* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download View
Bus (computing) wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer network wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Network tap wikipedia , lookup
901325 Data Communications & Networking Chapter 1 Introduction 2014/2015 الثاني Data Communication & Networking  Communication  Sharing information.  Sharing can be local (face to face) or remote (over distance) Tele communication (telephone, television, telegraphy) means communication at a distance remote communication. (tele: far) Data communication: exchange of data between two devices via transmission medium (wire cable) Communicating devices made up of : H.W( physical equipments )and S.W 2 Why Study Data Communication & Networking?  Because Data Communication & Networking are changing the way we do business and the way we live Require immediate access to accurate information Database, online shopping Enable long distance communication Internet, IP phone Access variable of information (text, voice and image) Email, messenger, video conference 3 Networks  Network  is a collection of computers and devices (Nodes) connected by communications channels that facilitates communications among users and allows users to share resources with other users  A node can be a computer, printer, or any other device can capable of sending and/or receiving data generated by other nodes on the network.  Nodes attached to media through NIC (network interface card)  Distributed Processing  Most network uses distributed processing , in which a task is divided among multiple computers. Instead of a single machine responsible for all aspects of a process, separate 4 Network Components  Software components Communication Protocols Network Operating System- NOS peer-to-peer (Windows Xp,Win7) Client-server (Windows server 2003 وLinux)  Hardware components  Server  Workstations  Connecting Devices  Cabling system  Shared resource & peripherals 5 A Data Communication Model  Protocol  is a set of rules that governs data communications. It represents an agreement between the communicating devices.  Without a protocol two devices may be connected but not communicating 6 Protocols  Protocols are set of rules that govern data communication to define What is communicated? How it communicated? When it is communicated?  Key elements  Syntax Structure or format of the data, meaning the order in which they are presented Example: A simple protocol might expect the first byte of data to be the address of the sender, the second byte to be the address of the receiver and the reset of the stream to be the message itself.  Semantics Refers to the meaning of each section of bits. Example: does an address identify the route to be taken or the final destination of the message  Timing When data to should be sent? How fast they can be sent? If a sender produces data at 100Mpbs but the receiver can process data at only 1Mpbs, transmission will overload7the receiver and data will be largely lost Standards  Standard provides a model for development allows for interoperability Types De jure/Formal legislated by an officially recognized body De facto Have been adopted as standers through widespread use Established by manufacturers that define the functionality of a new product or technology Standards Organizations      International Organization for Standardization (ISO) International Telecommunication Union Telecommunication standard sector ( ITU-T) American National Standards Institute (ANSI) Institute of Electrical and Electronics Engineers (IEEE) Electronic Industries Association (EIA) 8 Data Representation  Text  represented as a bit pattern; codes often used ASCII: 7-bit pattern (128 different symbols) Extended ASCII: 8-bit pattern (with an extra 0 at left from     00000000 to 0111111 Unicode:32 bits pattern (65,536,216) symbols, which is definitely enough to represent any symbol in the world ISO Numbers  represented by binary equivalent Images  represented by matrix of pixels, small dot.  The size of pixel represent the resolution  One method to represent color images is RGB Audio represent sound by continuous (analog) signal Video 9 History of Internet  Experimental work was funded by the U.S. DoD Advanced Research Projects Agency (DARPA).  The goal was to connect the major universities together to share computing resources for improving the cooperation of scientists in joint projects & publications.  ARPA contracted with BBN Corp. (formerly Bolt, Beranek and Newman) to develop “ARPAnet”. This was the first ever network that was developed by DoD.  The first e-mail program was created in 1972. NSF created a CNET connecting the academic researchers together.  In 1985 the defense withdraw from the network and it became funded by US National Science Foundation. The network was called NSFNET with linked many of the universities, Research labs, Libraries to access their super computers thus establishing the communication. The network grew very rapidly.  It was turned over to private Internet Service Providers (ISP) in 1995.  In early 90’es a new information service, www was developed at CERN by Timothy Berners-Lee. With the graphical browser it changed the whole picture as multimedia capabilities became possible.  Finally giving rise to INTERNET connecting millions of computers together 10 Effectiveness of data communication depends on  Delivery  System must deliver data to correct destination. Data must be received by only intended device or user.  Accuracy  Data delivered accurately  Altered data which left uncorrected are unusable.  Timeliness  Data delivered in timely manner without delay (real-time)  Jitter  variation in packet arrival time, It is the uneven delay in the delivery of audio or video packets 11 Direction of Data Flow  Simplex  communication is unidirectional. (one-way-street). Only one of the two devices on a link can transmit; the other can only receive, As Keyboard and monitors   Half-duplex  Each station can both transmit and receive , but not at the same time. When one device is sending the other can receive and vice versa. one-lane road with two direction)  Full-duplex  Both stations can transmit and receive simultaneously. ( telephone network)  Like two way street with traffic flowing in both directions at the same time  Signals going in either direction share the capacity of the link in two ways:  Either the link must contain two physically separate transmission paths one for sending and other for receiving.  Capacity of the channel is divided between signals traveling in both direction 12 Connecting devices  Divided into 5 different categories based on the layer in which they operate in a network 1. 2. 3. 4. 5. Below the physical layer: passive hub At the physical layer: repeater or active hub At the physical and data link layers: bridge or two-layer switch At the physical, data link, network layers: router or three-layer switch At all five layers: gateway 13 Passive Hub  Passive hub is just a connector.  In a star-topology Ethernet LAN, it is just a point where signals coming from different stations collide.  The hub is the collision point.  This type of hub is part of the media  its location in the Internet model is below the physical layer. 14 Repeaters  Operates only in the physical layers  Can extend the physical length of a LAN  Receive the signal before it becomes too weak or corrupted and regenerates the original bit pattern  Do not actually connect two LANs  connects two segments of the same LAN  Segments connected are still part of one single LAN  A repeater cannot connect two LANs of different protocols 15 Repeaters  Operates only in the physical layers  Can extend the physical length of a LAN  Receive the signal before it becomes too weak or corrupted and regenerates the original bit pattern  While, Amplifiers, Cannot discriminate between the intended signal and noise. It amplifies equally everything fed into I  Do not actually connect two LANs  connects two segments of the same LAN  Segments connected are still part of one single LAN  A repeater cannot connect two LANs of different protocols 16 Example  repeater can overcome 10Base5 Ethernet length restriction  the length of the cable is limited to 500 m  divide the cable into (500 m) sections and connect them with repeaters  The whole network is still considered one LAN  Portions of the network separated by repeaters are called segments  Repeaters acts as two-port node and has no filtering capability 17 Active Hubs  Actually a multiport repeater  Used to create connections between stations in a physical star topology  Can also be used to create tree topology to removes the length limitation of 10Base -T (100 m) 18 Example  repeater can overcome 10Base5 Ethernet length restriction  the length of the cable is limited to 500 m  divide the cable into (500 m) sections and connect them with repeaters  The whole network is still considered one LAN  Portions of the network separated by repeaters are called segments  Repeaters acts as two-port node and has no filtering capability 19 Bridge  device that connects two LAN segments together, which may be similar or        dissimilar, such as Ethernet and Token Ring. A bridge is inserted in the network to keep traffic contained within the segments to improve performance Operates in both the physical and the data link layer Physical layer : regenerates the signal Data link layer : check the physical (MAC) addresses (source & destination) contained in the frame Bridge has filtering capability, but repeaters has not. Checks the MAC (physical) address of the destination when receives a frame, and decide if the frame should be forwarded or dropped forwards the new copy only to the segment (specific port) to which the address belongs Bridge has a table that maps addresses to the port. 20 Bridge Bridge has a table to  Maps address to ports.  Used in filtering decisions 21 Transparent Bridges  Bridges in which the stations are completely unaware of the bridge’s existence. the stations does not reconfigured when a bridge is added or deleted  A system equipped with transparent bridges must meet three criteria:  Frame must be forwarded correctly one station to another.  The forwarding table is automatically made by learning frame movements in the network.  Loops in the system must be prevented.  Learning:  early bridges had static forwarding table  Administrated manually enter each table entry  simple, but not practical  better solution  dynamic table management that maps addresses to ports automatically  bridge gradually learns from the frame movement 22 Transparent Bridges Destination physical address: used for the forwarding decision (table lookup). Source physical address: used for adding entries to the table and for updating purposes. • A sends frame to D:flooding • E sends a frame to A: Forwarding • B sends a frame to C :flooding 23 Transparent Bridges  Loop problem  bridges are normally installed redundantly to make the system more reliable  Two LANs may be connected by more than one bridge  they may create a loop packet may be going round and round 24 Bridges: Spanning Tree  Is graph in which there is no loop  Create a topology in which each LAN can be reached from any other     LAN through one path only (no loop) Create a logical topology that overlays physical topology which can not be changed To find the spanning tree we need to Assign a cost (metric) to each LAN The interpretation of the cost is left up to network admin It may be the path with :  Minimum hops, (shortest distance)  Minimum delay, or maximum bandwidth 25 Spanning Tree with Minimum hops  The hop count is normally 1 from a bridge to the LAN and 0 in the reverse direction 26 Connecting Devices Network Interface cards 27 Connecting Devices  Wireless Bridge  device that connects two LAN segments together via infrared or microwave transmission. A wireless bridge is often used to span buildings and provides a more economical method than laying cable or leasing a private line 28 Network Criteria  Performance – depends on  Number of user  Type of transmission media,  Capabilities of connected H.W and the efficiency of software  Reliability – measured by  Frequency of failure  The time it takes to recover from failure  Network’s robustness in a catastrophe  Security  Protection from unauthorized access and Viruses 29 TYPE OF CONNECTION  Point to point  A dedicated link is provided between two devices  Most of them uses an actual length of wire or cable to connect the two ends but other options ,such as microwave satellite are possible Point – to – point connection  Multipoint  More than two devices share a single line.  The capacity is shared either spatially or temporally.  Spatially: Several devices can use link simultaneously  Temporally: Users take turns , it is a timeshared Multipoint connection 30 Topology  Physical topology  Is how the wires are run  The way in which a network is laid out physically  Logical topology is how the signal travels.  A device can be wired to implement any logical topology.  LANs are logical busses or rings, depending on how the hub is wired  4 basic types: mesh, star, bus, ring  The most common physical topology is the star.  All the wires come back to a central point  May often see hybrid 31 Mesh Topology  Every device has a dedicated point-to-point link to every other devices in network  Mesh topology often used in MANs and WANs  A fully connected mesh network has n(n-1)/2 physical channels to link n devices, Every device on the network must have n-1 I/O ports  Advantage  Privacy or security(every message travels along a dedicated line, only the intended recipient sees it. Physical boundaries prevents other user from gaining access the message  eliminating the traffic problems. The use of dedicated links guarantees that each connection can carry its own data load; that can occur when links must be shared by multiple devices.  A mesh is robust. If one link becomes unusable, it does not incapacitate the entire system.  Fault identification and fault isolation easy. This enables the network manager to discover the precise location of fault and aids in finding its cause and solution.  Disadvantage  Need more resource (cable & ports)  Expensive to implement 32 Star Topology  Each device has a dedicated point-to-point link only to a central device (hub, switch, router)  No direct traffic and link between devices  Advantages of star topology  Easy to install and reconfigure and less expensive  Each device need only one link and I/O port to connect it to any other devices.)  Robustness, If one link fails, only that link affected and other links remain active.  Identification and fault isolation  Disadvantages of star topology  Failure of central device may cause network failure  Requires more cable than (Ring ,bus) 33 Tree topology  Is a variation of star  Not every device plugs directly into the central hub. The majority of devices connect to secondary hub that in turn is connected to the central hub  The advantages and disadvantages of tree topology are generally the same as those of star.  The addition of secondary hubs bring more advantage:  Allow more devices to be attached to a single central hub, therefore increase the distance a signal can travel between devices. 34 Bus Topology  A multipoint topology  Consists of cables connecting PCs or file servers  Terminator attached to each end of bus cable segment  to absorb signal and prevent signal reflection back on to covered path  Transmitting packet across bus  Detected by all nodes on segment  Given time limit to reach destination  Advantages of bus design  Requires less cable than other topologies  Easy to install and extend bus with a workstation  Disadvantages of bus topology  Not secured  Can become quickly congested with network traffic  A fault in bus cable stops all transmissions even between devices on the same side of the problem. The damaged area reflects signals back the direction of origin, creating noise in both directions  It can difficult to add new devices (adding more require modification of the backbone). 35 Ring Topology  Each device is dedicated point-to-point connection only with the two devices on either side of it  Signal is passed from device to device until it reaches destination  Each device functions as a repeater  Advantage  Relatively easy to install and reconfigure  Fault isolation is simplified  Disadvantage  Unidirectional traffic  A break in the ring can disable the entire network. This can be solved by use dual ring  Hybrid topology 36 Networks Categories  Network category is determined by its size, ownership, the distance it cover and its physical architecture 37 LAN  Privately owned and links the devices in a single office, building or campus  LANs designed to allow resources to be shared between PCs or       workstations. The resources may be H.W or S.W or data. In LANs one of the computers has a large capacity drive and becomes a server to other clients. SW stored on server and used as needed by the whole group. LAN size determined by licensing restrictions( No of users per copy of SW) LAN use only one type of transmission medium. The most common LAN topologies are bus, ring and star. Today, LAN speed can be 100Mbps or 1000MBps(1G) 38 MAN  Owned by private company or it may be a service provided by public company ( such as local tel.-company)  Extended over an entire city.  May be single network such as a cable television network, or it may be connected number of LANs into a large network so that resources may be shared LAN-TO-LAN.  Examples:  Company can use MAN to connect the LANs in all its offices throughout the city.  A part of the telephone line network that can provide DSL line to the customer 39 WAN  Provides long distance transmission of data, voice , image and video information over large areas ( country or whole world)  In contrast to LAN, WAN may utilize public or private communication equipment's or combination 40 Switched and a Point-to-point WAN 41 Categories of Networks Based on Control Peer-to-Peer Network  No single computer controls the network.  Each computer is the same (a peer) to all others  It is suitable for small offices. Server-Based Network  The network is controlled by a special high-powered server.  The server is dedicated to running the network.  Print and file servers, application servers, communication servers, and directory service servers are common. 42 Interconnections of networks : internetwork An internet (small i) is two or more networks that can communicate with each other 43
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            