CCM 4300 Lecture 3
Computer Networks: Wireless and Mobile Communication
- and Mobile Communication
CCM 4300 Lecture 3 Computer Networks: Wireless and Mobile - - PowerPoint PPT Presentation
CCM 4300 Lecture 3 Computer Networks: Wireless and Mobile Communication and Mobile Communication Systems
are created and by whom
Network Topologies Introduction – an example of human-to-human interaction What is a protocol?
ISO OSI Reference Model
understand network logical and physical topologies understand the concept of layering and structure of the ISO Reference Model describe the functionality of each layer in the ISO
Reference Model understand the basic concepts of the client server architecture
#
$%
"
&!
'
&!
"
(!
)
Each computer is connected to a single cable which connects all of the computers. This is the cheapest network topology as the smallest amount of cabling is required. If the network cable breaks anywhere then none of the computers can access the network.
*
Each computer is connected to the two computers on either side of it. The last computer is linked to the first to form a ring. If the network cable breaks anywhere then none of the computers can access the network. Long cable length
+
Any computer can be connected to any other computer. There are multiple routes. If one link fails messages can go another way so this topology is very reliable. The Internet has a mesh topology.
,
All communication takes place via a central computer. If the central computer fails the whole network will break down. If one of the network cables breaks only the computer connected to that cable is affected.
An extended star topology is like a star topology except that each device that links to the centre device is also the centre of another star. Each of these devices acts as the centre of another star.
An apparent advantage of this is to extend the length and the size of the network. Limits the number of devices and the numbers of cables needed to interconnect to the central device. Logically, the information in an extended star topology stays local
(!.$
.
!1.
how do the computers initiate communication? what features can be negotiated at the start? the communication vocabulary
and what are the valid responses? what kinds of data can be exchanged ? how the communication can be closed in an
A human protocol and a computer network protocol:
( ))
+, $
$
4 Header Data
Data Control Information Message
For two networked devices to communicate they
must speak the same language (i.e. use the same protocol)
The protocols must be able to:
'
recovery
Must specify how to initiate, maintain and conclude
the communications exchange
Several protocols are involved in a network Operate together in a layered manner
layer(s)
File Transfer
)
Workstation Remote Server WAN End-to-end integrity Internetworking Router LAN
A protocol (or more typically a protocol suite) is
needed for communications
(e.g. Novell and TCP/IP protocols)
*
Protocols are specified in the form of documents
and usually implemented in software
A separate software package is needed for each
different protocol suite to be supported
Open Systems Interconnection Developed by International Standards
Organisation (ISO) - 1981
+
Described in ISO-7498 standard Proposes 7 layers Provides:
A layer should be created where a different level of
abstraction is needed
Each layer should perform a well-defined function The function of each layer should be chosen with a
view to defining internationally standardised protocols The layer boundaries should be chosen to minimise
, The layer boundaries should be chosen to minimise
the information flow across the interfaces
The number of layers should be:
thrown together
unwieldy
5--6-+
Computer Networks 1996
Application
general use
terminals, telnet, etc...
level protocol that clients must use.
Presentation
between different hardware, Operating Systems etc.)
Session
to
OS on another machine
end systems.
system
system, so it makes sure the correct delivery of data.
layer.
Network
destination across networks
avoid congestion by controlling the number transmitted
Data Link
transmission facility and turning it into a link that appears to be free from errors
Physical
uninterrupted bits from on computer to another and managing the connection
A common mnemonic device for remembering the
layers in the right order is
All People Seem To Need Data Processing
Layer Number Layer Name Layer Services 7 Application Support for e-mail, file transfer etc. 6 Presentation Data representation 5 Session Control the dialog 4 Transport End-to-end data integrity
'
4 Transport End-to-end data integrity 3 Network Internet addressing, routing and segmentation 2 Data Link Package bits into frames and control their delivery 1 Physical Adapt bits for transmission over the medium
If OSI is a Reference Model then what is a
network architecture? 1 "'&#-
)
1 "'&#- $$&2$$2 *&#
Service – what is done
entities above access it or how it works) Service vs. Interface Vs. Protocol
*
entities above access it or how it works)
Interface – how it is called above
results to expect
Protocol – how it “talks” to its peer layer
services)
Standard interfaces between layers
layer to evolve
Alternative services may be offered at a given layer +
Internal mechanisms of each layer are invisible to the
Layers may be completely removed if not required, or
substituted by simpler versions
The following factors limited adoption of OSI in practice:
Timing
,
Technology
Presentation layers hardly perform any function)
Implementation
led to a lasting bad reputation
Politics
attempting to impose inferior standard BUT
valuable as a conceptual architecture
Computer Networks 2003
Computer Networks 2003
OSI
computer networks and educational purposes
TCP/IP
link, physical
link, physical
general distributed computing
The tasks may be just to provide information, or to
'
perform a complex computation (perhaps returning data, results, etc)
)
business rules (integrity)
Lesson Objectives Network Topologies Introduction – an example of human-to-human interaction
*
What is a protocol? ISO OSI Reference Model
Are there any questions?