SlideShare una empresa de Scribd logo
1 de 33
15-213
          “ The course that gives CMU its Zip!”

                 Internetworkin
                        g

                 May 1, 2001
              Topics
               • Protocol layering and encapsulation
               • Internetworking with hubs, bridges,
                 and routers
               • The Internet Protocol (IP)
               • The global Internet



class30.ppt
Typical computer system

                               Keyboard         Mouse      Modem                Printer


                  Interrupt    Keyboard             Serial port          Parallel port
Processor
                  controller   controller            controller           controller


                                Local/IO Bus


                  IDE disk          SCSI                    Video           Network
 Memory                                                    adapter
                  controller      controller                                adapter

                                  SCSI bus
                    disk                                   Display          Network
                                disk        cdrom

    class30.ppt                  –2–                              CS 213 S’01
Generic
                               network
                                   host                                 host

                                                OS code
      protocol      software         software                      software
        stack       hardware        hardware                       hardware

network adapter/        link             link                             link
interface card

                    Interconnect (wires, repeaters, bridges, and routers)




      class30.ppt                 –3–                     CS 213 S’01
Protocols
A protocol defines the format of packets and the
 rules for communicating them across the network.
Different protocols provide different levels of
 service:
  • simple error correction (ethernet)
  • uniform name space, unreliable best-effort datagrams (host-
    host) (IP)
  • reliable byte streams (TCP)
  • unreliable best-effort datagrams (process-process) (UDP)
  • multimedia data retrieval (HTTP)


Crucial idea: protocols leverage off of the
 capabilities of other protocols.


  class30.ppt              –4–                    CS 213 S’01
Protocol layering
interface between
user code and OS             Protocols provide specialized
code                         services by relying on services
(Sockets interface)          provided by lower-level protocols
                             (i.e., they leverage lower-level
                             services).


               User application program (FTP, Telnet, WWW, email)
                                                                      Reliable
Unreliable      User datagram protocol    Transmission control        byte stream
best effort             (UDP)                protocol (TCP)           delivery
datagram                                                              (process-
delivery                      Internet Protocol (IP)                  process)
(process-
process)
                          Network interface (ethernet)
 Unreliable
 best effort
                                    hardware                          Physical
 datagram
                                                                      connectio
 delivery
                                                                      n
 (host-
 host)
       class30.ppt                  –5–                     CS 213 S’01
Encapsulation
                             Application program


User code                                 data
                                                  User Interface (API)
OS code                 TCP segment
                TCP        header
                                          data



             IP datagramTCP segment
      IP        header     header
                                          data     OS/adapter interface
                                                  (exception mechanism)
Ethernet frame IP datagramTCP segment
    header        header     header
                                          data        Adapter

                                                  Adapter/Network interface
                                        Network
     class30.ppt                   –6–                     CS 213 S’01
Basic network
                        types
System area network                Metropolitan area
 (SAN)                              network (MAN)
  • same room (meters)               • same city (10’s of
  • 300 MB/s Cray T3E                  kilometers)
                                     • 800 Mb/s Gigabit Nectar
Local area network
 (LAN)                             Wide area network
  • same bldg or campus             (WAN)
    (kilometers)                     • nationwide or worldwide
  • 10 Mb/sEthernet                    (1000’s of kilometers)
  • 100 Mb/s Fast Ethernet           • telephone system
  • 100 Mb/s FDDI                    • 1.544 Mb/s T1 carrier
  • 150 Mb/s OC-3 ATM                • 44.736 Mb/s T3 carrier
  • 622 Mb/s OC-12 ATM               • Global Internet



    class30.ppt              –7–                  CS 213 S’01
The internetworking idea
           (Kahn, 1972)
Build a single network (an interconnected set of
 networks, or internetwork, or internet) out of a
 large collection of separate networks.
  • Each network must stand on its own, with no internal changes
    allowed to connect to the internet.
  • Communications should be on a best-effort basis.
  • “black boxes” (later called routers) should be used to connect
    the networks.
  • No global control at the operations level.




 class30.ppt               –8–                    CS 213 S’01
Internetworking
Challenges:         challenges
  • heterogeneity
     – lots of different kinds of networks (Ethernet, FDDI, ATM,
       wireless, point-to-point)
     – how to unify this hodgepodge?
  • scale
     – how to provide uniques names for potentially billions of
       nodes? (naming)
     – how to find all these nodes? (forwarding and routing)
Note: internet refers to a general idea, Internet
 refers to a particular implementation of that idea
 (The global IP Internet).




  class30.ppt               –9–                     CS 213 S’01
Internetworking with repeaters

    r                  Repeaters (also called
                       hubs)
                       (r in the figure) directly
                       transfer bits from their
    r                  inputs to their outputs



    r




    r




class30.ppt   – 10 –               CS 213 S’01
Internetworking with
                        repeaters
Telnet,
FTP,         application                     application
HTTP,
email
             transport                       transport


              network                         network


              data link                       data link


  10Base-T    physical                        physical

             Host on          Repeater       Host on
             network A     (forwards bits)   network B



    class30.ppt             – 11 –             CS 213 S’01
Internetworking with repeaters:
         Pros and cons
Pros
 • Transparency
    – LANS can be connected without any awareness from the
      hosts.
 • Useful for serving multiple machines in an office from one
   ethernet outlet.
Cons
 • Not scalable
    – ethernet standard allows only 4 repeaters.
    – more than 4 would introduce delays that would break
      contention detection.
 • No heterogeneity
    – Networks connected with repeaters must have identical
      electrical properties.

  class30.ppt             – 12 –                 CS 213 S’01
Internetworking with bridges

    b                  Bridges (b In the figure)
                       maintain a cache of hosts
                       on their input segments.

    b                  Selectively transfer
                       ethernet frames from their
                       inputs to their outputs.

    b




    b




class30.ppt   – 13 –             CS 213 S’01
Internetworking with
                        bridges
Telnet,
FTP,         application                        application
HTTP,
email
             transport                          transport


              network                            network


 CSMA/CD      data link                          data link


  10Base-T    physical                           physical

             Host on             Bridge         Host on
             network A     (forwards ethernet   network B
                                frames)

    class30.ppt               – 14 –              CS 213 S’01
Internetworking with bridges:
Pros      Pros and cons
 • Transparency
    – LANS can be connected without any awareness from the
      hosts
    – popular solution for campus-size networks
Cons
 • Transparency can be misleading
    – looks like a single Ethernet segment, but really isn’t
    – packets can be dropped, latencies vary
 • Homogeneity
    – can only support networks with identical frame headers
      (e.g., Ethernet/FDDI)
    – however, can connect different speed Ethernets
 • Scalability
    – tens of networks only
       » bridges forward all broadcast frames
 class30.ppt
       » increased latency – 15 –                  CS 213 S’01
Internetworking with
                    routersfor short) is an
Def: An internetwork (internet
 arbitrary collection of physical networks
 interconnected by routers to provide some sort
 of host-to-host packet delivery service.

           host                       host

                     internet



           host                       host




  class30.ppt        – 16 –           CS 213 S’01
Building an
                                  internet
We start with two separate, unconnected computer networks (subnets),
which are at different locations, and possibly built by different vendors.




           A           B           C                  X             Y             Z

         adapter    adapter      adapter            adapter      adapter        adapter

                                  Ethernet                                            ATM
               network 1 (SCS)                                network 2 (ECE)




                Question: How to present the illusion of one network?

      class30.ppt                          – 17 –                          CS 213 S’01
Building an internet
                        (cont)
Next we physically connect one of the computers, called a router
       (in this case computer C), to each of the networks.




        A          B             C (router)          X              Y            Z

      adapter    adapter      adapter    adapter   adapter       adapter       adapter


            network 1 (SCS)                                  network 2 (ECE)




   class30.ppt                          – 18 –                             CS 213 S’01
Building an internet
                            (cont)
    Finally, we run a software implementation of the Internet
    Protocol (IP)
    on each host and router. IP provides a global name space for
    the hosts, routing messages between network1 and network 2 if
    necessary.

                                               128.2.250.0
IP addresses:   128.2.250.1   128.2.250.2      128.2.80.0       128.2.80.1    128.2.80.2     128.2.80.3

                     A            B            C (router)           X             Y              Z

                 adapter       adapter      adapter   adapter    adapter       adapter        adapter


                         network 1 (SCS)                                   network 2 (ECE)




      class30.ppt                           – 19 –                              CS 213 S’01
Building an internet
                           (cont)
At this point we have an internet consisting of 6 computers built from
2 original networks. Each computer on our internet can communicate
with any other computer. IP provides the illusion that there is just
one network.




            128.2.250.1                               128.2.80.1


                                internet
            128.2.250.2                               128.2.80.2



                                                      128.2.80.3


                                128.2.250.0
                                 128.2.80.3

      class30.ppt                – 20 –                 CS 213 S’01
Internetworking with
                         routers
Telnet,
FTP,         application                           application
HTTP,
email
             transport                             transport


      IP      network                               network


 CSMA/CD      data link                             data link


  10Base-T    physical                              physical

             Host on              Router           Host on
             network A     (forwards IP packets)   network B



    class30.ppt                – 21 –                CS 213 S’01
IP: Internetworking with
                routers
 IP is the most successful                  Many different kinds
   protocol ever developed                    of applications
                                                    and
 Keys to success:                              higher-level
    • simple enough to implement on top          protocols
      of any physical network
       – e.g., two tin cans and a string.
                                                      IP
    • rich enough to serve as the base
      for implementations of more
      complicated protocols and
      applications.                            Many different
       – The IP designers never dreamed            kinds
         of something like the Web.             of networks
    • “rough consensus and working
      code”
                                            The “Hourglass Model”,
       – resulted in solid implementable       Dave Clark, MIT
         specs.
class30.ppt              – 22 –                 CS 213 S’01
Internet protocol stack
 Berkeley sockets
 interface


               User application program (FTP, Telnet, WWW, email)
                                                                         Reliable
Unreliable      User datagram protocol       Transmission control        byte stream
best effort             (UDP)                   protocol (TCP)           delivery
datagram                                                                 (process-
delivery                      Internet Protocol (IP)                     process)
(process-
process)
                          Network interface (ethernet)
 Unreliable
 best effort
                                    hardware                             Physical
 datagram
                                                                         connectio
 delivery
                                                                         n
 (host-
 host)

       class30.ppt                  – 23 –                     CS 213 S’01
IP service model
IP service model:
  • Delivery model: IP provides best-effort delivery of
    datagram (connectionless) packets between two hosts.
     – IP tries but doesn’t guarantee that packets will arrive
       (best effort)
     – packets can be lost or duplicated (unreliable)
     – ordering of datagrams not guaranteed (connectionless)
  • Naming scheme: IP provides a unique address (name) for
    each host in the Internet.
Why would such a limited delivery model be
 useful?
  • simple, so it runs on any kind of network
  • provides a basis for building more sophisticated and user-
    friendly protocols like TCP and UDP


class30.ppt               – 24 –                 CS 213 S’01
IP datagram delivery:
             Example internet

                                                Network 1 (Ethernet)
      H1      H2        H3
                                                  H7     R3     H8
 Network 2
 (Ethernet)        R1                                    Network 4
                                                    R2
                                                         (Point-to-point)


                             Network 3 (FDDI)



                             H4       H5   H6




class30.ppt                       – 25 –                  CS 213 S’01
IP layering
Protocol layers used to connect host H1 to host H8 in example
internet.


 H1              R1                 R2           R3                     H8


 TCP                                                                TCP


  IP             IP                 IP               IP                 IP


 ETH       ETH        FDDI     FDDI      P2P   P2P        ETH       ETH




  class30.ppt                   – 26 –                    CS 213 S’01
Basic Internet
               components
 An Internet backbone is a collection of
   routers (nationwide or worldwide)
   connected by high-speed point-to-point
   networks.
 A Network Access Point (NAP) is a router
   that connects multiple backbones
   (sometimes referred to as peers).
 Regional networks are smaller backbones
   that cover smaller geographical areas
   (e.g., cities or states)
 A point of presence (POP) is a machine
   that is connected to the Internet.
 Internet Service Providers (ISPs) provide
   dial-up or direct access to POPs.
class30.ppt        – 27 –           CS 213 S’01
The Internet circa
                    1993
In 1993, the Internet consisted of one backbone
  (NSFNET) that connected 13 sites via 45 Mbs T3
  links.
  • Merit (Univ of Mich), NCSA (Illinois), Cornell Theory Center,
    Pittsburgh Supercomputing Center, San Diego
    Supercomputing Center, John von Neumann Center
    (Princeton), BARRNet (Palo Alto), MidNet (Lincoln, NE),
    WestNet (Salt Lake City), NorthwestNet (Seattle), SESQUINET
    (Rice), SURANET (Georgia Tech).
Connecting to the Internet involved connecting one
 of your routers to a router at a backbone site, or
 to a regional network that was already connected
 to the backbone.



class30.ppt                 – 28 –                     CS 213 S’01
The Internet backbone

              (circa 1993)




class30.ppt       – 29 –     CS 213 S’01
Current NAP-based
            Internet architecture
In the early 90’s commercial outfits were building
  their own high-speed backbones, connecting to
  NSFNET, and selling access to their POPs to
  companies, ISPs, and individuals.
In 1995, NSF decommissioned NSFNET, and
  fostered creation of a collection of NAPs to
  connect the commercial backbones.
Currently in the US there are about 50
  commercial backbones connected by ~12 NAPs
  (peering points).
Similar architecture worldwide connects national
  networks to the Internet.

  class30.ppt         – 30 –            CS 213 S’01
Internet connection
                        hierarchy
                        NAP          NAP            NAP

                                                                               colocation
                                                                                  sites
                Backbone      Backbone        Backbone        Backbone



            POP            POP      POP       POP          POP         POP    POP
                                                         T3

         Regional net               ISP                   Big Business



 POP      POP               POP      POP      POP             POP       POP
                                                              dialup          dialup
    T1                         T1

ISP (for individuals)   Small Business              Pgh employee          DC employee
     class30.ppt                     – 31 –                            CS 213 S’01
Network access points
                 (NAPs)




                          Note: Peers in this context are
                           commercial backbones..droh

                                      Source: Boardwatch.com
class30.ppt      – 32 –                       CS 213 S’01
MCI/WorldCom/UUNET Global
             Backbone




                       Source: Boardwatch.com
class30.ppt   – 33 –           CS 213 S’01

Más contenido relacionado

La actualidad más candente

QoS of multiplayer games over 802.11
QoS of multiplayer games over 802.11QoS of multiplayer games over 802.11
QoS of multiplayer games over 802.11muraliashwin
 
GENI - Seminário - Inatel
GENI - Seminário - InatelGENI - Seminário - Inatel
GENI - Seminário - InatelLúcio Henrique
 
Ubiquitous Resources Abstraction using a File System Interface on Sensor Nodes
Ubiquitous Resources Abstraction using a File System Interface on Sensor NodesUbiquitous Resources Abstraction using a File System Interface on Sensor Nodes
Ubiquitous Resources Abstraction using a File System Interface on Sensor NodesTill Riedel
 
Sound Devices 744T
Sound Devices 744TSound Devices 744T
Sound Devices 744TAV ProfShop
 
Sound Devices 744T
Sound Devices 744TSound Devices 744T
Sound Devices 744TAV ProfShop
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationrubtumproject.com
 
PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewIOSRJVSP
 
High Performance Computing Infrastructure: Past, Present, and Future
High Performance Computing Infrastructure: Past, Present, and FutureHigh Performance Computing Infrastructure: Past, Present, and Future
High Performance Computing Infrastructure: Past, Present, and Futurekarl.barnes
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureJim St. Leger
 
Raisul Islam 063441556
Raisul Islam 063441556Raisul Islam 063441556
Raisul Islam 063441556mashiur
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 

La actualidad más candente (16)

Poster Qos
Poster QosPoster Qos
Poster Qos
 
QoS of multiplayer games over 802.11
QoS of multiplayer games over 802.11QoS of multiplayer games over 802.11
QoS of multiplayer games over 802.11
 
GENI - Seminário - Inatel
GENI - Seminário - InatelGENI - Seminário - Inatel
GENI - Seminário - Inatel
 
digital_set_top_box
digital_set_top_boxdigital_set_top_box
digital_set_top_box
 
Ubiquitous Resources Abstraction using a File System Interface on Sensor Nodes
Ubiquitous Resources Abstraction using a File System Interface on Sensor NodesUbiquitous Resources Abstraction using a File System Interface on Sensor Nodes
Ubiquitous Resources Abstraction using a File System Interface on Sensor Nodes
 
Cuda 2011
Cuda 2011Cuda 2011
Cuda 2011
 
The fundamentals of sonet
The fundamentals of sonetThe fundamentals of sonet
The fundamentals of sonet
 
Sound Devices 744T
Sound Devices 744TSound Devices 744T
Sound Devices 744T
 
Sound Devices 744T
Sound Devices 744TSound Devices 744T
Sound Devices 744T
 
บทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplicationบทที่ 2 Mobile Aplication
บทที่ 2 Mobile Aplication
 
PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-Review
 
High Performance Computing Infrastructure: Past, Present, and Future
High Performance Computing Infrastructure: Past, Present, and FutureHigh Performance Computing Infrastructure: Past, Present, and Future
High Performance Computing Infrastructure: Past, Present, and Future
 
Chp4
Chp4Chp4
Chp4
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
 
Raisul Islam 063441556
Raisul Islam 063441556Raisul Islam 063441556
Raisul Islam 063441556
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 

Destacado

InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IPhunghanamhus
 
Topology ppt
Topology pptTopology ppt
Topology pptboocse11
 
How Traffic Moves Over The Internet
How Traffic Moves Over The InternetHow Traffic Moves Over The Internet
How Traffic Moves Over The Internets1160119
 
Internet Services Update Presentation
Internet Services Update PresentationInternet Services Update Presentation
Internet Services Update Presentationwebhostingguy
 
Online payment system
Online payment systemOnline payment system
Online payment systemmyangel27
 
New Media vs. Old Media
New Media vs. Old MediaNew Media vs. Old Media
New Media vs. Old MediaHeather Cherry
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Providerhazirma
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
Old Media vs. New Media
Old Media vs. New MediaOld Media vs. New Media
Old Media vs. New MediaBart De Waele
 
New Media Vs Traditional Media
New Media Vs Traditional MediaNew Media Vs Traditional Media
New Media Vs Traditional MediaLillykemmy
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentationJobaida Nahar
 

Destacado (20)

InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
How Traffic Moves Over The Internet
How Traffic Moves Over The InternetHow Traffic Moves Over The Internet
How Traffic Moves Over The Internet
 
Internet Services Update Presentation
Internet Services Update PresentationInternet Services Update Presentation
Internet Services Update Presentation
 
Online payment system
Online payment systemOnline payment system
Online payment system
 
Topology ppt
Topology pptTopology ppt
Topology ppt
 
New Media vs. Old Media
New Media vs. Old MediaNew Media vs. Old Media
New Media vs. Old Media
 
2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider2.2.1.3 Internet Service Provider
2.2.1.3 Internet Service Provider
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
3.3 Internet Services
3.3 Internet Services3.3 Internet Services
3.3 Internet Services
 
Old Media vs. New Media
Old Media vs. New MediaOld Media vs. New Media
Old Media vs. New Media
 
New Media Vs Traditional Media
New Media Vs Traditional MediaNew Media Vs Traditional Media
New Media Vs Traditional Media
 
Old Media vs. New Media
Old Media vs. New MediaOld Media vs. New Media
Old Media vs. New Media
 
Isp
IspIsp
Isp
 
Topology presentation
Topology  presentationTopology  presentation
Topology presentation
 
Internet
InternetInternet
Internet
 
e-Marketing strategy
e-Marketing strategye-Marketing strategy
e-Marketing strategy
 
M Commerce Ivsem
M Commerce IvsemM Commerce Ivsem
M Commerce Ivsem
 
Services provided by the internet
Services provided by the internetServices provided by the internet
Services provided by the internet
 

Similar a internet services

network connet
network connetnetwork connet
network connetreyvanth
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Geek speak it terminology
Geek speak it terminologyGeek speak it terminology
Geek speak it terminologyHugo Filho
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
ระบบเครือข่ายคอมพิวเตอร์
ระบบเครือข่ายคอมพิวเตอร์ระบบเครือข่ายคอมพิวเตอร์
ระบบเครือข่ายคอมพิวเตอร์Noii Kittiya
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network. PushpendraSingh483
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.pptjayvagasiya136
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012Samuel Dratwa
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 

Similar a internet services (20)

class30.ppt
class30.pptclass30.ppt
class30.ppt
 
class28.ppt
class28.pptclass28.ppt
class28.ppt
 
Internet service
Internet serviceInternet service
Internet service
 
network connet
network connetnetwork connet
network connet
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Geek speak it terminology
Geek speak it terminologyGeek speak it terminology
Geek speak it terminology
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
ระบบเครือข่ายคอมพิวเตอร์
ระบบเครือข่ายคอมพิวเตอร์ระบบเครือข่ายคอมพิวเตอร์
ระบบเครือข่ายคอมพิวเตอร์
 
Introduction to socket programming nbv
Introduction to socket programming nbvIntroduction to socket programming nbv
Introduction to socket programming nbv
 
Embedded
EmbeddedEmbedded
Embedded
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Ip
IpIp
Ip
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt210202021018701 suratNetworkSecurity.ppt
210202021018701 suratNetworkSecurity.ppt
 
computerNetworkSecurity.ppt
computerNetworkSecurity.pptcomputerNetworkSecurity.ppt
computerNetworkSecurity.ppt
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
Networking
NetworkingNetworking
Networking
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

internet services

  • 1. 15-213 “ The course that gives CMU its Zip!” Internetworkin g May 1, 2001 Topics • Protocol layering and encapsulation • Internetworking with hubs, bridges, and routers • The Internet Protocol (IP) • The global Internet class30.ppt
  • 2. Typical computer system Keyboard Mouse Modem Printer Interrupt Keyboard Serial port Parallel port Processor controller controller controller controller Local/IO Bus IDE disk SCSI Video Network Memory adapter controller controller adapter SCSI bus disk Display Network disk cdrom class30.ppt –2– CS 213 S’01
  • 3. Generic network host host OS code protocol software software software stack hardware hardware hardware network adapter/ link link link interface card Interconnect (wires, repeaters, bridges, and routers) class30.ppt –3– CS 213 S’01
  • 4. Protocols A protocol defines the format of packets and the rules for communicating them across the network. Different protocols provide different levels of service: • simple error correction (ethernet) • uniform name space, unreliable best-effort datagrams (host- host) (IP) • reliable byte streams (TCP) • unreliable best-effort datagrams (process-process) (UDP) • multimedia data retrieval (HTTP) Crucial idea: protocols leverage off of the capabilities of other protocols. class30.ppt –4– CS 213 S’01
  • 5. Protocol layering interface between user code and OS Protocols provide specialized code services by relying on services (Sockets interface) provided by lower-level protocols (i.e., they leverage lower-level services). User application program (FTP, Telnet, WWW, email) Reliable Unreliable User datagram protocol Transmission control byte stream best effort (UDP) protocol (TCP) delivery datagram (process- delivery Internet Protocol (IP) process) (process- process) Network interface (ethernet) Unreliable best effort hardware Physical datagram connectio delivery n (host- host) class30.ppt –5– CS 213 S’01
  • 6. Encapsulation Application program User code data User Interface (API) OS code TCP segment TCP header data IP datagramTCP segment IP header header data OS/adapter interface (exception mechanism) Ethernet frame IP datagramTCP segment header header header data Adapter Adapter/Network interface Network class30.ppt –6– CS 213 S’01
  • 7. Basic network types System area network Metropolitan area (SAN) network (MAN) • same room (meters) • same city (10’s of • 300 MB/s Cray T3E kilometers) • 800 Mb/s Gigabit Nectar Local area network (LAN) Wide area network • same bldg or campus (WAN) (kilometers) • nationwide or worldwide • 10 Mb/sEthernet (1000’s of kilometers) • 100 Mb/s Fast Ethernet • telephone system • 100 Mb/s FDDI • 1.544 Mb/s T1 carrier • 150 Mb/s OC-3 ATM • 44.736 Mb/s T3 carrier • 622 Mb/s OC-12 ATM • Global Internet class30.ppt –7– CS 213 S’01
  • 8. The internetworking idea (Kahn, 1972) Build a single network (an interconnected set of networks, or internetwork, or internet) out of a large collection of separate networks. • Each network must stand on its own, with no internal changes allowed to connect to the internet. • Communications should be on a best-effort basis. • “black boxes” (later called routers) should be used to connect the networks. • No global control at the operations level. class30.ppt –8– CS 213 S’01
  • 9. Internetworking Challenges: challenges • heterogeneity – lots of different kinds of networks (Ethernet, FDDI, ATM, wireless, point-to-point) – how to unify this hodgepodge? • scale – how to provide uniques names for potentially billions of nodes? (naming) – how to find all these nodes? (forwarding and routing) Note: internet refers to a general idea, Internet refers to a particular implementation of that idea (The global IP Internet). class30.ppt –9– CS 213 S’01
  • 10. Internetworking with repeaters r Repeaters (also called hubs) (r in the figure) directly transfer bits from their r inputs to their outputs r r class30.ppt – 10 – CS 213 S’01
  • 11. Internetworking with repeaters Telnet, FTP, application application HTTP, email transport transport network network data link data link 10Base-T physical physical Host on Repeater Host on network A (forwards bits) network B class30.ppt – 11 – CS 213 S’01
  • 12. Internetworking with repeaters: Pros and cons Pros • Transparency – LANS can be connected without any awareness from the hosts. • Useful for serving multiple machines in an office from one ethernet outlet. Cons • Not scalable – ethernet standard allows only 4 repeaters. – more than 4 would introduce delays that would break contention detection. • No heterogeneity – Networks connected with repeaters must have identical electrical properties. class30.ppt – 12 – CS 213 S’01
  • 13. Internetworking with bridges b Bridges (b In the figure) maintain a cache of hosts on their input segments. b Selectively transfer ethernet frames from their inputs to their outputs. b b class30.ppt – 13 – CS 213 S’01
  • 14. Internetworking with bridges Telnet, FTP, application application HTTP, email transport transport network network CSMA/CD data link data link 10Base-T physical physical Host on Bridge Host on network A (forwards ethernet network B frames) class30.ppt – 14 – CS 213 S’01
  • 15. Internetworking with bridges: Pros Pros and cons • Transparency – LANS can be connected without any awareness from the hosts – popular solution for campus-size networks Cons • Transparency can be misleading – looks like a single Ethernet segment, but really isn’t – packets can be dropped, latencies vary • Homogeneity – can only support networks with identical frame headers (e.g., Ethernet/FDDI) – however, can connect different speed Ethernets • Scalability – tens of networks only » bridges forward all broadcast frames class30.ppt » increased latency – 15 – CS 213 S’01
  • 16. Internetworking with routersfor short) is an Def: An internetwork (internet arbitrary collection of physical networks interconnected by routers to provide some sort of host-to-host packet delivery service. host host internet host host class30.ppt – 16 – CS 213 S’01
  • 17. Building an internet We start with two separate, unconnected computer networks (subnets), which are at different locations, and possibly built by different vendors. A B C X Y Z adapter adapter adapter adapter adapter adapter Ethernet ATM network 1 (SCS) network 2 (ECE) Question: How to present the illusion of one network? class30.ppt – 17 – CS 213 S’01
  • 18. Building an internet (cont) Next we physically connect one of the computers, called a router (in this case computer C), to each of the networks. A B C (router) X Y Z adapter adapter adapter adapter adapter adapter adapter network 1 (SCS) network 2 (ECE) class30.ppt – 18 – CS 213 S’01
  • 19. Building an internet (cont) Finally, we run a software implementation of the Internet Protocol (IP) on each host and router. IP provides a global name space for the hosts, routing messages between network1 and network 2 if necessary. 128.2.250.0 IP addresses: 128.2.250.1 128.2.250.2 128.2.80.0 128.2.80.1 128.2.80.2 128.2.80.3 A B C (router) X Y Z adapter adapter adapter adapter adapter adapter adapter network 1 (SCS) network 2 (ECE) class30.ppt – 19 – CS 213 S’01
  • 20. Building an internet (cont) At this point we have an internet consisting of 6 computers built from 2 original networks. Each computer on our internet can communicate with any other computer. IP provides the illusion that there is just one network. 128.2.250.1 128.2.80.1 internet 128.2.250.2 128.2.80.2 128.2.80.3 128.2.250.0 128.2.80.3 class30.ppt – 20 – CS 213 S’01
  • 21. Internetworking with routers Telnet, FTP, application application HTTP, email transport transport IP network network CSMA/CD data link data link 10Base-T physical physical Host on Router Host on network A (forwards IP packets) network B class30.ppt – 21 – CS 213 S’01
  • 22. IP: Internetworking with routers IP is the most successful Many different kinds protocol ever developed of applications and Keys to success: higher-level • simple enough to implement on top protocols of any physical network – e.g., two tin cans and a string. IP • rich enough to serve as the base for implementations of more complicated protocols and applications. Many different – The IP designers never dreamed kinds of something like the Web. of networks • “rough consensus and working code” The “Hourglass Model”, – resulted in solid implementable Dave Clark, MIT specs. class30.ppt – 22 – CS 213 S’01
  • 23. Internet protocol stack Berkeley sockets interface User application program (FTP, Telnet, WWW, email) Reliable Unreliable User datagram protocol Transmission control byte stream best effort (UDP) protocol (TCP) delivery datagram (process- delivery Internet Protocol (IP) process) (process- process) Network interface (ethernet) Unreliable best effort hardware Physical datagram connectio delivery n (host- host) class30.ppt – 23 – CS 213 S’01
  • 24. IP service model IP service model: • Delivery model: IP provides best-effort delivery of datagram (connectionless) packets between two hosts. – IP tries but doesn’t guarantee that packets will arrive (best effort) – packets can be lost or duplicated (unreliable) – ordering of datagrams not guaranteed (connectionless) • Naming scheme: IP provides a unique address (name) for each host in the Internet. Why would such a limited delivery model be useful? • simple, so it runs on any kind of network • provides a basis for building more sophisticated and user- friendly protocols like TCP and UDP class30.ppt – 24 – CS 213 S’01
  • 25. IP datagram delivery: Example internet Network 1 (Ethernet) H1 H2 H3 H7 R3 H8 Network 2 (Ethernet) R1 Network 4 R2 (Point-to-point) Network 3 (FDDI) H4 H5 H6 class30.ppt – 25 – CS 213 S’01
  • 26. IP layering Protocol layers used to connect host H1 to host H8 in example internet. H1 R1 R2 R3 H8 TCP TCP IP IP IP IP IP ETH ETH FDDI FDDI P2P P2P ETH ETH class30.ppt – 26 – CS 213 S’01
  • 27. Basic Internet components An Internet backbone is a collection of routers (nationwide or worldwide) connected by high-speed point-to-point networks. A Network Access Point (NAP) is a router that connects multiple backbones (sometimes referred to as peers). Regional networks are smaller backbones that cover smaller geographical areas (e.g., cities or states) A point of presence (POP) is a machine that is connected to the Internet. Internet Service Providers (ISPs) provide dial-up or direct access to POPs. class30.ppt – 27 – CS 213 S’01
  • 28. The Internet circa 1993 In 1993, the Internet consisted of one backbone (NSFNET) that connected 13 sites via 45 Mbs T3 links. • Merit (Univ of Mich), NCSA (Illinois), Cornell Theory Center, Pittsburgh Supercomputing Center, San Diego Supercomputing Center, John von Neumann Center (Princeton), BARRNet (Palo Alto), MidNet (Lincoln, NE), WestNet (Salt Lake City), NorthwestNet (Seattle), SESQUINET (Rice), SURANET (Georgia Tech). Connecting to the Internet involved connecting one of your routers to a router at a backbone site, or to a regional network that was already connected to the backbone. class30.ppt – 28 – CS 213 S’01
  • 29. The Internet backbone (circa 1993) class30.ppt – 29 – CS 213 S’01
  • 30. Current NAP-based Internet architecture In the early 90’s commercial outfits were building their own high-speed backbones, connecting to NSFNET, and selling access to their POPs to companies, ISPs, and individuals. In 1995, NSF decommissioned NSFNET, and fostered creation of a collection of NAPs to connect the commercial backbones. Currently in the US there are about 50 commercial backbones connected by ~12 NAPs (peering points). Similar architecture worldwide connects national networks to the Internet. class30.ppt – 30 – CS 213 S’01
  • 31. Internet connection hierarchy NAP NAP NAP colocation sites Backbone Backbone Backbone Backbone POP POP POP POP POP POP POP T3 Regional net ISP Big Business POP POP POP POP POP POP POP dialup dialup T1 T1 ISP (for individuals) Small Business Pgh employee DC employee class30.ppt – 31 – CS 213 S’01
  • 32. Network access points (NAPs) Note: Peers in this context are commercial backbones..droh Source: Boardwatch.com class30.ppt – 32 – CS 213 S’01
  • 33. MCI/WorldCom/UUNET Global Backbone Source: Boardwatch.com class30.ppt – 33 – CS 213 S’01