47
Network classification and Protocols

network topology and protocol seminaar 9th august,teit crce.ppt

Embed Size (px)

Citation preview

Page 1: network topology and protocol seminaar 9th august,teit crce.ppt

Network classification and Protocols

Page 2: network topology and protocol seminaar 9th august,teit crce.ppt

Page 2

Page 3: network topology and protocol seminaar 9th august,teit crce.ppt

Page 3

Network Classification

Definition of a communication Network:

– An interconnected system of computers, terminals, and other hardware established for the purpose of exchanging information or services.

– Node: a point of connection into a network

Networks can be classified by their geography, topology,etc…

Page 4: network topology and protocol seminaar 9th august,teit crce.ppt

Page 4

Networks by Geography

Local Area Networks (LANs)

LAN are limited to a premises of organization,generally used for data sharing in that organization.

Metropolitan Networks (MANs)

– Typically connect several LANs in locations scattered around a city.

– Term: dark fiber

Wide Area Networks (WANs)

– May be made up of a combination of switched and leased, terrestrial and satellite, and private microwave circuit

• Almost any circuit speed can be found in WANs

Page 5: network topology and protocol seminaar 9th august,teit crce.ppt

Page 5

Networks Topology

Network topology: the configuration of a communication

network

– Star

– Hierarchical

– Mesh

– Bus

– Ring

Page 6: network topology and protocol seminaar 9th august,teit crce.ppt

Page 6

Star Networks

Computers connected by cable segments to a central node.

Pros & Cons:

– The central node contacts every other location easy to manage and control the network

– Easy to expand a star network

– Single point for failure

Star topology is very common before.

– Is not used in computer network nowadays.

– still common in another type of network.

Page 7: network topology and protocol seminaar 9th august,teit crce.ppt

Page 7

Mesh Networks

The most fault tolerant and the most expensive topology.

n (n -1) / 2 cable segments for a mesh topology with n computers.

Mesh topology is usually used in WANs

Page 8: network topology and protocol seminaar 9th august,teit crce.ppt

Page 8

Bus Networks

A bus is a communication medium to which multiple nodes are attached.

Bus networks are usually implemented in situation where the distance between all nodes is limited.

Why?

– Signal loss on tap connection

– There is another reason …

All nodes are independent of one another

– Bus networks are reliable unless the bus is fail

Page 9: network topology and protocol seminaar 9th august,teit crce.ppt

Page 9

Signal Propagation

In any network, computers communicate by sending information across the media as a series of signals

– In a bus network, the signals travel along the length of the bus in both directions

– The signals continue to travel until …

• they weaken enough so as no to be detectable

• OR until they encounter a device that absorbs them

This traveling across the medium is called signal propagation

– At the end of a cable, the signal bounces back

Page 10: network topology and protocol seminaar 9th august,teit crce.ppt

Page 10

Signal Bounce

Is there any problem with signal bouncing?

Page 11: network topology and protocol seminaar 9th august,teit crce.ppt

Page 11

Cable Termination

A terminator attached to each end of a cable prevents signals from bouncing. Clearing the network for new communications.

Page 12: network topology and protocol seminaar 9th august,teit crce.ppt

Page 12

Ring Networks

Each computer connects directly to the next computer in a line;

– A circle of cable forms a ring;

– Every computer in a ring is responsible for regenerating the signal

Page 13: network topology and protocol seminaar 9th august,teit crce.ppt

Page 13

How do ring networks work

Data in a ring network travels from one computer

to the next computer until the data reaches its destination

Token passing is one method for sending data around a ring

Token is a small packet, passes around the ring to each computer in turn.

– If a computer (sender) has packets to send, it modifies the token, adds address and data, and sends it around the ring.

– The receiver returns an acknowledge packet to the sender.

– Upon receiving the acknowledge packet, the sender releases the tokens and sends it around the ring.

Page 14: network topology and protocol seminaar 9th august,teit crce.ppt

Page 14

Hybrid networks

Networks are generally hybrid networks

– Almost all networks are combination of the geographies, topologies, and technologies.

– E.g., hybrid topology, carry both voice and data traffic

Page 15: network topology and protocol seminaar 9th august,teit crce.ppt

Page 15

OSI Model Overview

The Open Systems Interconnection (OSI) reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers.

Each layer provides specific services to the layers above and below it in order for the network to work effectively.

Page 16: network topology and protocol seminaar 9th august,teit crce.ppt

Page 16

OSI Model Overview

A message begins at the top application layer and moves down the OSI layers to the bottom physical layer.

As the message descends, each successive OSI model layer adds a header to it.

A header is layer-specific information that basically explains what functions the layer carried out.

Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers.

Page 17: network topology and protocol seminaar 9th august,teit crce.ppt

Page 17

What is a Protocol?Protocol – in general ……

- an acceptable way of behaving.

- driving on the left hand side of the roadProtocols are critical and there must be agreement on them.

A network protocol Is the set of very detailed rules, sequences, message formats, and procedures that computer systems use and understand when exchanging data with each other

Page 18: network topology and protocol seminaar 9th august,teit crce.ppt

Page 18

Transmission Control Protocol/Internet Protocol

The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for inter-networking.

TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. 

Page 19: network topology and protocol seminaar 9th august,teit crce.ppt

Page 19

Transmission Control Protocol/Internet Protocol

Page 20: network topology and protocol seminaar 9th august,teit crce.ppt

Page 20

Transmission Control Protocol/Internet Protocol (TCP/IP)

It is a group of protocols that allows networked computers to communicate with each other

It doesn't matter whether:

• they are part of the same network or are attached to separate networks.

• one computer is a mainframe and the other a Macintosh.

TCP/IP is a platform-independent standard that bridges the gap between dissimilar computers, operating systems, and networks

Page 21: network topology and protocol seminaar 9th august,teit crce.ppt

Page 21

So TCP/IP allows two computers to exchange data. This is achieved as follows:

– When two or more networks are involved they are physically connected by devices called IP routers. A router is a computer that transfers packets of data from one network to another.

– TCP/IP software makes everything seem like one big network. That is, TCP/IP has the affect of allowing two separate networks to communicate as though they were part of the same physical network.

Page 22: network topology and protocol seminaar 9th august,teit crce.ppt

Page 22

What is the family of TCP/IP protocols?

Some of the common TCP/IP application protocols include :

File Transfer Protocol (FTP),

Telnet,

Domain Name System (DNS),

Simple Mail Transfer Protocol (SMTP),

Multipurpose Internet Mail Extensions (MIME),

X Window System,

Dynamic Host Configuration Protocol (DHCP).

Page 23: network topology and protocol seminaar 9th august,teit crce.ppt

Page 23

SO HOW DOES TCP/IP WORK?

Page 24: network topology and protocol seminaar 9th august,teit crce.ppt

Page 24

Firstly the Internet Protocol (IP)

Allows for data to be sent over the Internet occurs in packets contains from 1 - 1500 bytes of data

each packet is given a destination IP address:

• An IP address is an unique identifier for a particular computer on the Internet

• The addresses include four eight-bit octets, which are often written in decimal format for simplicity. To illustrate this, it is easy to see that the following address 10000111.10100101.00100011.11110000 is more easily written and understood as 135.165.35.240

Page 25: network topology and protocol seminaar 9th august,teit crce.ppt

Page 25

More on IP

It is a connectionless protocol meaning that all packets are sent on a "best effort" basis.

There is no guarantee that the packets will get to the destination in the order they that were sent, or even at all.

Therefore the problems are ……

packets may get lost

packets may arrive out of sequence

the message may be longer than 1500 bytes

Answer ……….

Another protocol ….

Page 26: network topology and protocol seminaar 9th august,teit crce.ppt

Page 26

The second protocol: Transmission Control Protocol (TCP)

ensures a sent message is sent without any loss of data or any mix up of the order of the data

will request re-transmission of lost or damaged packets.

How does it do this?

a long message is broken up into many IP packets

each packet have a number allocated to it

there is error checking

damaged or missed packets may be asked for again

Page 27: network topology and protocol seminaar 9th august,teit crce.ppt

Page 27

What is File Transfer Protocol (FTP)???

protocol that allows for the transfer of files across the Internet.

both computers need to run FTP - one acts as a server (remote), the other as a client (local).

mainly shareware type of files.

usually stored in ZIP format or self-extracting EXE

disadvantage must know the name of the file you are after

Page 28: network topology and protocol seminaar 9th august,teit crce.ppt

Page 28

Steps to FTP:

1. log on to machine e.g. to csusap

2. Connect to a another remote machine by either:

a. anonymous FTP - very common - but can only access files in the pub directory.

login name anonymouspassword <your email address>e.g

[email protected]

Anonymous FTP allows users to enter public data archives and download file

b. log in as yourself - this requires you to have an account on that machine i.e. username and password.

This is what you do on CSUSAPTypically these machines are UNIX boxes

Page 29: network topology and protocol seminaar 9th august,teit crce.ppt

Page 29

Pictorial explanation of FTP

ComputerA

file1.txt

Computer B

file2.txt

Both Computer A and Computer B have FTP running

Computer B hasestablished an FTPsession with Computer A and issues the get and put statement

get file1.txt

put file2.txt

Page 30: network topology and protocol seminaar 9th august,teit crce.ppt

Page 30

Other Web based protocols - HTTP

'HyperText Transfer Protocol' is the primary protocol of the World Wide Web (WWW).

When a Web browser connects to a Web server, it uses HTTP to request Web pagesA Web browser is an Internet client application, and the Web server is an Internet server application.

HTTP has the ability to transfer Web pages, graphics, and any other type of media that is used on the Web.It is a means to format of Web pages

It consists of a set of tags and internal commands that are embedded inside Web pages to control the appearance and layout of Web pages, as well as links to other Web pages

Page 31: network topology and protocol seminaar 9th august,teit crce.ppt

Page 31

۩Infrastructure servicesDomain Name Services (DNS)

۩Multimedia applications

some of the popular applications in the Internet

۩Electronic mail, World Wide Web

Page 32: network topology and protocol seminaar 9th august,teit crce.ppt

Page 32

Traditional Applications

Two of the most popular—

– The World Wide Web and

– Email.

Broadly speaking, both of these applications use the request/reply paradigm

—users send requests to servers, which then respond accordingly.

It is important to distinguish between application programs and application protocols.

For example, the HyperText Transport Protocol (HTTP) is an application protocol that is used to retrieve Web pages from remote servers.

Page 33: network topology and protocol seminaar 9th august,teit crce.ppt

Page 33

There can be many different Web clients that provide users with a different look and feel, but all of them use the same HTTP protocol to communicate with Web servers over the Internet

TWO VERY WIDELY-USED, STANDARDIZED APPLICATION PROTOCOLS:

SMTP: Simple Mail Transfer Protocol is used to exchange electronic mail.HTTP: HyperText Transport Protocol is used to communicate between Web browsers and Web servers.

Page 34: network topology and protocol seminaar 9th august,teit crce.ppt

Page 34

Electronic Mail

Page 35: network topology and protocol seminaar 9th august,teit crce.ppt

Page 35

World Wide Web

– Request Messages

HTTP request operations

Page 36: network topology and protocol seminaar 9th august,teit crce.ppt

Page 36

World Wide Web

– Response Messages

Five types of HTTP result codes

Page 37: network topology and protocol seminaar 9th august,teit crce.ppt

Page 37

– Uniform Resource Identifiers

• The URLs that HTTP uses as addresses are one type of Uniform Resource Identifier (URI).

• A URI is a character string that identifies a resource, where a resource can be anything that has identity, such as a document, an image, or a service.

• The first part of a URI is a scheme that names a particular way of identifying a certain kind of resource, such as mailto for email addresses or file for file names.

• The second part of a URI, separated from the first part by a colon, is the scheme-specific part.

Page 38: network topology and protocol seminaar 9th august,teit crce.ppt

Page 38

World Wide Web

– TCP Connections

HTTP 1.0 behavior

Page 39: network topology and protocol seminaar 9th august,teit crce.ppt

Page 39

World Wide Web

– TCP Connections

HTTP 1.1 behavior with persistent connections

Page 40: network topology and protocol seminaar 9th august,teit crce.ppt

Page 40

World Wide Web

– Caching

• Caching has many benefits. From the client’s perspective, a page that can be retrieved from a nearby cache can be displayed much more quickly than if it has to be fetched from across the world.

• From the server’s perspective, having a cache intercept and satisfy a request reduces the load on the server.

• Caching can be implemented in many different places..

Page 41: network topology and protocol seminaar 9th august,teit crce.ppt

Page 41

• For example, a user’s browser can cache recently accessed pages, and simply display the cached copy if the user visits the same page again

• As another example, a site can support a single site-wide cache.This allows users to take advantage of pages previously downloaded by other users.

• Closer to the middle of the Internet, ISPs can cache pages.

Page 42: network topology and protocol seminaar 9th august,teit crce.ppt

Page 42

• Note that in the second case, the users within the site most likely know what machine is caching pages on behalf of the site, and they configure their browsers to connect directly to the caching host. This node is sometimes called a proxy

Page 43: network topology and protocol seminaar 9th august,teit crce.ppt

Page 43

Infrastructure Services

Domain Hierarchy

Example of a domain hierarchy

Page 44: network topology and protocol seminaar 9th august,teit crce.ppt

Page 44

Name Resolution

Name resolution in practice, where the numbers 1–10 show the sequence of steps in the process.

Page 45: network topology and protocol seminaar 9th august,teit crce.ppt

Page 45

Web Services

– The SOAP architecture’s approach to the problem is to make it feasible, at least in theory, to generate protocols that are customized to each network application.

– The key elements of the approach are a framework for protocol specification, software toolkits for automatically generating protocol implementations from the specifications, and modular partial specifications that can be reused across protocols.

Page 46: network topology and protocol seminaar 9th august,teit crce.ppt

Page 46

Custom Application Protocols (WSDL, SOAP)

The architecture informally referred to as SOAP is based on Web Services Description Language (WSDL) and SOAP.4

Both of these standards are issued by the World Wide Web Consortium (W3C). This is the architecture that people usually mean when they use the term Web Services without any preceding qualifier.

Page 47: network topology and protocol seminaar 9th august,teit crce.ppt

Page 47