network components component names
play

Network Components Component Names Component Function Example - PowerPoint PPT Presentation

Network Components Component Names Component Function Example Application, or app, user Uses the network Skype, iTunes, Amazon Host, or end-system, edge Supports apps Laptop, mobile, desktop device, node, source, sink Router, or switch,


  1. Network Components

  2. Component Names Component Function Example Application, or app, user Uses the network Skype, iTunes, Amazon Host, or end-system, edge Supports apps Laptop, mobile, desktop device, node, source, sink Router, or switch, node, Relays messages Access point, cable/DSL hub, intermediate system between links modem Link, or channel Connects nodes Wires, wireless Computer Networks 2

  3. Parts of a Network app router link host Computer Networks 3

  4. Parts of a Network app host? link host Computer Networks 4

  5. A Small Network • Connect a couple of computers • Next, a large network … Computer Networks 5

  6. Source: Internet2

  7. Example Networks • WiFi (802.11) • Enterprise / Ethernet • ISP (Internet Service Provider) • Cable / DSL • Mobile phone / cellular (2G, 3G, 4G) • Bluetooth • Telephone • Satellite ... Computer Networks 7

  8. Network names by scale Scale Type Example Vicinity PAN (Personal Area Network) Bluetooth (e.g., headset) Building LAN (Local Area Network) WiFi, Ethernet City MAN (Metropolitan Area Network) Cable, DSL Country WAN (Wide Area Network) Large ISP Planet The Internet (network of all networks) The Internet! Computer Networks 8

  9. Internetworks • An internetwork, or internet, is what you get when you join networks together • Just another network • The Internet (capital “I”) is the internet we all use Computer Networks 9

  10. Network Boundaries • What part is the “network”? app router link host Computer Networks 10

  11. Network Boundaries (2) • What part represents an “ISP”? app router link host Computer Networks 11

  12. Network Boundaries (3) • Cloud as a generic network app router link host Computer Networks 12

  13. Key Interfaces • Between (1) apps and network, and (2) network components app router host Computer Networks 13

  14. Networks Need Modularity • The network does much for apps: • Make and break connections • Find a path through the network • Transfers information reliably • Transfers arbitrary length information • Send as fast as the network allows • Shares bandwidth among users • Secures information in transit • Lets many new hosts be added • … Computer Networks 14

  15. Networks Need Modularity • The network does much for apps: • Make and break connections We need a form of • Find a path through the network • Transfers information reliably modularity, to help • Transfers arbitrary length information manage complexity • Send as fast as the network allows and support reuse • Shares bandwidth among users • Secures information in transit • Lets many new hosts be added • … Computer Networks 15

  16. Protocols and Layers • Protocols and layering is the main structuring method used to divide up network functionality • Each instance of a protocol talks virtually to its peer using the protocol • Each instance of a protocol uses only the services of the lower layer Computer Networks 16

  17. Protocols and Layers (2) • Protocols are horizontal, layers are vertical Instance of Peer Protocol X protocol X instance X X Service provided by Protocol Y Lower layer instance (of Y Y protocol Y) Node 1 Node 2 Computer Networks 17

  18. Protocols and Layers (3) • Set of protocols in use is called a protocol stack Computer Networks 18

  19. Protocols and Layers (4) • Protocols you’ve probably heard of: • TCP, IP, 802.11, Ethernet, HTTP, SSL, DNS, … and many more Computer Networks 19

  20. Protocols and Layers (5) • Protocols you’ve probably heard of: Browser • TCP, IP, 802.11, Ethernet, HTTP, SSL, DNS, … and many more HTTP • An example protocol stack TCP • Used by a web browser on a host that is wirelessly connected to the Internet IP 802.11 Computer Networks 20

  21. Encapsulation • Encapsulation is the mechanism used to effect protocol layering • Lower layer wraps higher layer content, adding its own information to make a new message for delivery • Like sending a letter in an envelope; postal service doesn’t look inside Computer Networks 21

  22. Encapsulation (2) • Message “on the wire” begins to look like an onion • Lower layers are outermost HTTP HTTP TCP HTTP TCP IP TCP HTTP IP TCP 802.11 IP HTTP 802.11 Computer Networks 22

  23. Encapsulation (3) HTTP HTTP HTTP HTTP TCP TCP TCP HTTP TCP HTTP IP IP TCP IP TCP HTTP IP HTTP 802.11 802.11 TCP IP TCP HTTP IP HTTP 802.11 802.11 (wire) IP TCP HTTP 802.11 Computer Networks 23

  24. Encapsulation (4) • Normally draw message like this: • Each layer adds its own header 802.11 IP TCP HTTP First bits on the wire Last bits • More involved in practice • Trailers as well as headers, encrypt/compress contents • Segmentation (divide long message) and reassembly Computer Networks 24

  25. Demultiplexing • Incoming message must be passed to the protocols that it uses SMTP HTTP DNS TCP UDP IP ARP Ethernet ?? Computer Networks 25

  26. Demultiplexing (2) • Done with demultiplexing keys in the headers Host SMTP HTTP DNS TCP port number TCP UDP IP protocol field IP ARP Ethertype value Incoming Ethernet message Ethernet IP TCP HTTP Computer Networks 26

  27. Advantage of Layering • Information hiding and reuse Browser Server Browser Server HTTP HTTP HTTP HTTP or Computer Networks 27

  28. Advantage of Layering (2) • Information hiding and reuse Browser Server Browser Server HTTP HTTP HTTP HTTP TCP TCP TCP TCP or IP IP IP IP Ethernet 802.11 802.11 Ethernet Computer Networks 28

  29. Advantage of Layering (3) • Using information hiding to connect different systems Browser Server HTTP HTTP

  30. Advantage of Layering (4) • Information hiding to connect different systems Browser Server HTTP HTTP IP TCP HTTP TCP TCP IP IP IP IP Ethernet 802.11 Ethernet 802.11 802.11 IP TCP HTTP Ethernet IP TCP HTTP

  31. Advantage of Layering (5) • Information hiding to connect different systems Browser Server HTTP HTTP IP TCP HTTP TCP TCP IP IP IP IP Ethernet 802.11 Ethernet 802.11 802.11 IP TCP HTTP Ethernet IP TCP HTTP

  32. Disadvantages of Layering • ?

  33. Disadvantage of Layering • Adds overhead • More problematic with short messages • Hides information • App might care about network properties (e.g., latency, bandwidth, etc) • Network may need to know about app priorities (e.g., QoS) Computer Networks 33

  34. OSI Layers

  35. Protocols and Layering • The real internet protocol stacks: 4 Application SMTP HTTP RTP DNS 3 Transport TCP UDP “Narrow 2 Internet IP waist” Ethernet 3G 1 Link Cable DSL 802.11 Computer Networks 35

  36. Course Reference Model • We mostly follow the Internet • A little more about the Physical layer, and alternatives 5 Application – Programs that use network service 4 Transport – Provides end-to-end data delivery 3 Network – Send packets over multiple networks 2 Link – Send frames over one or more links 1 Physical – Send bits using signals Computer Networks 36

  37. Lecture Progression • Bottom-up through the layers: Application - HTTP, DNS, CDNs Transport - TCP, UDP Network - IP, NAT, BGP Link - Ethernet, 802.11 Physical - wires, fiber, wireless • Followed by more detail on: • Quality of service, Security (VPN, SSL) Computer Networks 37

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend