This document provides an overview of computer networks and protocols. It discusses different types of networks like local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also covers different networking technologies like circuit switching, packet switching, datagram, and virtual circuit. Key networking protocols like TCP/IP and OSI reference model are introduced. Specific protocols at the data link layer like CSMA/CD and error control protocols are discussed in detail.
This document discusses communication networks and provides details about various types of networks:
- It classifies networks according to how information flows, including switching networks and broadcast networks. It describes circuit switching and packet switching in switching networks.
- It discusses different types of networks based on coverage area, including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It provides examples for each type.
- It describes the Open Systems Interconnection (OSI) reference model and its seven layers, using the link layer as an example to explain protocols.
This document provides an overview of the syllabus for a Computer Networks course. It includes:
- An outline of the course units which cover data communication components, the OSI model, TCP/IP model, and each layer of the OSI model from layers 2 through 7.
- Evaluation criteria which includes continuous internal evaluation, semester end examination, and mandatory minimum marks.
- Suggested reading materials including textbooks and publications.
- An overview of the Computer Networks lab covering various experiments involving networking tools, protocols, programming, and simulation.
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
油
The new architecture is proposed for data intensive enabled by next generation dynamic optical networks
Offers a Lambda scheduling service over Lambda Grids
Supports both on-demand and scheduled data retrieval
Supports bulk data-transfer facilities using lambda-switched networks
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Supports out-of-band tools for adaptive placement of data replicas
This document discusses the logical design and building blocks of IoT systems. It describes the key functional blocks that provide identification, sensing, actuation, communication, and management capabilities. These include hardware components, IoT networking using various wireless standards, communication protocols like MQTT for messaging, and higher layer protocols. Challenges in IoT like interoperability, security, scalability, and data issues are also summarized. Finally, examples of IoT applications like connected cars, health, farms and smart grids are provided.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices like hubs, switches, routers, and network interface cards. Finally, it covers networking topics such as network topologies, the OSI model, TCP/IP protocols, WANs, LANs, and the IEEE 802 standards.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
油
The new architecture is proposed for data intensive enabled by next generation dynamic optical networks
Encapsulates optical network resources into a service framework to support dynamically provisioned and advanced data-intensive transport services
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Supports both on-demand and scheduled data retrieval
Supports a meshed wavelength switched network capable of establishing an end-to-end lightpath in seconds
Supports bulk data-transfer facilities using lambda-switched networks
Supports out-of-band tools for adaptive placement of data replicas
Offers network resources as Grid services for Grid computing
Lecture3 - Computer Networks by the Professor.pptHamzaIqbal900476
油
The document provides an introduction to computer networks. It discusses that a network is a set of communication elements like computers, printers, and routers connected by communication links like fiber optic cables. Networks allow sharing of resources and information between users. The key components of a network are its topology, hardware, software, and applications. Common network topologies include ring, star, bus, tree and mesh configurations.
The document discusses the OSI reference model, which defines 7 layers for network communications: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It describes the functions of each layer, such as the Physical layer handling signals and the Data Link layer organizing bits into frames. The OSI model enables different networks and devices to communicate by standardizing how layers interact, with each layer adding information and passing data to the next layer.
Datacom module 2: Data Communication Architecture, Protocols, and StandardsJeffrey Des Binwag
油
The document discusses network architectures, protocols, and standards. It covers topics like network architecture, data communication protocols, protocol stacks, network protocol classifications, layered network architectures like OSI and TCP/IP, and standards organizations. It provides definitions and explanations of key concepts in data communications and computer networking.
This document provides an overview of 4G wireless systems and LTE architecture. It discusses the purpose and motivation for 4G technology, including providing high-speed wireless access to mobile devices. It describes the LTE architecture, including the evolved NodeB, evolved packet core components, and interfaces. It also covers LTE channel structure, protocols, and the radio access network components of 4G such as OFDMA and frame structure.
The document provides an overview and syllabus for a course on broadband packet networks. It discusses various topics that will be covered including an introduction to internet structure, types of communication networks, examples of connections in different networks, standards committees, and the first generation of transport networks. The key outcomes of the course are identified as designing cost-effective networks to meet emerging technology requirements and explaining the importance of broadband networks and quality of service.
78 ieee analysis of power consumption in future high capicity network nodesengrarif
油
This document analyzes power consumption in future high-capacity network nodes. It discusses how increasing network capacity will unavoidably lead to higher power consumption. It examines different architectures based on packet-switched and circuit-switched designs using either all-electronic or all-optical implementations. The total power consumption of realistic future core network nodes would likely fall between these extremes. Circuit switching is generally more power efficient than packet switching, and could help relax scalability limitations due to power. Both electronic and optical technologies may enable very high capacity network nodes in the future depending on the architecture.
This document discusses different methods for switching data in communication networks. It describes circuit switching, packet switching, message switching, and fast packet switching. Circuit switching establishes a dedicated connection for transmission. Packet switching divides data into packets that are routed independently. Message switching stores data at switches before transmission. Fast packet switching reduces overhead to increase throughput. The document provides details on the characteristics and advantages and disadvantages of each switching method.
Services and applications infrastructure for agile optical networksTal Lavian Ph.D.
油
Huge advancements in optical devices, components and networking.
The underline of the Internet is optical How can we take advantage of this?
How can the applications take advantage of this?
Agile Optical Network is starting to appear. What services and interfaces well need between the optical control and the applications?
What are the applications?
The Internet architecture was built on some 15-20 years old assumptions. Are some modifications needed?
Is packet switching good for all? In some cases, is circuit switching better? (move TeraBytes of SAN date, P2P, Streaming)
End-to-End Argument Is is valid for all cases?
What cases not? What instead?
The current Internet architecture is based on L3. What is needed in order to offer services in L1-L2?
Computation vs. Bandwidth 10X in 5 years
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
油
This document summarizes a proposed Cross Layer- Performance Enhancement Architecture (CL-PEA) for mobile ad hoc networks (MANETs). The key points are:
1) Existing TCP/IP architecture is not well-suited for the dynamic topology and limited resources of MANETs. A cross-layer design where all layers can exchange information is proposed to better optimize protocol performance.
2) The proposed CL-PEA adds a new hardware layer where parameters from the hardware, operating system, and other layers can be stored. This allows all layers to access information to make more informed decisions.
3) By exchanging parameters across layers, CL-PEA aims to enhance protocol performance in
This document provides information on layering in networked computing by discussing the OSI and TCP/IP models. It begins by outlining the learning objectives, which are to understand the need for layering, the layers and protocols in each model, and how data is transmitted between layers and hosts. It then describes each layer in the OSI model and its functions. The TCP/IP model is also explained, comparing it to the OSI model by mapping its 4 layers to the 7 layers of OSI. Key protocols at each layer are identified and packet encapsulation in TCP/IP is demonstrated.
The ACTION Project: Applications Coordinate with Transport, IP and Optical Ne...CPqD
油
The document describes an analytical modeling effort to study spectrum contiguity fragmentation in elastic optical networks (EONs). It proposes two models: 1) A simple approximation model that estimates blocking probability due to fragmentation using a 2D Markov chain. 2) An accurate model that calculates blocking probability precisely based on counting possible allocation permutations. The models are evaluated for a single fiber carrying two types of connection requests of different sizes. Results show the accurate model can be used to study fragmentation in both single fibers and network-wide through simulation.
The document provides an overview of the OSI model and TCP/IP model. It describes:
- The 7 layers of the OSI model from physical to application layer and their functions.
- A brief history of the development of the OSI model.
- An introduction to the TCP/IP model and its layers, which are similar but not identical to the OSI layers.
- Some arguments that strict layering can be considered harmful, as it increases complexity and separation of optimizations between layers.
The document discusses network application protocols and provides examples of common network applications. It describes the client-server and peer-to-peer architectures for network applications. Applications use either TCP or UDP at the transport layer, depending on their requirements for reliability, throughput, and timing. TCP provides reliable data transfer while UDP is simpler but does not guarantee delivery. Well-known application layer protocols are presented along with the transport protocols typically used to support them.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
油
The new architecture is proposed for data intensive enabled by next generation dynamic optical networks
Encapsulates optical network resources into a service framework to support dynamically provisioned and advanced data-intensive transport services
Provides a generalized framework for high performance applications over next generation networks, not necessary optical end-to-end
Supports both on-demand and scheduled data retrieval
Supports a meshed wavelength switched network capable of establishing an end-to-end lightpath in seconds
Supports bulk data-transfer facilities using lambda-switched networks
Supports out-of-band tools for adaptive placement of data replicas
Offers network resources as Grid services for Grid computing
Lecture3 - Computer Networks by the Professor.pptHamzaIqbal900476
油
The document provides an introduction to computer networks. It discusses that a network is a set of communication elements like computers, printers, and routers connected by communication links like fiber optic cables. Networks allow sharing of resources and information between users. The key components of a network are its topology, hardware, software, and applications. Common network topologies include ring, star, bus, tree and mesh configurations.
The document discusses the OSI reference model, which defines 7 layers for network communications: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It describes the functions of each layer, such as the Physical layer handling signals and the Data Link layer organizing bits into frames. The OSI model enables different networks and devices to communicate by standardizing how layers interact, with each layer adding information and passing data to the next layer.
Datacom module 2: Data Communication Architecture, Protocols, and StandardsJeffrey Des Binwag
油
The document discusses network architectures, protocols, and standards. It covers topics like network architecture, data communication protocols, protocol stacks, network protocol classifications, layered network architectures like OSI and TCP/IP, and standards organizations. It provides definitions and explanations of key concepts in data communications and computer networking.
This document provides an overview of 4G wireless systems and LTE architecture. It discusses the purpose and motivation for 4G technology, including providing high-speed wireless access to mobile devices. It describes the LTE architecture, including the evolved NodeB, evolved packet core components, and interfaces. It also covers LTE channel structure, protocols, and the radio access network components of 4G such as OFDMA and frame structure.
The document provides an overview and syllabus for a course on broadband packet networks. It discusses various topics that will be covered including an introduction to internet structure, types of communication networks, examples of connections in different networks, standards committees, and the first generation of transport networks. The key outcomes of the course are identified as designing cost-effective networks to meet emerging technology requirements and explaining the importance of broadband networks and quality of service.
78 ieee analysis of power consumption in future high capicity network nodesengrarif
油
This document analyzes power consumption in future high-capacity network nodes. It discusses how increasing network capacity will unavoidably lead to higher power consumption. It examines different architectures based on packet-switched and circuit-switched designs using either all-electronic or all-optical implementations. The total power consumption of realistic future core network nodes would likely fall between these extremes. Circuit switching is generally more power efficient than packet switching, and could help relax scalability limitations due to power. Both electronic and optical technologies may enable very high capacity network nodes in the future depending on the architecture.
This document discusses different methods for switching data in communication networks. It describes circuit switching, packet switching, message switching, and fast packet switching. Circuit switching establishes a dedicated connection for transmission. Packet switching divides data into packets that are routed independently. Message switching stores data at switches before transmission. Fast packet switching reduces overhead to increase throughput. The document provides details on the characteristics and advantages and disadvantages of each switching method.
Services and applications infrastructure for agile optical networksTal Lavian Ph.D.
油
Huge advancements in optical devices, components and networking.
The underline of the Internet is optical How can we take advantage of this?
How can the applications take advantage of this?
Agile Optical Network is starting to appear. What services and interfaces well need between the optical control and the applications?
What are the applications?
The Internet architecture was built on some 15-20 years old assumptions. Are some modifications needed?
Is packet switching good for all? In some cases, is circuit switching better? (move TeraBytes of SAN date, P2P, Streaming)
End-to-End Argument Is is valid for all cases?
What cases not? What instead?
The current Internet architecture is based on L3. What is needed in order to offer services in L1-L2?
Computation vs. Bandwidth 10X in 5 years
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
油
This document summarizes a proposed Cross Layer- Performance Enhancement Architecture (CL-PEA) for mobile ad hoc networks (MANETs). The key points are:
1) Existing TCP/IP architecture is not well-suited for the dynamic topology and limited resources of MANETs. A cross-layer design where all layers can exchange information is proposed to better optimize protocol performance.
2) The proposed CL-PEA adds a new hardware layer where parameters from the hardware, operating system, and other layers can be stored. This allows all layers to access information to make more informed decisions.
3) By exchanging parameters across layers, CL-PEA aims to enhance protocol performance in
This document provides information on layering in networked computing by discussing the OSI and TCP/IP models. It begins by outlining the learning objectives, which are to understand the need for layering, the layers and protocols in each model, and how data is transmitted between layers and hosts. It then describes each layer in the OSI model and its functions. The TCP/IP model is also explained, comparing it to the OSI model by mapping its 4 layers to the 7 layers of OSI. Key protocols at each layer are identified and packet encapsulation in TCP/IP is demonstrated.
The ACTION Project: Applications Coordinate with Transport, IP and Optical Ne...CPqD
油
The document describes an analytical modeling effort to study spectrum contiguity fragmentation in elastic optical networks (EONs). It proposes two models: 1) A simple approximation model that estimates blocking probability due to fragmentation using a 2D Markov chain. 2) An accurate model that calculates blocking probability precisely based on counting possible allocation permutations. The models are evaluated for a single fiber carrying two types of connection requests of different sizes. Results show the accurate model can be used to study fragmentation in both single fibers and network-wide through simulation.
The document provides an overview of the OSI model and TCP/IP model. It describes:
- The 7 layers of the OSI model from physical to application layer and their functions.
- A brief history of the development of the OSI model.
- An introduction to the TCP/IP model and its layers, which are similar but not identical to the OSI layers.
- Some arguments that strict layering can be considered harmful, as it increases complexity and separation of optimizations between layers.
The document discusses network application protocols and provides examples of common network applications. It describes the client-server and peer-to-peer architectures for network applications. Applications use either TCP or UDP at the transport layer, depending on their requirements for reliability, throughput, and timing. TCP provides reliable data transfer while UDP is simpler but does not guarantee delivery. Well-known application layer protocols are presented along with the transport protocols typically used to support them.
The document describes an introductory chapter on the application layer from a textbook on computer networking. It provides an overview of key topics that will be covered in the chapter, including application architectures (client-server and peer-to-peer), example network applications, how processes communicate over the network, addressing processes, application layer protocols, and how applications map to transport protocols. It then focuses on describing the Hypertext Transfer Protocol (HTTP) and web architecture, including how HTTP connections and requests/responses work.
Switching allows communication between nodes in a network by transferring input sample points to the correct output ports at the correct time. There are different types of switching including digital switching where sample point amplitudes are 0s and 1s, circuit switching which establishes a dedicated physical path, and packet switching which breaks messages into packets that are transmitted asynchronously. Switching techniques include crossbar switching, bus and cable switches, token passing, and Ethernet approaches using cables, rings, or star networks with hubs or switches.
The document discusses layered network models including OSI and TCP/IP. It provides details on the layers of each model, the functions of each layer, and examples of protocols used. Key points covered include how data is encapsulated as it moves through the layers, with each layer adding header information, and how the layers allow for standardization and modularity in network communication.
This document discusses various networking devices and how they operate at different layers of the OSI model. It begins by introducing repeaters, hubs, bridges and routers. It then explains that repeaters operate at the physical layer and can regenerate weak signals but cannot filter traffic. Hubs are multi-port repeaters. Bridges operate at the data link layer and can filter traffic to reduce collisions. Routers operate at the network layer and can direct traffic between networks based on IP addresses. The document provides details on how each device functions and the network problems they can help resolve.
Information Technology for class X CBSE skill SubjectVEENAKSHI PATHAK
油
These questions are based on cbse booklet for 10th class information technology subject code 402. these questions are sufficient for exam for first lesion. This subject give benefit to students and good marks. if any student weak in one main subject it can replace with these marks.
Research & Research Methods: Basic Concepts and Types.pptxDr. Sarita Anand
油
This ppt has been made for the students pursuing PG in social science and humanities like M.Ed., M.A. (Education), Ph.D. Scholars. It will be also beneficial for the teachers and other faculty members interested in research and teaching research concepts.
The Constitution, Government and Law making bodies .saanidhyapatel09
油
This PowerPoint presentation provides an insightful overview of the Constitution, covering its key principles, features, and significance. It explains the fundamental rights, duties, structure of government, and the importance of constitutional law in governance. Ideal for students, educators, and anyone interested in understanding the foundation of a nations legal framework.
How to use Init Hooks in Odoo 18 - Odoo 際際滷sCeline George
油
In this slide, well discuss on how to use Init Hooks in Odoo 18. In Odoo, Init Hooks are essential functions specified as strings in the __init__ file of a module.
Useful environment methods in Odoo 18 - Odoo 際際滷sCeline George
油
In this slide well discuss on the useful environment methods in Odoo 18. In Odoo 18, environment methods play a crucial role in simplifying model interactions and enhancing data processing within the ORM framework.
Finals of Rass MELAI : a Music, Entertainment, Literature, Arts and Internet Culture Quiz organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
How to Configure Restaurants in Odoo 17 Point of SaleCeline George
油
Odoo, a versatile and integrated business management software, excels with its robust Point of Sale (POS) module. This guide delves into the intricacies of configuring restaurants in Odoo 17 POS, unlocking numerous possibilities for streamlined operations and enhanced customer experiences.
Mate, a short story by Kate Grenvile.pptxLiny Jenifer
油
A powerpoint presentation on the short story Mate by Kate Greenville. This presentation provides information on Kate Greenville, a character list, plot summary and critical analysis of the short story.
How to Modify Existing Web Pages in Odoo 18Celine George
油
In this slide, well discuss on how to modify existing web pages in Odoo 18. Web pages in Odoo 18 can also gather user data through user-friendly forms, encourage interaction through engaging features.
Finals of Kaun TALHA : a Travel, Architecture, Lifestyle, Heritage and Activism quiz, organized by Conquiztadors, the Quiz society of Sri Venkateswara College under their annual quizzing fest El Dorado 2025.
Database population in Odoo 18 - Odoo slidesCeline George
油
In this slide, well discuss the database population in Odoo 18. In Odoo, performance analysis of the source code is more important. Database population is one of the methods used to analyze the performance of our code.
1. Fall 2010 CEG 4188 1-1
CEG-4188
Lecture 1:
Computer Networks and Protocols
Prof. Gregor v. Bochmann
SITE, University of Ottawa
These course notes are based on slides prepared by Drs. Makrakis and
Shirmohammadi
2. Fall 2010 CEG 4188 1-2
Why Computer Networks?
Application Type
3. Fall 2010 CEG 4188 1-3
Communications Tasks
Transmission system
utilization
Addressing
Interfacing Routing
Signal generation Recovery
Synchronization Message formatting
Exchange management Security
Error detection and
correction
Network management
Flow control
4. Fall 2010 CEG 4188 1-4
Types of Communication Networks
Classification according to the way the
information flows are transported to the
users
Switching Networks
Broadcast Networks
5. Fall 2010 CEG 4188 1-5
Switching Networks
Data are transferred from source to
destination through a series of intermediate
nodes
6. Fall 2010 CEG 4188 1-6
Broadcast Networks
Satellite
--There are no intermediate switching
nodes
--All users are connected on the same
medium
7. Fall 2010 CEG 4188 1-7
Classification According to Coverage Area
Local Area Networks (0-2 Km; campus)
Ethernet (10/100/1000 Mbps), Token ring (4, 16 Mbps),
IEEE 802.11(b, g, a, n)
Metropolitan Area Networks (2-50 km; corporate offices, city)
DQDB (Distributed Queue Dual Bus), WiMAX
(IEEE 802.16.a/b/e)
Wide Area Networks (country, continent)
transmission lines, switching elements
Personal Access Networks (PANs)
Bluetooth, IEEE 802.15.3
8. Fall 2010 CEG 4188 1-8
Local Area Networks (LANs)
It expands over small geographic areas
(within a building or close-by buildings)
It is usually owned by the same organization
The internal data rates are typically much
greater than those of WANs
Typically, they make use of broadcast rather
than switching
9. Fall 2010 CEG 4188 1-9
Local Area Networks (LANs)
Single-building LAN
Backbone
Multi-building LAN
Examples: home network, wireless-wired campus network
10. Fall 2010 CEG 4188 1-10
Metropolitan Area Networks (MAN)
Examples: Ottawa-Carleton Research Institute (OCRI) MAN,
National Capital Institute on Telecommunications (NCIT) MAN
11. Fall 2010 CEG 4188 1-11
Wide Area Networks (WAN)
Example: Canadian Network for the Advancement of Research, Industry
and Education (CANARIE).
12. Fall 2010 CEG 4188 1-12
Wide Area Networks (WAN)
Traditionally, WANs have been
implemented using one of two
technologies
Circuit Switching
Packet Switching
Datagram
Virtual Circuit
13. Fall 2010 CEG 4188 1-13
Circuit Switching
Uses a dedicated path between two stations
Process consists of three phases
establish
transfer
disconnect
Bandwidth inefficient
channel capacity dedicated for duration of connection
if no data, capacity wasted
Set up (connection) takes time
Once connected, transfer is transparent
Can provide deterministic performance guarantees
14. Fall 2010 CEG 4188 1-14
Circuit Switching Network
Example: Public Service Telephone Network (PSTN)
15. Fall 2010 CEG 4188 1-15
Event Timing for Circuit Switching
16. Fall 2010 CEG 4188 1-16
Packet Switching
circuit switching was designed for voice
packet switching was designed for data
transmitted in small packets
packet contains user data and control info
user data may be part of a larger message
control info includes routing (addressing) info
packets are received, stored briefly
(buffered) and passed on to the next node
17. Fall 2010 CEG 4188 1-17
Packet Switching
Source breaks long message into information
transporting segments (packets).
Packets are sent one at a time to the network.
Packets contain user data and
control/signaling information.
user data may be part of a larger message
control information includes routing/addressing
information
Packets are received, stored briefly
(buffered) and are passed onto the next node.
18. Fall 2010 CEG 4188 1-18
Characteristics
Line efficiency
single link shared by many packets over time
packets queued and transmitted as fast as possible
Data rate conversion
stations connect to local nodes at their own speed
nodes buffer data if required to equalize rates
Packets are accepted even when the line is busy
Priorities can be used to support users needs,
instead of dedicating resources regardless if they are
used or not (becoming wasted if they are not)
19. Fall 2010 CEG 4188 1-19
Datagram
Packet
Switching
19
21. Fall 2010 CEG 4188 1-21
Virtual
Circuit
Packet
Switching
22. Fall 2010 CEG 4188 1-22
Event Timing for the 3 switching methods
23. Fall 2010 CEG 4188 1-23
Virtual Circuits versus Datagram
Virtual circuits
network can provide sequencing
traffic engineering can be applied, enabling more practical
provision of quality of service (QoS) support
less reliable in cases of switching node failures
Datagram
no call setup phase
more flexible
more reliable in cases of switching node failures
difficult to control networks state and provide quality of
service
25. Fall 2010 CEG 4188 1-25
Other forms of Packet Switching Services
Frame Relay based Networks
requires high level of network reliability.
took away a lot of overhead, improved
efficiency.
Asynchronous Transfer Mode (ATM)
based on the use of fixed size packets (53 bytes,
called ATM cells).
first Broadband Integrated Services (ISDN)
network .
offered quality of service (QoS) choices.
MPLS (label switching)
26. Fall 2010 CEG 4188 1-26
Internetworking
Internetworking is a scheme for
interconnecting multiple networks of non
identical technologies
Uses both hardware and software
Extra hardware positioned between networks
Software on each attached computer
System of interconnected networks is
called an internetwork or an internet
28. Fall 2010 CEG 4188 1-28
OSI Reference Model
and
the Link layer as an example
protocol layer
29. Fall 2010 CEG 4188 1-29
Open System Interconnection (OSI) Reference Model
Developed by the International Organization for
Standardization (ISO).
Has become the standard model for classifying
communication functions.
Has seven layers.
It is a theoretical system delivered too late!
It has NOT dominated. TCP/IP is the de facto
standard.
Several reasons:
TCP/IP appeared earlier
Internet won the game
OSI has a complex structure that could result in heavy
processing
30. Fall 2010 CEG 4188 1-30
Functions of the OSI Layers
Physical
The bits that are transmitted over the communication media.
Deals with network hardware, bit encoding.
Examples: copper, fiber, radio, satellite.
Data Link
Activates, maintains, and deactivates the physical link
between two adjacent nodes (node-to-node delivery).
Deals with framing, windowing, flow control, error detection
and recovery.
Network
Determines how best to route packets of data from source to
destination via intermediate network nodes.
Deals with addressing, routing, fragmentation, and
congestion.
31. Fall 2010 CEG 4188 1-31
Functions of OSI Layers ()
Transport
Provides end-to-end message delivery and error recovery.
Deals with end to end integrity and quality of service.
Session
To establish, manage, and terminate sessions.
Controls the dialogue between two host applications.
Reports exceptions to upper layers.
Presentation
Resolves data representation differences.
To translate, encrypt, and compress data.
Application
Perform functions to implement network applications.
E.g.; e-mail, teleconferencing.
32. Fall 2010 CEG 4188 1-32
Generic Communication Issues
Error control: making a channel more reliable, and handling
lost or out of sequence messages.
Flow control: avoid flooding a slower peer entity.
Resource allocation: mediating contention for physical (e.g.
buffers) or logical (e.g. data structures) resources
Fragmentation: dividing chunks of data into smaller pieces,
and subsequent reassembly
Multiplexing: combining several higher layer sessions
Connection setup: initiating logical communication with peer
entity
Addressing / naming: managing identifiers
Compression: reducing data rate
Encryption: provide data security
Timer management: bookkeeping and error recovery
33. Fall 2010 CEG 4188 1-33
Link layer protocols
- as an example
Transmission mode - physical link property
Line discipline - Who should send now?
Flow control - How much data should be sent?
Error control - How can errors be corrected?
39. Fall 2010 CEG 4188 1-39
listen
idle?
transmit
jamming
signal
wait
random
time
collision?
no
no
yes
yes
CSMA/CD
(network access protocol = line discipline)
Carrier Sense Multiple Access
with Collision Detection
Used in Ethernet: the most
widely-used type of LAN
40. Fall 2010 CEG 4188 1-40
Stop and Wait
Flow Control
What is the
problem
with this
scheme?
41. Fall 2010 CEG 4188 1-41
Sender Sliding Window
Flow Control ()
Sliding Window
42. Fall 2010 CEG 4188 1-42
Damaged Frame
Error Control: Stop-and-Wait
What causes
an error?
43. Fall 2010 CEG 4188 1-43
Lost Frame
Error Control: Stop-and-Wait ()
44. Fall 2010 CEG 4188 1-44
Lost ACK
Error Control: Stop-and-Wait ()
50. Architectural structure of a
protocol layer
protocol entity protocol entity
communication service used by the protocol
(offered by the lower layer)
service offered
by the
protocol
user of protocol user of protocol
service interface
service interface
Protocol
service interfaces of lower layer
message encoding message encoding
51. Link Layer protocol
protocol entity protocol entity
communication service of physical layer
send/receive a block of data
user of protocol user of protocol
send/receive user data block (reliably)
Link layer
service interface
Protocol
data blocks containing SEL, Poll, datablock, ack, nack
message encoding message encoding
Physical layer
service interface
52. Fall 2010 CEG 4188 1-52
Protocols
A protocol is a set of rules that govern all aspects of
communication between two or more partners, called peers
These rules are human-made; not like chemistry or physics!
The purpose of a protocol is to provide a specific
communication service.
What aspects must be defined for assuring compatibility
between the communicating partners? (see next slides)
Who makes protocols?
Standardization committees
Designers of a new distributed application
53. Fall 2010 CEG 4188 1-53
Service specification
The specification of a communication service has two parts:
specification of an abstract service interface through which the service can be
locally obtained (sometimes called service access point)
e.g. in the case of TCP: local interactions for establishing a connection and for
closing it; sending a flow of data over an established connection (with flow control,
no notion of "end of service unit")
It is an abstract interface, the interaction primitives may be considered a kind of
abstract message (initiated by one side, received by the other side of the interface;
some interactions are initiated by the user, others are initiated by the service). The
specification of an abstract service interface is like the specification of the dynamic
behavior of an object class. It includes
Static aspects
損 list of interaction primitives, also called service primitives (like messages exchange;
not like method calls that have the initiating party blocked until the method returns)
損 for each primitive, which sides initiates the message, and its parameters and their
type
Dynamic aspects
損 sequencing rules which define in which order the primitives may be executed
損 rules concerning the allowed parameter values for particular execution sequences
specification of the end-to-end behavior of the (distributed) system component
that provides the service
e.g. in the case of TCP: the establishment of a connection involves local exchanges
at both end-points of the connection concerning the connection establishment; data
received at one end-point must have been sent at the other end-point (with FIFO
property without loss nor errors)
54. Fall 2010 CEG 4188 1-54
Protocol specification
Protocol specification = definition of the behavior of a protocol entity as visible at the upper
and lower (abstract) service interfaces
This includes
reference to the specification of the upper (abstract) service interface (normally defined by the
corresponding service specification)
reference to the specification of the lower (abstract) service interface (normally defined by the
service specification of the underlying service used by the protocol)
dynamic behavior of the protocol entity, that is,
sequencing rules concerning interactions at the upper and lower interfaces.
Note (a): Certain protocols developed by certain groups, e.g. IETF, do not refer to any service specification. In this case
only the ordering of interactions at the lower interface are defined.
Note (b): In the simplest case (if the protocol does not use any connections, or if it can be assumed that appropriate
connections are already established) the interactions at the lower interface only include the sending and receiving of
protocol messages (so-called PDU's).
Rules concerning the allowed interaction parameters
e.g sequence numbering in TCP, sending acknowledgements, etc.
Encoding rules
(a) concerning how interaction parameters received at the upper interface are coded and sent as so-called "user data" in
one of the data fields of the primitives at the lower interface (and inversely the decoding of user data to obtain the corresponding value for
the upper interaction parameter).
損 e.g. in the case of the IP protocol: how is the address "local host" coded in the destination address field of an IP
packet ?
(b) concerning the coding of protocol control information managed by the protocol entity
損 e.g. in the case of the TCP protocol: where in the "user data" of the lower layer primitive (which in the case of
TCP is the data field of an IP packet) is the TCP sequence number placed and how are the integer values coded ?
55. Fall 2010 CEG 4188 1-55
Relevant Standards Bodies
ISO (www.iso.org)
An agency of the United Nations.
Collaborates standards development for information technology.
ITU (www.itu.int)
UN treaty agency that sets telecommunications standards.
ITU-T (Telecommunications section)
ANSI (www.ansi.org)
American National Standards Institute: the US national standards body.
Coordinates and accredits standards development across the US.
IEEE (www.ieee.org)
US based international professional organization.
Among other things, develops standards.
IETF / IRTF
Internet Engineering Task Force (www.ietf.org)
Internet Research Task Force (www.irtf.org)
EIA (www.eia.org)
Electronic Industries Alliance
E.g.; standards for wiring and interconnection
56. Fall 2010 CEG 4188 1-56
OSI Model
Open System
Interconnection.
An ISO standard
Why open?
57. Fall 2010 CEG 4188 1-57
OSI Reference Model
Physical
Link
Network
Transport
Session
Presentation
Application
59. Fall 2010 CEG 4188 1-59
TCP/IP Protocol Architecture
No official model but a working one.
Has 5 layers (OSI has 7 layers)
Was the result of research conducted on
ARPANET, funded by DARPA (USA).
Initially developed as a US military research
effort funded by the Department of Defense
It has dominated.
It is the heart of Internet.
60. Fall 2010 CEG 4188 1-60
TCP/IP Protocol Architecture
Application
Layer
Host-to-Host
or Transport
Layer
Internet Layer
Network Access
Layer
Physical Layer
Contains the logic needed to support user applications
(ftp, telnet, http etc.) Each application requires different
module.
Covers the physical interface between device (computer
and transmission medium or network - medium, signals,
data rates..)
Concerned with the exchange of data between end
system and network (destination address, priority etc.)
Depends on net. type
Provides routing functions across multiple networks. It is
implemented in end-systems and routers
Concerned with the reliability of transmission/reception
(error control, sequencing, flow control)
61. Fall 2010 CEG 4188 1-61
TCP/IP Protocol Architecture
Application
Layer
Host-to-Host
or Transport Layer
Internet Layer
Network Access
Layer
Physical Layer
Application
Layer
Host-to-Host
or Transport
Layer
Internet Layer
Network Access
Layer
Physical Layer
Network