版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、IntroductionChapter 1CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Uses of Computer NetworksNetwork HardwareNetwork SoftwareReference ModelsExample NetworksNetwork StandardizationMetric UnitsRevised: August 2011Uses of Computer NetworksComputer networks are col
2、lections of autonomous computers, e.g., the InternetThey have many uses:Business Applications Home Applications Mobile Users These uses raise:Social Issues This text covers networks for all of these usesCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011requestrespo
3、nseBusiness ApplicationsCompanies use networks and computers for resource sharing with the client-server model:Other popular uses are communication, e.g., email, VoIP, and e-commerce CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Home ApplicationsHomes contain m
4、any networked devices, e.g., computers, TVs, connected to the Internet by cable, DSL, wireless, etc.Home users communicate, e.g., social networks, consume content, e.g., video, and transact, e.g., auctionsSome application use the peer-to-peer model in which there are no fixed clients and servers:CN5
5、E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Mobile UsersTablets, laptops, and smart phones are popular devices; WiFi hotspots and 3G cellular provide wireless connectivity.Mobile users communicate, e.g., voice and texts, consume content, e.g., video and Web, and
6、 use sensors, e.g., GPS. Wireless and mobile are related but different:CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Social IssuesCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Network neutrality no network restrictionsCont
7、ent ownership, e.g., DMCA takedownsAnonymity and censorship Privacy, e.g., Web tracking and profilingTheft, e.g., botnets and phishingNetwork HardwareCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Networks can be classified by their scale:ScaleTypeVicinityPAN (P
8、ersonal Area Network) Building LAN (Local Area Network) CityMAN (Metropolitan Area Network) CountryWAN (Wide Area Network) PlanetThe Internet (network of all networks)Personal Area NetworkCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Connect devices over the ra
9、nge of a personExample of a Bluetooth (wireless) PAN:Local Area NetworksConnect devices in a home or office buildingCalled enterprise network in a companyCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Wireless LAN with 802.11Wired LAN withswitched EthernetMetrop
10、olitan Area NetworksCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Connect devices over a metropolitan areaExample MAN based on cable TV:Connect devices over a countryExample WAN connecting three branch offices:Wide Area Networks (1)CN5E by Tanenbaum & Wetherall
11、, Pearson Education-Prentice Hall and D. Wetherall, 2011Wide Area Networks (2)An ISP (Internet Service Provider) network is also a WAN.Customers buy connectivity from the ISP to use it.CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Wide Area Networks (3)A VPN (V
12、irtual Private Network) is a WAN built from virtual links that run on top of the Internet.CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Network SoftwareCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Protocol layers Design i
13、ssues for the layers Connection-oriented vs. connectionless service Service primitives Relationship of services to protocols Protocol Layers (1)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Protocol layering is the main structuring method used to divide up netw
14、ork functionality. Each protocol instance talks virtually to its peer Each layer communicates only by using the one below Lower layer services are accessed by an interface At bottom, messages are carried by the mediumProtocol Layers (2)Example: the philosopher-translator-secretary architectureEach p
15、rotocol at different layers serves a different purposeCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Protocol Layers (3)Each lower layer adds its own header (with control inform-ation) to the message to transmit and removes it on receiveLayers may also split and
16、 join messages, etc.CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Design Issues for the LayersCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Each layer solves a particular problem but must include mechanisms to address a se
17、t of recurring design issuesIssueExample mechanisms at different layersReliability despite failuresCodes for error detection/correction (3.2, 3.3)Routing around failures (5.2)Network growth and evolutionAddressing (5.6) and naming (7.1)Protocol layering (1.3)Allocation of resources like bandwidth Mu
18、ltiple access (4.2)Congestion control (5.3, 6.3)Security against various threatsConfidentiality of messages (8.2, 8.6)Authentication of communicating parties (8.7)Connection-Oriented vs. ConnectionlessService provided by a layer may be kinds of either:Connection-oriented, must be set up for ongoing
19、use (and torn down after use), e.g., phone callConnectionless, messages are handled separately, e.g., postal deliveryCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Service Primitives (1)A service is provided to the layer above as primitivesHypothetical example o
20、f service primitives that may provide a reliable byte stream (connection-oriented) service:CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Service Primitives (2)Hypothetical example of how these primitives may be used for a client-server interactionCN5E by Tanenb
21、aum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011ClientServerLISTEN (0)ACCEPT RECEIVESEND (4)DISCONNECT (6)CONNECT (1)SENDRECEIVEDISCONNECT (5)Connect requestAccept responseRequest for dataReplyDisconnectDisconnect(2)(3)Relationship of Services to ProtocolsCN5E by Tanenbaum & W
22、etherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Recap:A layer provides a service to the one aboveverticalA layer talks to its peer using a protocol horizontalReference ModelsCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Reference models describe
23、 the layers in a network architectureOSI reference model TCP/IP reference model Model used for this text Critique of OSI and TCP/IP OSI Reference ModelA principled, international standard, seven layer model to connect different systemsCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall an
24、d D. Wetherall, 2011 Provides functions needed by users Converts different representations Manages task dialogs Provides end-to-end delivery Sends packets over multiple links Sends frames of information Sends bits as signalsTCP/IP Reference ModelA four layer model derived from experimentation; omits
25、 some OSI layers and uses the IP as the network layer.CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011IP is the “narrow waist” of the InternetProtocols are shown in their respective layersModel Used in this BookCN5E by Tanenbaum & Wetherall, Pearson Education-Pre
26、ntice Hall and D. Wetherall, 2011It is based on the TCP/IP model but we call out the physical layer and look beyond Internet protocols.Critique of OSI & TCP/IPCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011OSI:Very influential model with clear conceptsModels, pr
27、otocols and adoption all bogged down by politics and complexityTCP/IP:Very successful protocols that worked well and thrivedWeak model derived after the fact from protocolsExample NetworksCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011The Internet 3G mobile phon
28、e networks Wireless LANs RFID and sensor networks Internet (1)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Before the Internet was the ARPANET, a decentralized, packet-switched network based on Barans ideas.ARPANET topology in Sept 1972.Nodes are IMPs, or earl
29、y routers, linked to hosts56 kbps linksInternet (2)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011The early Internet used NSFNET (1985-1995) as its backbone; universities connected to get on the InternetNSFNET topology in 1988T1 links (1.5 Mbps)Internet (3)CN5E
30、by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011The modern Internet is more complex:ISP networks serve as the Internet backboneISPs connect or peer to exchange traffic at IXPsWithin each network routers switch packetsBetween networks, traffic exchange is set by busine
31、ss agreementsCustomers connect at the edge by many meansCable, DSL, Fiber-to-the-Home, 3G/4G wireless, dialupData centers concentrate many servers (“the cloud”)Most traffic is content from data centers (esp. video)The architecture continues to evolveInternet (4)CN5E by Tanenbaum & Wetherall, Pearson
32、 Education-Prentice Hall and D. Wetherall, 2011Architecture of the Internet3G Mobile Phone Networks (1)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 20113G network is based on spatial cells; each cell provides wireless service to mobiles within it via a base statio
33、n3G Mobile Phone Networks (2)Base stations connect to the core network to find other mobiles and send data to the phone network and InternetCN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 20113G Mobile Phone Networks (3)CN5E by Tanenbaum & Wetherall, Pearson Educatio
34、n-Prentice Hall and D. Wetherall, 2011As mobiles move, base stations hand them off from one cell to the next, and the network tracks their locationHandoverWireless LANs (1)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011In 802.11, clients communicate via an AP (A
35、ccess Point) that is wired to the rest of the network.Wireless LANs (2)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Signals in the 2.4GHz ISM band vary in strength due to many effects, such as multipath fading due to reflections requires complex transmission s
36、chemes, e.g., OFDMWireless LANs (3)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 2011Radio broadcasts interfere with each other, and radio ranges may incompletely overlapCSMA (Carrier Sense Multiple Access) designs are usedRFID and Sensor Networks (1)CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026年湖南省永州市城管协管招聘笔试备考题库及答案解析
- 2026年焦作市中站区社区工作者招聘笔试参考题库及答案解析
- 2026年武汉市江汉区社区工作者招聘笔试备考试题及答案解析
- 2026年娄底市娄星区社区工作者招聘笔试参考试题及答案解析
- 2026年河池市金城江区社区工作者招聘笔试参考题库及答案解析
- 2026年莆田市秀屿区社区工作者招聘笔试参考题库及答案解析
- 课题二 化学实验的绿色追求教学设计高中化学人教版选修6实验化学-人教版2004
- 沪教版 (五四制)四年级下册小数加减法的应用教案设计
- 辽宁沈阳中考历史试卷
- 化学八年级全册课题3 水的组成教学设计及反思
- 管道施工工艺流程与质量控制
- 办公楼室内装修改造工程施工组织设计方案
- “双碳”目标下低碳建筑全生命周期碳排放核算
- 水利工程施工监理规范SL288-2014(CB、JL用表全套)
- 《网上观看大熊猫》名师课件
- GA/T 2133.2-2024便携式微型计算机移动警务终端第2部分:安全监控组件技术规范
- (正式版)HGT 3655-2024 紫外光(UV)固化木器涂料
- 湘教版高中数学必修二知识点清单
- 2024年山东出版集团有限公司招聘笔试参考题库含答案解析
- 2023年初级会计职称《初级会计实务》真题
- (中职)电子技术基础与技能教ppt教学课件汇总完整版电子教案
评论
0/150
提交评论