Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Computer
Communication
Jan 5, 1998
CMPN 369
Page 1
Topics
1. INTRODUCTION
2. PHYSICAL
LAYER
3. DATA LINK
LAYER
4. NETWORK
LAYER
5. TRANSPORT
LAYER
6. APPLICATION
LAYER
7. TCP/IP
SECURITY
Topics
1. INTRODUCTION
1.
2.
HISTORY
TYPES OF NETWORKS: LAN, WAN
3.
4.
5.
2.
PHYSICAL LAYER
3.
4.
NETWORK LAYER
5.
TRANSPORT LAYER
6.
APPLICATION LAYER
7.
TCP/IP SECURITY
Topics
1.
INTRODUCTION
2. PHYSICAL LAYER
1.
2.
3.
SOME PHYSICS
TRANSMISSION MEDIA,
MODULATION
TELEPHONE SYSTEM, MODEMS
4.
BASEBAND, BROADBAND
TRANSMISSION
5.
ATM TRANSMISSION
3.
4.
NETWORK LAYER
5.
TRANSPORT LAYER
6.
APPLICATION LAYER
7.
TCP/IP SECURITY
Topics
1.
INTRODUCTION
2.
PHYSICAL LAYER
3.
4.
4.
NETWORK LAYER
5.
TRANSPORT LAYER
6.
APPLICATION LAYER
7.
TCP/IP SECURITY
Topics
1.
INTRODUCTION
2.
PHYSICAL LAYER
3.
4.
NETWORK LAYER
1.
ROUTING, ROUTING
PROTOCOLS
2.
IP ADDRESSING, SUBNETS,
NETMASK
5.
TRANSPORT LAYER
6.
APPLICATION LAYER
7.
TCP/IP SECURITY
Topics
1.
INTRODUCTION
2.
PHYSICAL LAYER
3.
4.
NETWORK LAYER
5. TRANSPORT LAYER
1.
2.
SOCKET PROGRAMMING
6.
APPLICATION LAYER
7.
TCP/IP SECURITY
Topics
1.
INTRODUCTION
2.
PHYSICAL LAYER
3.
4.
NETWORK LAYER
5.
TRANSPORT LAYER
6.
APPLICATION LAYER
7.
1.
2.
BASIC INTERNET
SERVICES
TCP/IP SECURITY
Topics
1.
INTRODUCTION
2.
PHYSICAL LAYER
3.
4.
NETWORK LAYER
5.
TRANSPORT LAYER
6.
APPLICATION LAYER
7.
TCP/IP SECURITY
1.
INTRO TO CRYPTOGRAPHY
2.
3.
FIREWALLS
Quotes
Computers in the future may
weigh no more than 1.5 tons
I think there is a world market
for maybe five computers.
Thomas Watson Chairman of IBM 1943
History of Data
Communications
Communications
industry was already
established at the
beginning of the
computer era.
First type of data
communication was
terminals attached to
mainframes via modems
and telephone lines.
History of Data
Communications
Development of SemiAutomatic Business
Research Environment
(SABRE)
Development of Packet
Distribution Network
(PDN), allowed Advanced
Research Projects Agency
(ARPA) to develop
ARPANET.
History of Data
Communications
Development of other
Proprietary Computer
Networks (works on one
manufacturers equipment)
Systems Network Architecture
(SNA) developed by IBM
Decnet Developed by Digital
Telnet developed by General
Telephone and Electronics
(GTE)
Historical Events
1948 first commercial
computer installed UNIVAC I
1958 first U.S. communication
satellite
1964 SABRE airline reservation
system packet switching
network (purposed by RAND)
1969 ARPANET first packet
switching network begins
operation
Historical Events
1971 first computer chip
4 bit, 2,300 transistors
1972 Ethernet
specifications formulated
1974 IBM introduces SNA
1975 Altair 8800 first
commercial
microcomputer sold as kit
Historical Events
1975 Paul Alan / Bill Gates
wrote a BASIC language
interpreter for the Altair,
they formed Microsoft
1976 Woznaik and Jobs
built Apple I and formed
Apple Computer Company
1979 VisiCalc first
commercial spread sheet
introduced
Historical Events
1981 IBM introduced IBM
PC one floppy
1983 TCP/IP becomes the
official protocol on
ARPANET
1984 Apple introduced GUI
with Apple Macintosh
1986 PC Convertible (first
laptop (luggable))
Historical Events
1988 OS/2 shipped by IBM first
multitasking operating system
for PC 1989 Intel releases 486
1989 Microsoft releases
Windows 3.0 1991
1989 NSF replaces ARPANET
as internet backbone
1991 WWW invented by CERN
physicist Tim Berners-Lee
Historical Events
1992 Mosaic release first
GUI web browser
1995 Netscape goes from
startup to $2.9 billion in
one year
2000 .com melt down
Data Communications
Data Communications
Terminal to Computer
Client Server
Computer to Computer
Peer to Peer
PC as an Information
tool
Local Area Network (LAN)
number of computers
connected together
usually a small geographical
area
- office, floor, classroom
PC as an Information
Tool
Wide Area Network (WAN)
connection of LANs
connected by wire, microwave,
satellite
Resource Sharing
Sharing of Information
Types
- Mission critical data
- Frequently used data (form
letters)
- Policy / procedure manuals
Information Sharing
What information is vital to
your organization
What information do you
need to keep consistent, or
restricted, or in one place
for everyone to access
Consider how a network
(centralized control) would
help
Hardware Sharing
Allows sharing of devices
such as:
Printers
Fax modems
Scanners
Disk drives
CD ROM's
Tape Backup units
Plotters
Software Sharing
Software need not be
installed on every
computer
One install, one central
location for updates
Consistent configuration
Grant or deny access to a
program
Software Sharing
License considerations
single user
license per user
site license
Backup
Backup of central server or
disk
Hard to backup a number
of stand alone computers
Usually backup of
workstation is
responsibility of the user
Computer Roles in a
Network
Clients
use network resources
provide no resources to the
network
run their own operating system
Servers
provide resources to the
network
Peers
use and provide services
Operating systems
Server
Novel NetWare
Windows NT
Client
Windows 2000
DOS
OS/2
Peer
Windows 2000
Categories of
Networks
Client / Server
contains clients and supporting
servers
may be dedicated or non
dedicated
server centric
network centric
Categories of
Networks
Peer to Peer
network of computers sharing
resources with no dedicated
server
Server Based
Networks
Advantages
Strong central security
Central file storage (backup,
data organization)
Share hardware and software
Optimize dedicated servers for
special purpose
Less intrusive security (network
centric)
manages shared resources
manages users
Server Based
Networks
Disadvantages
Expensive hardware
Expensive software
Dedicated network
administrator
Peer to Peer
Advantages
no extra hardware or software
easy setup
no network administrator
users control resource sharing
no reliance on other computers
for their operation
lower cost for small networks
Peer to Peer
Disadvantages
additional load on computers
because of resource sharing
smaller networks
lack of central organization,
harder to find data
no central point of storage
(backup)
user administer their network
weak security
no central management
Peer Security /
Server Security
Peer to Peer
less secure than client server
security is controlled by access
to a share directory (password)
each resource requires a
separate password
cannot distinguish between
users
Client / Server
network logins
permissions granted to users for
files / resources
Home Network
Applications (2)
In peer-to-peer system
there are no fixed clients
and servers.
Cost
Expertise
Security issues
Number of work stations
Types of applications
Types of servers
Servers can designed for a
specialized purpose
file servers
print servers
Application servers
Message servers
database servers
Web servers
File Servers
Offer services that allow
users to share files
Typical operating systems
Novel NetWare, Windows NT
Services include
file transfer
file storage and data migration
file update synchronization
file archiving
File Servers
File Transfer
The ability to transfer files
from one computer to
another
Need for security (who has
what access to which files)
Historical done by sneaker
net
File Servers
File Storage and Data
Migration
Vast amounts of data is
stored (exabytes)
Must be able to efficiently
manage the storage of this
data
Categories of file storage
Online storage
Offline storage
File Storage
Online
Online storage consists
mostly of hard drives
Online information is
immediately available
File Storage
Offline
Offline storage include
media such as tape, optical
disk
High capacity, low price
Not immediately available
Need for operator
intervention
Best for rarely used data
(backup)
File Server
File Archiving
Process of backing up files
on offline devices
Most systems backup file
server data
Some backup client
workstations
Usually the backup of the
client (workstation) is the
users responsibility
Print Servers
Manages and controls
printing on the network
allows users to share printers
place printers where convenient
better workstation performance
by using high speed data
transfer, print queues and
spooling
ability to send and receive faxes
directly from the work station
Application Servers
Allow sharing of extra
computing of expensive
software applications that
reside on a shared
computer
Message Servers
Message services
coordinate interactions
between users, documents
and applications
Interactions may be
graphics, audio, video, etc.
Types of message services
Electronic mail
Workgroup applications
Object oriented
Directory services
Database Servers
Allows relatively weak
clients to access powerful
database capabilities
Usually runs in a client
server model
Client runs interface
Server runs database
operations such as
managing the database
processing queries
Network Topology
The way in which
connections between
devices in a network is
called the topology
Network Topology
Bus
1
Components connected
together by one or more wires
Passive topology no active
electronics
Messages sent by one node
are received by all
Only the node to which the
message is addressed
accepts the message
Network Topology
Bus
Only one node can
transmit at one time
A bus topology must be
terminated
An unterminated bus will
cause the signal to echo
back (ringing)
1
Network Topology
Bus
Advantages
Simple, reliable in small
networks
Easy to use
Requires least amount of cable
Easy to extend
Can be extended by using a
repeater
Network Topology
Bus
Disadvantages
Degrades with heavy traffic
Each connector weakens the
signal
Difficult to troubleshoot
Network Topology
Star
Cables run from central
hub to each computer
Each node communicates
with central hub
Central hub can resend
message to all nodes
(broadcast star)
Central hub can resend
only to destination node
(switched star)
Network Topology
Star
Active hubs regenerate the
signal
Active hubs and switches
require power
Passive hubs such as
wiring panels or punch
down blocks act as a
connection point
Some hubs allow more
than on type of cable
Network Topology
Star
Advantages
Easy to modify
Easy to diagnose
Single computer failure does not
affect the rest of the network
Use multiple types of cables
Network Topology
Star
Disadvantages
Central hub is a single point of
failure
More costly
Network Topology
Ring
Each computer is
connected to the next in
line the last computer is
connected to the first
Most use token passing
Only the node with the
token can send a message
Network Topology
Ring
Advantages
Equal access to the network
Still functions under heavy load
Disadvantages
Failure of one computer could
cause of the failure of the ring
Difficult to troubleshoot
Adding or removing a node
disrupts the network
Usually more expensive
Network Topology
Mesh Networks
Advantages
Fault tolerant
Easy to troubleshoot
Disadvantages
Cost
Logical/Physical Topologies
5
Physical Bus errors
Logical Bus
Physical Star OK
Logical/Physical Topologies
5
4
5
Logical Ring
Physical Star OK
4
3
Network Software
Protocol Hierarchies
Protocol Hierarchies
Connection-Oriented and
Connectionless Services
Six different types of
service.
Services to
Protocols
Relationship
OSI Model
The International
Organization for
Standardization (ISO)
began developing the
Open Systems
Interconnection (OSI)
model in 1977
It is now the most
accepted standard for
network modeling
OSI Model
Defines rules that apply to
the following issues
how network devices contact
each other
how network devices
communicate with each other
who has the right to transmit
data
are transmissions received
correctly and by the right node
OSI Model
Defines rules that apply to
the following issues
how physical media are
arranged and connected
ensure that network devices
maintain a proper rate of data
flow
how bits are represented on the
network media
OSI Model
Not implemented but many
models very close (SNA)
OSI model divides tasks
into seven layers
Layers are software and
hardware standards
OSI Model
The seven layers
Physical
Data link
Network
Transport
Session
Presentation
Application
OSI Model
Protocol Stack
a group of protocols each
communicating with its
neighbour
Layer N receives information
from layer N-1 and provides
information to layer N+1
for computers to communicate
with each other both must be
running the same protocol stack
OSI Model
Protocol stack
each layer creates / uses
information used by / created
by its peer protocol
computers may be running
different operating system but
running the same protocol stack
- ie Mac running TCP/IP
communicating with DOS
running TCP/IP
OSI Model
Peer Level
Communication
Message sent from one
application to another
application on different
hosts
travels down the layers of the
sending machine
each layer adds a header to be
used by its corresponding
peer level
bottom layer (physical) sends
the message to the receiving
machine
Peer level
Communication
Sending Message
(continued)
received on receiving side
passed up through each
layer
each layer reads the
corresponding header
Peer Level
Communication
OSI Model: 7
Protocol Layers
Physical Layer
Physical is responsible for
sending bits from one
computer to another
Is not concerned with the
meaning of the bits
Defines electrical details
(what represents a 0 or 1)
Mechanical connections
shape and number of
connector
Physical Layer
What signals are sent on
which pins
Devices at the physical
layer
Simple Hubs (passive and
active)
Couplers , T connectors,
terminators, cables, and
cabling, repeaters
Transceivers on the (NIC)
Repeaters, multiplexers
Physical Layer
The following are
addressed at the physical
layer
Network connections
- multipoint, point to point
Physical topologies
- bus, star, or ring
Path
a group of links that allows a
message to move from origin to
destination
Point to Point
only the destination computer
receives the message
Network Layer
Makes routing decisions
for devices that are farther
than one link away
Translates logical address
into physical address
Routers work at the
network layer
Example: IP addressing
Transport Layer
Responsible for process to
process (end to end)
delivery of messages
Breaks messages into
segments
Can be Connection-type or
Connection-less. Example:
TCP or UDP
Session Layer
Allows applications on
different computers to
share a connection
Provides for checkpoints
(if a connection is lost only
the required info is resent
Dialog control who can
transmit
Presentation Layer
Handles the format of the
data
protocol conversion
data translation (ASCII)
Compression
Encryption
Application Layer
Provides services to
support user applications
such as
FTP (file transfer)
TELNET (remote login)
SMTP (simple mail transfer
protocol ) e-mail
OSI
Model
Subnet 2
Subnet 4
Gateway
Subnet 3
Subnet 2
Node
Subnet 1
Router
Subnet 1
Node
Application
AP
Socket
interface
Identification of
application (port #)
Transport
Network
Data Link
Identifies the
node
Frames
NA
Node 0
AP0
Buffer hello
Socket
interface
Node 1
AP1
Buffer
Socket
interface
Transport
Transport
Network
Network
Data Link
Data Link
NA0
NA1
Node 0
Node 1
AP0
Buffer
hello
Socket
interface
AP1
hello
Buffer
Socket
interface
Transport
Transport
Network
Network
Data Link
Data Link
NA0
NA1
Node 0
Node 1
AP0
AP1
Buffer hello
Buffer
Socket
interface
Transport
Socket
interface
Transport
Network
Network
Data Link
Data Link
NA0
NA1
Node 0
Node 1
AP0
AP1
Buffer hello
Buffer
Socket
interface
Socket
interface
Transport
Network
Data Link
NA0
Transport
Node 1
Node 0
AP1
AP0
hello
Network
Data Link
NA1
Node 0
Node 1
AP0
AP1
Buffer hello
Buffer
Socket
interface
Socket
interface
Transport
Transport
Network
Network
Data Link
Node 1
AP1
Node 0
AP0
Data Link
hello
NA0
NA1
Is Node 1 in my subnet?
YES
Node 0
Node 1
AP1
AP0
Buffer
hello
Buffer
Socket
interface
Socket
interface
Transport
Transport
Network
Network
Data Link
NA0
NA1
NA0
Node 0 Node 1
AP1
AP0
Data Link
hello
NA1
Node 0
Node 1
AP0
Buffer
AP1
hello
Buffer
Socket
interface
hello
Socket
interface
Transport
Transport
Network
Network
Data Link
Data Link
NA0
NA1
NA1
NA0
AP0
hello
Node 0
Node 1
AP1
AP0
Buffer hello
Buffer
Socket
interface
Socket
interface
Transport
Transport
Network
Network
Data Link
Node X Node 0
AP1
NA0
AP0 hello
Is Node X in
my subnet?
NO
Data Link
Call
ROUTER
NA1
Backbone
Routing Tables
Router
Routing
tables
Subnet 30
Node
X
Router
Node
0
NAR0
Subnet 20
NAR0 NA0
Node X
Node 0
AP1
AP0
hello
Node
1
Gate
way
Backbone
Router
Routing Tables
Subnet 30
Router
Node
0
Node
1
Subnet 20
Reference Models
Reference Models
TCP / IP
Protocols and networks in
the TCP/IP model initially.
Packet-switching
network based on a
connectionless
internetwork layer
Permit hosts to
inject packets,
independent travel
to destination
IEEE
Institute of Electrical and
Electronic Engineers
defined standards relating
to the physical cabling and
data transmission relating
to the physical and Data
Link layers
802.x standards
Example Networks
The Internet
Connection-Oriented Networks:
X.25, Frame Relay, and ATM
Ethernet
Wireless LANs: 802:11
Architecture of the
Internet
Overview of the Internet.
Ethernet
Wireless LANs