580 likes | 590 Views
This study algorithm provides the background knowledge for the Introduction to Data Communications unit. It covers centralised and distributed data processing, the Internet's architecture, TCP/IP and OSI protocols, and more.
E N D
“Study algorithm for this unit” • Make up the background knowledge for this unit. • The subsequent chapter is related logically to the previous chapters.------- This means that you must make up them if you miss one or more. • You cannot fully understand the contents being covered by only attending the class ! • The content I am lecturing in the classes is harder than that of the text • Different learning outcomes, depending on the degree for which you are studying • The exam is relatively easier than….. Before coming to my classes (1) Read the corresponding chapter(s) to be covered (2) Read my PowerPoint slides published on the course website (3) Write down the questions you have If you have not done the above, then …… During my classes Concentrate on listening and thinking rather than talking ! Concentrate on understanding rather than writing ! ( make notes) After my classes Read the text and the slides again ! If you still have questions, then go to my office If you still have questions, then read the reference book(s) If you still have questions, then consider withdrawing from this unit
Last Week Topic 3 – Distributed Data Processing • Describe the differences between centralised and distributed data processing • Describe different types of distributed data processing for applications and distributed databases • Describe the implications for data comms of distributed data processing • Understand the motivation towards client server architectures
Last Week Topic 4 – The Internet • Discuss the history of the Internet and explain it’s explosive growth • Describe the overall Internet architecture including key components • Explain the components and operation of the Domain Name System
Topic 5 – TCP/IP and OSI Learning objectives • Describe the definition of a protocol; • Discuss the need and benefits of using protocol architectures; • Describe the TCP/IP protocol architecture • Describe the OSI reference model.
human protocols: “what’s the time?” “I have a question” introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols: machines rather than humans all communication activity in Internet governed by protocols What’s a protocol? protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
a human protocol and a computer network protocol: TCP connection response Get http://www.awl.com/kurose-ross Got the time? 2:00 <file> time What’s a protocol? Hi TCP connection request Hi
Protocol Architecture – Modular Approach • Breaks complex tasks into subtasks • Each module handles specific subset of tasks • Communication occurs • between different modules on the same system • between similar modules on different systems
Advantages of Modularity • Easier application development • Network can change without all programs being modified
ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Organization of air travel • a series of steps
ticket ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing baggage gate airplane routing airplane routing takeoff/landing airplane routing departure airport intermediate air-traffic control centers arrival airport Layering of airline functionality Layers: each layer implements a service • via its own internal-layer actions • relying on services provided by layer below
Three-Layer Model • Distributed data communications involves three primary components: • Networks • Computers • Applications • Three corresponding layers • Network access layer • Transport layer • Application layer
Network Access Layer • Concerned with exchange of data between computer and network • Includes addressing, routing, prioritizing, etc • Different networks require different software at this layer • Example: X.25 standard for network access procedures on packet-switching networks
Transport Layer • Concerned with reliable transfer of information between applications • Independent of the nature of the application • Includes aspects like flow control and error checking
Application Layer • Logic needed to support various applications • Each type of application (file transfer, remote access) requires different software on this layer
Addressing • Each computer on a network requires a unique address on that network • Each application requires a unique address within the computer to allow support for multiple applications (service access points, or SAP)
Data Transmission • Application layer creates data block • Transport layer appends header to create PDU (protocol data unit) • Destination SAP, Sequence #, Error-Detection Code • Network layer appends another header • Destination computer, facilities (e.g. “priority”)
Standardised Protocol Architectures • Vendors like standards because they make their products more marketable • Customers like standards because they enable products from different vendors to interoperate • Two protocol standards are well-known: • TCP/IP: widely implemented • OSI: less used, but widely known and still useful for modeling/conceptualizing
Transmission Control Protocol/Internet Protocol Developed by DARPA No official protocol model Identified by 5 Layers Application Host-to-Host (transport) Internet (Network) Network Access (link) Physical TCP/IP
network link physical link physical M M M Ht M Hn Hn Hn Hn Ht Ht Ht Ht M M M M Hn Ht Ht Hl Hl Hl Hn Hn Hn Ht Ht Ht M M M source Encapsulation message application transport network link physical segment datagram frame switch destination application transport network link physical router
TCP/IP Physical Layer • Physical interface between a DTE (e.g. computer or terminal) and a transmission medium • Specifies: • Characteristics of medium • Nature of signals • Data rate
TCP/IP Network Access (link) • Exchange of data between systems on a shared network • Utilizes address of host and destination • Can also prioritize transmission • Software at this layer depends on network (e.g. X.25 vs. Ethernet)
TCP/IP Internet Layer • An Internet is an interconnection of two or more networks • Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network • Uses IP for addressing and routing across networks • Implemented in workstations and routers
TCP/IP Transport Layer • Also called host-to-host layer • Reliable exchange of data between applications • Uses TCP protocols for transmission
TCP/IP Application Layer • Logic needed to support variety of applications • Separate module supports each type of application (e.g. file transfer)
TCP & UDP • Most TCP/IP applications use TCP for transport layer • TCP provides a connection (logical association) between two entities to regulate flow check errors • UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication
TCP service • Reliable, in-order byte-stream data transfer • loss: acknowledgements and retransmissions • Flow control: • sender won’t overwhelm receiver • Congestion control: • senders “slow down sending rate” when network congested
Goal: data transfer between end systems same as TCP UDP - User Datagram Protocol : connectionless unreliable data transfer no flow control no congestion control App’s using TCP: HTTP (Web), FTP (file transfer), Telnet (remote login), SMTP (email) App’s using UDP: streaming media, teleconferencing, DNS, Internet telephony UDP
IP and IPv6 • IP provides for 32-bit source and destination addresses • IPv6 (1996 standard) provides for 128-bit addresses • Migration to IPv6 will be a very slow process
TCP/IP Applications • SMTP (Simple Mail Transfer Protocol) • Basic e-mail facility, transferring messages among hosts • FTP (File Transfer Protocol) • Sends files from one system to another on user command • Telnet • Remote login capability, allowing a user to emulate a terminal on the remote system
Internetworking • Interconnected networks, usually implies TCP/IP • Can appear to users as a single large network • The global Internet is the largest example, but intranets and extranets are also examples
Origins of the OSI reference model • The early development of LANs, MANs, and WANs was chaotic in many ways. The early 1980s saw tremendous increases in the number and sizes of networks. • As companies realized that they could save money and gain productivity by using networking technology, they added networks and expanded existing networks as rapidly as new network technologies and products were introduced. • By the middle of the 1980s, companies began to experience difficulties from all the expansions they had made. It became more difficult for networks using different specifications and implementations to communicate with each other. To address the problem of networks being incompatible and unable to communicate with each other, the International Organization for Standardization (ISO) researched different network schemes.As a result of this research, the ISO created a model that would help vendors create networks that would be compatible with, and operate with, other networks. • the OSI reference model describes how data travels from application programs (for example, spreadsheets), through a network medium, to an application program located in another computer, even if the sender and receiver are connected using different network media.
Open Systems Interconnection Developed by ISO Contains seven layers OSI
OSI Lower Layers • Physical • Data Link • Network
OSI Physical Layer • Responsible for transmission of bits--binary transmission • Always implemented through hardware • This layer outlines the functional, procedural, electrical, and mechanical specifications for controlling physical links. The specifications relate to the activation, maintenance, and deactivation of physical links. It also controls the transmitting of data onto physical media. • e.g. RS-232 • A “hub” operates at this layer
OSI Data Link Layer • The data-link layer arranges bits from the physical layer into logical chunks of data, known as frames. A frame is a contiguous series of data with a common function. Framing enables the network to organize bits into a logical data format and send them to the correct computer. • This layer controls how data is formatted and how transmission on the network is controlled • Responsible for error-free, reliable transmission of data • Flow control, error correction • Controls access to the medium • e.g. HDLC, ethernet • A “switch” operates at this layer
OSI Network Layer • Responsible for routing of messages through network • ensures data delivery by providing connectivity and path selection between two host systems. • selects the most appropriate path for sending data, and routes data packets • Concerned with type of switching used (circuit v. packet) • Handles routing between networks, as well as through packet-switching networks • provides logical LAN-to-LAN communications by supporting the routing of data between different networks • IP protocol and IP addressing at this layer • A “router” operates at this layer
OSI Upper Layers • Transport • Session • Presentation • Application
OSI Transport Layer • Aids point-to-point communications • Isolates messages from lower and upper layers • Provides reliability in the transportation of data between hosts and ensures complete data transfer. The transport layer uses error detection and recovery information flow control to establish, maintain, and terminate all virtual circuits. • Breaks down message size • Monitors quality of communications channel • Selects most efficient communication service necessary for a given transmission • TCP/UDP operate at this layer
OSI Session Layer • Establishes logical connections between hosts:connection establishment, data transfer, and connection release • Manages log-ons, password exchange, log-offs • Terminates connection at end of session
OSI Presentation Layer • manages data representation • transforms data into a mutually agreed format that each application can understand • Provides format and code conversion services • Examples • File conversion from ASCII to EBDIC(Extended Binary-Coded Decimal Interchange Code ) • Encryption and compression • Invoking character sequences to generate bold, italics, etc on a printer
OSI Application Layer • Provides access to network for end-user • User’s capabilities are determined by what items are available on this layer
Layering: The OSI Model layer-to-layer communication Application Application 7 7 Presentation Presentation 6 6 Session Session 5 5 Peer-layer communication Transport Transport Router Router 4 4 Network Network Network Network 3 3 Link Link Link Link 2 2 Physical Physical Physical Physical 1 1
FTP ASCII/Binary TCP IP Ethernet TCP/IP - OSI Comparison Application Application Presentation Transport Session Transport Network Network Link Link Physical The 4-layer Internet model The 7-layer OSI Model
1 20 2 3 4 19 18 17 14 5 15 6 11 8 16 7 12 9 13 10 Example: FTP over the Internet Using TCP/IP and Ethernet App App “A” Stanford “B” (MIT) OS OS Ethernet Ethernet R5 R1 R2 R3 R4
In the sending host • Application-Programming Interface (API) • Application requests TCP connection with “B” • Transmission Control Protocol (TCP) • Creates TCP “Connection setup” packet • TCP requests IP packet to be sent to “B” TCP Packet TCP Data TCP Header Type = Connection Setup Empty
TCP Data TCP Header In the sending host (2) 3. Internet Protocol (IP) • Creates IP packet with correct addresses. • IP requests packet to be sent to router. TCP Packet Encapsulation Destination Address: IP “B” Source Address: IP “A” Protocol = TCP IP Data IP Header IP Packet
IP Data IP Header In the sending host (3) 4. Link (“MAC” or Ethernet) Protocol • Creates MAC frame with Frame Check Sequence (FCS). • Wait for Access to the line. • MAC requests PHY to send each bit of the frame. IP Packet Destination Address: MAC “R1” Source Address: MAC “A” Protocol = IP Encapsulation Ethernet FCS Ethernet Data Ethernet Header Ethernet Packet