cs24
play

CS24 FRESHMAN SEMINAR FOR CS SCHOLARS WEEK 10 - NETWORKING U N I - PowerPoint PPT Presentation

Spring 2015 - Berkeley, CA CS24 FRESHMAN SEMINAR FOR CS SCHOLARS WEEK 10 - NETWORKING U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015 2 TELEGRAPH AND BANCROFT (1960) 3


  1. Spring 2015 - Berkeley, CA CS24 FRESHMAN SEMINAR FOR CS SCHOLARS WEEK 10 - NETWORKING U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  2. 2

  3. TELEGRAPH AND BANCROFT (1960) 3

  4. http://edugeeks.in/wp-content/uploads/2013/10/osi-model-.gif 4

  5. PHYSICAL TRANSMISSION MEDIA [OPTICS/COPPER] PHYSICAL LAYER (PHY) ENCODING AND SIGNALING, TOPOLOGY U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 3 M A R C H 2 015

  6. Abstraction Provided: We can send a single bit unreliably from point A to point B, where A and B are close to each other. How this is Achieved: We leave that to EE people. Example Implementations: Copper wires, wireless, optic fibres, etc. U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  7. FIBER OPTICS 7

  8. ETHERNET/ WFI/ RADIO/ ULTRASONIC DATA LINK LAYER (DLL) LOGICAL LINK CONTROL(LLC) AND MEDIA ACCESS CONTROL (MAC) U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 3 M A R C H 2 015

  9. Requirements: Those provided by layer 1. Abstraction Provided: Sending n bits of data reliably from point A to point B, where A and B are close to each other. How this is Achieved: Use error correcting codes in order to send n bits reliably. (This involves sending n + k bits where the k bits encode some redundant information. See CS 70 for more examples of error correcting codes.) Also, quite often the recipient will respond to the sender saying “I got the message”. The sender will keep sending the message until that happens. There are many implementations of layer 2, and each one does slightly different things. Example Implementations: Ethernet, WiFi U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  10. ERROR CODES TWO TYPES ARQ - AUTOMATIC REPETITION REQUEST FEC - FORWARD ERROR CORRECTION REPITION CODE: 101 1 101 1 101 1 —> 101 1 01 1 1 101 1 (ERROR!) PARITY BIT: # OF ONES E.G., 101 1 —> 3… 1010 —> (ERROR!) CHECKSUM E.G. SUM(BYTE(FOR EACH CHAR IN MSG)) CRYPTO HASH FUNCTIONS U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 17 M A R C H 2 015

  11. INTERNET PROTOCOL (IP), GATEWAYS, ROUTERS NETWORK LAYER (NET) IPV4, IPV6 ADDRESSING U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 3 M A R C H 2 015

  12. Requirements: Those provided by layer 2, the existence of people needing a large network Abstraction Provided: Sending data unreliably (explained later) from point A to point B, where A and B are somewhere on Earth (not necessarily close to each other). Implementations: Build a graph of all devices connected to the Internet. The vertices of the graph are the devices, the edges are links between devices. (Devices linked by an edge can communicate using layer 2.) In order to send messages to anyone, you send it to a neighbor, who forwards it on, who forwards it on… until it reaches the destination. U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  13. INTERNET PROTOCOL (IP) ADDRESS Every device gets an IP address, which is just like a mailing address. When we want to connect to another device, we send out a “packet” (sequence of bits) whose destination is that device’s IP address. U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  14. THE SLOWNESS THAT IS AIRBEARS 14

  15. TRANSMISSION CONTROL PROTOCOL TRANSPORT LAYER USER DATAGRAM PACKETS (UDP) U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 3 M A R C H 2 015

  16. Requirements: Layer 3. Abstraction Provided: Depends on the protocol. Usually it allows you to transfer data between programs (in layer 3, we were only concerned with transferring data between devices - but if each device has multiple programs running, how do we know to which program we should deliver the data?) It can also provide reliability, in-order delivery, and other such guarantees. How this is Achieved: See CS 168. The key idea for transferring data between programs is port numbers, which are “addresses” for each program (just like how IP addresses are “addresses” for each device). U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  17. Why is this a separate layer from layer 3? There is one key difference - layer 4 is implemented exclusively at the endpoints of the data transfer. That is, when I want to send some data from my computer in Berkeley to India, the relevant layer 4 protocols run on my computer and on the computer in India - nowhere else. On the other hand, in layer 3, the relevant protocols are running on all of the routers and devices along the path from my computer to the computer in India. Example Implementations: TCP, UDP and ICMP are the most common ones. The World Wide Web (aka websites) uses TCP. Skype and other streaming applications use UDP. DNS uses UDP. The ping command on Unix systems uses ICMP. U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  18. THE OTHER LAYERS SESSION LAYER USER-COMPUTER SESSION CONTROL PRESENTATION FORMATTING APPLICATION CHOOSING WHAT TO COMMUNICATE U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 3 M A R C H 2 015

  19. THE INTERNET OF EVERYDAY THINGS U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 31 M A R C H 2 015

  20. TODOS RECIPES AND TOPICS DUE ON APRIL 12 SUMMARIES DUE AT THE END OF SEMESTER - MAY 8 U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 17 M A R C H 2 015

  21. QUESTIONS ? Week 1 1 PHYSICAL COMPUTING / WORK SESSION? U N I V E R S I T Y O F C A L I F O R N I A - B E R K E L E Y 2 4 F E B R U A R Y 2 015

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend