network components parts of a network
play

Network Components Parts of a Network app router link host - PowerPoint PPT Presentation

Network Components Parts of a Network app router link host Computer Networks 2 Parts of a Network app router link host Computer Networks 3 Component Names Component Function Example Application, or app, user Generates Zoom,


  1. Network Components

  2. Parts of a Network app router link host Computer Networks 2

  3. Parts of a Network app router link host Computer Networks 3

  4. Component Names Component Function Example Application, or app, user Generates Zoom, iTunes, Browser messages Host, or end-system, edge Laptop, mobile, Runs the app device, node, source, sink desktop Router, or switch, node, Relays messages Access point, cable/DSL hub across links modem Link, or channel Carries messages Wires, wireless Computer Networks 4

  5. Parts of a Network app router link host Computer Networks 5

  6. Parts of a Network app host? link host Computer Networks 6

  7. Types of Links • Full-duplex • Bidirectional • Half-duplex • Bidirectional • Simplex • unidirectional Computer Networks 7

  8. Wireless Links • Message is broadcast • Received by all nodes in range • Not a good fit with our model Computer Networks 8

  9. Wireless Links (2) • Often show logical links • Not all possible connectivity Computer Networks 9

  10. A Small Network • Connect a couple of computers • Next, a large network … Computer Networks 10

  11. Source: Internet2

  12. Example Computer Networks?

  13. Example Computer Networks • WiFi (802.11) • Enterprise / Ethernet • ISP (Internet Service Provider) • Cable / DSL • Mobile phone / cellular (2G, 3G, 4G, 5G) • Bluetooth • Telephone • Satellite ... Computer Networks 13

  14. Computer network names by scale Scale Type Example Vicinity PAN (Personal Area Network) Bluetooth (e.g., headset) Building LAN (Local Area Network) WiFi, Ethernet DCN (Data Center Network) Ethernet City MAN (Metropolitan Area Network) Cable, DSL Country WAN (Wide Area Network) Large ISP Planet The Internet (network of all networks) The Internet! Computer Networks 14

  15. Internetworks • An internetwork, or internet, is what you get when you join networks together • Just another network • The Internet (capital “I”) is the internet we all use Computer Networks 15

  16. Network Boundaries • What part is the “network”? app router link host Computer Networks 16

  17. Network Boundaries (2) • What part represents an “ISP”? app router link host Computer Networks 17

  18. Network Boundaries (3) • Cloud as a generic network app router link host Computer Networks 18

  19. Key Interfaces • Between (1) apps and network, and (2) network components app router host Computer Networks 19

  20. What should networks do for apps?

  21. What should networks do for apps? • Make and break connections • Find a path through the network • Transfers information reliably • Transfers arbitrary length information • Send as fast as the network allows • Shares bandwidth among users • Secures information in transit • Lets many new hosts be added • … Computer Networks 21

  22. What should networks do for apps? • Make and break connections • Find a path through the network We need modularity • Transfers information reliably to help manage • Transfers arbitrary length information complexity and • Send as fast as the network allows • Shares bandwidth among users support reuse • Secures information in transit • Lets many new hosts be added • … Computer Networks 22

  23. Protocols and Layers • Protocols and layering is the main structuring method used to divide up network functionality • Divide functionality in layers organized vertically • Each protocol implements the functionality of that layer • Each protocol instance talks virtually to its peer instances using the protocol • Each protocol instances uses only the services of the lower layer Computer Networks 23

  24. Protocols and Layers (2) • Protocols are horizontal, layers are vertical Instance of Peer Protocol X protocol X instance X X Service provided by Protocol Y Lower layer instance (of Y Y protocol Y) Node 1 Node 2 Computer Networks 24

  25. Protocols and Layers (3) • Set of protocols in use is called a protocol stack Computer Networks 25

  26. Protocols and Layers (4) • Protocols you’ve probably heard of: • TCP, IP, 802.11, Ethernet, HTTP, SSL, DNS, … and many more Computer Networks 26

  27. Protocols and Layers (5) • Protocols you’ve probably heard of: Browser • TCP, IP, 802.11, Ethernet, HTTP, SSL, DNS, … and many more HTTP • An example protocol stack TCP • Used by a web browser on a host that is wirelessly connected to the Internet IP 802.11 Computer Networks 27

  28. Encapsulation • Encapsulation is the mechanism used to effect protocol layering • Lower layer wraps higher layer content, adding its own information to make a new message for delivery • Like sending a letter in an envelope; postal service doesn’t look inside Computer Networks 28

  29. Encapsulation (2) • Message “on the wire” begins to look like an onion • Lower layers are outermost HTTP HTTP TCP HTTP TCP IP TCP HTTP IP 802.11 IP TCP HTTP 802.11 Computer Networks 29

  30. Encapsulation (3) HTTP HTTP HTTP HTTP TCP TCP TCP HTTP TCP HTTP IP IP IP TCP HTTP IP TCP HTTP 802.11 802.11 IP TCP HTTP IP TCP HTTP 802.11 802.11 (wire) IP TCP HTTP 802.11 Computer Networks 30

  31. Encapsulation (4) • Normally draw message like this: • Each layer adds its own header 802.11 IP TCP HTTP First bits on the wire Last bits • More involved in practice • Trailers as well as headers, encrypt/compress contents • Segmentation (divide long message) and reassembly Computer Networks 31

  32. Multiple protocols in a layer SMTP HTTP DNS TCP UDP IP ARP 802.11 Ethernet Computer Networks 32

  33. Demultiplexing • Pass incoming message to the protocols that it uses SMTP HTTP DNS TCP UDP IP ARP 802.11 Ethernet ?? Computer Networks 33

  34. Demultiplexing (2) • Done with demultiplexing identifiers in the headers Host SMTP HTTP DNS TCP port number TCP UDP IP protocol field IP ARP Ethertype value Incoming Ethernet message Ethernet IP TCP HTTP Computer Networks 34

  35. Advantage of Layering • Information hiding and reuse Browser Server Browser Server HTTP HTTP HTTP HTTP or Computer Networks 35

  36. Advantage of Layering (2) • Information hiding and reuse Browser Server Browser Server HTTP HTTP HTTP HTTP TCP TCP TCP TCP or IP IP IP IP Ethernet 802.11 802.11 Ethernet Computer Networks 36

  37. Advantage of Layering (3) • Using information hiding to connect different systems Browser Server HTTP HTTP

  38. Advantage of Layering (4) • Information hiding to connect different systems Browser Server HTTP HTTP IP TCP HTTP TCP TCP IP IP IP IP Ethernet Ethernet 802.11 802.11 802.11 IP TCP HTTP Ethernet IP TCP HTTP

  39. Advantage of Layering (5) • Information hiding to connect different systems Browser Server HTTP HTTP IP TCP HTTP TCP TCP IP IP IP IP Ethernet Ethernet 802.11 802.11 802.11 IP TCP HTTP Ethernet IP TCP HTTP

  40. Disadvantages of Layering • ?

  41. Disadvantage of Layering • Adds overhead • More problematic with short messages • Hides information • App might care about network properties (e.g., latency, bandwidth, etc) • Network may need to know about app priorities (e.g., QoS) Computer Networks 41

  42. OSI Layers

  43. Protocols and Layering • The real internet protocol stacks: 4 Application SMTP HTTP RTP DNS 3 Transport TCP UDP “Narrow 2 Internet IP waist” Ethernet 3G 1 Link Cable DSL 802.11 Computer Networks 43

  44. Course Reference Model • We mostly follow the Internet 5 Application – Programs that use network service 4 Transport – Provides end-to-end data delivery 3 Network – Send packets over multiple networks 2 Link – Send frames over one or more links 1 Physical – Send bits using signals Computer Networks 44

  45. Lecture Progression Middle à top à bottom 3. Application - HTTP, DNS, CDNs 1. Transport - TCP, UDP 2. Network - IP, NAT, BGP 5. Link - Ethernet, 802.11 4. Physical - wires, fiber, wireless Followed by more detail on cross-cutting elements: • Quality of service, Security (VPN, SSL) Computer Networks 45

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend