Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Networking Final

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 32

Networking

1
Network

“ ... communication system for connecting


end-systems”

End-systems a.k.a. “hosts”


PCs, workstations
dedicated computers
network components

2
Multi-access vs. Point-to-point
 Multi-access means shared medium.
– many end-systems share the same physical
communication resources (wire, frequency, ...)
– There must be some arbitration mechanism.

 Point-to-point
– only 2 systems involved
– no doubt about where data came from !

3
Multi-access Point-to-point

4
LAN - Local Area Network

 connects computers that are physically


close together ( < 1 mile).
– high speed
– multi-access
 Technologies:
– Ethernet 10 Mbps, 100Mbps
– Token Ring 16 Mbps
– FDDI 100 Mbps

5
WAN - Wide Area Network

 connects computers that are physically


far apart. “long-haul network”.
– typically slower than a LAN.
– typically less reliable than a LAN.
– point-to-point
 Technologies:
– telephone lines
– Satellite communications

6
MAN - Metropolitan Area
Network
 Larger than a LAN and smaller than a
WAN
- example: campus-wide network
- multi-access network
 Technologies:
– coaxial cable
– microwave

7
Internet work
 Connection of 2 or more distinct
(possibly dissimilar) networks.
 Requires some kind of network device
to facilitate the connection.

Net A Net B

8
 Layered model:
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical

9
The Physical Layer
 Responsibility:
– transmission of raw bits over a
communication channel.
 Issues:
– mechanical and electrical interfaces
– time per bit
– distances

10
The Data Link Layer -
Data Link Control
 Responsibility:
– provide an error-free communication link
 Issues:
– framing (dividing data into chunks)
» header & trailer bits
– addressing

10110110101 01100010011 10110000001

11
The Data Link Layer -
The MAC sub layer
 Medium Access Control - needed by
multi-access networks.

 MAC provides DLC with “virtual wires”


on multi-access networks.

12
The Network Layer
 Responsibilities:
– path selection between end-systems (routing).
– subnet flow control.
– fragmentation & reassembly
– translation between different network types.
 Issues:
– packet headers
– virtual circuits

13
The Transport Layer
 Responsibilities:
– provides virtual end-to-end links between
peer processes.
– end-to-end flow control
 Issues:
– headers
– error detection
– reliable communication

14
The Session Layer

 Responsibilities:
– establishes, manages, and terminates
sessions between applications.
– service location lookup

 Many protocol suites do not include a


session layer.

15
The Presentation Layer

 Responsibilities:
– data encryption
– data compression
– data conversion
 Many protocol suites do not include a
Presentation Layer.

16
The Application Layer

 Responsibilities:
– anything not provided by any of the other
layers
 Issues:
– application level protocols
– appropriate selection of “type of service”

17
Layering & Headers
 Each layer needs to add some control
information to the data in order to do it’s job.
 This information is typically prepended to the
data before being given to the lower layer.
 Once the lower layers deliver the the data
and control information - the peer layer uses
the control information.

18
Headers

Process DATA Process

Transport H DATA Transport

Network H H DATA Network

Data Link H H H DATA Data Link

19
What are the headers?

Physical: no header - just a bunch of bits.

Data Link:
– address of the receiving endpoints
– address of the sending endpoint
– length of the data
– checksum.

20
Network layer header -
examples
 protocol suite  protocol
version  header checksum
 type of service  source network
 length of the data address
 packet identifier  destination network
 fragment number address
 time to live

21
Important Summary
 Data-Link: communication between
machines on the same network.
 Network: communication between
machines on possibly different
networks.
 Transport: communication between
processes (running on machines on
possibly different networks).

22
Connecting Networks

 Repeater: physical layer


 Bridge: data link layer
 Router: network layer
 Gateway: network layer and above.

23
Repeater

 Copies bits from one network to another


 Does not look at any bits
 Allows the extension of a network
beyond physical length limitations

REPEATER

24
Bridge
 Copies frames from one network to another
 Can operate selectively - does not copy all frames
(must look at data-link headers).
 Extends the network beyond physical length
limitations.

BRIDGE

25
Router
 Copies packets from one network to another.
 Makes decisions about what route a packet
should take (looks at network headers).

ROUTER
ROUTER

26
Gateway
 Operates as a router
 Data conversions above the network
layer.
 Conversions:
encapsulation - use an intermediate network
translation - connect different application
protocols
encryption - could be done by a gateway

27
Encapsulation Example

Gateway Gateway

 Provides service connectivity even


though intermediate network does
not support protocols.

28
Translation

Gateway

 Translate from green protocol to brown


protocol

29
Encryption gateway
Secure Secure
Network Encryption/Decryption Network
Gateways

GW ? GW
?
?

Insecure Network

30
Hardware vs. Software
 Repeaters are typically hardware devices.
 Bridges can be implemented in hardware or
software.
 Routers & Gateways are typically implemented
in software so that they can be extended to
handle new protocols.
 Many workstations can operate as routers or
gateways.

31
Made by:

TEJASVI AGARWAL
08/BBS/7143
BBS Semester 1
Deen Dayal Upadhyaya College,
University of Delhi

Submitted to:

Dr.Monika Bansal

32

You might also like