760 likes | 778 Views
Learn about basic networking, communication protocols, and the history of the Internet & Web in this chapter. Understand different communication links, broadband options, Ethernet technologies, and Gigabit networks applications.
E N D
Chapter 7 Computer Networks, the Internet, and the World Wide Web
Objectives In this chapter, you will learn about • Basic networking concepts • Communication protocols • Network services and benefits • A brief history of the Internet and the World Wide Web
Introduction • Computer network • Computers connected together • Purpose: Exchanging resources and information • Just about any kind of information can be sent • Examples: Television and radio signals, voice, graphics, handwriting, photographs, movies
Basic Networking Concepts • Computer network • Set of independent computer systems connected by telecommunication links • Purpose: Sharing information and resources • Nodes, hosts, or end systems • Individual computers on a network
Communication Links • Switched, dial-up telephone line • A circuit is temporarily established between the caller and callee • Circuit lasts for the duration of the call. • Analog medium • Requires modem at both ends to transmit information produced by a computer • Computer produces digital information
Figure 7.2 Modulation of a Carrier to Encode Binary Information
Communication Links (continued) • Dial-up phone links • Initial transmission rates of 300 bps • Later in 1980s increased to 1,200-9,600 bps • Transmission rate now: 56,000 bps (56 Kbps) • Too slow for web pages, MP3, streaming video • Still used to access networks in remote areas. • Broadband • Transmission rate: Exceeding 256,000 bps (256 Kbps) • Is “always on”, so do not have to wait for connection
Communication Links (continued) • Options for broadband communications • Broadband refers to transmission rates over 256K bps. • Home use • Digital subscriber line (DSL) • Cable modem • Commercial and office environment • Ethernet • Fast Ethernet • Gigabit Ethernet
Communication Links (continued) • Digital subscriber line (DSL) • DSL is a “permanently on” connection • Transmits digital signals at different frequencies, so no interference with voice. • Line is often asymmetric with download & upload bandwidths. • Cable modem • Uses links that deliver TV signals to homes. • Speeds roughly comparable to DSL. • Signal is “always on”.
Communication Links (continued) • Commercial and office environment • Ethernet – mid 1970’s • Most common with 10Mbps • Often available in dorms and new homes • Fast Ethernet developed in • 100 Mbps – 1990’s • Coaxial cable, fiber-optic cable, or regular twisted-pair copper wire. • Gigabit Ethernet project • In 1998, achieved 1000 Mbps • In 2003 achieved 10 billion bps • Transmit entire contents of 1,700 books, each 300 pages long in a single second
Figure 7.3 Transmission Time of an Image at Different Transmission Speeds
Gigabit Networks Applications • Transmitting real-time video images without flicker or delay • Exchanging 3D medical images • Transmitting weather satellit data • Supporting researchers working on Human Genome project.
Communication Links (continued) • Wireless data communication • Uses radio, microwave, and infrared signals • Enables “mobile computing” • Types of wireless data communication • Wireless local access network • Wireless wide-area access network
Wireless data communication • Wireless local access network • Transmits few hundred feet • Connected to standard wired network • Found in home, coffee shops, offices • Wi-Fi (Wireless Fidility) connects wireless computer to internet within 150-300 ft of access point (called hot spots). • Wireless wide-area access network • Computer transmits message to remote base station, which may be miles away • Base station typically a large antenna on top of a tower. • Some are only line-of-sight, so not more than 10-50 miles apart.
Local Area Networks • Local area network (LAN) • Connects hardware devices that are in close proximity • The owner of the devices is also the owner of the means of communications • Common wired LAN topologies • Bus • Ring • Star
Figure 7.4 Some Common LAN Topologies
Common LAN Topologies • Buses • If two or more nodes use the link at the same time, messages collide and are unreadable • Nodes must take turns using net. • Rings • Messages circulate in either clockwise or counterclockwise direction until at destination • Star • Central node routes information directly to any other node.
Local Area Networks(continued) • Ethernet • Most widely used LAN technology • Uses the bus topology • Node places message including destination address on bus. • This message is received by all other nodes • All nodes check address to see if message is for them. • Nodes who are not addressed discard message
Local Area Networks(continued) • Two ways to construct an Ethernet LAN • Shared cable • Hubs: The most widely used technology • Shared cable features • Wire is strung through the building. • Users connect into cable at nearest point. • Repeater amplifies and forwards signal • If two Ethernets are connected using a repeater, they function as a single network. • Bridge (or switch) joining two networks has knowledge about nodes on each • It forwards messages to other network only if needed.
Figure 7.5 An Ethernet LAN Implemented Using Shared Cables
Hubs for LANs • In this construction of a LAN, a box called a hub is used in place of shared cable • Hubs are boxes with a number of ports. • Hubs are placed in a wiring closet. • Each node in Ethernet LAN is connected to a port • Hubs are connects these ports using a shared cable inside hub
Figure 7.6 An Ethernet LAN Implemented Using a Hub
Wide Area Networks • Wide area networks (WANs) • Connect devices that are across town, across the country, or across the ocean • Users must purchase telecommunications services from an external provider • Dedicated point-to-point lines • Most use a store-and-forward, packet-switched technology to deliver messages
Figure 7.7 Typical Structure of a Wide Area Network
Overall Structure of the Internet • All real-world networks, including the Internet, are a mix of LANs and WANs • Example: A company or a college • One or more LANs connecting its local computers • Individual LANs interconnected into a wide-area company network • Routers are used to connect networks of both similar and dissimilar types. • A router can connect an LAN to a WAN. • A bridge can only connect two networks of identical type.
Figure 7.8(a) Structure of a Typical Company Network
Overall Structure of the Internet (continued) • Internet Service Provider (ISP) • Normally a business • Provides a pathway from a specific network to other networks, or from an individual’s computer to other networks • This access occurs through a WAN owned by the ISP • ISPs are hierarchical • Interconnect to each other in multiple layers to provide greater geographical coverage • A regional or national ISP may connect to an international IPS called a tier-1 network or Internet backbone.
T1 & T3 Lines • A dedicated phone connection supporting data rates of 1.544 Mbits per second. • Consists of 24 individual channels, each of which supports 64Kbits per second. • Each 64Kbit/second channel can be configured to carry voice or data traffic. • T-1 lines are a popular leased line option for businesses connecting to the Internet and for Internet Service Providers (ISPs) connecting to the Internetbackbone. • The Internet backbone itself consists of faster T-3 connections. • Reference: Webopedia
Figure 7.8(b) Structure of a Network Using an ISP
Figure 7.8(c) Hierarchy of Internet Service Providers
Overall Structure of the Internet (continued) • Internet • A huge interconnected “network of networks” • Includes nodes, LANs, WANs, bridges, routers, and multiple levels of ISPs • Early 2005 • 317 million nodes (hosts) • Hundreds of thousands of separate networks located in over 225 countries
Communication Protocols • A protocol • A mutually agreed upon set of rules, conventions, and agreements for the efficient and orderly exchange of information • Internet is operated by the Internet Society, a nonprofit society consisting of over 100 worldwide organizations, foundations, businesses, etc. • TCP/IP • The Internet protocol hierarchy • Governs the operation of the Internet • Named after 2 of the most successful protocols • Consists of five layers (see next slide)
Figure 7.10 The Five-Layer TCP/IP Internet Protocol Hierarchy
Physical Layer • Protocols govern the exchange of binary digits across a physical communication channel • Specify such things as • What signal is used to indicate a bit on the line • How long will “bit on the line” signal last • Will signal be digital or analog • What voltage levels are used to represent 0 & 1 • Goal: Create a bit pipe between two computers
Data Link Layer • Protocols carry out • Error detection and correction • Framing • Which bits in incoming stream belong together • Identifying start and end of message • Creates an error-free message pipe • Composed of two stages • Layer 2a: Medium access control • Layer 2b: Logical link control
Data Link Layer (continued) • Medium access control protocols • Determine how to arbitrate ownership of a shared line when multiple nodes want to send at the same time • Logical link control protocols • Ensure that a message traveling across a channel from source to destination arrives correctly
Automatic Repeat Request (ARQ) Algorithm Part of Logical Link Protocols - layer 2b Assures message travels from A to B correctly
Automatic Repeat Request (ARQ) • Process of requesting that a data transmission be resent • Main ARQ protocols • Stop and Wait ARQ (A half duplex technique) • Sender sends a message and waits for acknowledgment, then sends the next message • Receiver receives the message and sends an acknowledgement, then waits for the next message • Continuous ARQ (A full duplex technique) • Sender continues sending packets without waiting for the receiver to acknowledge • Receiver continues receiving messages without acknowledging them right away
Stop and Wait ARQ Sender Receiver Sends the packet, then waits to hear from receiver. Sends acknowledgement Sends the next packet Sends negative acknowledgement Resends the packet again
Continuous ARQ Sender sends packets continuously without waiting for receiver to acknowledge Notice that acknowledgments now identify the packet being acknowledged. Receiver sends back a NAK for a specific packet to be resent.
Source of Error What causes it How to prevent it Line Outages Faulty equipment, Storms, Accidents (circuit fails) White Noise (hiss) (Gaussian Noise) Movement of electrons (thermal energy) Increase signal strength (increase SNR) Impulse Noise (Spikes) Sudden increases in electricity (e.g., lightning, power surges) Shield or move the wires Cross-talk Multiplexer guard bands are too small or wires too close together Increase the guard bands, or move or shield the wires Echo Poor connections (causing signal to be reflected back to the source) Fix the connections, or tune equipment Attenuation Gradual decrease in signal over distance (weakening of a signal) Use repeaters or amplifiers Intermodulation Noise Signals from several circuits combine Move or shield the wires Jitter Analog signals change (small changes in amp., freq., and phase) Tune equipment Harmonic Distortion Amplifier changes phase (does not correctly amplify its input signal) Tune equipment Sources of Errors and Prevention More important mostly on analog
Error Detection Sender calculates an Error Detection Value (EDV) and transmits it along with data Receiver recalculates EDV and checks it against the received EDV Mathematical calculations Mathematical calculations ? = Data to be transmitted EDV • If the same No errors in transmission • If different Error(s) in transmission Larger the size, better error detection (but lower efficiency)
Error Detection Techniques • Parity checks • Longitudinal Redundancy Checking (LRC) • Polynomial checking • Checksum • Cyclic Redundancy Check (CRC)
Parity Checking • One of the oldest and simplest • A single bit added to each character • Even parity: number of 1’s remains even • Odd parity: number of 1’s remains odd • Receiving end recalculates parity bit • If one bit has been transmitted in error the received parity bit will differ from the recalculated one • Simple, but doesn’t catch all errors • If two (or an even number of) bits have been transmitted in error at the same time, the parity check appears to be correct • Detects about 50% of errors
sender receiver EVEN parity 01101010 number of all transmitted 1’s remains EVEN parity sender receiver ODD parity 01101011 number of all transmitted 1’s remains ODD parity Examples of Using Parity To be sent: Letter V in 7-bit ASCII: 0110101
LRC - Longitudinal Redundancy Checking • Adds an additional character (instead of a bit) • Block Check Character (BCC) to each block of data • Determined like parity but, but counting longitudinally through the message (as well as vertically) • Calculations are based on the 1st bit, 2nd bit, etc. (of all characters) in the block • 1st bit of BCC number of 1’s in the 1st bit of characters • 2nd bit of BCC number of 1’s in the 2ndt bit of characters • Major improvement over parity checking • 98% error detection rate for burst errors ( > 10 bits) • Less capable of detecting single bit errors
Using LRC for Error Detection Example: Send the message “DATA” using ODD parity and LRC ASCII 1 0 0 0 1 0 0 1 0 0 0 0 0 1 1 0 1 0 1 0 0 1 0 0 0 0 0 1 Parity bit 1 1 0 1 Letter D A T A BCC 1 1 0 1 1 1 1 1 Note that the BCC’s parity bit is also determined by parity
Polynomial Checking • Adds 1 or more characters to the end of message (based on a mathematical algorithm) • Two types: Checksum and CRC • Checksum • Calculated by adding decimal values of each character in the message, • Dividing the total by 255. and • Saving the remainder (1 byte value) and using it as the checksum • 95% effective • Cyclic Redundancy Check (CRC) • Computed by calculating the remainder to a division problem: