You are on page 1of 11

Overview

Communication Networks

Communication Networks
Layout (Hardware) Protocols (Software) Systems Level
- Nodes, Links - Circuit Switching - Throughput, Delay
- Topology - Packet Switching - Reliability
Telecommunications 1 - Media - Multiplexing - IP Network
- Capacity, Speed - TCP/IP - PSTN, DSL, ISDN
P. Mathys - Connectivity
- Redundancy
- ATM, Frame Relay
- Protocol Stack
- LAN, MAN, WAN
- Ethernet, Token Ring
- Switches, Routers - Error Control, ARQ - Traffic: Voice, Data,
- Geographical Extent - Conflict Resolution Multimedia
- Backbone - Point-to-point bit pipe - Gateways, Firewalls
- Wireless - Routing, Flow Control - OSI Model
- Satellite - Encryption

Nodes and Links Nodes and Links

A network has nodes connected by External nodes are users and sometimes
links: access points to other networks.
External
Node
Network Internal nodes are part of the network
infrastructure and perform various tasks.
Links provide interconnections between
Internal
External
Node nodes. The goal is to have a path from any
Node node to any other node without the need
for an excessive number of links.

Topology Topology

Fully connected Ring Tree Spanning Tree


In a spanning tree there
is exactly one path from
every node to every other
node and there are no
Star Bus cycles.
Spanning Tree Topology
Uses the least amount of
links to connect all nodes,
but offers no redundancy.
Topology: Configuration formed by the connection
between internal/external nodes of a network.
WAN: Wide Area Network

Example: Telephone Network Example: Internet MAN: Metropolitan Area Network


LAN: Local Area Network

Telephone WAN 1 Competitors


Competitors Backbone
EO Router Network
Router
Backbone
LDN 2 Network
WAN 2
Switch
LDN 1 Switch

Firewall

Telephone Computer
LAN
EO Gateway
EO
EO
Gateway
LATA

EO: End office or local central office Computer


LATA: Local access and transport area
LDN: Long distance network LAN MAN

Example: Cable & Wireless


Geographical Extent
USA Backbone
WAN (wide area network), 100-1000
km
MAN (metropolitan area network), 10-
100 km
LAN (local area network), 10-1000 m
PAN (personal area network), 1-10 m

From: http://www.cw.com

Internal Nodes Internet Terminology

Main function: Connect incoming link to Gateway: A device which


right outgoing link. interconnects two or more networks.
Telephone network: Internal nodes are called
Firewall: Security system to protect a
switches.
network against external threats.
Internet: Internal nodes are called routers.
Nodes are computers that are program-med
Router: An internal network device
and adapt to network conditions. that forwards messages from incoming
to outgoing links based on address and
network state information.
What are Links Made From? Link Characterization

Wire, twisted wire Rate or speed in bps (bits per second),


e.g., telephone, Ethernet kbps, Mbps, Gbps (kilo-, Mega-, Giga-bps).
Coaxial cable A single telephone channel without
e.g., cable TV compression uses 64 kbps.
Optical fiber 24 telephone channels plus overhead use
e.g., backbone of Internet
24x64+8=1544 kbps or 1.544 Mbps (T1).
Wireless: AM, FM, microwave, optical
e.g., radio, satellite, IR beams

T-Carrier Hierarchy Optical Carrier (OC) Levels

T1 is a high speed digital network using OC-1: 51.84 Mbps (approx 1 video or
pulse code modulation (PCM), developed 750 voice channels)
and implemented by AT&T around 1960. OC-3: 155.52 Mbps
T1: 1.544 Mbps (24 voice channels) OC-12: 622.08 Mbps
T1C: 3.152 Mbps (48 voice channels) OC-48: 2488.32 Mbps
T2: 6.312 Mbps (96 voice channels) OC-192: 10 Gbps
T3: 44.736 Mbps (1 video or 672 voice ch.) OC-768: 40 Gbps (approx 1000 video
T4: 274.176 Mbps (6 video or 4032 voice) ch.)

IEEE 802.x Standards How to Transport Data

802.3 CSMA/CD (carrier sense multiple access Suppose you have data that needs to
with collision detection) Ethernet be transmitted from user A to user B.
802.5 Token ring LANs
Should you ask the network to set up a
802.11 Wireless LANs dedicated path from user A to user B?
802.15 Wireless PANs (personal area
Or should you break up the data into
networks)
standard size packets and let the
802.16 Wireless stationary point-to-
multipoint LANs/MANs network decide on the fly how to best
send the packets from user A to user B?
Circuit vs. Packet Switching Circuit vs. Packet Switching

The telephone network was optimized Because of the relatively long periods of
for analog voice communication. A inactivity between transactions or messages,
direct path between two parties is it is not economical to set up a dedicated
established for each conversation
session. network path between two computers.
Traffic between computers is usually Instead, successive messages between two
bursty, i.e., short packets of data are computers are addressed and sent individ-
exchanged rapidly, followed by ually, not necessarily using the same path.
relatively long periods of inactivity. Long messages are broken up into packets.

Example: Car Rental Example: Using the Bus

Suppose youre on a vacation and rent Suppose you go downtown with the bus. You
a car for one week. You will have to only pay the bus while you ride it. The fare is
pay the rental fee whether you actually cheap because you can share the bus with
drive the car or have it parked in a many other people. But the bus route is fixed
parking lot. But whenever you need to and you may have to change along the way
go somewhere, the car is right there to get to your destination. In addition, you
and you can use it immediately. This is may have to wait for the next available bus.
the essential idea behind circuit This is similar to packet switching in
switching. networks.

Circuit Switching Packet Switching

Telephone network: Fixed path Internet: Messages are broken into


between two users is established at packets which travel individually over
beginning of telephone call. dynamically assigned paths.

C A B A B
... C
A A -> C A

B B
D D

Cannot have A->C and B->D simultaneously Link sharing: Can have A->C and B->D simultaneously (alternating rapidly)
Layered Network
Protocols
Architecture
Data networks are rather complex to The rules and conventions used in the
design and implement. To make the peer-to-peer communications at a given
complexity manageable, most networks layer are collectively called a protocol.
use a layered architecture. Protocols used on the Internet are TCP,
Each layer has specific, well defined IP, and UDP (User Datagram Protocol).
tasks. Layers at the same level in A list of protocols that is used at each
different computers are referred to as layer in a certain network architecture is
peers. called a protocol stack.

Layers: Example Layers: Example (contd.)


You are the president of company B in Boulder To actually get the letter to the president of
and want to offer the services of your company company Y, you use the services of the next
to your peer, the president of company Y in New lower layer.
York. Specifically, you ask your secretary to put a
You write a letter, starting with Dear Bob, may I destination address, a return address, and a
, and ending with Sincerely yours, Jim. The stamp onto an envelope, and to put the letter
phrases Dear Bob and Sincerely yours are inside the envelope. The peer of the secretary
part of the peer-to-peer protocol when writing in company B is the secretary in company Y.
letters.

Layers: Example (contd.) The OSI 7 Layer Model

The secretary in turn uses the services of the In an attempt to standardize network
next lower layer and brings the letter to the
post office in Boulder. Its peer is the post
architectures, the ISO (International
office in New York. Standards Organization) issued the OSI
The post office in Boulder collects all letters for (Open Systems Interconnection) model in
New York, brings them to the airport, and flies 1984 (ten years after the TCP/IP reference
them to New York. The airplane represents the model was first defined in 1974).
bottom layer, which is called physical layer. The OSI model has 7 layers which are
shown on the following slide.
OSI 7 Layer Model WWW and Internet

Open Systems Interconnect (OSI) Reference Model for computer networking


Web Browser/WWW Server

Level where applications access network services, e.g., e-mail, WWW


HTML (Hypertext Markup Language)
Intermediary format that specifies/handles presentation of data, e.g., html HTTP (Hypertext Transfer Protocol)
Telnet, ftp, SMTP
Used to establish, use and end sessions between applications, e.g., http
TCP (Transmission Control Protocol)
Does packetizing, error recognition/recovery between end users, e.g., TCP

Physical/logical addressing, routing, switching, flow control, e.g., IP


IP (Internet protocol)

Package bits into frames, media access, point-to-point comm, e.g., Ethernet Ethernet, ATM, PPP

Transmits bits over physical medium such as optical fiber, twisted pair wire, etc Twisted pair wire, optical fiber, wireless

OSI Model Networking OSI Model

(7) Application Layer


(6) Presentation Layer
(5) Session Layer
(4) Transport Layer
(3) Network Layer
(2) Data Link Layer
(1) Physical Layer

Services Performed by Services Performed by


Layers Layers
Physical Layer (1): Network Layer (3):
Transmit raw bits over physical medium Transfer and route packets reliably
between sub-networks
Convert bits to waveforms and vice versa
Routing algorithms, congestion control
Data Link Layer (2): Transport Layer (4):
Transfer data frames reliably on point-to- Transparent, reliable and cost-effective
point or multi-access links data transfer between end systems
Error detection/correction, ARQ (automatic Break messages into packets, flow control,
repeat request), contention resolution additional end-to-end reliability.
Services Performed by Services Performed by
Layers Layers
Session Layer (5): Application Layer (7):
Provide mechanism for organizing and structuring Provide uniform semantics for applications
interactions between application processes (e.g., running in different environments
token management)
Terminal emulation, file
Presentation Layer (6): conversion/transfer
Provide independence from differences in data
representations (e.g., ASCII vs. Unicode)
Note: In practice the most important
layers are 14, the others are seldom
Data compression, code conversion
implemented explicitly within the
network architecture.

MIME
TCP/IP Model TCP/IP Model
SMTP

The TCP/IP model grew out of the ARPA-NET FTP DNS


project. Researchers recognized early on Telnet HTTP SNMP
(1974) the importance of interconnecting
networks of different makes and topologies.
Layer 4 TCP UDP
TCP/IP deliberately only specifies layers 3 and
Layer 3 ARP IP
4 of the OSI model; lower layers can be
implemented in a variety of ways. Layer 2 Ethernet, Token Ring, Token Bus, FDDI,
TCP/IP is the most widely implemented model. Layer 1
Sonet, ISDN, ATM, Wireless, etc

Physical Medium (Cable)

TCP/IP Model TCP/IP Model

Acronyms: Acronyms:
SMTP: Simple mail transfer protocol TCP: Transmission control protocol
MIME: Multipurpose internet mail extensions UDP: User datagram protocol
FTP: File transfer protocol ARP: Address resolution protocol (IP <-->
HTTP: Hypertext transfer protocol LAN)
DNS: Domain name system IP: Internet protocol
SNMP: Simple network management protocol FDDI: Fiber distributed data interface
SNTP: Simple network time protocol ISDN: Integrated services digital network
ATM: Asynchronous transfer mode
Data Transmission using the
Internet Protocol (IP)
Internet Protocol (IP)
IP is the workhorse protocol of the How does data get transmitted on the
TCP/IP protocol stack. It provides an Internet from one computer to another?
unreliable connectionless datagram Data is broken up into packets at the sender
delivery service. and reassembled at the receiver.
IP implements layer 3 (network layer) Each data packet is individually labeled with a
of the OSI model. source and a destination address.
The main task of the IP is the routing Source and destination addresses are 32-bit
and the fragmentation and reassembly numbers (under IP v4).
of datagrams.

Internet Protocol (IP) IP Header (for each packet)

To perform its functions and to communicate


among peers, the IP layer adds a header to
the data packets (called payload) that it
receives for transmission, as shown in the
next slide.
The most important fields in the header are:
Source/destination IP address
Total length, TTL (time to live)

32 bits wide

Network and Host Numbers IPv4 Address Classes

Network numbers used to be globally


administered by the InterNIC. Now there Class Network # Host # Usage
are several commercial agents (e.g., A 8 bits 24 bits Very large sites
http://www.networksolutions.com). B 16 bits 16 bits Large sites
Host numbers are locally administered
C 24 bits 8 bits Small sites
Global routing decisions can be made on
the basis of the network numbers. D n/a n/a Multicast address
Local routing decisions only need to take E n/a n/a Reserved
the host numbers into account.
IP address = <network #><host #> (32 bits total)
IPv4 Address Classes Subnets
In practice, individual subnets rarely consist
Class Network Numbers Hosts/Network of more than 100...200 computers.
A 0 127 16,777,214 Thus, the original host # is subdivided (by
the local network administration) into a
B 128.0 191.255 65,534 subnet # and a new (shorter) host #.
C 192.0.0 223.255.255 254 For example, 128.138.129.2 is interpreted as
Network #: 128.138 (administered globally)
D 224.0.0.0 239.255.255.255 n/a
Subnet #: 129 (administered locally)
E 240.0.0.0 255.255.255.255 n/a Host #: 2 (administered locally)

Examples Exploring Network Topology

192.149.89.61 is a class C address: Try to find the website of a network


Network #: 192.149.89 operator, e.g., www.cw.com (Cable &
Host #: 61 Wireless), and see if network maps are
128.138.129.2 is a class B address: available.
Network #: 128.138
Subnet #: 129 Host #: 2
Examine the numerical IP address for
18.69.0.27 is a class A address: network, subnet, and host numbers.
Network #: 18 Use tools such as tracert or traceroute.
Subnet #: 69.0 Host #: 27

TraceRoute Example
traceroute

traceroute (or tracert) probes the


path that data packets take through the
Internet, recording all the "hops"
(routers) along the way.
Using traceroute you can find out how
to get to a site, where (approximately)
it is located, where bottlenecks along
the path are, and where packets are
lost
(Almost) Fully Connected
Example Ring
Topology
Weathermap
Example
of TEN-155 core i-21 fiber-optic
network

from sigma.dante.org.uk from www.interoute.com

Star Topology Example What is Best Topology?

Centers in
Prague and Brno
The network topology is determined by the
internal/external nodes and how they are
interconnected by links
There is no single right topology.
Factors that determine topology choice:
Amount of traffic between locations.
Cost of links/nodes vs. revenue from users.
Delay requirements.

from www.cesnet.cz

Example: Delay and


Optimization Criteria
Throughput for a Ski Lift
Throughput is the total number of (unit) Throughput is the total number of skiers
messages that a communications system can transported from bottom to top per hour.
transfer in a fixed time interval. Delay is the average amount of time it takes for a
skier to go from bottom to top, including the time
Optimal for network: Maximize throughput. spent waiting in line.
Delay is the average amount of time it takes The ski lift operator wants to maximize throughput
for a message to be transferred from a (= # of tickets sold), the skier wants to minimize
source node to a destination node. delay (= time spent not skiing downhill). The two
Optimal for user: Minimize delay. goals are contradictory.
=> Compromise is necessary.
Delay vs. Number of Links Delay vs. Number of Links
F F
F
G G
G
# of links: 8*7/2=28
E E Avg delay: 1 hop
E
H Compared
H H
to ring:
50% more
Compared to ring:
D links, D
D 250% more links,
30% less
A
A
A 57% less delay (hops)
delay (hops)
B B
C B C
C

Hops Hops Hops Hops G F


A -> B 1 A -> F 3 A -> B 1 A -> F 2
A -> C 2 A -> G 2 A -> C 2 A -> G 2 E # of links: 8 Compared to ring:
A -> D 3 A -> H 1 A -> D 2 A -> H 1 H 0% more links,
A -> E 4 A -> E 1 Avg delay: 2 hops
One additional node 13% less delay (hops)
# of links: 8 # of links: 12 D One additional node
A
Avg delay: 16/7 = 2.3 hops Avg delay: 11/7 = 1.6 hops
B C

Different Topology Features Different Topology Features

Fully connected Ring Star Bus


N nodes N nodes N+1 nodes N nodes
N*(N-1)/2 links N links N links N+1 links
Avg delay: 1 hop Avg delay: approx Avg delay: 2 hops Avg delay: 1 hop
Very robust with N/4 hops Vulnerable: Cannot (but collisions can
respect to link Can survive loss of survive loss of occur)
failures any single link central node Vulnerable: cannot
survive loss of bus

Different Topology Features What is Best Topology?

Spanning Tree Conclusions:


N nodes If links are very expensive, use more
N-1 links strategically placed (internal) nodes.
Avg delay: If short delay is very crucial, use more
proportional to log N links.
Has no cycles Quality of service (QoS) differentiation:
Loss of any link splits Connections with short delay (e.g., for
network in two two-way voice communication) can be
requested from network if higher price is
paid, similar to express mail.

You might also like