SlideShare una empresa de Scribd logo
1 de 26
Slides for Chapter 3:
Networking and Internetworking
From Coulouris, Dollimore and
Kindberg
Distributed Systems:
Concepts and Design
Edition 3, © Addison-Wesley 2001
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.1
Network types
Range Bandwidth (Mbps) Latency (ms)
LAN 1-2 kms 10-1000 1-10
WAN worldwide 0.010-600 100-500
MAN 2-50 kms 1-150 10
Wireless LAN 0.15-1.5 km 2-11 5-20
Wireless WAN worldwide 0.010-2 100-500
Internet worldwide 0.010-2 100-500
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.2
Conceptual layering of protocol software
Layer n
Layer 2
Layer 1
Message sent Message received
Communication
medium
Sender Recipient
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.3
Encapsulation as it is applied in layered protocols
Presentation header
Application-layer message
Session header
Transport header
Network header
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.4
Protocol layers in the ISO Open Systems Interconnection (OSI) model
Application
Presentation
Session
Transport
Network
Data link
Physical
Message sent Message received
Sender Recipient
Layers
Communication
medium
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.5
OSI protocol summary
Layer Description Examples
Application Protocols that are designed to meet the communication requirements of
specific applications, often defining the interface to a service.
HTTP,FTP, SMTP,
CORBA IIOP
Presentation Protocols at this level transmit data in a network representation that is
independent of the representations used in individual computers, which may
differ. Encryption is also performed in this layer, if required.
Secure Sockets
(SSL),CORBA Data
Rep.
Session At this level reliability and adaptation are performed, such as detection of
failures and automatic recovery.
Transport This is the lowest level at which messages (rather than packets) are handled.
Messages are addressed to communication ports attached to processes,
Protocols in this layer may be connection-oriented or connectionless.
TCP,UDP
Network Transfers data packets between computers in a specific network. In a WAN
or an internetwork this involves the generation of a route passing through
routers. In a single LAN no routing is required.
IP, ATM virtual
circuits
Data link Responsible for transmission of packets between nodes that are directly
connected by a physical link. In a WAN transmission is between pairs of
routers or between routers and hosts. In a LAN it is between any pair of hosts.
Ethernet MAC,
ATM cell transfer,
PPP
Physical The circuits and hardware that drive the network. It transmits sequences of
binary data by analogue signalling, using amplitude or frequency modulation
of electrical signals (on cable circuits), light signals (on fibre optic circuits)
or other electromagnetic signals (on radio and microwave circuits).
Ethernet base- band
signalling, ISDN
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.6
Internetwork layers
Underlying network
Application
Network interface
Transport
Internetwork
Internetwork packets
Network-specific packets
Message
Layers
Internetwork
protocols
Underlying
network
protocols
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.7
Routing in a wide area network
Hosts Links
or local
networks
A
D E
B
C
1
2
5
43
6
Routers
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.8
Routing tables for the network in Figure 3.7
Routings from D Routings from E
To Link Cost To Link Cost
A
B
C
D
E
3
3
6
local
6
1
2
2
0
1
A
B
C
D
E
4
4
5
6
local
2
1
1
1
0
Routings from A Routings from B Routings from C
To Link Cost To Link Cost To Link Cost
A
B
C
D
E
local
1
1
3
1
0
1
2
1
2
A
B
C
D
E
1
local
2
1
4
1
0
1
2
1
A
B
C
D
E
2
2
local
5
5
2
1
0
2
1
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.9
Pseudo-code for RIP routing algorithm
Send: Each t seconds or when Tl changes, send Tl on each non-faulty
outgoing link.
Receive: Whenever a routing table Tr is received on link n:
for all rows Rr in Tr {
if (Rr.link | n) {
Rr.cost = Rr.cost + 1;
Rr.link = n;
if (Rr.destination is not in Tl) add Rr to Tl;
// add new destination to Tl
else for all rows Rl in Tl {
if (Rr.destination = Rl.destination and
(Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr;
// Rr.cost < Rl.cost : remote node has better route
// Rl.link = n : remote node is more authoritative
}
}
}
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.10
Simplified view of the QMW Computer Science network
file
compute
dialup
hammer
henry
hotpoint
138.37.88.230
138.37.88.162
bruno
138.37.88.249
router/
sickle
138.37.95.241138.37.95.240/29
138.37.95.249
copper
138.37.88.248
firewall
web
138.37.95.248/29
server
desktop computers 138.37.88.xx
subnet
subnet
Eswitch
138.37.88
server
server
server
138.37.88.251
custard
138.37.94.246
desktop computers
Eswitch
138.37.94
hubhub
Student subnetStaff subnet
other
servers
router/
firewall
138.37.94.251
1000 Mbps Ethernet
Eswitch: Ethernet switch
100 Mbps Ethernet
file server/
gateway
printers
Campus
router
Campus
router
138.37.94.xx
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.11
Tunnelling for IPv6 migration
A B
IPv6 IPv6
IPv6 encapsulated in IPv4 packets
Encapsulators
IPv4 network
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.12
TCP/IP layers
Messages (UDP) or Streams (TCP)
Application
Transport
Internet
UDP or TCP packets
IP datagrams
Network-specific frames
Message
Layers
Underlying network
Network interface
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.13
Encapsulation in a message transmitted via TCP over an Ethernet
Application message
TCP header
IP header
Ethernet header
Ethernet frame
port
TCP
IP
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.14
The programmer's conceptual view of a TCP/IP Internet
IP
Application Application
TCP UDP
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.15
Internet address structure, showing field sizes in bits
7 24
Class A: 0 Network ID Host ID
14 16
Class B: 1 0 Network ID Host ID
21 8
Class C: 1 1 0 Network ID Host ID
28
Class D (multicast): 1 1 1 0 Multicast address
27
Class E (reserved): 1 1 1 1 unused0
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.16
Decimal representation of Internet addresses
octet 1 octet 2 octet 3
Class A: 1 to 127
0 to 255 0 to 255 1 to 254
Class B: 128 to 191
Class C: 192 to 223
224 to 239Class D (multicast):
Network ID
Network ID
Network ID
Host ID
Host ID
Host ID
Multicast address
0 to 255 0 to 255 1 to 254
0 to 255 0 to 255 0 to 255
0 to 255 0 to 255 0 to 255
Multicast address
0 to 255 0 to 255 1 to 254240 to 255Class E (reserved):
1.0.0.0 to
127.255.255.255
128.0.0.0 to
191.255.255.255
192.0.0.0 to
223.255.255.255
224.0.0.0 to
239.255.255.255
240.0.0.0 to
255.255.255.255
Range of addresses
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.17
IP packet layout
dataIP address of destinationIP address of source
header
up to 64 kilobytes
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.18
IPv6 header layout
Source address
(128 bits)
Destination address
(128 bits)
Version (4 bits) Priority (4 bits) Flow label (24 bits)
Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.19
The MobileIP routing mechanism
Sender
Home
Mobile host MH
Foreign agent FA
Internet
agent
First IP packet
addressed to MH
Address of FA
returned to sender
First IP packet
tunnelled to FA
Subsequent IP packets
tunnelled to FA
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.20
Firewall configurations
Internet
Router/
Protected intranet
a) Filtering router
Internet
b) Filtering router and bastion
filter
Internet
R/filterc) Screened subnet for bastion R/filter Bastion
R/filter Bastion
web/ftp
server
web/ftp
server
web/ftp
server
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.21
IEEE 802 network standards
IEEE No. Title Reference
802.3 CSMA/CD Networks (Ethernet) [IEEE 1985a]
802.4 Token Bus Networks [IEEE 1985b]
802.5 Token Ring Networks [IEEE 1985c]
802.6 Metropolitan Area Networks [IEEE 1994]
802.11 Wireless Local Area Networks [IEEE 1999]
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.22
Wireless LAN configuration
LAN
Server
Wireless
LAN
Laptops
Base station/
access point
Palmtop
radio obstruction
A B C
D
E
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.23
ATM protocol layers
Physical
Application
ATM layer
Higher-layer protocols
ATM cells
ATM virtual channels
Message
Layers
ATM adaption layer
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.24
ATM cell layout
Flags DataVirtual channel idVirtual path id
53 bytes
Header: 5 bytes
Instructor’s Guide for Coulouris,
Dollimore and Kindberg Distributed
Systems: Concepts and Design Edn. 3
© Addison-Wesley Publishers 2000
Figure 3.25
Switching virtual paths in an ATM network
VPI in VPI out
2
3
4
5
VPI = 3
VPI = 5
VPI = 4
Virtual path Virtual channels
VPI = 2
VPI : virtual path identifier
VP switch VP/VC
switch
VP switch
Host
Host

Más contenido relacionado

La actualidad más candente

Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
Ali Usman
 

La actualidad más candente (20)

2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Cc unit 1 ppt
Cc unit 1 pptCc unit 1 ppt
Cc unit 1 ppt
 
Practical Byzantine Fault Tolernace
Practical Byzantine Fault TolernacePractical Byzantine Fault Tolernace
Practical Byzantine Fault Tolernace
 
Operating system - Deadlock
Operating system - DeadlockOperating system - Deadlock
Operating system - Deadlock
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Ch2
Ch2Ch2
Ch2
 
Database , 12 Reliability
Database , 12 ReliabilityDatabase , 12 Reliability
Database , 12 Reliability
 
Type Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLikeType Checking(Compiler Design) #ShareThisIfYouLike
Type Checking(Compiler Design) #ShareThisIfYouLike
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Distributed Coordination-Based Systems
Distributed Coordination-Based SystemsDistributed Coordination-Based Systems
Distributed Coordination-Based Systems
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
A tutorial on C++ Programming
A tutorial on C++ ProgrammingA tutorial on C++ Programming
A tutorial on C++ Programming
 
Coupling and cohesion
Coupling and cohesionCoupling and cohesion
Coupling and cohesion
 
Types of errors 2019
Types of errors 2019Types of errors 2019
Types of errors 2019
 
DBMS unit-1.pdf
DBMS unit-1.pdfDBMS unit-1.pdf
DBMS unit-1.pdf
 
Lecture: Context-Free Grammars
Lecture: Context-Free GrammarsLecture: Context-Free Grammars
Lecture: Context-Free Grammars
 
Network and System Administration
Network and System AdministrationNetwork and System Administration
Network and System Administration
 

Destacado

Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slides
lara_ays
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
AbDul ThaYyal
 
Chapter 5 slides
Chapter 5 slidesChapter 5 slides
Chapter 5 slides
lara_ays
 
Chapter 7 slides
Chapter 7 slidesChapter 7 slides
Chapter 7 slides
lara_ays
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
AbDul ThaYyal
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
AbDul ThaYyal
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
AbDul ThaYyal
 
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsChapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
AbDul ThaYyal
 
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-ReportReport-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
Viralkumar Jayswal
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)
AbDul ThaYyal
 
Chapter 3 slides
Chapter 3 slidesChapter 3 slides
Chapter 3 slides
lara_ays
 

Destacado (20)

Chapter 6 slides
Chapter 6 slidesChapter 6 slides
Chapter 6 slides
 
Chapter 2 system models
Chapter 2 system modelsChapter 2 system models
Chapter 2 system models
 
Chapter 5 slides
Chapter 5 slidesChapter 5 slides
Chapter 5 slides
 
Chapter 7 slides
Chapter 7 slidesChapter 7 slides
Chapter 7 slides
 
Chapter 1 slides
Chapter 1 slidesChapter 1 slides
Chapter 1 slides
 
Chapter 17 corba
Chapter 17 corbaChapter 17 corba
Chapter 17 corba
 
Chapter 1 slides
Chapter 1 slidesChapter 1 slides
Chapter 1 slides
 
Chapter 3 networking and internetworking
Chapter 3 networking and internetworkingChapter 3 networking and internetworking
Chapter 3 networking and internetworking
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Chapter 4 a interprocess communication
Chapter 4 a interprocess communicationChapter 4 a interprocess communication
Chapter 4 a interprocess communication
 
Chapter 11b
Chapter 11bChapter 11b
Chapter 11b
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systemsChapter 1 characterisation of distributed systems
Chapter 1 characterisation of distributed systems
 
Report-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-ReportReport-An Expert System for Car Failure Diagnosis-Report
Report-An Expert System for Car Failure Diagnosis-Report
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)
 
Chapter 9 names
Chapter 9 namesChapter 9 names
Chapter 9 names
 
Chapter 6 os
Chapter 6 osChapter 6 os
Chapter 6 os
 
2. microkernel new
2. microkernel new2. microkernel new
2. microkernel new
 
Chapter 3 slides
Chapter 3 slidesChapter 3 slides
Chapter 3 slides
 
3. challenges
3. challenges3. challenges
3. challenges
 

Similar a Chapter 3 slides (Distributed Systems)

Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
BlackHat41
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...
Ashish Gupta
 
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
Ashish Gupta
 
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
Ashish Gupta
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
keiko277
 

Similar a Chapter 3 slides (Distributed Systems) (20)

ch3.ppt
ch3.pptch3.ppt
ch3.ppt
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ch3 (1)
Ch3 (1)Ch3 (1)
Ch3 (1)
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 
Computer Networking network layer chapter 4
Computer Networking network layer chapter 4Computer Networking network layer chapter 4
Computer Networking network layer chapter 4
 
Chapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.pptChapter_4_V6.11 Network layer.ppt
Chapter_4_V6.11 Network layer.ppt
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...independent of the subnet topology. The Transport Layer should be shielded fr...
independent of the subnet topology. The Transport Layer should be shielded fr...
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Week6 final
Week6 finalWeek6 final
Week6 final
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
CCNA Exam Question
CCNA Exam QuestionCCNA Exam Question
CCNA Exam Question
 
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
Presentation1.Machine learning,Supervised, semi supervised learning, cluste...Presentation1.Machine learning,Supervised, semi supervised learning, cluste...
Presentation1.Machine learning, Supervised, semi supervised learning, cluste...
 
The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...The services provided by the network layer should be independent of the subne...
The services provided by the network layer should be independent of the subne...
 
Chapter 14 Important questions
Chapter 14 Important questionsChapter 14 Important questions
Chapter 14 Important questions
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
 

Más de soe sumijan

Más de soe sumijan (9)

Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)Perencanaan Infrastruktur (Trends Infrastructures)
Perencanaan Infrastruktur (Trends Infrastructures)
 
Chapter 2 slides
Chapter 2 slidesChapter 2 slides
Chapter 2 slides
 
Computer Vision Pertemuan 06
Computer Vision Pertemuan 06Computer Vision Pertemuan 06
Computer Vision Pertemuan 06
 
Computer Vision Pertemuan 05
Computer  Vision Pertemuan 05Computer  Vision Pertemuan 05
Computer Vision Pertemuan 05
 
Computer Vision Pertemuan 04
Computer  Vision Pertemuan 04Computer  Vision Pertemuan 04
Computer Vision Pertemuan 04
 
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
e-Government (Strategi dan Implementasinya untuk Pemerinyahan)
 
Pertemuan 01-02
Pertemuan 01-02Pertemuan 01-02
Pertemuan 01-02
 
Multimedia dan Computer Vision
Multimedia dan Computer VisionMultimedia dan Computer Vision
Multimedia dan Computer Vision
 
Aplikasi sistem real time
Aplikasi sistem real timeAplikasi sistem real time
Aplikasi sistem real time
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Chapter 3 slides (Distributed Systems)

  • 1. Slides for Chapter 3: Networking and Internetworking From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley 2001
  • 2. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.1 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5 km 2-11 5-20 Wireless WAN worldwide 0.010-2 100-500 Internet worldwide 0.010-2 100-500
  • 3. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.2 Conceptual layering of protocol software Layer n Layer 2 Layer 1 Message sent Message received Communication medium Sender Recipient
  • 4. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.3 Encapsulation as it is applied in layered protocols Presentation header Application-layer message Session header Transport header Network header
  • 5. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.4 Protocol layers in the ISO Open Systems Interconnection (OSI) model Application Presentation Session Transport Network Data link Physical Message sent Message received Sender Recipient Layers Communication medium
  • 6. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.5 OSI protocol summary Layer Description Examples Application Protocols that are designed to meet the communication requirements of specific applications, often defining the interface to a service. HTTP,FTP, SMTP, CORBA IIOP Presentation Protocols at this level transmit data in a network representation that is independent of the representations used in individual computers, which may differ. Encryption is also performed in this layer, if required. Secure Sockets (SSL),CORBA Data Rep. Session At this level reliability and adaptation are performed, such as detection of failures and automatic recovery. Transport This is the lowest level at which messages (rather than packets) are handled. Messages are addressed to communication ports attached to processes, Protocols in this layer may be connection-oriented or connectionless. TCP,UDP Network Transfers data packets between computers in a specific network. In a WAN or an internetwork this involves the generation of a route passing through routers. In a single LAN no routing is required. IP, ATM virtual circuits Data link Responsible for transmission of packets between nodes that are directly connected by a physical link. In a WAN transmission is between pairs of routers or between routers and hosts. In a LAN it is between any pair of hosts. Ethernet MAC, ATM cell transfer, PPP Physical The circuits and hardware that drive the network. It transmits sequences of binary data by analogue signalling, using amplitude or frequency modulation of electrical signals (on cable circuits), light signals (on fibre optic circuits) or other electromagnetic signals (on radio and microwave circuits). Ethernet base- band signalling, ISDN
  • 7. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.6 Internetwork layers Underlying network Application Network interface Transport Internetwork Internetwork packets Network-specific packets Message Layers Internetwork protocols Underlying network protocols
  • 8. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.7 Routing in a wide area network Hosts Links or local networks A D E B C 1 2 5 43 6 Routers
  • 9. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.8 Routing tables for the network in Figure 3.7 Routings from D Routings from E To Link Cost To Link Cost A B C D E 3 3 6 local 6 1 2 2 0 1 A B C D E 4 4 5 6 local 2 1 1 1 0 Routings from A Routings from B Routings from C To Link Cost To Link Cost To Link Cost A B C D E local 1 1 3 1 0 1 2 1 2 A B C D E 1 local 2 1 4 1 0 1 2 1 A B C D E 2 2 local 5 5 2 1 0 2 1
  • 10. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.9 Pseudo-code for RIP routing algorithm Send: Each t seconds or when Tl changes, send Tl on each non-faulty outgoing link. Receive: Whenever a routing table Tr is received on link n: for all rows Rr in Tr { if (Rr.link | n) { Rr.cost = Rr.cost + 1; Rr.link = n; if (Rr.destination is not in Tl) add Rr to Tl; // add new destination to Tl else for all rows Rl in Tl { if (Rr.destination = Rl.destination and (Rr.cost < Rl.cost or Rl.link = n)) Rl = Rr; // Rr.cost < Rl.cost : remote node has better route // Rl.link = n : remote node is more authoritative } } }
  • 11. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.10 Simplified view of the QMW Computer Science network file compute dialup hammer henry hotpoint 138.37.88.230 138.37.88.162 bruno 138.37.88.249 router/ sickle 138.37.95.241138.37.95.240/29 138.37.95.249 copper 138.37.88.248 firewall web 138.37.95.248/29 server desktop computers 138.37.88.xx subnet subnet Eswitch 138.37.88 server server server 138.37.88.251 custard 138.37.94.246 desktop computers Eswitch 138.37.94 hubhub Student subnetStaff subnet other servers router/ firewall 138.37.94.251 1000 Mbps Ethernet Eswitch: Ethernet switch 100 Mbps Ethernet file server/ gateway printers Campus router Campus router 138.37.94.xx
  • 12. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.11 Tunnelling for IPv6 migration A B IPv6 IPv6 IPv6 encapsulated in IPv4 packets Encapsulators IPv4 network
  • 13. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.12 TCP/IP layers Messages (UDP) or Streams (TCP) Application Transport Internet UDP or TCP packets IP datagrams Network-specific frames Message Layers Underlying network Network interface
  • 14. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.13 Encapsulation in a message transmitted via TCP over an Ethernet Application message TCP header IP header Ethernet header Ethernet frame port TCP IP
  • 15. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.14 The programmer's conceptual view of a TCP/IP Internet IP Application Application TCP UDP
  • 16. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.15 Internet address structure, showing field sizes in bits 7 24 Class A: 0 Network ID Host ID 14 16 Class B: 1 0 Network ID Host ID 21 8 Class C: 1 1 0 Network ID Host ID 28 Class D (multicast): 1 1 1 0 Multicast address 27 Class E (reserved): 1 1 1 1 unused0
  • 17. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.16 Decimal representation of Internet addresses octet 1 octet 2 octet 3 Class A: 1 to 127 0 to 255 0 to 255 1 to 254 Class B: 128 to 191 Class C: 192 to 223 224 to 239Class D (multicast): Network ID Network ID Network ID Host ID Host ID Host ID Multicast address 0 to 255 0 to 255 1 to 254 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 0 to 255 Multicast address 0 to 255 0 to 255 1 to 254240 to 255Class E (reserved): 1.0.0.0 to 127.255.255.255 128.0.0.0 to 191.255.255.255 192.0.0.0 to 223.255.255.255 224.0.0.0 to 239.255.255.255 240.0.0.0 to 255.255.255.255 Range of addresses
  • 18. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.17 IP packet layout dataIP address of destinationIP address of source header up to 64 kilobytes
  • 19. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.18 IPv6 header layout Source address (128 bits) Destination address (128 bits) Version (4 bits) Priority (4 bits) Flow label (24 bits) Payload length (16 bits) Hop limit (8 bits)Next header (8 bits)
  • 20. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.19 The MobileIP routing mechanism Sender Home Mobile host MH Foreign agent FA Internet agent First IP packet addressed to MH Address of FA returned to sender First IP packet tunnelled to FA Subsequent IP packets tunnelled to FA
  • 21. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.20 Firewall configurations Internet Router/ Protected intranet a) Filtering router Internet b) Filtering router and bastion filter Internet R/filterc) Screened subnet for bastion R/filter Bastion R/filter Bastion web/ftp server web/ftp server web/ftp server
  • 22. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.21 IEEE 802 network standards IEEE No. Title Reference 802.3 CSMA/CD Networks (Ethernet) [IEEE 1985a] 802.4 Token Bus Networks [IEEE 1985b] 802.5 Token Ring Networks [IEEE 1985c] 802.6 Metropolitan Area Networks [IEEE 1994] 802.11 Wireless Local Area Networks [IEEE 1999]
  • 23. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.22 Wireless LAN configuration LAN Server Wireless LAN Laptops Base station/ access point Palmtop radio obstruction A B C D E
  • 24. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.23 ATM protocol layers Physical Application ATM layer Higher-layer protocols ATM cells ATM virtual channels Message Layers ATM adaption layer
  • 25. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.24 ATM cell layout Flags DataVirtual channel idVirtual path id 53 bytes Header: 5 bytes
  • 26. Instructor’s Guide for Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 © Addison-Wesley Publishers 2000 Figure 3.25 Switching virtual paths in an ATM network VPI in VPI out 2 3 4 5 VPI = 3 VPI = 5 VPI = 4 Virtual path Virtual channels VPI = 2 VPI : virtual path identifier VP switch VP/VC switch VP switch Host Host