Upload
sarvjeet-singh-sohal
View
220
Download
0
Embed Size (px)
Citation preview
7/29/2019 Inter networking and Internet Protocols
1/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)1
OUTLINE
oOSI and TCP/IP Model.oFDDI (Fiber Distributed Data Interface).o Internetwork and Its Architectural Modal.oFunction of TCP protocol.oToken Ring Protocol.oEthernet.oMetropolitan Area Network (MAN) & Wide Area
Network (WAN)
7/29/2019 Inter networking and Internet Protocols
2/16
7/29/2019 Inter networking and Internet Protocols
3/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)3
congestion of data packets.
Data link layer: The data link layer packages raw bits from the physical layer into frames
(logical, structured packets for data). This layer is responsible for transferring frames from
one computer to another, without errors. After sending a frame, it waits for an
acknowledgment from the receiving computer.
Physical layer: The physical layer transmits bits from one computer to another and regulates
the transmission of a stream of bits over a physical medium. The layer defines how the cable
is attached to the network adapter and what transmission technique is used to send data over
the cable
The Internet Protocol Suite also known as TCP/IP is the set of communications protocols
used for the Internet and other similar networks. It is named from two of the most important
protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which
were the first two networking protocols defined in this standard. IP networking represents asynthesis of several developments that began to evolve in the 1960s and 1970s, namely the
Internet and LANs (Local Area Networks), which emerged in the mid- to late-1980s, together
with the advent of the World Wide Web in early 1990s.
The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each
layer solves a set of problems involving the transmission of data, and provides a well-defined
service to the upper layer protocols based on using services from some lower layers. Upper
layers are logically closer to the user and deal with more abstract data, relying on lower layer
protocols to translate data into forms that can eventually be physically transmitted.
The main differences between the two models are as follows:
1. OSI is a reference model and TCP/IP is an implementation of OSI model.2. TCP/IP Protocols are considered to be standards around which the internet has
developed. The OSI model however is a "generic, protocol independent standard."
3. TCP/IP combines the presentation and session layer issues into its application layer.4. TCP/IP combines the OSI data link and physical layers into the network access layer.5. TCP/IP appears to be a simpler model and this is mainly due to the fact that it has
fewer layers.
6. TCP/IP is considered to be a more credible model- This is mainly due to the factbecause TCP/IP protocols are the standards around which the internet was developed
therefore it mainly gains creditability due to this reason. Whereas in contrast networks
are not usually built around the OSI model as it is merely used as a guidance tool.
7. The OSI model consists of 7 architectural layers whereas the TCP/IP only has 4layers.
8. In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designedinto strict layers as the OSI model.[6] RFC 3439 contains a section entitled "Layering
considered harmful." However, TCP/IP does recognize four broad layers of
functionality which are derived from the operating scope of their contained protocols,
7/29/2019 Inter networking and Internet Protocols
4/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)4
namely the scope of the software application, the end-to-end transport connection, the
internetworking range, and lastly the scope of the direct links to other nodes on the
local network.
9. The presumably strict consumer/producer layering of OSI as it is usually describeddoes not present contradictions in TCP/IP, as it is permissible that protocol usage doesnot follow the hierarchy implied in a layered model. Such examples exist in some
routing protocols (e.g., OSPF), or in the description of tunnelling protocols, which
provide a Link Layer for an application, although the tunnel host protocol may well
be a Transport or even an Application Layer protocol in its own right.
10.The TCP/IP design generally favours decisions based on simplicity, efficiency andease of implementation.
FDDI (Fiber Distributed Data Interface).
FDDI is another popular local area networking technology that provides a data rate of 100
Mbps (i.e., the same data rate as Fast Ethernet). Unlike Ethernet and other LAN technologies
that use copper cables to carry electrical signals, FDDI is designed to use optical fiber. Data
is encoded in pulses of light.
FDDI defines use of two types of fiber:single mode (sometimes called mono mode) and
multimode. Modes can be thought of as bundles of light rays entering the fiber at a particular
angle. Single-mode fiber allows only one mode of light to propagate through the fiber, while
multimode fiber allows multiple modes of light to propagate through the fiber. Because
multiple modes of light propagating through the fiber may travel different distances(depending on the entry angles), causing them to arrive at the destination at different times (a
phenomenon called modal dispersion), single-mode fiber is capable of higher bandwidth and
greater cable run distances than multimode fiber. Due to these characteristics, single-mode
fiber is often used for interbuilding connectivity, while multimode fiber is often used for
intrabuilding connectivity. Multimode fiber uses light-emitting diodes (LEDs) as the light-
generating devices, while single-mode fiber generally uses lasers.
Dual-counter-rotating token ring architecture one ring is primary and the other secondary. Up
7/29/2019 Inter networking and Internet Protocols
5/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)5
to 500 stations with a maximum distance of 2 km between any pair of stations for multimode
fiber with single-mode fiber the distance can be up to 40 km Maximum ring length is 100 km
(total fiber length is 200 km for two rings) and uses 4b/5b encoding.
Architectural model of FDDI:
Media Access Control(MAC): Defines how the medium is accessed, including frame format,
token handling, addressing, algorithm for calculating a cyclic redundancy check value, anderror recovery mechanisms.
Physical Layer Protocol(PHY): Defines data encoding/decoding procedures, clocking
requirements, framing, and other functions.
Physical Layer Medium (PMD): Defines the characteristics of the transmission medium,
including the fiber-optic link, power levels, bit error rates, optical components, and
connectors.
Station Management(SMT): Defines the FDDI station configuration, ring configuration,and ring control features, including station insertion and removal, initialization, fault isolation
and recovery, scheduling, and collection of statistics.
FDDI Frame Format:
The fields of an FDDI frame are as follows:
Preamble: Prepares each station for the upcoming frame.
Start delimiter: Indicates the beginning of the frame. It consists of signalling patterns that
differentiate it from the rest of the frame.
7/29/2019 Inter networking and Internet Protocols
6/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)6
Frame control: Indicates the size of the address fields, whether the frame contains
asynchronous or synchronous data, and other control information.
Destination address: Contains a unicast (singular), multicast (group), or broadcast (every
station) address. As with Ethernet and Token Ring, FDDI destination addresses are 6 bytes.
Source address: Identifies the single station that sent the frame. As with Ethernet and Token
Ring, FDDI source addresses are 6bytes.
Data: Contains either information destined for an upper-layer protocol or control
information.
Frame check sequence (FCS): Filled by the source station with a calculated cyclic
redundancy check(CRC) value dependent on the frame contents (as with Token Ring and
Ethernet). The destination station recalculates the value to determine whether the frame may
have been damaged in transit. If so, the frame is discarded.
End delimiter: Contains non data symbols that indicate the end of the frame.
Frame status: Allows the source station to determine if an error occurred and if the frame
was recognized and copied by a receiving station.
Advantages of FDDI over token ring:
High bandwidth (10 times more than token ring) Larger distances between FDDI nodes because of very low attenuation ( 0.3 db/km)
in fibers
Improved signal-to-noise ratio because of no interference from external radiofrequencies and electromagnetic noise
Token ring protocol cannot work if a link or a station fails. So, it is vulnerable to linkand station failure but FDDI does works even.
Very difficult to tap signals form a fiber cable
7/29/2019 Inter networking and Internet Protocols
7/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)7
Internetwork and Its Architectural Modal
An internetwork is a collection of individual networks, connected by intermediate networking
devices, that functions as a single large network. Internetworking refers to the industry,
products, and procedures that meet the challenge of creating and administering internetworks.
Figure below illustrates some different kinds of network technologies that can be
interconnected by routers and other networking devices to create an internetwork.
The words internetwork and internet are simply a contraction of the phrase interconnected
network. However, when written with a capital I, the Internet refers to the worldwide set of
interconnected networks. Therefore, the Internet is an internet, but the reverse does not apply.
The Internet is sometimes called the connected Internet.
Architectural Modal of Internetwork:
The Internetwork consists of the following groups of networks:
1. Backbones: Large networks that exist primarily to interconnect other networks. Alsoknown as network access points (NAPs) or Internet Exchange Points (IXPs).
Currently, the backbones consist of commercial entities.
2. Regional networks connecting, for example, universities and colleges.3. Commercial networks providing access to the backbones to subscribers, and networks
owned by commercial organizations for internal use that also have connections to the
Internet.
4. Local networks, such as campus-wide university networks.Another important aspect of internetworking is the creation of a standardized abstraction
7/29/2019 Inter networking and Internet Protocols
8/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)8
of the communication mechanisms provided by each type of network. Each physical
network has its own technology-dependent communication interface, in the form of a
programming interface that provides basic communication functions (primitives). TCP/IP
provides communication services that run between the programming interface of a
physical network and user applications. It enables a common interface for theseapplications, independent of the underlying physical network. The architecture of the
physical network is therefore hidden from the user and from the developer of the
application. The application need only code to the standardized communication
abstraction to be able to function under any type of physical network and operating
platform.
In Figure, to interconnect two networks, we need a computer that is attached to both networks
and can forward data packets from one network to the other; such a machine is called a
router. The term IP router is also used because the routing function is part of the Internet
Protocol portion of the TCP/IP protocol suite
To be able to identify a host within the internetwork, each host is assigned an address, called
the IP address. When a host has multiple network adapters (interfaces) such as with a router,
each interface has a unique IP address. The IP address consists of two parts:
IP address =
The network number part of the IP address identifies the network within the internet and is
assigned by a central authority and is unique throughout the internet. The authority for
assigning the host number part of the IP address resides with the organization that controls
the network identified by the network number.
7/29/2019 Inter networking and Internet Protocols
9/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)9
Function of TCP protocol
Functions Performed By TCP
o Addressing/Multiplexing: TCP is used by many different applications for theirtransport protocol. Therefore, like its simpler sibling UDP, an important job for TCPis multiplexingthe data received from these different processes so they can be sent out
using the underlying network-layer protocol. At the same time, these higher-layer
application processes are identified using TCP ports. The section on TCP/IP transport
layer addressing contains a great deal of detail on how this addressing works.
o Connection Establishment, Management and Termination: TCP provides a set ofprocedures that devices follow to negotiate and establish a TCP connection over
which data can travel. Once opened, TCP includes logic for managing connections
and handling problems that may result with them. When a device is done with a TCP
connection, a special process is followed to terminate it.
o Data Handling and Packaging: TCP defines a mechanism by which applications areable to send data to it from higher layers. This data is then packaged into messages to
be sent to the destination TCP software. The destination software un packages the
data and gives it to the application on the destination machine.
o Data Transfer: Conceptually, the TCP implementation on a transmitting device isresponsible for the transfer of packaged data to the TCP process on the other device.
Following the principle of layering, this is done by having the TCP software on the
sending machine pass the data packets to the underlying network-layer protocol,
which again normally means IP.
o Providing Reliability and Transmission Quality Services: TCP includes a set ofservices and features that allow an application to consider the sending of data using
the protocol to be reliable. This means that normally, a TCP application doesn't
have to worry about data being sent and never showing up, or arriving in the wrong
order. It also means other common problems that might arise if IP were used directly
are avoided.
o Providing Flow Control and Congestion Avoidance Features: TCP allows the flow ofdata between two devices to be controlled and managed. It also includes features to
deal with congestion that may be experienced during communication between
devices.
TCP Header Format:
The Transmission Control Protocol (TCP) header is the first 24 bytes of a TCP segment that
contains the parameters and state of an end-to-end TCP socket. The TCP header is used to
track the state of communication between two TCP endpoints. Since TCP segments are
inserted (encapsulated) in the payload of the IP packet the TCP header immediately follows
http://www.tcpipguide.com/free/t_TCPIPTransportLayerProtocolTCPandUDPAddressingPort.htmhttp://www.tcpipguide.com/free/t_TCPIPTransportLayerProtocolTCPandUDPAddressingPort.htmhttp://www.tcpipguide.com/free/t_TCPBasicOperationConnectionEstablishmentManagement.htmhttp://www.tcpipguide.com/free/t_TCPMessageSegmentFormat.htmhttp://www.tcpipguide.com/free/t_TCPReliabilityandFlowControlFeaturesandProtocolMod.htmhttp://www.tcpipguide.com/free/t_TCPReliabilityandFlowControlFeaturesandProtocolMod.htmhttp://www.tcpipguide.com/free/t_TCPReliabilityandFlowControlFeaturesandProtocolMod.htmhttp://www.tcpipguide.com/free/t_TCPReliabilityandFlowControlFeaturesandProtocolMod.htmhttp://www.tcpipguide.com/free/t_TCPMessageSegmentFormat.htmhttp://www.tcpipguide.com/free/t_TCPBasicOperationConnectionEstablishmentManagement.htmhttp://www.tcpipguide.com/free/t_TCPIPTransportLayerProtocolTCPandUDPAddressingPort.htmhttp://www.tcpipguide.com/free/t_TCPIPTransportLayerProtocolTCPandUDPAddressingPort.htm7/29/2019 Inter networking and Internet Protocols
10/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)10
the IP header during transmission. TCP does not need to keep track of which systems are
communicating, it only needs to track which end to end sockets are currently open. Internet
Protocol handles the logical addressing, routing and host-to-host connectivity.
TCP uses port numbers on each side of the connection to track the connection endpoints, state
bits such as SYN, ACK, RST, FIN, sequence numbers and acknowledgement numbers to
track the communication at each step in transmission.
7/29/2019 Inter networking and Internet Protocols
11/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)11
Token Ring Protocol
Token ring: a number of stations connected by transmission links in a ring topology.
Information flows in one direction along the ring from source to destination and back to
source.
Medium access control is provided by a small frame, the token that circulates around the ring
when all stations are idle. Only the station possessing the token is allowed to transmit at any
given time.
Token Ring Operation
When a station wishes to transmit, it must wait for token to pass by and seize thetoken.
One approach: change one bit in token which transforms it into a start-of-frame sequence and appends frame for transmission.
Second approach: station claims token by removing it from the ring. Frame circles the ring and is removed by the transmitting station. Each station interrogates passing frame, if destined for station, it copies the frame into
local buffer. {Normally, there is a one bit delay as the frame passes through a
station.}
Features:
4 and 16 Mbps using twisted-pair cabling with differential Manchester line encoding. Maximum number of stations is 250. Waits for last byte of frame to arrive before reinserting token on ring {new token after
received}.
8 priority levels provided via two 3-bit fields (priority and reservation) in data andtoken frames.
Permits 16-bit and 48-bit addresses. Under light loaddelay is added due to waiting for the token. Under heavy loadring is round-robin The ring must be long enough to hold the complete token. Advantagesfair access Disadvantagesring is single point of failure, added issues due to token maintenance.
7/29/2019 Inter networking and Internet Protocols
12/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)12
Frame format:
Token Ring and IEEE 802.5 support two basic frame types: Tokens Data/command frames.
Tokens are 3 bytes in length and consist of a start delimiter, an access control byte,and an end delimiter.
Data frames carry information for upper-layer protocols Command frames contain control information and have no data for upper-layer
protocols.
Token Frame contains three fields, each of which is 1 byte in length:
Start Delimiter Access Control Ending delimiter
Start delimiter (1 byte): Alerts each station of the arrival of a token (or data/command
frame). This field includes signals that distinguish the byte from the rest of the frame by
violating the encoding scheme used elsewhere in the frame.
Access-control (1 byte): Contains the Priority field (the most significant 3 bits) and the
Reservation field (the least significant 3 bits), as well as a token bit (used to differentiate a
token from a data/command frame) and a monitor bit (used by the active monitor to
determine whether a frame is circling the ring endlessly).
End delimiter (1 byte): Signals the end of the token or data/command frame. This field alsocontains bits to indicate a damaged frame and identify the frame that is the last in a logical
sequence.
Data/command frames have the same three fields as Token Frames, plus several others. The
Data/command frame fields are described below:
Frame-control byte (1 byte): Indicates whether the frame contains data or controlinformation. In control frames, this byte specifies the type of control information.
Destination and source addresses (2-6 bytes): Consists of two 6-byte address fields that
identify the destination and source station addresses.
Data (up to 4500 bytes): Indicates that the length of field is limited by the ring token holding
time, which defines the maximum time a station can hold the token.
Frame-check sequence (FCS- 4 byte): Is filed by the source station with a calculated value
dependent on the frame contents. The destination station recalculates the value to determine
whether the frame was damaged in transit. If so, the frame is discarded.
Frame Status (1 byte): This is the terminating field of a command/data frame. The Frame
Status field includes the address-recognized indicator and frame-copied indicator.
Start
Delimiter
Access
Control
Frame
Control
Destination
address
Source
addressData
Frame
check
sequence
End
Delimiter
Frame
Status
7/29/2019 Inter networking and Internet Protocols
13/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)13
ETHERNET
Ethernet is a well-known and widely used network technology that employs bus topology.
IEEE802.3 working group controls the Ethernet standards.
The original Ethernet hardware operated at a rate of 10 Mbps A later version known as Fast Ethernet operates at 100 Mbps. The most recent version, which is known as Gigabit Ethernet operates at 1000 Mbps
or 1 Gigabit per second (Gbps).
10Gbps on copper will soon be availableEthernet uses a bus topology; Ethernet requires multiple computers to share access to a single
medium.
While transmitting a frame, a computer has the exclusive use of the cable. A sender transmits a signal, which propagates from the sender toward both ends of the cable.
Sharing in local area networks technologies does not mean that multiple frames from
different computers are being sent at the same time. Instead, the sending computer has
exclusive use of the entire cable during the transmission of a given frame other computers
must wait.
Only one computer can transmit at any time. After the computer finishes transmitting oneframe, the shared cable becomes available for another computer to use.
Ethernet has several different variations, each of which uses different cable types, topologies,
and distance limitations.
The different types are:
10 Base-5 (Thick Ethernet) 10 Base-2 (Thin Ethernet)
10 Base-T (UTP Ethernet)
7/29/2019 Inter networking and Internet Protocols
14/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)14
10 Base-FL 100 Base-T 100 Base-F Gigabit Ethernet 10-Gigabit Ethernet
Thick Ethernet, officially known as 10 Base-5
10 Base-5 is laid out in a bus topology, with a single coaxial cable connecting all nodes
together. At each end of the coaxial cable is a terminator. Each node on the network
physically connects to the coaxial cable through a device called a transceiver and an AUI
cable is connected between the node and the transceiver.
A single 10 Base-5 segment may be up to 500 meters (1650 feet)in length and may have up to
255 nodes connected to it. Each node must be at least 2.5 meters (8.25 feet) apart.
Advantage and Disadvantage of 10 Base-5
Advantage:
Long Distances Possible: 10 Base-5 allows distances up to 500 meters (1650 feet). This
makes it very useful as a "backbone" technology for wiring together multiple locations within
a building without the use of repeaters
Noise Immunity: Since 10 Base-5 uses a very heavily shielded cable, it can be used in
electrically noisy environments which can cause other network types to fail.
Conceptually Simple: Since all devices on a 10 Base-5 network are simply chained together
on a common coaxial cable, it is a simple matter to plan the routing of the cable.
Disadvantage:
Inflexible: 10 Base-5 networks do not lend themselves well to installations where the setup of
the network will change much after the initial installation. It can be very difficult to add or
move a node once it is connected to the coaxial cable.
Fault Intolerant: Since 10 Base-5 uses a common physical cable to interconnect all the
7/29/2019 Inter networking and Internet Protocols
15/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)15
nodes, the failure of any part of the coaxial cable or any node has the ability to cause the
collapse of the entire network.
Susceptible to Ground Loops: A ground loop occurs when a network cable is used to
interconnect devices which are powered from different sources, and therefore a difference in
voltage exists between two points on the network. The result is an electrical current flowing
through the shields of the cable, which causes considerable noise to be introduced into the
center conductor.
Very Difficult Troubleshooting: As mentioned above, a failure anywhere on a 10 Base-5
segment has the ability to drop the entire network. Troubleshooting such a failure can be
extremely frustrating, as the only way to do it is to check each node and the cabling between
them one at a time. This is very time consuming, and can be expensive if a company's entire
business relies on the network to be up.
Metropolitan Area Network (MAN) & Wide Area Network (WAN)
Metropolitan Area Network (MAN)
A MAN (metropolitan area network) is a high-speed network covering widerdistances than LAN.
A MAN spans distances of approximately 100 miles; therefore, it is suitable forconnecting devices and LANs in a metropolitan area.
MAN speeds are typically 100 Mbps or higher. The most commonly implemented MAN is the fiber distributed data interface (FDDI).
It operates at 100 Mbps over fiber optic cable for distances up to 200 kilometers.
Wide Area Network (WAN)
A WAN is the oldest type of network. WANs generally span a wide geographic area like a state, province, country, or
multiple countries. However, some WANs are confined to a limited geographic area,
like a LAN.
A WAN in a limited geographic area could be easily extended over a wide area usingthe same technologies. The same is not true of a LAN.
7/29/2019 Inter networking and Internet Protocols
16/16
Internetworking & Internet Protocols 2013
Sarvjeet Singh Sohal (1269922)16