I NTERNETWORKING Chapter 2 Computer Network by P.It-arun Computer Engineering Dept, RMUTT. 1

Preview:

Citation preview

INTERNETWORKINGChapter 2

Co

mp

ute

r Ne

two

rk by P

.It-aru

n C

om

pu

ter

En

gin

ee

ring

De

pt, R

MU

TT

.

1

TOPIC

Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation

3

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

INTERNETWORK BASIC

Co

mp

ute

r Ne

two

rk by P

.It-aru

n C

om

pu

ter

En

gin

ee

ring

De

pt, R

MU

TT

.

4

POSSIBLE CAUSES OF LAN TRAFFIC CONGESTION ARE

Too many hosts in a broadcast domain Broadcast storms Multicasting Low bandwidth Adding hubs for connectivity to the net

work A large amount of ARP or IPX traffic (IPX

is a Novell

5

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

NETWORK SEGMENTATION

Collision domain Broadcast domain

6

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

7

TWO ADVANTAGES OF USING R OUTERS IN YOUR NETWORK AR

E They don’t forward broadcasts by default. They can filter the network based on layer

3 (Network layer) information (i.e., IP address).

8

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

FOUR ROUTER FUNCTIONS IN YOUR NETWORK CAN BE LISTED AS

Packet switching Packet filtering Internetwork communication Path selection

9

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

INTERNETWORKING MODEL The Layered Approach Advantages of Reference Models

It divides the network communication process into s maller and simpler components, thus aiding compon

ent development, design, and troubleshooting. - It allows multiple vendor development through stan

dardization of network components. It encourages industry standardization by defining

what functions occur at each layer of the model. It allows various types of network hardware and soft

ware to communicate. It prevents changes in one layer from affecting othe

r layers, so it does not hamper development.

10

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE OSI REFERENCE MODEL

The upper layers

11

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE LOWER LAYERS

12

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

LAYER FUNCTIONS

13

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

INTERFACES: VERTICAL (ADJACENT LAYER) COMMUNICATION

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

14

PROTOCOLS: HORIZONTAL (CORRESPONDING LAYER) COMMUNICATION

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

15

DATA ENCAPSULATION

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

16

TCP/IP PROTOCOLS

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

17

TCP/IP PROTOCOLS

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

18

PROTOCOL DATA UNITS (PDUS) AND SERVICE DATA UNITS (SDUS)

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

19

INDIRECT DEVICE CONNECTION AND MESSAGE ROUTING

Assist.Prof.

Itarun

Pitimon (itarun.p@cpe.rmutt.ac.th)

20

APPLICATION LAYER

The Application layer of the OSI model marks t he spot where users actually communicate to the computer.

Sample -> World Wide Web (WWW) E-mail gateways Electronic data interchange (EDI) Special interest bulletin boards Internet navigation utilities Financial transaction services

21

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE PRESENTATION LAYER It presents data to the Application layer and is

responsible for data translation and code formatting.

This layer is essentially a translator and provi des coding and conversion functions. A succe

- ssful data transfer technique is to adapt the d ata into a standard format before transmissio

n.

22

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE SESSION LAYER

The Session layer is responsible for sett ing up, managing, and then tearing do wn sessions between Presentation laye

r entities. This layer also provides dialogue contro

l between devices, or nodes. It coordina tes communication between systems, a nd serves to organize their communicat ion by offering three different modes: si

mplex , half duplex , and full duplex.

23

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE TRANSPORT LAYER The Transport layer segments and reas

sembles data into a data stream. Services located in the Transport layer

both segment and reassemble data fro - m upper layer applications and unite it

onto the same data stream. - - They provide end to end data transport

services and can establish a logical con nection between the sending host and

destination host on an internetwork.

24

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

The Transport layer is responsible for providin - g mechanisms for multiplexing upper layer ap

plications, establishing sessions, and tearing down virtual circuits.

The Transport layer can be connectionless or c-onnection oriented.

Some of you are probably familiar with TCP an d UDP already.

25

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

FLOW CONTROL Data integrity is ensured at the Transpo

rt layer by maintaining flow control and by allowing users to request reliable da ta transport between systems.

The segments delivered are acknowledged back to the sender upon their reception.

Any segments not acknowledged are retransmitted.

Segments are sequenced back into their pr oper order upon arrival at their destination.

A manageable data flow is maintained in or der to avoid congestion, overloading, and d ata loss.

26

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

- CONNECTION ORIENTED COMMUNICATION

a call setup , or a three way handshake

27

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

TRANSMITTING SEGMENTS WIT H FLOW CONTROL

28

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ACKNOWLEDGMENTS

It guarantees that the data won’t be du plicated or lost.

This is achieved through something call ed positive acknowledgment with retra

nsmission a technique that requires a r eceiving machine to communicate with

the transmitting source by sending an a cknowledgment message back to the s

ender when it receives data.

29

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

WINDOWING

30

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE NETWORK LAYER The Network layer (also called layer 3)

manages device addressing, tracks the location of devices on the network, and

determines the best way to move data, which means that the Network layer m

ust transport traffic between devices th at aren’t locally attached.

Two types of packets are used at the Ne twork layer:

Data packets : routed protocolrouted protocol Route update packets : routing routing

protocolprotocol 31

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ROUTING TABLE USED IN A ROUTER

32

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

HERE ARE SOME POINTS ABOUT ROUTERS THAT YOU SHOULD REALLY COMMIT TO MEMORY:

Routers, by default, will not forward any broadcast or m ulticast packets.

Routers use the logical address in a Network layer head er to determine the next hop router to forward the pack et to.

Routers can use access lists, created by an administrat or, to control security on the types of packets that are a

llowed to enter or exit an interface. Routers can provide layer2 bridging functions if nee

ded and can simultaneously route through the same interface.

Layer 3 devices (routers in this case) provide connecti ons between virtual LANs (VLANs).

Routers can provide quality of service (QoS) for specific types of network traffic.

33

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE DATA LINK LAYER The Data Link layer provides the physical tran

smission of the data and handles error notifica tion, network topology, and flow control.

The Data Link layer formats the message into pieces, each called a data frame , and adds a c

ustomized header containing the hardware de stination and source address.

34

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

DATA LINK LAYER WITH THE ETHER NET AND IEEE SPECIFICATIONS.

35

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE IEEE ETHERNET DATA LINK LAY ER HAS TWO SUBLAYERS:

Media Access Control (MAC)8023. Defines how packets are placed

on the media. Contention media access is “first come/first served” access wher e everyone shares the same bandwidth

—hence the name. Physical addressing is defined here,

Logical Link Control (LLC)802.2 Responsible for identifying Network

layer protocols and then encapsulatingthem.

36

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

SWITCHES AND BRIDGES AT THE DAT A LINK LAYER

Layer2 switching is considered hard- ware based bridging because it uses sp

ecialized hardware called an applicatio- n specific integrated circuit (ASIC).

37

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE PHYSICAL LAYER we find that the Physical layer does two things

: It sends bits and receives bits. Bits come onl y in values of 1 or 0 —a Morse code with nu

mericalval ues. The Physical layer specifies the electrical, me

chanical, procedural, and functional requirem ents for activating, maintaining, and deactivat

ing a physical link between end systems. This layer is also where you identify the interf

ace bet ween t he data terminal equipment (DTE) and t he data communication equipment (DCE).

38

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

HUBS AT THE PHYSICAL LAYER

A hub - is really a multiple port repeater. A re peater receives a digital signal and reamplifi

es or regenerates that signal, and then forw ards the digital signal out all active ports wit hout looking at any data.

39

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET NETWORKINGLecture 2-2

Co

mp

ute

r Ne

two

rk by P

.It-aru

n C

om

pu

ter

En

gin

ee

ring

De

pt, R

MU

TT

.

40

THE SUCCESS OF ETHERNET IS DUE TO THE FOLLOWING FACTORS: Simplicity and ease of maintenance Ability to incorporate new technologies Reliability Low cost of installation and upgrade

41

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

802.3 ETHERNET IN RELATION TO THE OSI MODEL

42

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

IEEE 802.X STANDARDS

43

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET TECHNOLOGIES MAPPED TO THE OSI MODEL

44

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET ADDRESSING

W e get into how Ethernet addressing w orks. It uses the Media Access Control ( MAC) address burned into each and eve

ry Ethernet Network Interface Card (NIC).

45

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

MAC ADDRESS FORMAT

46

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

GENERIC FRAME FORMAT

47

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

IEEE 802.3

48

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET II FRAME FORMAT

49

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET II AND IEEE 802.3 FRAME FORMAT

50

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

MEDIA ACCESS CONTROL (MAC)

51

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

MAC RULES AND COLLISION DETECTION/BACKOFF

52

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

MAC RULES AND COLLISION DETECTION/BACKOFF

53

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET TIMING

54

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

INTERFRAME SPACING

55

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

BACKOFF

56

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ERROR HANDLING

57

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

TYPES OF COLLISIONS

58

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE EFFECTS OF HAVING A CSMA/CD NETWORK SUSTAINING HEAVY COLLISIONS INCLUDE

Delay Lowt hr oughput Congestion

59

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET ERRORS

60

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ETHERNET ERRORS

61

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

FCS ERRORS

62

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

PARAMETERS FOR 10 MBPS ETHERNET OPERATION

63

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

MANCHESTER ENCODING EXAMPLES

64

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

PARAMETERS FOR 100-MBPS ETHERNET OPERATION

65

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

MLT-3 ENCODING EXAMPLE (100BASE-TX)

66

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

NRZI ENCODING EXAMPLES (100BASE-FX)

67

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

PARAMETERS FOR GIGABIT ETHERNET OPERATION

68

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

ACTUAL 1000BASE-T SIGNAL TRANSMISSION

69

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

GIGABIT ETHERNET LAYERS

70

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

GIGABIT ETHERNET MEDIA COMPARISON

71

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

PARAMETERS FOR 10-GBPS ETHERNET OPERATION

72

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

10GBASE LX-4 SIGNAL MULTIPLEXING

73

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

WIRELESS NETWORKING

Co

mp

ute

r Ne

two

rk by P

.It-aru

n C

om

pu

ter

En

gin

ee

ring

De

pt, R

MU

TT

.

74

BENEFITS OF WLANS

75

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

EVOLUTION OF WIRELESS LANS

76

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

UNLICENSED FREQUENCY BANDS

77

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

WIRELESS TECHNOLOGIES

78

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

DISTANCE VERSUS SPEED

79

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

WIRELESS TECHNOLOGIES

80

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

IN-BUILDING WLANS

81

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

THE IEEE 802 STANDARDS

82

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

IEEE 802.11 PROTOCOLS

83

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

IEEE 802.11 STANDARDS

84

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

DATA ENCAPSULATION

Co

mp

ute

r Ne

two

rk by P

.It-aru

n C

om

pu

ter

En

gin

ee

ring

De

pt, R

MU

TT

.

85

DATA ENCAPSULATION

86

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

87

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

88

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

SUMMARY - OSI model—the seven layer model used to help applica

tion developers design applications that can run on any type of system or network. Each layer has its special jo

bs and select responsibilities within the model to ensur e that solid, effective communications do, in fact, occur

. Remember that hubs are Physical layer devices and rep

eat the digital signal to all segments except the one it was received from.

Switches segment the network using hardware address es and break up collision domains.

Routers break up broadcast domains (and collision dom ains) and use logical addressing to send packets throug

h an internetwork.

89

Co

mp

ute

r Ne

two

rk by P

.It-aru

n

Co

mp

ute

r En

gin

ee

ring

De

pt, R

MU

TT

.

Recommended