8. Network Topology
Network topology is the study of the physical
(real) and logical (virtual) interconnections
between nodes [Wikipedia]
Topology types:
Point to Point; Bus; Star; Ring; Mesh and Hybrid
10. Protocol
The rules governing the syntax, semantics,
and synchronization of communication.
[Wikipedia]
Protocol defines 1) format and 2) order of
messages sent and received among network
entities and 3) action(s) taken on
transmission and receipt of message
[Kurose and Ross]
11. Protocol
In this course, we will focus on protocols for data traffic only.
TCP/IP is the most dominant suite of protocols and
is used on the Internet.
TCP/IP suite of protocols is often organized in a
hierarchy of layers (OSI layers; to be covered next
week)
Some other protocol suites (no where as popular)
include: NetBIOS/ NetBEUI and IPX/ SPX.
12. Addressing
Each station must be addressable
Two kinds of addresses:
1) Physical addressing (MAC addresses)
2) Logical addressing (IP addresses)
The communicating applications (source/ destination
applications) must also be identifiable
Identified through TCP ports
A socket (IP address + TCP port) identifies both
an application and the machine it’s on.
14. Logical Addressing: IP
IP Version 4; Address: 32 bits
IP Version 6; Address: 128 bits
Hierarchical addressing
2 parts: a network part and a host part.
Machines in a LAN have the same
network part; they differ in host parts
How is the network part of an IP address
defined Subnet mask
4,294,967,296
possible addresses = 232
15. IP (Internet Protocol)
IP Address
192.168.15.2 (decimal)
11000000 10101000
00001111 00000010 (binary)
Subnet Mask:
255.255.255.0 (decimal)
11111111 11111111
11111111 00000000 (binary)
IP Address
192.168.15.2 (decimal)
11000000 10101000
00001111 00000010 (binary)
Subnet Mask:
255.255.255.0 (decimal)
11111111 11111111
11111111 00000000 (binary)
Network part Host part
16. Applications Identification
How to identify source/ destination
application communicating
The source/ destination applications are
identified through TCP ports
Common TCP Ports:
HTTP: 80; SMTP:25; DNS: 53
17. Naming
Machine addresses are difficult to memorize
Solution: Provide recognizable names to
numerically addressed Internet resources.
google.com; stanford.edu; niit.edu.pkgoogle.com; stanford.edu; niit.edu.pk
…, Third level domain, Second level domain; Top level domain (TLD);
List of TLDs:
http://en.wikipedia.org/wiki/List_of_Internet_top-level_domains
Examples:
18. Naming
How to manage address to name mapping?
1) A hosts file on each machine
Unix/ Linux: /etc/hosts file
Windows: %SystemRoot%system32driversetc
2) A decentralized domain name server system
Scalable solution
The name to IP mapping is available at a DNS server
DNS servers are of two types
a) DNS Authoritative server (each domain has at least two
authoritative servers)
b) DNS Caching server (each LAN can have one)
19. Example application
Let’s assume that a student (in the
niit.edu.pk LAN) wishes to access NUST-
SEECS website hosted at www.niit.edu.pk
W
W
W
P
C
To clarify concepts, let us assume
a greatly simplified model of the
LAN of NUST-SEECS
Network’s domain name:
niit.edu.pk
20. Example applicationhttp://www.niit.edu.pk
Other browsers include Firefox, Opera.
Browser acts as:
a client of webserver
fetches and displays user requested documents
1
2
This is an example of a browser (Internet Explorer)
Address Bar
21. Example application (contd.)
The HTTP request sent
by the student PC (the machine pc.niit.edu.pk)
to the webserver (the machine www.niit.edu.pk)
would be something like “GET / HTML/1.1”
Packet so far:
Outstanding issues:
How to send this request to Webserver?
Which application at webserver must process this packet?
GET / HTML/1.1
1
2
22. But how to send this request to Webserver?
To communicate with www.niit.edu.pk
(hostname), its IP address must be known
How to resolve hostnames to IP addresses
Domain Name Service (DNS)
1
Example application (contd.)
25. W
W
W
D
N
SReply
The IP address of
www.niit.edu.pk is
202.125.157.196
DNS Client/Server Exchange
The IP address of
www.niit.edu.pk is
202.125.157.196
26. Which application at webserver must process
this packet?
In TCP/IP, each well-known application is
identified using ports.
The port of DNS is 53; HTTP is 80; SMTP is 25.
In our considered example, HTTP server
application (port 80) would process the packet.
Packet so far:
2
Source Port | Destination Port | GET / HTML/1.1
> 1024 | 80 |
Example application (contd.)
27. The destination IP address (found through DNS)
is 202.125.157.196.
Let’s assume the source IP address is
202.125.157.150
(network must be same; to be explained later)
Packet so far:
Source IP | Destination IP | Source Port | Destination Port | GET / HTML/1.1
202.125.157.150 | 202.125.157.196 | > 1024 | 80 |
Logical addressing: network and host parts
*Assuming /24 subnet mask (to be explained later)
Example application (contd.)
28. How to send the created packet to Webserver?
To communicate with any host, its physical address
(called MAC address) must be known.
How to resolve IP addresses to MAC addresses
Address Resolution Protocol (ARP)
3
Example application (contd.)
30. W
W
W
D
N
S
Reply
The MAC address of
202.125.157.196 is
12:34:aa:bb:cc:dd
ARP Client/Server Exchange
The MAC address of
202.125.157.196 is
12:34:aa:bb:cc:dd
31. Now that the physical (MAC) addresses are known,
communication can take place
The destination MAC address is 12:34:aa:bb:cc:dd
The source MAC address (let’s assume) is
23:34:aa:bb:cc:dd
IP packet containing the data
MAC frame
Source IP | Destination IP | Source Port | Destination Port | GET / HTML/1.1
202.125.157.150 | 202.125.157.196 | > 1024 | 80 |
PayloadSource MAC address | Destination MAC address FCS
Example application (contd.)
32. Encapsulation
This topic is to be studied in more depth next lecture
GET / HTML/1.1
Source MAC address | Destination MAC address
23:34:aa:bb:cc:dd | 12:34:aa:bb:cc:dd
FCSPayload
PayloadSource Port | Destination Port
> 1024 | 80
Payload
PayloadSource IP | Destination IP
202.125.157.150 | 202.125.157.196
Payload
Application data
TCP Segment
MAC Frame
IP Packet
33. HTTP Client/Server Exchange
W
W
W
D
N
S
Send me the index.html page
for the host www.niit.edu.pk
using HTTP version 1.1
Request
Send me the index.html page
for the host www.niit.edu.pk
using HTTP version 1.1
34. W
W
W
D
N
S
Reply
The index.html page in the wwwroot directory
configured for the www.niit.edu.pk webserver
is sent back to the browser for display
HTTP Client/Server Exchange
and data; provide better communications; help to secure information; and provide access to numerous databases.Types of networks are as follows. A wide area network (WAN) covers a wide geographical area, such as a country. A metropolitan area network (MAN) covers a city or suburb. A local area network (LAN) covers a limited area such as an office or a building. Most large networks have a host computer, a mainframe or midsize central computer to control the network. Any device attached to a network is called a node. MANs and LANs may be connected to the internet by a high-speed network called a backbone.Two types of LANs are client/server and peer-to-peer. A client/server LAN consists of microcomputers that request data (clients) and powerful computers that provide data (servers). A file server, for example, stores programs and data files; other servers are database server, print server, web server, and mail server. In a peer-to-peer LAN, there is no server; microcomputers on a network communicate with each other directly. Several standard components of a LAN are the connection or the cabling system, microcomputers with network interface cards (NIC), network operating system (Novel NetWare, Microsoft Windows NT/2000, Unix, or Linux), and other shared devices (printers, storage devices). Other components are a router, a special computer that helps to communicate messages when networks are tied together; a bridge, an interface used to connect the same types of networks; a gateway, an interface that allows communication between dissimilar networks; and a hub, a common connection point for devices in a network.
Why they are interesting?
Overcome geographic limits
Access remote data
Separate clients and server
Reliability: Reduce errors and inconsistencies
Greater performance: Grid computing; Distributed computing
Courtesy: http://www.hyperline.com/img/sharedimg/cable/cable_c8.jpg
The electromagnetic spectrum consists of fields of electrical energy and magnetic energy, which travel in waves. A part of the electromagnetic spectrum is the radio frequency spectrum, fields of electrical and magnetic energy that carry communications signals, which vary according to frequency. A range or a band of frequencies that a transmission can carry in a given period of time is called bandwidth. The wider the band, the faster data can be transmitted. Broadband connections are very high speed.A communications channel is the path over which information travels in a telecommunications system. Channels may be wired or wireless.
Three types of wired channels are the following. (1) Twisted-pair wire, or standard telephone wire, consists of two strands of insulated copper wire twisted around each other; it is used for both voice and data transmission. (2) Coaxial cable consists of insulated copper wire wrapped in other materials; it is better than twisted-pair for resisting noise. (3) Fiber-optic cable consists of thin strands of glass or plastic that transmit beams of light rather than electricity; it is very fast and noise-resistant.
Four types of wireless channels are the following. (1) Infrared transmission sends data via infrared-light waves. (2) Broadcast radio sends data over long distances, between states, regions, and countries. (3) Microwave radio transmits voice and data as superhigh-frequency radio waves. (4) Communications satellites are microwave relay stations in orbit around the earth. They occupy one of the three zones in space: GEO, MEO, or LEO.Types of long-distance wireless communications may be one-way or two-way. Examples of one-way communication are (1) Global Positioning Satellite (GPS), which consists of satellites that can be used to identify earth locations identified by GPS signal receivers, and (2) pagers, radio receivers that receive data from special radio transmitters. Examples of two-way communication are (1) two-way pagers; (2) analog cellphones, designed for communicating by voice through a system of cells, each 8 miles or less in diameter and served by a transmitter-receiving tower; (3) digital wireless services, supports digital cellphones and personal digital assistants, uses a network of cell towers to send voice communications and data over the airwaves in digital form; and (4) broadband wireless digital services, which are able to transmit data at high speed, provide web access, and display color video and still pictures and play music.Short-range wireless communication standards include (1) Bluetooth, a short-range wireless digital standard aimed at linking cell phones, PDAs, computers, and peripherals up to distances of 30 feet, and (2) WiFi, a short-range wireless digital standard aimed at helping portable computers and handheld wireless devices to communicate at high speeds and share internet connections at distances up to 300 feet. It connects through access points to a kind of local area network known as the Ethernet.
Factors Affecting How Data is Transmitted. Several factors affect how data is transmitted. (1) Line configurations are the methods whereby communications lines are connected. A point-to-point line directly connects the sending and receiving devices, whereas a multipoint line is a single line that interconnects several communications devices to one computer. (2) Serial transmission transmits the bits sequentially; parallel data transmission transmits bits through separate lines simultaneously. (3) Data can flow in three ways: simplex (one way); half-duplex (in both directions but not at the same time); and full-duplex (in both directions simultaneously). (4) The transmission mode can be either asynchronous or synchronous. In asynchronous transmission, data is sent one byte at a time, with a "start" bit and a "stop" bit. With synchronous transmission, data is transmitted in blocks, with a start and a stop bit pattern to delineate each block. (5) In circuit switching, the transmitter has full use of the circuit until all the data has been transmitted and the circuit is terminated. In packet switching, electronic messages are divided into packets for transmission over a wide area network to their destination, through the most expedient route. (6) The efficiency of data transmission can be increased by transmitting multiple signals over a single communications channel, a process known as multiplexing. Multiplexing devices include multiplexers, concentrators, and front-end processors. (7) A protocol is a set of conventions that control the exchange of data between hardware and/or software components in a communications network. (8) OSI is an international standard that defines seven layers of protocols for worldwide computer communications.
Point-to-point (PTP) topology connects two nodes directly together. The following examples are pure point to point links:
Two computers communicating via modems.
A mainframe terminal communicating with a front end processor.
A workstation communicating along a parallel cable to a printer.
http://www.dcs.napier.ac.uk/~bill/cisco_presentation/brian.ppt
7) A protocol is a set of conventions that control the exchange of data between hardware and/or software components in a communications network. (8) OSI is an international standard that defines seven layers of protocols for worldwide computer communications.
Courtesy: www.layertwo.net
www.tcpipguide.com
Courtesy: www.layertwo.net
www.tcpipguide.com
Courtesy: www.layertwo.net
www.tcpipguide.com
Hosts file is used in small networks or as supplement to the next option