Introduction to Networks Lecture Topics

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Networks Lecture Topics Lecture Topics • History and motivation • Network architecture – Layered models – Definitions and abstractions Introduction to Networks – OSI Reference Model • Network design issues – Definitions – Components – Message, packet, and cell switching – Resource sharing – Functionality – Performance Networks are Important!!! Internet Hosts WWWWWW EmailEmail WorldWorld WideWide WebWeb ElectronicElectronic MailMail TelnetTelnet TerminalTerminal EmulationEmulation FTPFTP Multimedia FileFile TransferTransfer ProtocolProtocol Multimedia C/SC/S Client-ServerClient-Server ApplicationsApplications … and many others … http://www.isoc.org/guest/zakon/Internet/History/HIT.html NET.WORK.VIRGINIA World Wide Web Sites vBNS ESnet Internet2 ATM network with Internet access Over 400 sites with OC3, Internet DS3, or DS1 service SprintLink DS3 Service through Sprint and Router Vision Alliance (consortium OC3 led by Bell Atlantic) Sprint WTN OC3 OC3 Sprint RIC OC3 Sprint ROA http://www.isoc.org/guest/zakon/Internet/History/HIT.html Backbone/Internet Gateway 1 Network Architecture A Simple Layered Model • Network architecture Application Programs – Guides the design and implementation of the network – Assists in coping with complexity Process-to-Process Channels • Networks are typically modeled as a set of layered, cooperating processes Layers Host-to-Host Connectivity • The International Organization for Standards Networking Hardware (ISO) has developed the seven-layer Open Systems Interconnect (OSI) model • Decomposes system into simpler, manageable – The OSI model is not strictly adhered to in actual components implementations. It is used more as guidelines. • Provides a modular design Multiple Abstractions for One Layer Functions Are Not Always “Layer-able” Application Programs Application Programs Request/Reply Message Stream Channel Channel Process-to-Process Channels Host-to-Host Connectivity Host-to-Host Connectivity Network Networking Hardware Networking Hardware Management • Process-to-process channel – Request/reply interaction • Some functions may need to interact with – Stream of messages multiple layers Layered Models … Generalized (1) Layered Models … Generalized (2) •Layer N services provided to upper layers – Provides services to layers N+1 and above – Uses services offered by layers N-1 and below service interface – May ONLY interact with peer layer N entities via protocols peer-to-peer • Distinction between service, interface, and Node A interface Node B implementation Layer N protocol Layer N+1 Layer N+1 service interface Layer N Layer N services provided by lower layers Layer N-1 Layer N-1 2 Layered Models … Generalized (3) Interfaces and Protocols • Protocols are rules for cooperation between peers • Three components of an interface – Peer-to-peer interfaces, e.g. Protocol X defines the – Set of visible abstract objects, and for each, a set of interfaces allowed operations with parameters – “Protocol” sometimes used to refer to the layer itself, – Set of rules governing sequences of operations e.g. the entity that realizes Protocol X – Encoding and formatting conventions required for • Service access points (SAPs) adhering to an operations and parameters interface definition are needed between layers – Service or layer-to-layer interface • Protocols are operationally equivalent, but are – The services implemented by a protocol at layer X are usually restricted to peer layers (interfaces are accessed through its SAP. Think of SAP as a functional between adjacent layers) interface. OSI Terminology for Layering OSI Reference Model IDU Layer N+1 ICI SDU Application Application Presentation Presentation SAP PDU Session Session Layer N header SDU ICI SDU Transport Transport Network Network Network SAP Service Access Point (where N+1 accesses N) IDU Interface Data Unit (passed from N+1 to N) Data Link Data Link Data Link SDU Service Data Unit (data from N+1) Physical Physical Physical ICI Interface Control Information (service type, etc.) PDU Protocol Data Unit (exchanged by peer N entities) Deviation from Strict Layering Layered Model Example • Example: Fiber Distributed Data Interface (FDDI) • Typical protocol “stack” in a UNIX-based TCP/IP environment LLC X FTP Telnet Data Link Application MAC HTTP SMTP NFS PHY SMT Physical Presentation XDR PMD Session RPC LLC Logical Link Control Transport TCP UDP MAC Media Access Control Network IP PHY Physical Data Link Ethernet FDDI PMD Physical Media Dependent Physical SMT Station Management 3 Internet Protocol Graph Advantages of Layering (1) • Internet protocols (“TCP/IP”) really uses a • Data hiding and encapsulation -- data structures, four-layer architecture algorithms, etc. in a layer are not visible to other layers HTTP FTP HTTP FTP • Decomposition -- complex systems can be decomposed into more easily understood pieces TCP UDP • System can evolve since layers can be changed (as long as service and interface does not change) IP • Alternate services can be offered at layer N+1 that share the services of layer N Net 1 Net 2 ... Net n Advantages of Layering (2) Disadvantages of Layering • Alternate implementations of a layer can • Some functions (like FDDI station management) co-exist really need to access and operate at multiple layers • Poorly conceived layers can lead to awkward and • A layer or sublayer can be simplified or complex interfaces omitted if some or all of its services are not • There may be performance penalties due to extra needed overhead of layers, for example memory-to-memory copies • Confidence in correct operation enhanced • Design of (an older) layer N+1 may be by testing each layer independently sub-optimal given the properties of (a new) layer N Physical Layer Data Link Layer • The physical layer provides a virtual link for • The data link layer is responsible for the transmitting a sequence of bits between any pair of error-free transmission of packets between nodes joined by a physical communication “adjacent” or directly-connected nodes (OSI defn) channel -- “virtual bit pipe” • The media access control (MAC) function is a • Synchronous or asynchronous sub-layer of the data link layer • Defines physical interface, signaling, cabling, – Allows multiple nodes to share a common transmission connectors, etc. media • May be variations at the physical level for a basic – Supports addressing of nodes data link protocol (PMD specs) • The logical link control (LLC) function is another – IEEE 802.3 (Ethernet): 10Base5 (thick wire), 10Base2 sub-layer (thin wire), 10BaseT (twisted pair) – Functions such as error recovery 4 Network Layer Transport Layer (1) • The network layer is responsible for getting a • The transport layer provides packet through the network from the source node network-independent, end-to-end message transfer to the destination node between pairs of ports or sockets – Routing to select network path • Ports are destination points for communication – Flow control or congestion control that are defined by software – Internetworking to allow transmission between – Ports are identified by a transport address that identifies different types of networks the host computer and the port identifier • In a WAN or internetwork, the network layer – Used to distinguish between multiple applications on one host requires cooperation among peers at intermediate – Established services, like FTP and HTTP, have “well- nodes known” default port identifiers that can be obtained • Network layer function is minimal in a LAN through a name service (RFC 1700) • Key: Network layer provides host-to-host • Key: Transport layer provides process-to- communication process communication. Transport Layer (2) Transport Layer (3) • Transport layers typically provide one of Network two basic types of service: Process Process A B – Virtual circuit or connection-oriented service • Transmission Control Protocol (TCP) – Datagram or connection-less service Ports (Sockets) • User Datagram Protocol (UDP) Transport Layer: Virtual Circuits Transport Layer: Datagrams • Virtual circuits are logical channels between a • Datagram communication is connectionless source and destination • New connection is established and released for each • Connections are maintained for multiple packet or packet or message transmitted message transmissions until they are explicitly – Packet itself establishes and releases the “connection” released • Functions – Network layer may still use dynamic routing – Translate transport address to network address • Functions – Pass messages to network layer for delivery – Translate transport address to network address – Each message sent as a single packet – Segment messages into packets for transmission – Upper layer responsible for re-ordering and error detection – Pass packets to network layer for delivery – Reassemble packets at receiving end 5 Session Layer Presentation Layer (1) • The session layer is responsible for • The presentation layer represents information to establishing and maintaining virtual applications so as to preserve semantics (meanings connections between pairs of processes in or values) while resolving syntactic different hosts, possibly including service (representation) differences location and access rights • In open systems, heterogeneous computers result in heterogeneous representations – Characters: ASCII, EBCDIC, Unicode • Multiple sessions may be multiplexed over a – Integers: lengths, 1’s versus 2’s complement single connection (provided by a lower layer) – Reals: fixed or floats, different float points – Byte order: 01234567... or 67452301
Recommended publications
  • Draft Stable Implementation Agreement for Open
    NBS PUBLICATIONS U.S. DEPARTMENT OF COMMERCE National Bureau of Standards Institute for Computer Sciences and Technology A 11 IDE 7 E T M NBSIR 87-3674 Draft Stable Implementation Agreements for Open Systems Interconnection Protocols NBS Workshop for Implementors of Open Systems Interconnection Version 1 Edition 0 October 1987 DRAFT STABLE IMPLEMENTATION AGREEMENTS Based on the Proceeding of the NBS/OSI Implementor’s Workshop Plenary Assembly Held October 9, 1987 National Bureau of Standards Gaithersburg, MD 20899 U.S. DEPARTMENT OF COMMERCE NATIONAL BUREAU OF STANDARDS — QC 100 - U 5 6 87-3674 1987 C • 2 U.S. DEPARTMENT OF COMMERCE National Bureau of Standards Institute for Computer Sciences and Technology Research Information Center NBSIR 87-3674 National r>ureau of Standards Gaithersburg, Maryland 20899 A) BSc DRAFT STABLE IMPLEMENTATION QCtoo AGREEMENTS FOR OPEN SYSTEMS < USy INTERCONNECTION PROTOCOLS m., 1921 c.> NBS Workshop for Implementors of Open Systems Interconnection Version 1 Edition 0 October 1987 DRAFT STABLE IMPLEMENTATION AGREEMENTS Based on the Proceeding of the NBS/OSI Implementor’s Workshop Plenary Assembly Held October 9, 1987 National Bureau of Standards Gaithersburg, MD 20899 U.S. DEPARTMENT OF COMMERCE, C. William Verity, Acting Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director 21 Table of Contents 1. GENERAL INFORMATION 1 1.1 PURPOSE OF THIS DOCUMENT * 1 1.2 PURPOSE OF THE WORKSHOP 1 1.3 WORKSHOP ORGANIZATION 1 2. SUB NETWORKS 1 2.1 LOCAL AREA NETWORKS 1 2.1.1 IEEE 802.2 LOGICAL LINK CONTROL 1 2.1.2 IEEE 802.3 CSMA/CD ACCESS METHOD 1 2.1.3 IEEE 802.4 TOKEN BUS ACCESS METHOD 1 2.1.4 IEEE 802.5 Token Ring Access Method 3 2.2 WIDE AREA NETWORKS 4 2.2.1 CCITT RECOMMENDATION X.25 4 2.3 PRIVATE SUBNETWORKS 4 2.3.1 PRIVATE SUBNETWORKS' 4 3.
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • Medium Access Control Sublayer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Prof. Dr. Mesut Güneş Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Distributed, embedded Systems Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (()MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus ● Network Infrastructure ● Token Ring ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● PtProtoco ls use dtdtd to determ ine w ho gets next access to the channel Data Link Layer ● Medium Access Control (()MAC) sublay er Phy sical Laye r Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Rang e ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access - LLC IEEE 802.2 Logical Link Control ..
    [Show full text]
  • Chapter 2. Network Interfaces
    Chapter 2. Network interfaces This chapter provides an overview of the protocols and interfaces that allow TCP/IP traffic to flow over various kinds of physical networks. TCP/IP, as an internetwork protocol suite, can operate over a vast number of physical networks. The most common and widely used of these protocols is, of course, Ethernet. The number of network protocols that have provisions for natively supporting IP is clearly beyond the scope of this redbook. However, we provide a summary of some of the different networks most commonly used with TCP/IP. 2.1 Ethernet and IEEE 802.x Local Area Networks (LANs) Two frame formats can be used on the Ethernet coaxial cable: 1. The standard issued in 1978 by Xerox Corporation, Intel Corporation and Digital Equipment Corporation, usually called Ethernet (or DIX Ethernet). 2. The international IEEE 802.3 standard, a more recently defined standard. See Figure 6 for more details. The difference between the two standards is in the use of one of the header fields, which contains a protocol-type number for Ethernet and the length of the data in the frame for IEEE 802.3. Dest Source Preamble Addr Addr Type Info FCS 8bytes 6bytes 6bytes 2bytes 46<=N<=1500 bytes 4 bytes Ethernet IEEE 802.2 header Dest Source Preamble SFD Addr Addr Length DSAP SSAP Ctrl Info FCS 7 bytes1byte 6 bytes 6 bytes 2 bytes 1byte 1byte 1byte variable 4bytes IEEE 802.3 3376\3376F2AE Figure 6. ARP - Frame formats for Ethernet and IEEE 802.3 • The type field in Ethernet is used to distinguish between different protocols running on the coaxial cable, and allows their coexistence on the same physical cable.
    [Show full text]
  • Computer Networks(2015 Pattern) Unit I- Physical Layer
    Computer Networks(2015 Pattern) Unit I- Physical Layer By Prof. B.A.Khivsara Note: Material for this presentations are taken from Internet and books and only being used for student reference Outline Introduction of LAN; MAN; WAN; PAN, Ad-hoc Network Topologies Network Architectures OSI Model TCP/IP Model Design issues for Layers Transmission Mediums Network Devices Manchester and Differential Manchester Encodings; IEEE802.11: Frequency Hopping (FHSS) and Direct Sequence (DSSS) Introduction of Network Network: A network is defined as a group of two or more computer systems linked together. Types of Networks: LAN MAN WAN PAN Ad-hoc Network Local Area Networks (LAN) floor/building-wide single communication medium no routing, broadcast segments connected by switches or hubs high bandwidth, low latency Ethernet - 10Mbps, 100Mbps, 1Gbps no latency guarantees LAN- Local Area Network It is designed for small physical areas such as an office, group of buildings or a factory. LANs are used widely as it is easy to design and to troubleshoot. Personal computers and workstations are connected to each other through LANs. We can use different types of topologies through LAN, these are Star, Ring, Bus, Tree etc. LAN can be a simple network like connecting two computers, to share files and network among each other while it can also be as complex as interconnecting an entire building. LAN networks are also widely used to share resources like printers, shared hard-drive etc. LAN Diagram LAN Advantages • Cost reductions through sharing of information and databases, resources and network services. • Increased information exchange between different departments in an organization, or between individuals.
    [Show full text]
  • MAC Layer Protocols for Internet of Things: a Survey
    future internet Review MAC Layer Protocols for Internet of Things: A Survey Luiz Oliveira 1, Joel J. P. C. Rodrigues 1,2,3,* , Sergei A. Kozlov 3 , Ricardo A. L. Rabêlo 4 and Victor Hugo C. de Albuquerque 5 1 National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí MG 37540-000, Brazil; [email protected] 2 Instituto de Telecomunicações, 1049-001 Lisboa, Portugal 3 International Institute of Photonics and Optoinformatics, ITMO University, 197101 Saint Petersburg, Russia; [email protected] 4 Department of Computing (DC), Graduate Program in Computer Science (PPGCC), Federal University of Piaui (UFPI), Ministro Petronio Portela Campus, Teresina 64049-550, Piaui, Brazil; [email protected] 5 Graduate Program in Applied Informatics, University of Fortaleza (UNIFOR), Fortaleza CE 60811-905, Brazil; [email protected] * Correspondence: [email protected]; Tel.: +55-35-3471-9200 Received: 27 November 2018; Accepted: 18 December 2018; Published: 14 January 2019 Abstract: Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage).
    [Show full text]
  • UNIT II DATA-LINK LAYER & MEDIA ACCESS Introduction – Link-Layer
    UNIT II DATA-LINK LAYER & MEDIA ACCESS Introduction – Link-Layer Addressing – DLC Services – Data-Link Layer Protocols – HDLC – PPP - Media Access Control - Wired LANs: Ethernet - Wireless LANs – Introduction – IEEE 802.11, Bluetooth – Connecting Devices. 2.1 Introduction What is DLL (Data Link Layer)? The Data Link Layer is the second layer in the OSI model, above the Physical Layer, which ensures that the error free data is transferred between the adjacent nodes in the network. It breaks the datagram passed down by above layers and converts them into frames ready for transfer. This is called Framing. It provides two main functionalities Reliable data transfer service between two peer network layers Flow Control mechanism which regulates the flow of frames such that data congestion is not there at slow receivers due to fast senders. 2.2 LINK-LAYER ADDRESSING In a connectionless internetwork such as the Internet we cannot make a datagram reach its destination using only IP addresses. The reason is that each datagram in the Internet, from the same source host to the same destination host, may take a different path. The source and destination IP addresses define the two ends but cannot define which links the datagram should pass through. Three Types of addresses Some link-layer protocols define three types of addresses: unicast, multicast, and broadcast. Unicast Address Each host or each interface of a router is assigned a unicast address. Unicasting means one-to-one communication. A frame with a unicast address destination is destined only for one entity in the link. A3:34:45:11:92:F1 Multicast Address Some link-layer protocols define multicast addresses.
    [Show full text]
  • Atn) Ground-Ground Router Description
    INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PACIFIC REGIONAL AERONAUTICAL TELECOMMUNICATION NETWORK (ATN) GROUND-GROUND ROUTER DESCRIPTION Edition 1.2 – May 2004 Reference Document for the ATN Router Description ISSUE 1.2- MAY 2004 Table of Contents 1.0 INTRODUCTION............................................................................................................................3 1.1 SCOPE .............................................................................................................................................3 1.2 SARPS COMPLIANCE......................................................................................................................4 2.0 DOCUMENTS..................................................................................................................................5 2.1 APPLICABLE DOCUMENTS ..............................................................................................................5 2.2 REFERENCE DOCUMENTS ...............................................................................................................6 3.0 ATN GROUND-GROUND ROUTER REQUIREMENTS..........................................................7 3.1 OVERVIEW ......................................................................................................................................7 3.1.1 ATN G/G Router Protocol Characteristics .............................................................................8 3.1.1.1 Application Layer................................................................................................................8
    [Show full text]
  • Internetworking: an Analysis and Proposal
    Rochester Institute of Technology RIT Scholar Works Theses 1990 Internetworking: an analysis and proposal Gary M. Diana Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Diana, Gary M., "Internetworking: an analysis and proposal" (1990). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Internetworking: An Analysis and Proposal Internetworking: An Analysis and Proposal Gary M. Diana April 26, 1990 Rochester Institute ofTechnology Department of Computer Science A Thesis, submitted to the Faculty of the School of Computer Science and Information Technology, in partial fulfillment for the Degree of Master of Science in Computer Science Approved by: ~/( Ie () i Associate Professor Dr. Andrew T. Kitchen Chairman, Thesis Committee Associate Professor Dr. James E. Heliotis Reading Member, Thesis Committee Associate Professor Henry A. Etlinger Reading Member, Thesis Committee Title of Thesis: Internetworking: An Analysis and Proposal I Gary M. Diana hereby grant permission to the Wallace Memorial Library, of RIT, to reproduce my thesis in whole or in part. Any reproduction will not be used for commercial use or profit. Date: May 22, 1990 Acknowledgements This thesis represents the final efforts on my way to obtaining the degree of Master of in Science Computer Science. There are many people who supported me over the six years it has taken, and I would like to take this opportunity to recognize them.
    [Show full text]
  • IEEE 802.11 Wireless LAN Standard
    IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b n Accepted in 1999 n Focusing on 2.4 GHz unlicensed band n Initially 2 Mbit BW – relatively slow (802.11) 802.11 Standards WiFi Alliance http://www.wi-fi.org/ Read the handout! 802.11 Standards 802.11ac @5GHz with 1.3Gbps Max. Data Rate! http://en.wikipedia.org/wiki/IEEE_802.11 http://www.wi-fi.org/discover-and-learn OSI Model IEEE 802 Protocol Layers Provide an interface to higher layers and perform flow and error control • Encoding/decoding of signals transmission medium IEEE• Preamble 802 generation/removal Protocol Layers (for synchronization) • Bit transmission/reception • Includes specification of the transmission medium • On transmission, assemble data into a frame with address and error detection fields • On reception, disassemble frame and perform address recognition and error detection • Govern access to the LAN transmission medium LLC and MAC are separated: - The logic required to manage access to a shared- access medium not found in traditional layer 2 data link control - For the same LLC, several MAC options may be provided Protocol Architecture o Functions of physical layer: n Encoding/decoding of signals n Preamble generation/removal (for synchronization) n Bit transmission/reception n Includes specification of the transmission medium Protocol Architecture o Functions of medium access control (MAC) layer: n On transmission,
    [Show full text]
  • The OSI Model and Switching 1
    The OSI Model and Switching 1 Chapter I The OSI Model and Switching Vasilios A. Siris Institute of Computer Science–FORTH, Greece In this chapter we give the motivation and basic concepts of the OSI reference model, discuss its seven-layer architecture, the communication between systems using the OSI model, and finally the relationship between the OSI model and multilayer switching. MOTIVATION AND BASIC CONCEPTS The Open System Interconnection (OSI) reference model is a framework for defining the conventions and tasks required for network systems to communicate with one another. The work on the OSI model began in the late 1970s, mostly independently, by the International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee or CCITT (which comes from the translation of the title in French). CCITT has been succeeded by the Telecommunications Standardization Sector of the International Telecommunica- tions Union (ITU-TS). In 1983 the work of the two organizations was combined, and a single document describing the reference model for Open Systems Interconnec- tion was produced. The term “open systems” refers to the fact that the specifications are publicly available to everyone. The purpose of the OSI model was to assist vendors and communications software developers to produce interoperable network systems. Although the OSI model was designed to replace all previous computer communications standards, it is no longer viewed as such a replacement. Rather, the OSI model has succeeded as a tool for describing and defining how heterogeneous network systems communicate. Copyright © 2002, Idea Group Publishing. 2 Siris The OSI model is based on a widely accepted structuring technique called layering.
    [Show full text]