Top Banner
Introduction to Networking Khalid M. Al-Tawil, Ph.D [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Computer Networks
49

Introduction to Networking Khalid M. Al-Tawil, Ph.D [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Introduction to Networking

Khalid M. Al-Tawil, Ph.D

[email protected]

Department of Computer Engineering

King Fahd University of Petroleum and Minerals

Dhahran, Saudi Arabia

Computer Networks

Page 2: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

What is Networking?

When you use a computer not connected to a network, you are working in what is called a stand-alone environment.

Computers connected over a network can make that information exchange easier and faster. The information moves directly from computer to computer rather than through a human intermediary. People can concentrate on getting their work done rather than on moving information around the company

Page 3: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

LAN

A local area network (LAN) is a number of computers connected to each other by cable in a single location, usually a single floor of a building or all the computers in a small company.

While local area networks are perfect for sharing resources within a building or campus, they cannot be used to connect distant sites.

Page 4: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

WANs

Stated simply, wide area networks are the set of connecting links between local area networks. These links are made over telephone lines leased from the various telephone companies. WANs can be created with satellite links, packet radio, or microwave transceivers. These options are generally far more expensive than leased telephone lines.

Page 5: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

WANs A WAN, spans a larger area, often a country or

continent. It contains a collection of machines (call these hosts) intended for running user (i.e. ,application) programs. The hosts are connected by a communication subnet, or just subnet for short. The job of the subnet is to carry messages from host to host,

In most WANs, the subnet consists of two distinct components: transmission lines and switching elements. Transmission lines (also called circuits, channels, or trunks) move bits between machines.

Page 6: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Limitation of WAN

WANs suffer from extremely limited bandwidth. The fastest commercially feasible wide area data links are many times slower than the slowest local area links. This makes the sharing of resources over a WAN difficult. Generally, WAN links are used only for interprocess communications to route short messages, such as e-mail or HTML (World Wide Web) traffic.

Page 7: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Advantages of Networking

Sharing Information Sharing Hardware Resources Sharing Software Resources Preserving Information Protecting Information

Page 8: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Sharing Hardware Resources

Networked computers can also share» Fax modems

» Floppy drives

» CD-ROMs

» Tape backup units

» Plotters

» Scanners

» Hard disks

» Almost any other device that can be attached to the computer.

Page 9: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Sharing Hardware Resources

You can attach some peripherals directlydirectly to the network; they do not need to be attached to a computer to be shared on the network.

Page 10: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Clients, Servers, and Peers

There are three roles for computer in a local area network:» Clients, which we use but do not provide network

resources

» Peers, which both use and provide network resources

» Servers, which provide network resources.

Page 11: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Advantages of Server-Based Networks

Strong central security Central file storage, which allows all users to work

from the same set of data and provides easy backup of critical data

Ability of servers to pool available hardware and software, lowering overall costs

Page 12: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Advantages of Server-Based Networks

Ability to share expensive equipment, such as laser printers

Easy manageability of a large number of users Central organization, which keeps data from

getting lost among computers

Page 13: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Disadvantages of Server-Based Networks

Expensive dedicated hardware Expensive network operating system software and

client licenses. A dedicated network administrator (usually

required)

Page 14: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Protocol Hierarchies

To reduce their design complexity, most networks are organized as a series of layers or levels, each one built upon the below it. The purpose of each layer is to offer certain services to the higher layers, shielding those layers from the details of how the offered services to the higher layers from the details of how the offered services are actually implemented.

Page 15: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Protocol Hierarchies

Layer n on one machine carries on a conversation with layer n on another machine. The rules and conventions used in this conversation are collectively known as the layer n protocol. Basically, a protocol is an agreement between the communicating parties on how communication is to proceed.

Page 16: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Protocol Hierarchies

In reality, no data are directly transferred from layer n on one machine to layer n on another machine. Instead, each layer passes data and control information to the layer immediately below it, until the lowest layer is reached. Below layer 1 is the physical medium through which actual communication occurs.

Page 17: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Design Issues for the Layers

Rules for the data transfer Error control Preserve the order of messages sent on them. How to keep a fast sender from swamping a slow

receiver with data. Inability of all processes to accept arbitrarily long

messages. When there are multiple paths between source and

destination, a route must be chosen.

Page 18: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Connection-less/Connection-Oriented Protocols

There are two ways that communications between computers can be arranged: Connectionless and connection oriented.

Connectionless systems optimistically assume that all data will get through, so there’s no protocol overhead for guaranteed delivery or sequential packet ordering. This makes them fast..

Page 19: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Connection-less/Connection-Oriented Protocols

Connection-oriented systems pessimistically presume that some data will be lost or disordered in most transmissions. Connection oriented protocols guarantee that transmitted data will reach its destination. Transmission Control Protocol (TCP/IP) is an example of a connection-oriented internet protocol.

Page 20: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Connectionless versus Connection-Oriented

Protocols

All is not lost for connectionless transports, however, since higher level protocols will know what data has not reached its destination after some time and request retransmission. The higher level protocol must sort out the data packets.

Page 21: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Interfaces & Services

The function of each layer is to provide services to the layer above it.

The active elements in each layer are called entities. An entity can be a software entity (such as a process) or a hardware entity (such as an intelligent I/O chip).

Entities on the same layer in different machines are called peer entities.

The entities in layer n implement a service used by layer n+1.

Page 22: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Differences between Services and Protocols

A service is a set of primitives (operations) that a layer provides to the layer above it. Defines what operations the layer is prepared to perform on behalf of its users, says nothing at all about how these operations are implemented.

Page 23: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Differences between Services and Protocols

A protocol, in contrast, is a set of rules governing the format and meaning of the frames, packets, or messages that are exchanged by the peer entities within a layer. Entities use protocols in order to implement their service definitions.

A protocol relates to the implementation of the service and as such is not visible to the user of the services.

Page 24: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

The OSI Model

The International Organization for Standardization (ISOISO) began developing the OSI reference model in 1977. It has since become the most widely accepted model for understanding network communication.

This model is based on a proposal developed by the International Standards Organization (ISO). The model is called the ISO OSIISO OSI (Open Systems Interconnect) Reference Model.

Page 25: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

The OSI Model

The OSI model itself is not a network architecture because it does not specify the exacts services and protocols to be used in each layer. It just tells what each layer should do.

Page 26: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

The OSI Model (contd.)

The OSI model consists of 7 layers:» Application

» Presentation

» Session

» Transport

» Network

» Data Link

» Physical

Page 27: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

ApplicationPresentation

Session

TransportNetwork

Data link

Physical

ApplicationPresentation

Session

TransportNetwork

Data link

Physical

A message sent from one peer layer to another

UNIX MACINTOSH

Page 28: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Original data

Original data

Original data

Original data

Original data

Original data

Original data

Hp

Hs

Ht

Hn

Hd

Original data

Original data

Original data

Original data

Original data

Original data

Original data

Hp

Hs

Ht

Hn

Hd

Application

Presentation

Session

Transport

Network

Data link

Physical

DOS Macintosh

Hp -Presentation headerHt =Transport headerHs =Session headerHn =Network headerHd =Data Link header

The OSI model and headers

Page 29: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Physical Layer

The Physical Layer is simply responsible for sending bits from one computer to the another. The Physical Layer is not concerned with the meaning of the bits.

This level defines physical and electrical details, such as what will represent a 1 or a 0, how many pins a network connector will have, how data will be synchronized, and when the network adapter may or may not transmit the data.

Page 30: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Physical Layer

The following items are addressed at the physical layer» Network connection types, including multipoint and

point-to-point connections.

» Physical topologies, which are physical layouts of networks, such as bus, star or ringbus, star or ring

Page 31: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Bus Topology

Page 32: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

True Mesh

Page 33: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Hybrid Mesh

Page 34: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Hub

Hub

Hub

HubHub

.

Hybrid Star

Page 35: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Ring topology

Page 36: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Physical Layer

Analog and digital signaling, which include several methods for encoding data in a analog and digital signals.

Bit synchronization, which deals with synchronization between sender and receiver.

Baseband and Broadband transmissions, which are different methods for using media bandwidth.

Page 37: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Data Link Layer

The data link layer provides for the flow of data over a single link from one device to another. It accepts packets from the network layer and packages the information into data units called frames to be presented to the physical layer for transmission.

Page 38: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Data Link Layer

A Cyclic Redundancy Check (CRC) added to the data frame can detect damaged frames, and the data link layer in the receiving computer can request that the information be present. The data link layer can also detect when frames are lost and request that those frames be sent again.

Page 39: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Data Link Layer

A data frame that’s all packaged and ready to go follows this format:» The start indicator

» The source address

» The destination address

» The control portion: like special handling instructions

» The actual data

» The error control segment or the CRC

Page 40: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Data Link Layer

Bridges, intelligent hubs, and network interface cards are devices typically associated with the data link layer.

Two sub-layers make up the data link layer:» Media Access Control (MAC)

» Logical Link Control (LLC)

Page 41: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Network Layer

The network layer makes routing decisions and forwards packets for devices that are farther away than a single link. (A link connects two network devices and is implemented by the data link layer.

Page 42: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Network Layer

The network layer translates logical network addresses into physical machine addresses (the numbers used as destination IDs in the physical network cards). This layer also determines the quality of service (such as the priority of the message) and the route a message will take if there are several ways a message can get to its destination.

Page 43: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Network Layer

It also may break large packets into smaller chunks if the packet is larger than the largest data frame the data link layer will accept. The network reassembles the chunks into packets at the receiving end.

Routers and gateways operate in the network layer.

Page 44: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Network Layer (contd.)

The network layer serves to support communications between logically separate networks. This layer is concerned with the following.

– Addressing, including logical network addresses and service addresses

– Circuit, message, and packet switching – Route discovery and route selection– Connection services, including network layer flow control,

network layer error control, and packet sequence control.– Gateway services.

Page 45: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Transport Layer

The transport layer ensures that packets are delivered error free, in sequence, and with no losses or duplications. The transport layer breaks large messages from the session layer (which we’ll look at next) into packets to be sent to the destination computer and reassembles packets into messages to be presented to the session layer in the destination layer.

Page 46: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Session Layer

The session layer allows application on separate computers to share a connection called a session. This layer provides services such as name lookup and security to allow two programs to find each other and establish the communications link.

The session layer also provides for data synchronization and checkpointing so that in the event of a network failure, only the data sent after the point of failure need be resent.

Page 47: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Presentation Layer

Unlike all the lower layers, which are just interested in moving bits reliably from here to there.

The presentation layer translates data between the formats the network requires and the formats the computer excepts. This layer does protocol conversion, data translation, compression and encryption, character set conversion, and the interpretation of graphics commands.

Page 48: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Application Layer

It provides services that directly support user application, such as database access, e-mail, and file transfers. It also allows applications to communicate with applications on other computers as though they were on the same computer.

Page 49: Introduction to Networking Khalid M. Al-Tawil, Ph.D khalid@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals.

Summary

Overview of Networking» WANS, LANs, MANs, etc.

The ISO OSI Model Some networking topologies Networking in the Kingdom