I. Introduction to Networks
A.Growth of Subject
1.In the last 5-10 years
many companies have made a transition in how they organize their computer
systems. They
have moved from
distributed systems (mainframe and terminals) to networks (servers and
personal computers.)
This new approach
saves money (price/performance ratio goes up faster than linear!) and allows
greater access to
resources.
2.In the last 3 years
a.Teachers, high school students, etc. all have E-mail accounts and are
accessing information via the Internet
and the WWW.
b.WWW makes information available in an attractive format (as opposed to
Gopher, etc.)
c.Commercial networks (America Online, Compuserve, etc.) are providing
network services along with
Internet Navigators.
3.In the past, the network
was the playground of research scientists (physicists, meteorologist, etc.)
who needed
powerful computers.
4.Future
a.Communication (person-to-person)
b.Videoconferencing
c.Entertainment
B.Technical Design Issues
1.Jargon: There aren't many
equations in this field, but there are lots of specialized words and, in
particular, lots of
acronyms! Tanenbaum
has them in the appendix. They have to be learned.
2.Network types
a.Broadcast/Multicast: These send information to all (broadcast) or a subset
greater than one (multicast) of
machines on the network.
Fig. 1-1. analogy: A Professor lecturing to a class
The information that you want to send, a packet, will have a header, which
tells the machines on the
network for whom it is intended as well as data or a payload which is the
actual information to be
transmitted. It can, of course, be intended for many machines.
Note: If packets are small and all have the same size, they are cells.
(for example in ATM)
b.Point-to-Point: All connections are between individual pairs of machines,
and information hops from
machine to machine to get to its final destination.
Fig 1-2. A telephone tree is an example of a point-to-point network.
c.Generally, small-scale networks are broadcast, large-scale networks are
point-to-point.
3.Network Sizes
Fig. 1-3. Classification of interconnected processors by scale.
a.The basic sizes are LAN's, MAN's, WAN's and the Internet.
b.LAN's
These are distinguished by simpler transmission technology and topology
as well as smaller size that
cuts costs.
Bus and rings are popular topologies (both are broadcast.)
Fig. 1-4. Two broadcast networks. (a) Bus. (b) Ring.
An arbitration mechanism is needed to decide who gets to transmit. Usually,
only one machine can
transmit at a time.
Ethernet (IEEE 802.3) is on buses. (10-100 Mbps)
Token ring (IEEE 802.5) is on rings. (4-16Mbps)
c.MAN's
Essentially, these are networks based on DQDB, distributed queue dual bus
(IEEE 802.6) and also
Broadcast.
Fig. 1-5. Architecture of the DQDB metropolitan area network.
This one has two buses with uni-directional flow. There is a head end in
both directions to govern the
flow.
d.WAN's
The machines that run applications are called hosts or end systems. The
hosts are on LAN's or
MAN's that are connected through routers to a subnet.
Subnet - inter-connected routers
Net - Subnet and hosts
Fig. 1-6. Relation between hosts and the subnet.
When two messages want the same output port of a router, that is called
contention. Typically, both
packets are received, and one is immediately forwarded while the other
is stored or buffered. [This
network is point-to-point, store-and-forward or packet-switched (as opposed
to circuit-switched,
where a connection is set up in advance.)]
Managing this connection is a major network management issue and interacts
with the topology.
Note: A variety of different topologies exist and are shown in Fig. 1-7.
More connectivity implies
less contention but higher cost.
Fig. 1-7. Some possible topologies for a point-to-point subnet.
(a)Star. (b)Ring. (c)Tree. (d) Complete. (e)Intersecting rings. (f) Irregular.
When buffers overflow, packets are dropped. The users must detect this
and re-transmit.
e.Internets vs. the Internet
a.A collection of inter-connected networks is an internet. These networks
may be based on
incompatible software and/or hardware. They must be connected through a
gateway that talks to
both.
b.The Internet is a particular internet that includes virtually universities,
businesses, most US
Government organizations, etc.
C.Reference Models
1.Layering
Fig. 1-8. Layers,
protocols, and interfaces.
a.Because networks are complicated, one divides them conceptually into
layers. Each layer carries on a
conversation between hosts without knowing what is going on above or below
using a set of conventions or
rules that are called protocols.
b.Other jargon:
Corresponding layers on different machines are peers.
Below layer 1 is the physical medium through which the hosts actually connect.
The interface defines the services that a lower layer provides an upper
layer (see Tanenbaum
22-23.)
The network architecture defines the layers and protocols.
The protocol stack is the list of protocols used by the architecture.
c.Examples:
1.Tanenbaum has an example in which one philosopher wants to send another
a message "I love
rabbits" but they do not speak the same language. The philosophers exchange
messages directly with
translators (interface) who don't understand the philosophical meaning
of the message but know
enough to translate it into a language that all translators know-Dutch
in this example. The translators
directly exchange messages with the secretaries (interface) who may not
know Dutch but can
transcribe and send words (service) and then send the message (physical
medium.)
Fig. 1-9. The philosopher-translator-secretary architecture
2.Two programs, WordPerfect and Microsoft Word want to transfer a document
"Network Studies,"
preserving formatting. These are converted into RTF (rich-text-format)
which is pure ASCII and
contains the additional information that way. These are then converted
into the bit string appropriate
for the computer it is on, e.g. a PC vs. a Macintosh and then sent via
a modem.
d.At each level, headers and/or trailers are added to communicate needed
information; also packets may
need to be subdivided. At a lower layer, the layer looks at the headers
from higher levels as part of the
message! It makes no distinction between the headers and messages at higher
levels.
Fig. 1-10. Example information flow supporting virtual communication in
layer 5.
e.Each layer may manage error control sequencing and communication.
Circuits are not perfect; errors should be detected and corrected. In older
protocols (X.25 and
stacks) meant for error-prone media(copper wires), error-correction is
done at lower layers and
frequently. Also correction as opposed to just detection is mandatory.
In new protocols (ATM)
meant for relatively error-free media (optical fibers), error control can
be done at higher layers.
Tradeoff: Reducing congestion by allowing rerouting versus the additional
complexity and cost of
sorting out the packets on the end and time sensitive. [Voice and video
are time-sensitive; computer
data usually is not. Computer data is bursty; voice and video usually are
not.]
Fig. 1-11. Note: tradeoff is cost per application bit. The total number
of other bits sent should be
minimized.
Do packets arrive in the order that they are sent? If not, they must be
sorted out.
Is communication one-way or two-way? Is it connection-oriented or connectionless?
2.Connection-oriented and
connectionless
a.Connection-oriented: This is like the phone system. You establish a connection
prior to sending any
messages. The messages are then received in the order they are sent. [Messages
correspond to the
transmitted voice which cannot be garbled.] The connection is then released.
b.Connectionless: This is like the postal system. Two letters are routed
independently and a sequence of
letters does not necessarily arrive from sender to destination that it
is sent.
c.Quality of Service (QoS): Some services are reliable, implying that they
never lose data. Reliability is
usually important for data (but not electronic junk mail) but not for voice.
Fig. 1-12.
Different layers can and do have different QoS. For example: TCP/IP which
is used on the Internet offers
unreliable, connectionless service on the (lower) IP level and reliable,
connection-oriented service on the
(upper) TCP level.
3.OSI Reference Model
a.This model is based on a proposal for international standardization of
network protocols:
ISO = Internation Standards Organization
OSI = Open Systems Interconnection
It has seven layers as shown in Fig. 1-13 of Tanenbaum. In practice, layers
have different sizes; they can be
fat or thin.
b.Layer Structure
Fig. 1-13. The OSI reference model.
Physical Layer: concerned with mechanical, electrical, and procedural interfacing
with the physical
transmission medium.
Data Link Layer: Carves data into frames (typically 100-1000 bytes), transmits
them sequentially
and then re-transmits them if there are errors. There can be a duplicate
if an acknowledgement frame
is lost. This layer deals with damaged, lost, and duplicate frames. It
also deals with flow regulation so
that a fast transmitter doesn't drown a slow receiver.
MAC Sublayer: Broadcast networks must also control access to the shared
channel. This issue is
dealt with in a special sublayer.
Network Layer: This layer is aware of the whole subnet topology and is
responsible for routing
packets. Depending on the protocols, this can be static or dynamic. It
also must control congestion
in the network when too many users wish to use the network.
Transport Layer: This layer takes data from the upper (applications) layers
and packages it for
transport on the network. It can use several network connections for one
message if speed is
required or bundle several messages on one connection to reduce costs.
It sets the quality of service
[e.g., error-free point-to-point, sequential]. It also monitors data flow
from host-to-host (like
router-to-router control in the data link layer.)
Session and Presentation Layers: These two layers establish sessions and
worry about synchronizing
transfer (putting checkpoints in the data stream) and syntax (ASCII vs.
Unicode.) This layer is thin in
practice since the applications typically reach into the transport layer.
Tannenbaum generally
subsumes them under applications and so shall we.
Applications: E-mail (communication), Telnet (file transfer), Terminal
emulators (for making the legs
on a Macintosh or a PC work remotely on a SUN), etc.
c.Each layer adds its information in headers or trailers that are treated
as data by the layers below and are
stripped off as the data goes back up the chain in the receiving host.
Fig. 1-14. An example of how the OSI model is used. Some of the headers
may be null.
4.TCP/IP Reference Model
a.The Internet is based on TCP/IP; so, it is a real-world, very important
protocol. [The OSI model is very
important conceptually and more complete, but there is not existing network
that corresponds to it exacty.
b.A goal of TCP/IP is to provide connections that are maintained when routers
between the source and
destination go down.
c.Layers
Fig. 1-15. The TCP/IP reference model.
1.Host-to-Host Network: This layer, which corresponds to the data link
and physical layers is not
defined within TCP/IP and varies from network to network.
2.Internet Layer: This layer injects packets into the network and routes
them to their destinations. The
service is connectionless. Each packet travels independently to its destination.
Packets can arrive out
of order and by different paths. The protocol used at this layer is IP
(Internet protocol). Routing and
avoiding congestion are the key issues.
3.Transport Layer: This layer allows peer entities (e.g., E-mail) on the
source and destination hosts
exchange messages. There are two end-to-end protocols defined:
Fig. 1-16. Protocols and networks in the TCP/IP model initially.
TCP (transmission control protocol): It is reliable and connection oriented.
On the transmitting
end, it takes the incoming byte stream and breaks it into packets for transport.
On the
receiving end, it re-assembles them into the output sequence. It handles
flow control and error
control.
UDP (user datagram protocol): It is an unreliable, connectionless protocol.
It is used by
applications that want to handle their own flow control, error control,
and sequencing.
Examples: one-shot client-server request-reply queries and time-sensitive
messages (like
video and voice.)
4.Application Layer: The usual suspects appear in this layer: Telnet (virtual
terminal), PINE (E-mail),
FTP (file transfer), HTTP (fetching pages on theWWW), etc.
d.Note that the internet (network) layer is connectionless while the transport
layer running TCP is
connection-oriented. Thus, we see that being connectionless or connection-oriented
is a property of a
layer, not the network.
5.OSI vs. TCP/IP
a.The basic distinction between the OSI model and the TCP/IP model is between
theory and practice.
b.In OSI: the model came first and then the protocols. The protocols are
unwieldly and have not been
successfully implemented. By contrast, it has been a great success conceptually.
c.In TCP/IP: Just the opposite holds. Conceptually, it does not distinguish
well between layers, protocols,
and interfaces. In practice, it is widely used in the network and transport
layers, but it doesn't deal with the
data link and physical layers which must be separately implemented.
D.Networks and Network Services
1.For PC LAN's, a very commonly
used network system is Novell NetWare. Its protocol stack predates OSI
and
looks a lot
like TCP/lP.
Fig. 1-17. The Novell
NetWare reference model.
a.The physical and data link layers use standard LAN protocols like ethernet
or token ring.
b.At the network layer, there is an unreliable connectionless protocol
called IPX. Above that in the transport
layer, there is a connection-oriented transport protocol NCP (network core
protocol) and another SPX for
just transport.
c.Just like in TCP/IP, it is based on an internet datagram packet which
is created at the network layer. Its
structure is shown below and in Tannenbaum.
Fig. 1-18. A Novell NetWare IPX packet.
d.When a new machines boots up, it exchanges messages with routers and
servers so that they become
aware of the machine's presence and the machine becomes aware of the services
that are offered.
2.SMDS (Switched Multimegabit
Data Service)
a.This is a service offered by RBOC's (Regional Bell Operating Companies),
other regional carriers, and
long-distance carriers. It is designed to deal with bursty traffic (typical
for data) as opposed to steady traffic
(typical for voice).
Fig. 1-19. (a) Four LANs interconnected with leased lines. (b) Interconnection
using SMDS.
b.Shown in the figure is a case where it might be useful. A company wants
to hook up four geometrically
remore LAN's so that they can transfer data. They can lease lines, but
that is inefficient if they are only using
the lines a small part of the time.
SMDS transmits packets as they arrive. The transmission is connectionless
and unreliable.
To regulate the traffic, a counter increments regularly. When a new packet
is sent in, the number of bytes in
it is counted. If the number is less than the counter, it is transmitted,
it is sent at the full network speed.
Otherwise, it is dropped.
3.X.25
a.This approach, widely used outside the US was developed in the 1970's
by the CC ITT (Comité
Consaltatif International Télégraphique et Téléphonique).
b.Standards
Physical layer: X.21 specifies digital links. Actually, virtually all systems
that use X.25 have another
physical setup that is analog, based on the RV-232 standard.
Data link: A number of (slightly incompatible) variations exist. It takes
care of transmission errors on
the telephone lines.
At the network layer, it is connection-oriented and reliable; its packets
are 128 bytes. A 'personal'
circuit is set up that is called a permanent virtual circuit.
c.They operate up to 64 Kbps so they are obsolete for many purposes.
4.Frame relay: This is a
'bare bones' service that is analogous to a virtual leased line. Like SMDS,
it uses counters
to make sure
that the averaged (leased) transmission rate is not violated. Its base
speed 1.5 Mbps is much higher
than X.25. It
takes advantage of reliable digital lines by eliminating most error control
and all flow control. That
lowers cost
but requires users to provide a functionality themselves.
5.B-ISDN and ATM
a.The phone companies use a plethora of networks for different services.
POTS: plain old telephone service is the circuit-switched network used
for voice SMDS; frame relay
are packet-switched and separate.
SSN7: phone companys' signalling network, and it also separate.
The phone companies would also like to offer cable TV service.
b.A perceived solution is to invent a single digital network that can deliver
all these services as well as other
services like movies and music on demand, interactive libraries to the
home, videoconferencing, etc.
This service is called B-ISDN (Broadband integrated services digital network.)
c.The underlying technology for B-ISDN is ATM (Asynchronous transfer mode).
It is called asynchronous
because its basic packets (called cells) are not tied to a master clock.
Each cell is 53 bytes long with 5
bytes of header and 48 bytes of data.
Fig. 1-20. An ATM cell.
d.Why cell switching?
This is a giant break from circuit-switching which is the historical switching
technology in the phone
system.
Small cells imply that time sensitivity can be respected where needed.
At the same time,
broadcasting and data flow (with a significant overhead) are possible.
e.ATM is connection-oriented. While delivery is not reliable, sequence
is. (Reliability can be assured since it
is required for some applications.)[One of the complaints about ATM is
that it looks a lot like voice.]
f.ATM has its own reference model (why not?) which is not the same as the
OSI model.
Fig. 1-21. The ATM layers and sublayers, and their functions.
The physical layer deals with the physical medium and "transport convergence."
In ATM jargon,
interfaces are replaced by convergence sublayers.
The ATM layer defines the header fields of the cells and also deals with
establishing and releasing
virtual circuits and with congestion.
The AAL layer deals with breaking up the application data into cells and
re-assembling them.
Different AAL's are needed for different data.
Fig. 1-22. The B-ISDN ATM reference model.
Fig. 1-23.
g.The ATM reference model is actually 3-dimensional. The user plane deals
with data transport, flow control,
and error control. The control plane deals with connection management.
Then, the layers and planes must
be managed.
h.The layers have sublayers and the top-most and bottom-most sublayers
deal with getting a host of different
applications with very different needs to talk to the same protocols and
getting these protocols to talk to a
host of different transmission media.
i.My Own Perspectives (see Tannenbaum for his)
ATM was designed by committee (like OSI) and is a complicated mess for
that reason.
ATM will come as a high-speed transport mechanism, but I am very unsure
that B-ISDN will come
and take over all services.
E.Standardization
1.In order to assure some
ability to communicate between different computers, phones, networks, etc.
Standards
have to be established.
2.Increasingly, vendors
are building to "open" standards, rather than using "closed" standards
(e.g., UNIX vs.
VAX-VMS) because
buyers have repeatedly demonstrated that they will bug inferior "open"
products (arguably,
VMS v. UNIX
in operating systems, Apple vs. DOS machines in PC's, etc.)
3.Standards can be:
defacto: standards
that have just happened (e.g., UNIX or the IBM PC).
dejure: have
been established by one of the standards bodies.
4.Telephone Standards
a.In the US, one must mediate between the long-distance carriers (AT&T,
MCI, Sprint, etc.) , the RBOC's
(Bell Atlantic, Pacific Bell, etc.), and other local carriers (1500, including
GTE).
b.Internationally, most countries have a national phone system, although
the worldwide trend is toward more
privatization.
c.The ITU (Internation Telecommunication Union) sets the standards for
communications. Since 1947, it is
an agency of the United Nations. It has three sectors:
ITU-R: Radio communications
ITU-T: Telecommunication standards
ITU-D: Development
Our primary concern is the ITU-T which is the successor organization to
the CC ITT (as of 1993).
d.Working groups in ITU make recommendations for phone systems (and networks)
that are widely
respected and all major phone and telecommunications companies are included.
5.There is also ISO (International
Standards Organization), a voluntary, non-treaty organization whose members
include most
of the nation standards organizations.
ANSI: American
National Standards Institute
BSI, AFNOR, and
DIN are corresponding organizations in Britain, France, and Germany.
ISO has 200 technical committees; TC97 deals with computers and information
processing.
Each TC forms working groups; the working groups have over 100,000 members.
6.Other important sources
for standards:
NIST: National Institute of Standards and Technology
IEEE: Institute for Electrical and Electronics Engineers
7.The Internet has its own
standardization procedures which are described by Tanenbaum.
|