SlideShare uma empresa Scribd logo
1 de 50
Netprog:  OSI Reference Model Networking
Netprog:  OSI Reference Model Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” 	PCs, workstations 	dedicated computers 	network components
Netprog:  OSI Reference Model Multiaccess vs. Point-to-point Multiaccess  means shared medium. many  end-systems share the same physical communication resources (wire, frequency, ...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from !
Netprog:  OSI Reference Model Multiaccess Point-to-point
Netprog:  OSI Reference Model LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet	10 Mbps, 100Mbps Token Ring	16 Mbps FDDI   	100 Mbps
Netprog:  OSI Reference Model WAN - Wide Area Network connects computers that are physically far apart. “long-haul network”. typically slower than a LAN. typically less reliable than a LAN. point-to-point Technologies: telephone lines Satellite communications
Netprog:  OSI Reference Model MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable  microwave
Netprog:  OSI Reference Model Internetwork Connection of 2 or more distinct (possibly dissimilar) networks. Requires  some kind of network device to facilitate the connection. Net A Net B
Netprog:  OSI Reference Model OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
Netprog:  OSI Reference Model Responsibility: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances The Physical Layer
Netprog:  OSI Reference Model The Data Link Layer - Data Link Control Responsibility: provide an error-free communication link Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001
Netprog:  OSI Reference Model The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess networks. MAC provides DLC with “virtual wires” on multiaccess  networks.
Netprog:  OSI Reference Model The Network Layer Responsibilities: path selection between end-systems (routing). subnet flow control. fragmentation & reassembly translation between different network types. Issues: packet headers virtual circuits
Netprog:  OSI Reference Model The Transport Layer Responsibilities: provides  virtual end-to-end links between peer processes. end-to-end flow control Issues: headers error detection  reliable communication
Netprog:  OSI Reference Model The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer.
Netprog:  OSI Reference Model The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer.
Netprog:  OSI Reference Model The Application Layer Responsibilities: anything not provided by any of the other layers Issues: application level protocols appropriate selection of “type of service”
Netprog:  OSI Reference Model Layering & Headers  Each layer needs to add some control information to the data in order to do it’s job.  This information is typically prepended to the data before being given to the lower layer. Once the lower layers deliver the the data and control information - the peer layer uses the control information.
Netprog:  OSI Reference Model Headers DATA Process Process Transport Transport DATA H Network Network DATA H H Data Link Data Link DATA H H H
Netprog:  OSI Reference Model What are the headers? Physical: no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum.
Netprog:  OSI Reference Model Network layer header - examples protocol suite version type of service  length of the data packet identifier fragment number time to live ,[object Object]
header checksum
source network address
destination network address,[object Object]
Netprog:  OSI Reference Model Connecting Networks Repeater:  	physical layer Bridge: 		data link layer Router: 		network layer Gateway: 	network layer and above.
Netprog:  OSI Reference Model Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER
Netprog:  OSI Reference Model Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE
Netprog:  OSI Reference Model Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER
Netprog:  OSI Reference Model Gateway Operates as a router Data conversions above the network layer. Conversions: encapsulation - use an intermediate network  translation - connect different application protocols encrpyption - could be done by a gateway
Netprog:  OSI Reference Model Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols.
Netprog:  OSI Reference Model Translation Gateway Translate from green protocol to brown protocol
Netprog:  OSI Reference Model Encryption gateway Secure Network Secure  Network Encryption/Decryption Gateways ? GW GW ? ? InsecureNetwork
Netprog:  OSI Reference Model Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways.
Netprog:  OSI Reference Model Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte High Byte Address A High Byte Low Byte Address A+1
Netprog:  OSI Reference Model Byte Ordering Big-Endian IBM 370 Motorola 68000 Sun Little-Endian IBM 80x86 DEC VAX DEC PDP-11 Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1
Netprog:  OSI Reference Model Byte Order and Networking Suppose a Big Endian machine sends a 16 bit integer with the value 2: A Little Endian machine will think it got the number 512: 0000000000000010 0000001000000000
Netprog:  OSI Reference Model Network Byte Order Conversion of application-level data is left up to the presentation layer. But hold on !!! How do lower level layers communicate if they all represent values differently ? (data length fields in headers) A fixed byte order is used (called network byte order) for all control data.
Netprog:  OSI Reference Model Multiplexing “.. to combine many into one”.  Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP.
Netprog:  OSI Reference Model Modes of Service connection-oriented vs. connectionless sequencing error-control flow-control byte stream vs. message based full-duplex vs. half-duplex.
Netprog:  OSI Reference Model Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages.
Netprog:  OSI Reference Model Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.
Netprog:  OSI Reference Model Error Control Some services require error detection (it is important to know when a transmission error has occured). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission.
Netprog:  OSI Reference Model Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).
Netprog:  OSI Reference Model Byte Stream vs. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams.
Netprog:  OSI Reference Model Full- vs. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction.
Netprog:  OSI Reference Model End-to-End vs. Hop-toHop Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.
Netprog:  OSI Reference Model End-to-End Process A Process B
Netprog:  OSI Reference Model Hop-by-Hop Process A Process B
Netprog:  OSI Reference Model Buffering Buffering can provide more efficient communications.  Buffering is most useful for byte stream services. Process A Process B Send Buffer Recv. Buffer
Netprog:  OSI Reference Model Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host (end-system) must be specified the process must be specified.

Mais conteúdo relacionado

Mais procurados (20)

OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
 
OSI Network Reference Model
OSI Network Reference ModelOSI Network Reference Model
OSI Network Reference Model
 
Osi reference model and the tcp
Osi reference model and the tcpOsi reference model and the tcp
Osi reference model and the tcp
 
OSI layers
OSI layersOSI layers
OSI layers
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
OSI and TCPIP Model
OSI and TCPIP ModelOSI and TCPIP Model
OSI and TCPIP Model
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
A Technical Seminar on OSI model
A Technical Seminar on OSI modelA Technical Seminar on OSI model
A Technical Seminar on OSI model
 
Osi model
Osi modelOsi model
Osi model
 
Osi protocols
Osi protocolsOsi protocols
Osi protocols
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Chap2
Chap2Chap2
Chap2
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
ZERO-LECTURE.pptx
ZERO-LECTURE.pptxZERO-LECTURE.pptx
ZERO-LECTURE.pptx
 
Lecture 02 networking
Lecture 02 networkingLecture 02 networking
Lecture 02 networking
 
Osi model
Osi modelOsi model
Osi model
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 

Destaque

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksCall Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksMervat AbuElkheir
 
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...jSHOW
 
Finance information system
Finance information systemFinance information system
Finance information systemSuby A John
 
Financial Information Systems
Financial Information SystemsFinancial Information Systems
Financial Information Systemscatch_ashutosh
 
Cellphone based home automation
Cellphone based home automationCellphone based home automation
Cellphone based home automationPROJECTRONICS
 

Destaque (13)

Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Call Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless NetworksCall Admission Control In Mobile Wireless Networks
Call Admission Control In Mobile Wireless Networks
 
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
Utilizing Call Admission Control To Derive Optimal Pricing Of Multiple Servic...
 
Internet Domain Names
Internet Domain NamesInternet Domain Names
Internet Domain Names
 
IP address and Domain name
IP address and Domain nameIP address and Domain name
IP address and Domain name
 
Finance information system
Finance information systemFinance information system
Finance information system
 
OSI layers
OSI layersOSI layers
OSI layers
 
Financial Information Systems
Financial Information SystemsFinancial Information Systems
Financial Information Systems
 
Financial Information System
Financial Information SystemFinancial Information System
Financial Information System
 
Ip address
Ip addressIp address
Ip address
 
Cellphone based home automation
Cellphone based home automationCellphone based home automation
Cellphone based home automation
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 

Semelhante a Networking

Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Aswini Badatya
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Saumendra Pradhan
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingMd. Mashiur Rahman
 
layering.pdf
layering.pdflayering.pdf
layering.pdfBoostHub
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingMeenakshiGupta233101
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyAvishek Maitra
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi modelNaiyan Noor
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptmohanravi1986
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptdeeplearning6
 

Semelhante a Networking (20)

Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Computer networking
Computer networkingComputer networking
Computer networking
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Lecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworkingLecture 1 networking &amp; internetworking
Lecture 1 networking &amp; internetworking
 
layering.pdf
layering.pdflayering.pdf
layering.pdf
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
OSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networkingOSI and TCP/IP reference models in networking
OSI and TCP/IP reference models in networking
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Internet (i mcom)
Internet (i mcom)Internet (i mcom)
Internet (i mcom)
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 
CN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.pptCN unit 1 part 2 2023.ppt
CN unit 1 part 2 2023.ppt
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Networking

  • 1. Netprog: OSI Reference Model Networking
  • 2. Netprog: OSI Reference Model Network “ ... communication system for connecting end-systems” End-systems a.k.a. “hosts” PCs, workstations dedicated computers network components
  • 3. Netprog: OSI Reference Model Multiaccess vs. Point-to-point Multiaccess means shared medium. many end-systems share the same physical communication resources (wire, frequency, ...) There must be some arbitration mechanism. Point-to-point only 2 systems involved no doubt about where data came from !
  • 4. Netprog: OSI Reference Model Multiaccess Point-to-point
  • 5. Netprog: OSI Reference Model LAN - Local Area Network connects computers that are physically close together ( < 1 mile). high speed multi-access Technologies: Ethernet 10 Mbps, 100Mbps Token Ring 16 Mbps FDDI 100 Mbps
  • 6. Netprog: OSI Reference Model WAN - Wide Area Network connects computers that are physically far apart. “long-haul network”. typically slower than a LAN. typically less reliable than a LAN. point-to-point Technologies: telephone lines Satellite communications
  • 7. Netprog: OSI Reference Model MAN - Metropolitan Area Network Larger than a LAN and smaller than a WAN - example: campus-wide network - multi-access network Technologies: coaxial cable microwave
  • 8. Netprog: OSI Reference Model Internetwork Connection of 2 or more distinct (possibly dissimilar) networks. Requires some kind of network device to facilitate the connection. Net A Net B
  • 9. Netprog: OSI Reference Model OSI Reference Model Layered model: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
  • 10. Netprog: OSI Reference Model Responsibility: transmission of raw bits over a communication channel. Issues: mechanical and electrical interfaces time per bit distances The Physical Layer
  • 11. Netprog: OSI Reference Model The Data Link Layer - Data Link Control Responsibility: provide an error-free communication link Issues: framing (dividing data into chunks) header & trailer bits addressing 10110110101 01100010011 10110000001
  • 12. Netprog: OSI Reference Model The Data Link Layer - The MAC sublayer Medium Access Control - needed by mutiaccess networks. MAC provides DLC with “virtual wires” on multiaccess networks.
  • 13. Netprog: OSI Reference Model The Network Layer Responsibilities: path selection between end-systems (routing). subnet flow control. fragmentation & reassembly translation between different network types. Issues: packet headers virtual circuits
  • 14. Netprog: OSI Reference Model The Transport Layer Responsibilities: provides virtual end-to-end links between peer processes. end-to-end flow control Issues: headers error detection reliable communication
  • 15. Netprog: OSI Reference Model The Session Layer Responsibilities: establishes, manages, and terminates sessions between applications. service location lookup Many protocol suites do not include a session layer.
  • 16. Netprog: OSI Reference Model The Presentation Layer Responsibilities: data encryption data compression data conversion Many protocol suites do not include a Presentation Layer.
  • 17. Netprog: OSI Reference Model The Application Layer Responsibilities: anything not provided by any of the other layers Issues: application level protocols appropriate selection of “type of service”
  • 18. Netprog: OSI Reference Model Layering & Headers Each layer needs to add some control information to the data in order to do it’s job. This information is typically prepended to the data before being given to the lower layer. Once the lower layers deliver the the data and control information - the peer layer uses the control information.
  • 19. Netprog: OSI Reference Model Headers DATA Process Process Transport Transport DATA H Network Network DATA H H Data Link Data Link DATA H H H
  • 20. Netprog: OSI Reference Model What are the headers? Physical: no header - just a bunch of bits. Data Link: address of the receiving endpoints address of the sending endpoint length of the data checksum.
  • 21.
  • 24.
  • 25. Netprog: OSI Reference Model Connecting Networks Repeater: physical layer Bridge: data link layer Router: network layer Gateway: network layer and above.
  • 26. Netprog: OSI Reference Model Repeater Copies bits from one network to another Does not look at any bits Allows the extension of a network beyond physical length limitations REPEATER
  • 27. Netprog: OSI Reference Model Bridge Copies frames from one network to another Can operate selectively - does not copy all frames (must look at data-link headers). Extends the network beyond physical length limitations. BRIDGE
  • 28. Netprog: OSI Reference Model Router Copies packets from one network to another. Makes decisions about what route a packet should take (looks at network headers). ROUTER
  • 29. Netprog: OSI Reference Model Gateway Operates as a router Data conversions above the network layer. Conversions: encapsulation - use an intermediate network translation - connect different application protocols encrpyption - could be done by a gateway
  • 30. Netprog: OSI Reference Model Encapsulation Example Gateway Gateway Provides service connectivity even though intermediate network does not support protocols.
  • 31. Netprog: OSI Reference Model Translation Gateway Translate from green protocol to brown protocol
  • 32. Netprog: OSI Reference Model Encryption gateway Secure Network Secure Network Encryption/Decryption Gateways ? GW GW ? ? InsecureNetwork
  • 33. Netprog: OSI Reference Model Hardware vs. Software Repeaters are typically hardware devices. Bridges can be implemented in hardware or software. Routers & Gateways are typically implemented in software so that they can be extended to handle new protocols. Many workstations can operate as routers or gateways.
  • 34. Netprog: OSI Reference Model Byte Ordering Different computer architectures use different byte ordering to represent multibyte values. 16 bit integer: Low Byte High Byte Address A High Byte Low Byte Address A+1
  • 35. Netprog: OSI Reference Model Byte Ordering Big-Endian IBM 370 Motorola 68000 Sun Little-Endian IBM 80x86 DEC VAX DEC PDP-11 Low Byte High Byte High Byte Low Byte Addr A Addr A+1 Addr A Addr A+1
  • 36. Netprog: OSI Reference Model Byte Order and Networking Suppose a Big Endian machine sends a 16 bit integer with the value 2: A Little Endian machine will think it got the number 512: 0000000000000010 0000001000000000
  • 37. Netprog: OSI Reference Model Network Byte Order Conversion of application-level data is left up to the presentation layer. But hold on !!! How do lower level layers communicate if they all represent values differently ? (data length fields in headers) A fixed byte order is used (called network byte order) for all control data.
  • 38. Netprog: OSI Reference Model Multiplexing “.. to combine many into one”. Many processes sharing a single network interface. A single process could use multiple protocols. More on this when we look at TCP/IP.
  • 39. Netprog: OSI Reference Model Modes of Service connection-oriented vs. connectionless sequencing error-control flow-control byte stream vs. message based full-duplex vs. half-duplex.
  • 40. Netprog: OSI Reference Model Connection-Oriented vs. Connectionless Service A connection-oriented service includes the establishment of a logical connection between 2 processes. establish logical connection transfer data terminate connection. Connectionless services involve sending of independent messages.
  • 41. Netprog: OSI Reference Model Sequencing Sequencing provides support for an order to communications. A service that includes sequencing requires that messages (or bytes) are received in the same order they are sent.
  • 42. Netprog: OSI Reference Model Error Control Some services require error detection (it is important to know when a transmission error has occured). Checksums provide a simple error detection mechanism. Error control sometimes involves notification and retransmission.
  • 43. Netprog: OSI Reference Model Flow Control Flow control prevents the sending process from overwhelming the receiving process. Flow control can be handled a variety of ways - this is one of the major research issues in the development of the next generation of networks (ATM).
  • 44. Netprog: OSI Reference Model Byte Stream vs. Message Byte stream implies an ordered sequence of bytes with no message boundaries. Message oriented services provide communication service to chunks of data called datagrams.
  • 45. Netprog: OSI Reference Model Full- vs. Half-Duplex Full-Duplex services support the transfer of data in both directions. Half-Duplex services support the transfer of data in a single direction.
  • 46. Netprog: OSI Reference Model End-to-End vs. Hop-toHop Many service modes/features such as flow control and error control can be done either: between endpoints of the communication. -or- between every 2 nodes on the path between the endpoints.
  • 47. Netprog: OSI Reference Model End-to-End Process A Process B
  • 48. Netprog: OSI Reference Model Hop-by-Hop Process A Process B
  • 49. Netprog: OSI Reference Model Buffering Buffering can provide more efficient communications. Buffering is most useful for byte stream services. Process A Process B Send Buffer Recv. Buffer
  • 50. Netprog: OSI Reference Model Addresses Each communication endpoint must have an address. Consider 2 processes communicating over an internet: the network must be specified the host (end-system) must be specified the process must be specified.
  • 51. Netprog: OSI Reference Model Addresses at Layers Physical Layer: no address necessary Data Link Layer - address must be able to select any host on the network. Network Layer - address must be able to provide information to enable routing. Transport Layer - address must identify the destination process.
  • 52. Netprog: OSI Reference Model Broadcasts Many networks support the notion of sending a message from one host to all other hosts on the network. A special address called the “broadcast address” is often used. Some popular network services are based on broadcasting (YP/NIS, rup, rusers)