Chapter 1
Chapter 1
1
Client/Server Networks
• Server-based network
• Clients and servers
• Data flows efficiently
• Servers respond to
requests from clients
• Servers perform specific
tasks
• Scalable network
• Centralized
12/23/2023 2
Classifications of
Client/Server Networks
• LAN
• Local area network
• Computers linked
together over a small
geographic region
12/23/2023 3
Classifications of
Client/Server Networks
• WAN
• Wide area network
• Computers linked
over large
geographic locations
• MAN
• Metropolitan area
network
• Computers linked
together within a
city or county
12/23/2023 4
Classifications of
Client/Server Networks
• PAN
• Personal area network
• Wireless devices connected in close proximity to each other
• Intranet
• Private corporate network
• Protected by a firewall
12/23/2023 5
Constructing
Client/Server Networks
• Servers
• Network topologies
• Transmission media
• Network operating
system (NOS)
• Network adapters
• Network navigation
devices
12/23/2023 6
Servers
• Number and type of servers
depend on network size and
workload
• Dedicated server
• Performs one specific function
• Authentication server
• Keeps track of network logins
and services available
• File server
• Stores and manages files
12/23/2023 7
Dedicated Servers
• Print server
• Manages client-requested printing jobs
• Creates print queue (prioritizes print jobs)
• Applications server
• Acts as a storage area for application software
• Database server
• Provides clients with access to database information
• E-mail server
• Processes and delivers in-coming and outgoing
e-mail
12/23/2023 8
Dedicated Servers
• Communications server
• Handles communications between networks including the Internet
• Often the only device on the network directly connected to the Internet
• Web server
• Hosts a Web site available through
the Internet
12/23/2023 9
P2P Networking/Computing
• P2P computing is the sharing of computer resources
and services by direct exchange between systems.
• These resources and services include the exchange
of information, processing cycles, cache storage, and
disk storage for files.
• P2P computing takes advantage of existing
computing power, computer storage and
networking connectivity, allowing users to leverage
their collective power to the “benefit” of all.
12/23/2023 10
P2P Architecture
• All nodes are both
clients and servers
• Provide and consume data
• Any node can initiate a
connection
• No centralized data
source
• “The ultimate form of
democracy on the Internet”
• “The ultimate threat to copy-
right protection on the
Internet
12/23/2023 11
What is P2P?
• A distributed system
architecture
• No centralized control
• Typically many nodes, but
unreliable and heterogeneous
• Nodes are symmetric in Internet
Internet
function
• Take advantage of distributed,
shared resources (bandwidth,
CPU, storage) on peer-nodes
• Fault-tolerant, self-organizing
• Operate in dynamic
environment, frequent join and
leave is the norm
12/23/2023 12
P2P Network Characteristics
• Clients are also servers and routers
• Nodes contribute content, storage, memory, CPU
• Nodes are autonomous (no administrative
• authority)
• Network is dynamic: nodes enter and leave the network
“frequently”
• Nodes collaborate directly with each other (not through well-
known servers)
• Nodes have widely varying capabilities
12/23/2023 13
P2P vs. Client/Server
• Pure P2P:
• No central server
• For certain requests any peer can function as a client,
as a router, or as a server
• The information is not located in a central location but
is distributed among all peers
• A peer may need to communicate with multiple peers
to locate a piece of information
12/23/2023 2.17
Figure 2.1 Tasks involved in sending a letter
12/23/2023 2.18
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
12/23/2023 2.20
Figure 2.2 Seven layers of the OSI model
12/23/2023 2.21
Figure 2.3 The interaction between layers in the OSI model
12/23/2023 2.22
Figure 2.4 An exchange using the OSI model
12/23/2023 2.23
2-3 LAYERS IN THE OSI MODEL
12/23/2023 2.24
Figure 2.5 Physical layer
12/23/2023 2.25
Physical layer
12/23/2023 2.26
Physical layer
Synchronization of bits. The sender and receiver not only must use the same bit rate but
also must be synchronized at the bit level. In other words, the sender and the receiver clocks
must be synchronized.
o Line configuration. The physical layer is concerned with the connection of devices to the
media. In a point-to-point configuration, two devices are connected through a dedicated
link. In a multipoint configuration, a link is shared among several devices.
o Physical topology. The physical topology defines how devices are connected to make a
network. Devices can be connected by using a mesh topology (every device is connected to
every other device), a star topology (devices are connected through a central device), a ring
topology (each device is connected to the next, forming a ring), a bus topology (every device
is on a common link), or a hybrid topology (this is a combination of two or more topologies).
12/23/2023 2.27
Physical layer
Transmission mode. The physical layer also defines the direction of transmission between
two devices: simplex, half-duplex, or full-duplex. In simplex mode, only one device can send;
the other can only receive.
The simplex mode is a one-way communication. In the half-duplex mode, two devices can
send and receive, but not at the same time. In a full-duplex (or simply duplex) mode, two
devices can send and receive at the same time.
12/23/2023 2.28
Note
12/23/2023 2.29
Figure 2.6 Data link layer
12/23/2023 2.30
Figure 2.6 Data link layer
Other responsibilities of the data link layer include the following:
Framing. The data link layer divides the stream of bits received from the network layer into
manageable data units called frames.
Physical addressing. If frames are to be distributed to different systems on the network, the
data link layer adds a header to the frame to define the sender and/or receiver of the frame. If the
frame is intended for a system outside the sender's network, the receiver address is the address
of the device that connects the network to the next one.
Flow control. If the rate at which the data are absorbed by the receiver is less than the rate at
which data are produced in the sender, the data link layer imposes a flow control mechanism to
avoid overwhelming the receiver.
Error control. The data link layer adds reliability to the physical layer by adding mechanisms to
detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate
frames. Error control is normally achieved through a trailer added to the end of the frame.
12/23/2023 2.31
Figure 2.6 Data link layer
Access control. When two or more devices are connected to the same link, data link layer
protocols are necessary to determine which device has control over the link at any given time.
12/23/2023 2.32
Note
12/23/2023 2.33
Figure 2.7 Hop-to-hop delivery
12/23/2023 2.34
Figure 2.8 Network layer
12/23/2023 2.35
Figure 2.8 Network layer
12/23/2023 2.36
Figure 2.8 Network layer
12/23/2023 2.37
Note
12/23/2023 2.38
Figure 2.9 Source-to-destination delivery
12/23/2023 2.39
Figure 2.10 Transport layer
12/23/2023 2.40
Note
12/23/2023 2.41
Figure 2.11 Reliable process-to-process delivery of a message
12/23/2023 2.42
Figure 2.12 Session layer
12/23/2023 2.43
Session layer
The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes. The session layer is the network dialog controller.
It establishes, maintains, and synchronizes the interaction among communicating systems.
Specific responsibilities of the session layer include the following:
Dialog control. The session layer allows two systems to enter into a dialog. It allows the
communication between two processes to take place in either halfduplex (one way at a time)
or full-duplex (two ways at a time) mode.
Synchronization. The session layer allows a process to add checkpoints, or synChronization
points, to a stream of data.
For example, if a system is sending a file of 2000 pages, it is advisable to insert checkpoints
after every 100 pages to ensure that each 100-page unit is received and acknowledged
independently.
12/23/2023 2.44
Session layer
In this case, if a crash happens during the transmission of page 523, the only pages that need
to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be
resent.
12/23/2023 2.45
Note
12/23/2023 2.46
Figure 2.13 Presentation layer
12/23/2023 2.47
Presentation layer
In this case, if a crash happens during the transmission of page 523, the only pages that need
to be resent after system recovery are pages 501 to 523. Pages previous to 501 need not be
resent. Specific responsibilities of the presentation layer include the following:
Translation. The processes (running programs) in two systems are usually exchanging
information in the form of character strings, numbers, and so on.
The information must be changed to bit streams before being transmitted. Because different
computers use different encoding systems, the presentation layer is responsible for
interoperability between these different encoding methods.
The presentation layer at the sender changes the information from its sender-dependent
format into a common format.
The presentation layer at the receiving machine changes the common format into its
12/23/2023
receiver-dependent format. 2.48
Presentation layer
12/23/2023 2.49
Note
12/23/2023 2.50
Figure 2.14 Application layer
12/23/2023 2.51
Application layer
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information
services.
Specific services provided by the application layer include the following:
Network virtual terminal. A network virtual terminal is a software version of a physical
terminal, and it allows a user to log on to a remote host.
To do so, the application creates a software emulation of a terminal at the remote host. The
user's computer talks to the software terminal which, in turn, talks to the host, and vice
versa. The remote host believes it is communicating with one of its own terminals and allows
the user to log on.
12/23/2023 2.52
Application layer
File transfer, access, and management: This application allows a user to access files in a
remote host (to make changes or read data), to retrieve files from a remote computer for use
in the local computer, and to manage or control files in a remote computer locally.
Mail services: This application provides the basis for e-mail forwarding and storage.
Directory services. This application provides distributed database sources and access for
global information about various objects and services.
12/23/2023 2.53
Note
12/23/2023 2.54
Figure 2.15 Summary of layers
12/23/2023 2.55
2-4 TCP/IP PROTOCOL SUITE
Transport Layer
Traditionally the transport layer was represented in TCP/IP by two protocols:
TCP and UDP.
IP is a host-to-host protocol, meaning that it can deliver a packet from one
physical device to another.
UDP and TCP are transport level protocols responsible for delivery of a
message from a process (running program) to another process.
A new transport layer protocol, SCTP, has been devised to meet the needs of
some newer applications.
12/23/2023 [email protected] 2.63
2-4 TCP/IP PROTOCOL SUITE
User Datagram Protocol
The User Datagram Protocol (UDP) is the simpler of the two standard TCPIIP
transport protocols.
It is a process-to-process protocol that adds only port addresses, checksum
error control, and length information to the data from the upper layer.
Transmission Control Protocol
The Transmission Control Protocol (TCP) provides full transport-layer services
to applications.
TCP is a reliable stream transport protocol. The term stream, in this context,
means connection-oriented: A connection must be established between both
12/23/2023 [email protected] 2.64
2-4 TCP/IP PROTOCOL SUITE
At the sending end of each transmission, TCP divides a stream of data into smaller
units called segments.
Each segment includes a sequence number for reordering after receipt, together
with an acknowledgment number for the segments received. Segments are
carried across the internet inside of IP datagrams.
At the receiving end, TCP collects each datagram as it comes in and reorders the
transmission based on sequence numbers.
Stream Control Transmission Protocol
The Stream Control Transmission Protocol (SCTP) provides support for newer
applications such as voice over the Internet.
It12/23/2023
is a transport layer protocol [email protected]
combines the best features of UDP and TCP. 2.65
2-5 ADDRESSING
The physical address, also known as the link address, is the address of a node as defined by its LAN
or WAN. It is included in the frame used by the data link layer.
It is the lowest-level address.
The physical addresses have authority over the network (LAN or WAN).
The size and format of these addresses vary depending on the network.
For example, Ethernet uses a 6-byte (48-bit) physical address that is imprinted on the network
interface card (NIC).
07:01:02:01:2C:4B
753
6 Presentation
5 Session
4 Transport INTRODUCTION
3 Network
2 Data Link
1 Physical
12/23/2023 [email protected] 80
7 Application NETWORK GOALS
Communications
5 Session Information can be distributed very quickly, such as
email and video conferencing.
4 Transport
Saving Money
Resources such as information, software, and
3 Network hardware can be shared.
1 Physical
12/23/2023 [email protected] 81
7 Application APPLICATIONS
5 Session • Email
• Chat
• Web sites
4 Transport
• Sharing of documents and pictures
• Accessing a centralized database of information
3 Network • Mobile workers
2 Data Link
1 Physical
12/23/2023 [email protected] 82
7 Application NETWORK STRUCTURE
Subnet
5 Session Carries messages from host to host. It is made up
of telecommunication lines (i.e. circuits, channels,
4 Transport trunks) and switching elements (i.e. IMPs, routers).
Hosts
3 Network End user machines or computers.
1 Physical
12/23/2023 [email protected] 83
7 Application NETWORK ARCHITECTURES
12/23/2023 [email protected] 84
7 Application NETWORK ARCHITECTURES
2 Data Link
1 Physical
12/23/2023 [email protected] 85
7 Application OSI REFERENCE MODEL
1 Physical
12/23/2023 [email protected] 86
7 Application OSI REFERENCE MODEL
12/23/2023 [email protected] 87
7 Application OSI REFERENCE MODEL
12/23/2023 [email protected] 88
7 Application OSI REFERENCE MODEL
1 Physical
12/23/2023 [email protected] 89
7 Application OSI REFERENCE MODEL
Main topics:
4 Transport
• Connection-oriented and connectionless services
• Transmission Control Protocol (TCP)
3 Network • User Datagram Protocol (UDP)
2 Data Link
1 Physical
12/23/2023 [email protected] 90
7 Application OSI REFERENCE MODEL
3 Network d) Synchronization.
2 Data Link
1 Physical
12/23/2023 [email protected] 91
7 Application OSI REFERENCE MODEL
2 Data Link
1 Physical
12/23/2023 [email protected] 92
7 Application OSI REFERENCE MODEL
1 Physical
12/23/2023 [email protected] 93
7 Application SERVICES
1. Terminologies
5 Session
Entities – active elements in each layer (e.g.
process, intelligent I/O chip).
4 Transport Peer Entities – entities in the same layer on
different machines.
3 Network Service Provider – Layer N.
Service User – Layer N + 1.
2 Data Link
Service Access Points – places where layer N + 1
can access services offered by layer N.
1 Physical
12/23/2023 [email protected] 94
7 Application SERVICES
12/23/2023 [email protected] 95
7 Application SERVICES
Analog Bandwidth
5 Session • Measurement is in Hertz (Hz) or cycles/sec.
1 Physical
12/23/2023 [email protected] 97
7 Application TRANSMISSION MEDIA
6 Presentation 1. Guided
Data is sent via a wire or optical cable.
5 Session Twisted Pair
Two copper wires are twisted together to reduce
the effect of crosstalk noise. (e.g. Cat5, UTP, STP)
4 Transport
Baseband Coaxial Cable
3 Network A 50-ohm cable used for digital transmission. Used
in 10Base2 and 10Base5.
2 Data Link Broadband Coaxial Cable
A 75-ohm cable used for analog transmission such
1 Physical as Cable TV.
12/23/2023 [email protected] 98
7 Application TRANSMISSION MEDIA
1 Physical
* Fiber optic cables are difficult to tap (higher security)
and are normally used for backbone cabling.
12/23/2023 [email protected] 99
7 Application TRANSMISSION MEDIA
6 Presentation 2. Unguided
Data is sent through the air.
5 Session
Line-of-sight
Transmitter and receiver must “see” each other,
4 Transport such as a terrestrial microwave system.
Communication Satellites
3 Network
A big microwave repeater in the sky. Data is
broadcasted, and can be “pirated.”
2 Data Link
Radio
Term used to include all frequency bands, such as
1 Physical
FM, UHF, and VHF television.
6 Presentation 1. Modulation
Modulating a sine wave carrier to convey data.
5 Session
Amplitude Modulation (AM)
Amplitude is increased/decreased while frequency
4 Transport remains constant.
6 Presentation 2. Modems
A device that accepts digital signals and outputs a
modulated carrier wave, and vice versa.
5 Session
It is used to interconnect the digital computer to the
4 Transport analog telephone network.
2 Data Link
1 Physical
3 Network Hubs
• Multi-port repeater.
2 Data Link • Interconnects several computers.
• Does not filter data traffic.
1 Physical
6 Presentation
5 Session
2 Data Link
1 Physical
B(A,2) C(B,3)
5 Session B 1 C
2
4 Transport A(-,-) 3 2 3
D(E,3)
2
A D F(E,4)
3 Network 1
1 F
E(A,2) 2
2 Data Link 2
E
1 Physical
A–E–D–F
A – E – F is the answer.
12/23/2023 [email protected] 108
7 Application ROUTING ALGORITHMS
6 Presentation 2. Flooding
1 Physical
6 Presentation Format
xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
where x is either 0 or 1
5 Session
Example 1:
4 Transport 11111111. 11111111.00000000.00000000
255.255.0.0
3 Network
Example 2:
2 Data Link 11111111. 11111111.10000000.00000000
1 Physical 255.255.192.0
Example 3:
1 Physical
IP address of computer 180.100.7.2
Mask 255.255.192.0
Network address 180.100.0.0
12/23/2023 [email protected] 111
7 Application IP ADDRESSING
6 Presentation Mask
6 Presentation Subnets
The Internet is running out of IP address. One solution
is to subnet a network address.
5 Session
This is done by borrowing host bits to be used as
4 Transport network bits.
Example:
3 Network
Class B mask 255.255.0.0
Borrowing 1 bit gives a subnet mask of 255.255.128.0
2 Data Link Borrowing 2 bits gives a subnet mask of 255.255.192.0
Borrowing 3 bits gives a subnet mask of 255.255.224.0
Borrowing 4 bits gives a subnet mask of 255.255.240.0
1 Physical
6 Presentation Example:
Given an IP address of 180.200.0.0, subnet by
borrowing 4 bits.
5 Session
Subnet mask = 255.255.240.0
4 Transport The 4 bits borrowed are value 128, 64, 32, 16. This will
create 16 sub networks, where the first and last will be
unusable.
3 Network
Sub network address:
2 Data Link 180.200.0.0
180.200.16.0
180.200.32.0
1 Physical
180.200.48.0
180.200.64.0
etc…
12/23/2023 [email protected] 114
7 Application IP ADDRESSING
180.200.31.255
1 Physical
2 Data Link
1 Physical