computer networking
DESCRIPTION
广西医科大学. Computer Networking. 网络课件. 双语教学. 模拟实验. 计算机网络教研室. DI. 1. 2. 3. CHAPTER 4 Introduction to Protocols. The first section. Exercises. Online lecture. Homes. Buildings. Appliances. . . . Computers. People. Transportation Vehicles. $. Vending Machines. Smart Cards. - PowerPoint PPT PresentationTRANSCRIPT
PowerPoint Presentation
Computer Networking
DI1The first section2Exercises3Online lectureCHAPTER 4Introduction to ProtocolsDepartment of Computer Networking Application Network Management and Operation
2www.gxmu.edu.cnChapter 4 Introduction to Protocols4-1 Introduction 4-2 A Definition of the Need for Protocols4-3 A Simple Protocol Suite4-4 Protocol Layers 4-5 Protocol Functions 4-6 Transport Protocols4-7 Data Link Protocols Network Management and Operation
4outline [`autlain]n. definition [,defi`nin]n., suite [swi:t]n. function[fkn]n.www.gxmu.edu.cnKEY TERMSApplication layer Fragmentation Segmentation Check character Multiplexing Transport layer Connectionless Network access layer Connection-oriented UDPTDP PDU Virtual circuit
Chapter 4 Introduction to Protocols Network Management and Operation
5term [t:m]n.; segmentation [,semn`tein]n. check character fragmentation [,frmen`tein]n., www.gxmu.edu.cn4.1 INTRODUCTION1The concept of protocols.
3The principles of protocols2The need for protocolsTcp/ip will be used as an example Chapter 4 Introduction to Protocols Network Management and Operation
6principle [`prinspl]n., TCP/IP www.gxmu.edu.cn4-2 A DEFINTION AND THE NEED A protocol is a set of rules or guidelines that govern the interactions between people, between people and machines, or between machines.
*
*Communications protocols define what needs to be done but not how to do it.FChapter 4 Introduction to Protocols Network Management and Operation
7guidelines n. govern [`vn]vt. & vi. interaction [,ntr`kn]n., , machine [m`i:n]n.,4.14.2
www.gxmu.edu.cnWhy must Protocols for computer communication be more precisely defined than the protocols humans use?Because computers dont have the human ability to interpret subtleties in the tone of a voice or to apply judgment when unusual or unexpected events occur.Chapter 4 Introduction to Protocols Network Management and Operation
8precisely [pri`saisli]adv.; to interpret subtlety [`stlti]n. judgment [ddmnt]n. unusual [nju:ul]adj.,unexpected [,nik`spektid]adj. occur [`k:]vi.; precisely [pri`saisli]adv. , subtlety [`stlti]n., judgment [,ddmnt]n. define [di`fain]vt.4.10www.gxmu.edu.cn Where is protocols Protocols are most often implemented in software and layers.
The binding protocolsProtocols with the network card driverA number of protocols can be bundled with a card An agreement can bind to multiple card
Chapter 4 Introduction to Protocols Network Management and Operation
9stack [stk]vt. & vi. implement [`implimnt]vt. developed [di`velpt]adj.
www.gxmu.edu.cnWhy protocols layered ?
To make it easy to develop ,test, and modify the protocol software,it is generally developed layer by layer.
N-1
N-1
systemAsystemBN+1 NN+1 NN+1Protocol NProtocolN-1ProtocolChapter 4 Introduction to Protocols Network Management and Operation
10stack [stk]vt. & vi.www.gxmu.edu.cnProtocol stack(Protocol Suite ) A protocol stack is the collection of software modules that implement a protocol.This collection of software modules is normally call a protocol stack.
TCP/IPIPX/SPXAppleTalk etc Network Management and Operation
11module [`mdju:l]n., implement [`implimnt]vt. stack [stk]vt. & vi. suite [swi:t]n.,www.gxmu.edu.cnThe Principle of Peer layer communicationBan on direct communication between the peer layers (WHY?)Each layer must rely on the lower layer of the services provided.
Network Management and Operation
12ban [bn]vt., rely on , www.gxmu.edu.cn Grammar what to do
Semantics how to do HDLCFlag(7EH)BSCSOH(01H)STX(02H)ETX(03H)
Timing when to do
Telephone Traffic lights
Protocol Three elements FlagAddressCtrlDataFCSSFlagSOHHEADSTXTEXTETXBCCBSCHDLC Network Management and Operation
13element [`elimnt]n.() grammar [`rm]n. semantics [si`mntiks]n. timing [`taimi]n. HDLCHigh Level Data Link Control
IBMBSC
5-8
www.gxmu.edu.cnTIMING SAMPLE
Chapter 4 Introduction to Protocols Network Management and Operation
14----------Acknowledgement [k`nlidmnt]n.,-------www.gxmu.edu.cn4-3 A SIMPLE PROTOCOL SUITEA hypothetical protocol suite that has some similarity to TCP/IP.Application : Don`t deal directly with all the intricacies of the communication process.Communication services: Collection of activities .Network access: E-mail commands and data are exchanged .Chapter 4 Introduction to Protocols Network Management and Operation
15hypothetical [,haipu`etikl]adj. intricacy [`intriksi]n.,TCP/IP
4.8
www.gxmu.edu.cnFigure 4-1 The layers of a hypothetical protocol.
Chapter 4 Introduction to Protocols Network Management and Operation
16Protocol stack
www.gxmu.edu.cnFigure 4-2 The flow of data and commands in the protocol stack.
Chapter 4 Introduction to Protocols Network Management and Operation
17flow [flu]vi., 12A.B.2
Tangzhong Network Management and Operation
18:
www.gxmu.edu.cnTCP/IP Protocol SuiteTCPIGMPARPRARPICMPIPUDPSMTPDNSSNMPFTPUnderlying-LayerLAN or WAN TechnologyChapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cn4-4 PROTOCOL LAYERSPDU (Protocol Data Unit):The combination of data from the next higher layer and the header from the current layer is called a PDUPDU =HEADER+DATA
Each layer of the smallest unit of data transmission The header in a PDU contains information to be used by the peer layer in the receiving computerChapter 4 Introduction to Protocols Network Management and Operation
20combination [,kmbi`nein]n., , current [`krnt]adj. layer [`lei]n.,
PDU
www.gxmu.edu.cnFigure 4-3 Examples of the data contained in the headers of the transport and network access PDUs.
* Error detection codes are typically the result of a mathematical function performed on the contents of an entire message. F (the remainder of the PDU that has been calculated by the sending transport layer.)
Chapter 4 Introduction to Protocols Network Management and Operation
21PDUcontained [kn`teind]v.++PDU PDU+PDU PDU PDU
Error detection codes are typically the result of a mathematical function performed on the contents of an entire message. FPDU
www.gxmu.edu.cnApplicationMessageTransportSegment NetworkPacket()Data linkFramePhysical LinkBitPDU specific namesChapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cn4-5 PROTOCOL FUNCTIONS Encapsulation Fragmentation and reassemblyConnection controlOrdered deliveryFlow controlError controlAddressingMultiplexingTransmission services
Chapter 4 Introduction to Protocols Network Management and Operation
23function [`fkn]n.; ; encapsulation [in,kpsju`lein]n. fragmentation [,frmen`tein]n. reassemble [,ri:`sembl]vt connection [k`nekn]n., Ordered delivery [di`livri] Flow control error control addressing [`dresi]n. multiplexing [,mltipleksi]n. Transmission services www.gxmu.edu.cnThe process of adding control information to data from a higher layer is called encapsulation.De-encalsulation.Encapsulation: control info+data
DATAHEAD()DATA4.5.1EncapsulationChapter 4 Introduction to Protocols Network Management and Operation
24encapsulation [in,kpsju`lein] n.,PDU
www.gxmu.edu.cnControl information Three general categories1)Address PDU headers often contain both the senders and receivers addresses. The address field in a header tells the destination of a message or PDU.2)Error detection code. Typically a mathematically calculated check sum.3)Protocol control. additional information
Chapter 4 Introduction to Protocols Network Management and Operation
25general [`denrl]adj. category [`ktiri]n., destination [,desti`nein]n. typically [`tipikli]adv.,mathematical [,mi`mtikl]adj. sum [sm]n.
PDU--check sum -www.gxmu.edu.cnEncapsulation example
Chapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cn4.5.2 Fragmentation and ReassemblyFragmentation Various levels of the protocol may require that the PDU be broken into smaller blocks. This process is call either fragmentation or segmentation. Fragmentation= Segmentation
*Segmentation is the error control process that is employed when only part of a message is delivered to the receiver. FChapter 4 Introduction to Protocols Network Management and Operation
27fragmentation [,frmen`tein] segmentation [,semn`tein]n. n.reassemble [,ri:`sembl]vt., vi. employe [im`plii]n., PDU www.gxmu.edu.cnWhy Fragment?AdvantagesMore efficient error controlMore equitable access to network facilitiesShorter delaysSmaller buffers needed
DisadvantagesResults in more overheads.Less efficient transmission.More processing timeChapter 4 Introduction to Protocols Network Management and Operation
28fragment [`frmnt]n.equitable [`ekwitbl]adj., facility [f`siliti]n. , overheads n. , (4096
Chapter 4 Introduction to Protocolswww.gxmu.edu.cnReassemblyThe process of reassembling a message that has been fragmented is called reassembly.
At the receiving end,the fragmented data must be reassembled into messages corresponding to those that were originally sent by the application level. Network Management and Operation
29reassemble [,ri:`sembl]vt., vi. fragmented [fr`mentid,`frmntid]adj.correspond [kris`pnd]vi.with
www.gxmu.edu.cnSegmentation and Reassembly
PDUNPDUN-1HPDUN-1HPDUNPDUNHPDUNHH
Figure 4-4 An illustration of message fragmentation and reassembly. Chapter 4 Introduction to Protocols Network Management and Operation
30segmentation [,semn`tein]n. reassemble [,ri:`sembl]vt., vi.0>400040003000 TH1 TH2.NAH1 NAH2270001www.gxmu.edu.cnChapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cnFlow of data in the OSI model123456AP1AP2123456H4H3H2T21010011010111010H5H612
Chapter 4 Introduction to Protocols Network Management and Operation
header
32www.gxmu.edu.cn TCP HEADIP HEADLLC HEAD0101110101001000010MAC HEAD
segmentpackageframePDUFCSFCSPDUs in TCP/IPByteChapter 4 Introduction to Protocols Network Management and Operation
33www.gxmu.edu.cnConnection is usually a logical association between the entities Virtual circuit
Connection-oriented setup time at the beginning of the communication.Key attribute :Assigns sequence numbers to each PDU. Sequence numbers used for Ordered delivery Flow control Error control
4.5.3 Connection ControlChapter 4 Introduction to Protocols Network Management and Operation
34logical [`ldikl]adj. association [,sui`ein]n., entity [`entiti]n. attribute [`tribju:t]vt.; assign [`sain]vt.;sequence [`si:kwns]n., sequence number n. delivery [di`livri]n., PDUPDUPDUwww.gxmu.edu.cnConnectionless
No setup timeallows an application to send a message to any destination ,an any time.
UDPIn the TCP/IP protocol suite, connectionless transport is provided by the UDP .Chapter 4 Introduction to Protocols Network Management and Operation
35destination [,desti`nein]n., provided [pr`vaidid]conj.,Vt www.gxmu.edu.cn4.5.4 Ordered DeliveryPDUS may be out of sequence,why?
The PDUs take different paths (routes) through several networks.How to do ? Sequence numbers Chapter 4 Introduction to Protocols Network Management and Operation
36Sequence Number sequence [`si:kwns]n.PDUs can arrive at the destination out of sequence because _____. they take different routes through the network4.17 PDUPDUPDUPDUwww.gxmu.edu.cnSequence numbers function The sequence numbers in PDUs serve multiple purposes because they allow the receiving end to check to ensure that all PDUs have been received, that they are in the right sequence, and that none have been duplicated.
Chapter 4 Introduction to Protocols Network Management and Operation
37sequence [`si:kwns]n., duplicate [`dju:plikit]n., none [nn]pron.
PDUPDU4.18 PDUPDUPDUwww.gxmu.edu.cn4.5.5 Flow ControlWhy is Flow control required in computer based communication systems because sometimes the sending computer transmits data at a rate faster than the receiving computer can handle it.
The term used to describe the ability of the receiving end of the transmission to limit the amount or rate of data sent by the transmitting end is flow control.Chapter 4 Introduction to Protocols Network Management and Operation
38 amount [`maunt]n. rate [reit]n., (); www.gxmu.edu.cn
Flow ControlStop and wait Xon/Xoff ACK/NAKSliding window Fixed window size Credit scheme
Chapter 4 Introduction to Protocols Network Management and Operation
39PDU PDU-PDUPDUSliding window www.gxmu.edu.cn4.5.6 Error ControlGuard against loss or damage at various levels
Types of ErrorsDetectionCorrection
Chapter 4 Introduction to Protocols Network Management and Operation
40guard against , various [`vris]adj.PDU PDU PDUwww.gxmu.edu.cnError ControlAll transmission media have potential for introduction of errors.Error Control refers to the facts that errors must be:Detected reliablySomething should be done to retransmit the frame that has been received in errorChapter 4 Introduction to Protocols Network Management and Operation
41potential [p`tenl]adj.,
www.gxmu.edu.cn
Single-bit errorMultiple-bit error
Burst error
Types of ErrorsChapter 4 Introduction to Protocols Network Management and Operation
42burst error www.gxmu.edu.cnDefineError controlError correctionError detectionError detection is usually accomplished by having the sender insert an error detecting code.
Chapter 4 Introduction to Protocols Network Management and Operation
43
4.7 PDU
www.gxmu.edu.cnCheck character Error detecting code=check character It is calculated mathematically as a part of the error checking process when transmitting and receiving a message.
*An error detection code corrects all of the errors it finds during a transmission.FChapter 4 Introduction to Protocols Network Management and Operation
44=
www.gxmu.edu.cnParity Examples - Using Even Parity
Simple ParityLRC/VRC
Chapter 4 Introduction to Protocols Network Management and Operation
45parity [`priti]n., Simple Parity LRC: Longitudinal Redundancy Check
VRC: 4.16 1001011010010100111
www.gxmu.edu.cnError correctionRetransmission.If no acknowledge in given time, re-transmit.Sequence numberingDuplicate PDUs discard
Chapter 4 Introduction to Protocols Network Management and Operation
46retransmission [,ri:trnz`min]n., sequence number n. duplicate[dju:plikit]n., discard [dis`k:d]vt.acknowledge [k`nlid]vt., www.gxmu.edu.cnNOTENetwork access layer : Each PDU is received correctly.Transport layer : All PDUs are received and that none are duplicated.Chapter 4 Introduction to Protocols Network Management and Operation
47PDUwww.gxmu.edu.cn4.5.7 AddressingPDU headers often contain both the sender`s and receiver`s addresses.Different layers of the protocol contain different addresses.Addresses are unique and not [email protected] LayerEmail application addressNetwork access layerIp addressChapter 4 Introduction to Protocols Network Management and Operation
48ambiguous [m`bijus]adj. [q y]; , The transport header contains the address of the email application on the receiving computer that is to process the data.4.14 PC
www.gxmu.edu.cn4.5.8MultiplexingWhen a computer uses a single communications circuit to establish multiple connections to different applications.
Many to one/one to manySupporting multiple connections on one machineChapter 4 Introduction to Protocols Network Management and Operation
49multiplexing [`mltipleksi]n. establish [is`tbli]vt., When a computer uses a single communication circuit to establish multiple connections to different applications, it is called Multiplexing.ftpwww.gxmu.edu.cnMultiplexing vs. No Multiplexing
Types of multiplexing
Network Management and Operation
50FDMFrequency-division multiplexing TDM www.gxmu.edu.cnFigure 8-3WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998Multiplexing, Frequency DomainFDM
FDM, Time Domain
Demultiplexing, Time DomainChapter 4 Introduction to Protocols Network Management and Operation
51time domain www.gxmu.edu.cn4.5.9 Transmission ServiceA protocol may provide transmission services such as a. the ability to prioritize messagesb. the ability to specify required throughput ratesc. the ability to provide some kind of security to the message
Chapter 4 Introduction to Protocols Network Management and Operation
52prioritize [prai`ritaiz]vt. throughput [`ru:put]n.,,
www.gxmu.edu.cnSummarySimplified hypothetical model .To help us learn the concepts of protocols.Chapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cn4.6 Transport protocolsThe major function and responsibility To assure that messages are exchangeed reliably between the sender and the receiver.
Two primary elements :1)the arrival of all of the data at the destination.2) their presentation to the receiving application in the same order the sending application intended. Provide an end-to-end data transfer service.
Chapter 4 Introduction to Protocols Network Management and Operation
5412 www.gxmu.edu.cnProvide the two types of serviceConnection-oriented serviceHave setup time at the beginning of the communication.
TCP FTPTelnetSMTPHTTPPOP3A telephone call is an example of a connection-oriented service.Chapter 4 Introduction to Protocols Network Management and Operation
55Virtual [`v:tjul]adj.circuit www.gxmu.edu.cn3-way handshake
Connection-oriented serviceChapter 4 Introduction to Protocols Network Management and Operation
56TCP/IPTCP syn(syn=j)SYN_SEND synSYNack=j+1SYNsyn=kSYN+ACKSYN_RECV SYNACKACK(ack=k+1)ESTABLISHED www.gxmu.edu.cnConnectionless service
UDPNo setup time at the beginning of the communication.Allows an application to send a message to any destination ,at any time. don`t guarantee the delivery of a message. UDP DNSSNMPQQ
Chapter 4 Introduction to Protocols Network Management and Operation
57guarantee [,rn`ti:]vt.; sequence number n.
www.gxmu.edu.cnPort Port The process of distinction
The only signs=hostip+porthttp://10.100.48.100:8080
Chapter 4 Introduction to Protocols Network Management and Operation
58distinction [distikn]n.www.gxmu.edu.cnAdv: There is no setup time at the beginning of the communication.Disadv: There is no guarantee that a message will be delivered.
Chapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cnService process normally use a fixed port. RPCSNMPTFTPSMTPFTPTelnet11116169252123UDPTCPIPChapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cnFTPSMTPTFTPDNSTelnetSNMP2123255369161TCP UDPapplicationtransport layerportTCP and UDP Principle of transmission of information Chapter 4 Introduction to Protocols Network Management and Operation
61TCPUDP(port)
www.gxmu.edu.cn
Port AddressesChapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cn4-7 DATA LINK PROTOCOLSThe major function :To deal with the specifics of the particular type of circuit that used between the sender and receiver and to ensure that each PDU arrives accurately and with no errors.Not concerned : Sequence duplicated missing.Chapter 4 Introduction to Protocols Network Management and Operation
634.15particular [p`tikjul]adj., accurately PDUPDU PDU A major function of data link protocols is to ensure that each PDU arrives accurately and with no errors.TData link protocols do not concerned with whether PDU`s arrive in sequence.
www.gxmu.edu.cnSituations that occur during data communicationcommunication startup character identificationPDU identification Error controlTermination
Chapter 4 Introduction to Protocols Network Management and Operation
64situation [,sitju`ein]n.; identification [ai,dentifi`kein]n., occur [`k:]vi. termination [`t:mnein]n., --PDU,---www.gxmu.edu.cnSUMMARYhas introduced information about the various protocols that are required to make a communication system work.TCP/IP has become very widely used .Chapter 4 Introduction to Protocols Network Management and Operation
65various [`vris]adj., foundation [faun`dein]n., This chapter has introduced information that gives you foundation information about the various protocols that are required to make a communication system work.A address2. The _____ field in a header tells the destination of a message or PDU. .AB destinationD block checkC segmentationAnswerRedoNextChapter 4 Introduction to Protocols Network Management and Operation
D multiplexing.3. When a computer uses a single communication circuit to establish multiple connections to different applications, it is called .DAmulticastingB multitaskingC multiprogrammingAnswerRedoNextChapter 4 Introduction to Protocols Network Management and Operation
D b, and c.4. Protocols are most often implemented in .DAhardwareB softwareC layersAnswerRedoNextChapter 4 Introduction to Protocols Network Management and Operation
C the peer layer in the receiving computer5. The header in a PDU contains information to be used by .CA the user at the receiving endB the owner of the communications circuiD the workstation at the transmitting endAnswerRedoNextChapter 4 Introduction to Protocols Network Management and Operation
6. The transmitter or sender of a message is also called the ________
sourceAnswer7.The vehicle through which a message travels from sender to receiver is called the ______________ .
mediumAnswer8.A set of rules that guide the progress of a message from sender to receiver is called a ______________ .
protocolAnswerChapter 4 Introduction to Protocols Network Management and Operation
9. The company that passed up the opportunity to own the basic patents on the telephone was ___________ .
Western UnionAnswer10.Signals that are continuous are called_________________,.
analog signals AnswerChapter 4 Introduction to Protocols Network Management and Operation
www.gxmu.edu.cnThank You !
Tangzhong Network Management and Operation
73