Professional Documents
Culture Documents
Communication Networks
Communication Networks
Layout (Hardware) Protocols (Software) Systems Level
- Nodes, Links - Circuit Switching - Throughput, Delay
- Topology - Packet Switching - Reliability
Telecommunications 1 - Media - Multiplexing - IP Network
- Capacity, Speed - TCP/IP - PSTN, DSL, ISDN
P. Mathys - Connectivity
- Redundancy
- ATM, Frame Relay
- Protocol Stack
- LAN, MAN, WAN
- Ethernet, Token Ring
- Switches, Routers - Error Control, ARQ - Traffic: Voice, Data,
- Geographical Extent - Conflict Resolution Multimedia
- Backbone - Point-to-point bit pipe - Gateways, Firewalls
- Wireless - Routing, Flow Control - OSI Model
- Satellite - Encryption
A network has nodes connected by External nodes are users and sometimes
links: access points to other networks.
External
Node
Network Internal nodes are part of the network
infrastructure and perform various tasks.
Links provide interconnections between
Internal
External
Node nodes. The goal is to have a path from any
Node node to any other node without the need
for an excessive number of links.
Topology Topology
Firewall
Telephone Computer
LAN
EO Gateway
EO
EO
Gateway
LATA
From: http://www.cw.com
T1 is a high speed digital network using OC-1: 51.84 Mbps (approx 1 video or
pulse code modulation (PCM), developed 750 voice channels)
and implemented by AT&T around 1960. OC-3: 155.52 Mbps
T1: 1.544 Mbps (24 voice channels) OC-12: 622.08 Mbps
T1C: 3.152 Mbps (48 voice channels) OC-48: 2488.32 Mbps
T2: 6.312 Mbps (96 voice channels) OC-192: 10 Gbps
T3: 44.736 Mbps (1 video or 672 voice ch.) OC-768: 40 Gbps (approx 1000 video
T4: 274.176 Mbps (6 video or 4032 voice) ch.)
802.3 CSMA/CD (carrier sense multiple access Suppose you have data that needs to
with collision detection) Ethernet be transmitted from user A to user B.
802.5 Token ring LANs
Should you ask the network to set up a
802.11 Wireless LANs dedicated path from user A to user B?
802.15 Wireless PANs (personal area
Or should you break up the data into
networks)
standard size packets and let the
802.16 Wireless stationary point-to-
multipoint LANs/MANs network decide on the fly how to best
send the packets from user A to user B?
Circuit vs. Packet Switching Circuit vs. Packet Switching
The telephone network was optimized Because of the relatively long periods of
for analog voice communication. A inactivity between transactions or messages,
direct path between two parties is it is not economical to set up a dedicated
established for each conversation
session. network path between two computers.
Traffic between computers is usually Instead, successive messages between two
bursty, i.e., short packets of data are computers are addressed and sent individ-
exchanged rapidly, followed by ually, not necessarily using the same path.
relatively long periods of inactivity. Long messages are broken up into packets.
Suppose youre on a vacation and rent Suppose you go downtown with the bus. You
a car for one week. You will have to only pay the bus while you ride it. The fare is
pay the rental fee whether you actually cheap because you can share the bus with
drive the car or have it parked in a many other people. But the bus route is fixed
parking lot. But whenever you need to and you may have to change along the way
go somewhere, the car is right there to get to your destination. In addition, you
and you can use it immediately. This is may have to wait for the next available bus.
the essential idea behind circuit This is similar to packet switching in
switching. networks.
C A B A B
... C
A A -> C A
B B
D D
Cannot have A->C and B->D simultaneously Link sharing: Can have A->C and B->D simultaneously (alternating rapidly)
Layered Network
Protocols
Architecture
Data networks are rather complex to The rules and conventions used in the
design and implement. To make the peer-to-peer communications at a given
complexity manageable, most networks layer are collectively called a protocol.
use a layered architecture. Protocols used on the Internet are TCP,
Each layer has specific, well defined IP, and UDP (User Datagram Protocol).
tasks. Layers at the same level in A list of protocols that is used at each
different computers are referred to as layer in a certain network architecture is
peers. called a protocol stack.
The secretary in turn uses the services of the In an attempt to standardize network
next lower layer and brings the letter to the
post office in Boulder. Its peer is the post
architectures, the ISO (International
office in New York. Standards Organization) issued the OSI
The post office in Boulder collects all letters for (Open Systems Interconnection) model in
New York, brings them to the airport, and flies 1984 (ten years after the TCP/IP reference
them to New York. The airplane represents the model was first defined in 1974).
bottom layer, which is called physical layer. The OSI model has 7 layers which are
shown on the following slide.
OSI 7 Layer Model WWW and Internet
Package bits into frames, media access, point-to-point comm, e.g., Ethernet Ethernet, ATM, PPP
Transmits bits over physical medium such as optical fiber, twisted pair wire, etc Twisted pair wire, optical fiber, wireless
MIME
TCP/IP Model TCP/IP Model
SMTP
Acronyms: Acronyms:
SMTP: Simple mail transfer protocol TCP: Transmission control protocol
MIME: Multipurpose internet mail extensions UDP: User datagram protocol
FTP: File transfer protocol ARP: Address resolution protocol (IP <-->
HTTP: Hypertext transfer protocol LAN)
DNS: Domain name system IP: Internet protocol
SNMP: Simple network management protocol FDDI: Fiber distributed data interface
SNTP: Simple network time protocol ISDN: Integrated services digital network
ATM: Asynchronous transfer mode
Data Transmission using the
Internet Protocol (IP)
Internet Protocol (IP)
IP is the workhorse protocol of the How does data get transmitted on the
TCP/IP protocol stack. It provides an Internet from one computer to another?
unreliable connectionless datagram Data is broken up into packets at the sender
delivery service. and reassembled at the receiver.
IP implements layer 3 (network layer) Each data packet is individually labeled with a
of the OSI model. source and a destination address.
The main task of the IP is the routing Source and destination addresses are 32-bit
and the fragmentation and reassembly numbers (under IP v4).
of datagrams.
32 bits wide
TraceRoute Example
traceroute
Centers in
Prague and Brno
The network topology is determined by the
internal/external nodes and how they are
interconnected by links
There is no single right topology.
Factors that determine topology choice:
Amount of traffic between locations.
Cost of links/nodes vs. revenue from users.
Delay requirements.
from www.cesnet.cz