No Slide Title
Download
Report
Transcript No Slide Title
The Workings
of the Internet
CECS 5030
with Cathie Norris,
Jennifer Smolka & Gerald Knezek
Overview
Layered Organization
Topologies
Network Transports
Access Methods
Routing
ISO/OSI Model
Developed by International Organization
for Standardization in 1974
Consists of seven layers
Each with unique function
Each hands off functions to adjacent layer
Modules (layers) may be replaced with
another of equal functionality (Xerox vs.
Novell, for example)
OSI Model Layers
OSI Layer
Function Provided
Application
Network applications such as file
transfer and terminal emulation
Presentation
Data formatting and encryption
Session
Transport
Network
Establishment and maintenance
of sessions
Provision for end-to-end reliable
and unreliable delivery
Delivery of packets of information,
which includes routing
Data Link
Transfer of units of information,
framing, and error checking
Physical
Transmission of binary signal
Network Topologies
Architectural “drawings” that show the
overall physical configuration for a given
communications system
Determine access methods and rules used
to design and implement a communication
system
Represent the drawing of your network
cable plant
Three main types: star, ring, and bus
Network Topologies
Linear Bus - Ethernet/IEEE 802.3
10Base2 and 10Base5
Star Wired Bus - Ethernet/IEEE 802.3i
10BaseT
Star Wired Ring - Token Ring/IEEE
802.5
Dual Counter Rotating Ring FDDI/ANSI X3T9.5
Wireless - Product Specific
Star Topology
First used with the telephone switches
Centralized hub with all stations connected
No single point of failure effects the whole
network, except the hub
Oldest and most popular topology
Better network management
Node
Node
Central Hub
Node
Node
Ring Topology
All stations (repeaters) are enclosed in a
loop
Each receives the signal and repeats it on
the other side to its “downstream” neighbor
Data is transmitted in one direction only
Single point of failure when one station
quits repeating
Management processes invoked that
dynamically remove a station allowing the
ring to return to an operational state
Ring Topology
Node
Transmitter
Node
Data Direction
Receiver
Node
Repeater
Node
Bus Topology
Also known as linear bus
Uses a single length of cable with all
stations attached to it
The network is terminated at its endpoints
(not a closed loop)
A break on the single cable will bring
down all attachments on the network
The bus topology is most commonly used
for Ethernet networks
Bus Topology
Node
Node
Node
Star-Wired Bus Topology
Each node is attached to
Node
Node
hub
When one node fails, it
Node
Node
doesn’t affect the other
nodes
Node
Node
The hub is a single point
of failure for all nodes
Concentrator
Hub failure causes all
Hub
nodes to lose connectivity
Physical Media
Physical media provide the connections
between network devices that make
networking possible
There are four main types of physical
media in widespread use today:
Coaxial Cable
Twisted Pair
Fiber Optic Cable
Wireless Media
Thick Coaxial Cable
Used in the first Ethernet networks
Type RG-11 / 10Base5
Usually orange/black
Thickness of a small garden hose
Very expensive and heavy cable
Two strands along the axis
Conductor down the center
Insulator surrounds conductor
Shielded mesh serves as outside
Thin Coaxial Cable
Alternative to Thick Ethernet Cable
Type RG-58 / 10Base2 / “Cheapnet”
Usually black
Thickness of a pencil
More flexible than thick Ethernet
Reduced the cost of the cabling
Flexible
Twisted Pair Cable
Phone Systems
Twisted Pair Cable consists of two copper
wires, usually twisted around each other
to cancel out any noise in the circuit
Two main type of Twisted Pair Cabling
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP)
Shielded twisted pair is the original
media used for token ring networks
STP can be used for high-speed
networks, such as FDDI or ATM, where
shielding is important
Unshielded Twisted Pair
(UTP)
Most commonly used twisted pair cable
Uses common telephone wire
UTP was standardized by the IEEE 802.3
committee in October of 1990
UTP for LANs is now classified as:
Category 3 - used for LANs up to 10 Mbps
Category 4 - used for LANs up to 16 Mbps
Category 5 - used for LANs up to 100 Mbps
Fiber Optic Cable
Uses light signals transmitted over a
very thin filament, usually made of glass
Advantage over other types of media
security against eavesdropping
immunity to interference
maximum length of a single
segment
Most expensive of all media
Wireless Media
Connect your computer to your cell
phone?
Problems with stability of connection
Have wireless for a long time
Commercial Satellite
Geostationary Orbit
Microwave Wavelength
Expensive
Wireless Media
A number of wireless media are used in
internetworking, e.g.:
Microwave
Commercial Radio wave
Infrared signaling (Palm Synching)
Concentrators/Hubs
Hubs allow multiple users to be connected
to a single network as a shared device
The more users on a hub the slower the
response time
Network Transports
Ethernet / Fast Ethernet / IEEE 802.3
Token Ring / IEEE 802.5
FDDI / FDDI/ANSI X3T9.5
Wireless/IEEE 802.11
Ethernet Cable Names
Unshielded
Twisted
Name
Thick Coaxial Thin Coaxial
Pair
Fiber
Wire Type
RG-8
RG-58
22 - 26 AWG 62.5/125 micron
IEEE Name
10BASE5
10BASE2
10BASET
10BASEF
Standard Number IEEE 802.3
IEEE 802.3a IEEE 802.3i
NA
Other Names
Thick net
Thin net
UTP
How Ethernet Works
Sent the message and listens for a
response
An access method based on the Carrier
Sense Multiple Access with Collision
Detection (CSMA/CD) algorithm
Cooperative effort between Digital, Intel,
and Xerox produced Ethernet version 1.0
in 1980
How Ethernet Works
Ethernet was adopted with modifications
by the standards committees IEEE 802.3
and ANSI 8802/3
Most widely used network system today
Normal Ethernet Operation
B
C
Address mismatch
packet discarded
Address mismatch
packet discarded
Send data
to node D
Transmitted packet seen
A
by all stations on the LAN
(broadcast medium)
Data
Address match
packet processed
D
Final Ethernet Issues
Ethernet is an access method that
strictly adheres to the CSMA/CD
algorithm
Ethernet is a multiprotocol solution
Ethernet is usually hardware (firmware),
not software
How Token Ring Works
Token Ring controls which PC can send
messages by passing a token from
station to station around the ring
When a PC wants to transmit it will
replace the token with a “frame”
(message)
The frame is passed from PC to PC until
it reaches its destination
How Token Ring Works
The destination PC makes a copy of the
“frame” (message) and marks the frame
to indicate that it got the message
The frame circulates around the
network until it gets back to the sender
The sender, seeing that the message
has been received, replaces it with a
new token
Wide Area Network (WAN)
Topologies
Dedicated Circuits
56Kb
T-1
DS-3
Frame-Relay
56Kb to T-1 speeds
Integrated Services Digital Network (ISDN)
Inter-networking
Networks have their restrictions
Thick coaxial cable maximum length is
500 meters
LANs are broadcast-oriented
Proper network design is impossible
using repeaters
Inter-networking
Properly extending the LAN requires
special devices known as bridges and
routers
A LAN that uses bridges is called an
extended LAN
A LAN that uses routers is called an
internet or inter-network
A gateway between dissimilar networks
Inter-networking
Bridges and routers are data-forwarding
devices that forward packets to one or
more LANs
They allow for more efficient
networks to be designed
Inter-networking Categories
Application
Presentation
Gateways
Session
Transport
Network
Routers
Data Link
Bridges
Physical
Repeaters
Repeaters
Extend the network by interconnecting
multiple segments
Have transformed into wiring
concentrators (hubs)
Low cost
Can be used to interconnect different
wiring types but not different access
methods
e.g. Coax to twisted pair
Bridge Designs
Cascaded
Locates on bridge next to another in a
pillar fashion
Backbone
For networks with many LANs
Backbone cable is run vertically in
building’s riser
LAN “ribs” run on each floor
Star
Used in wide area networks or remote
bridged networks
Cascaded
Terminal Server
Workstation
Terminal
Host
Cable segment 1
Cable segment 2
Cable segment 3
File Server
Backbone
Workstation
Floor 20
Host
Fiber
backbone
Workstation
Terminal
Floor 1
Star
California
Serial line
Serial line
Texas
Virginia
Serial line
North Carolina
Introduction to Routers
Routers are data forwarding devices but operate
differently than a bridge
Routers separate networks into regions.
Each region is assigned a unique network number
These network numbers are unique for each network
they are assigned to
Packet forwarding is based on these network Ids
Routers route packets based on a protocol as well as
a network ID
Most routers today are multiprotocol in that one box
can forward different protocol packets
Routers, like bridges, can be used locally or remotely
Routing
Most network protocols were designed with network-layer
routing
Routers base forwarding decisions on an embedded
network number in the network layer header of the packet
Network numbers can be thought of as area codes in the
phone system
Must use the area code to call different areas
Any number of end stations may be assigned to one
network number
Most routers do not keep track of individual end
stations’ addresses
Network numbers group network stations into one or more
network numbers
Taken as a whole, routers combine networks and form
internets
Routers - Operation
Node D
Router sends
packet directly
to the end station
MAC address
for the router
Destination
network
number
is different
Network 2
C
Router Z
Find router B
and give packet
to the router
Node A
Node P
Destination network address is local
transmit packet directly to the end station
Network 1
Routing Diagram
G
Network 4
Router X
H
F
E
Network 3
Router Y
D
Network 2
C
MAC Addresses
Router Z
B
A
Network 1
Multiprotocol Routers
LANs currently operate with many different types of
protocols
Apple Computers can use AppleTalk
UNIX workstations use TCP/IP
Client/Server applications could use Novell
NetWare
To require one router for each protocol on the LAN is
not efficient
Multiprotocol routers were invented to handle this
Arrived around 1986
Routes not only based on the network IDs but are
able to pass the packet to the correct protocol
processor by examining the Type of packet
Gateways
Complex devices that provide for a
protocol translation during data
forwarding
Examples are:
TCP/IP to SNA
asynchronous to synchronous serial
stream
Gateways differ from bridges and routers
Perform protocol translation of the
incoming packet to match the
outgoing stream
References
From Networking 101
Jim Cabral, Puget Technology Group, Inc. &
Tammy Ruth, Children’s Hospital and Medical Center
www.pugettech.com
[email protected]
[email protected]