introduction 1-1 ekt355/4 advanced computer network miss hasnah ahmad [email protected]...

25
Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD [email protected] 012-4210 492 School of Computer & Communication Engineering (SCCE)

Upload: lauren-armstrong

Post on 12-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-1

EKT355/4ADVANCED

COMPUTER NETWORK

MISS HASNAH AHMAD

[email protected]

012-4210 492

School of Computer & Communication Engineering (SCCE)

Page 2: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-2

General Info:

• This course is continuing the topics that are covered in the course Principles of Computer Network (Pre-requisite).

• Core

• 4 units:3 hours per week lecture2 hours per week lab

Page 3: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-3

Topic 1: The Network Layer - RevisitedVirtual Circuit and Datagram NetworksThe Internet Protocol (IP): Forwarding and Addressing in the InternetRouting Algorithms, Broadcast and Multicast Routing

Topic 2: Link Layer and LANsIntroduction and ServicesError Detection and CorrectionMultiple Access Links and ProtocolsLink-Layer Addressing and SwitchesEthernet

Topic 3: Wireless and Mobile NetworksIntroduction to Wireless NetworkIEEE 802.11 Wireless LANsCellular Internet Access Architecture (GSM Standards)Principles: Addressing and Routing to Mobile UsersMobile IPHandling Mobility in Cellular Networks

Mobility and Higher-Layer ProtocolsTopic 4: Multimedia Networking

Multimedia Networking ApplicationsStreaming Stored Audio and Video

Making the Best Out of Best Effort ServiceTopic 5: Network Security

What Is Network Security?Principles of CryptographyMessage Integrity

End-Point Authentication

Course Contents:

Page 4: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-4

Laboratory activities will cover:

• Introduction to Network Modeling and Simulation• Setting up a Small Network• Wireless and Mobile Networks

Laboratory Exercises:

Page 5: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-5

Reference Book

Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith RossAddison-WesleyMarch 2012

Page 6: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-6

CO1: Ability to analyze and apply the components that set up the data link and LANs in the OSI layer.

CO2: Ability to design and set up the wireless and mobile network over the Internet.

CO3: Ability to develop and implement multimedia networking for streaming data application over the Internet.

CO4: Ability to evaluate and manage the network security and administration to support the huge number of Internet users.

Course Outcomes:

Page 7: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-7

Evaluation Contribution:

(i) Examination Components : 70%a) Final Examination : 50%b) Test 1 : 10%c) Test 2 : 10%

(ii) Course Work : 30%Labs/Assignments/Quizzes: 30%

Page 8: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Introduction 1-8

Topic 1 Network Layer - Revisited

Objectives:

• understand principles behind network layer services:

- network layer service models- forwarding versus routing- how a router works- routing (path selection)- broadcast, multicast

• instantiation, implementation in the Internet

Page 9: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Content:• Introduction

- Network layer- Routing and forwarding- Network service model

• Virtual circuit and datagram networks- Connection oriented and connectionless- Virtual circuit- Datagram

UniMAP

Topic 1 Network Layer - Revisited

Page 10: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-10

Network Layer transport segment from

sending to receiving host

on sending side encapsulates segments into datagrams

on receiving side, delivers segments to transport layer

network layer protocols in every host, router

router examines header fields in all IP datagrams passing through it

applicationtransportnetworkdata linkphysical

applicationtransportnetworkdata linkphysical

networkdata linkphysical network

data linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysical

networkdata linkphysicalnetwork

data linkphysical

Page 11: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-11

Two Key Network-Layer Functions forwarding: move

packets from router’s input to appropriate router output

routing: determine route taken by packets from source to dest.

routing algorithms

analogy:

routing: process of planning trip from source to dest

forwarding: process of getting through single interchange

Page 12: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-12

123

0111

value in arrivingpacket’s header

routing algorithm

local forwarding tableheader value output link

0100010101111001

3221

Interplay between routing and forwarding

routing algorithm determinesend-end-path through network

forwarding table determineslocal forwarding at this router

Page 13: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-13

Network Service ModelQ: What service model for “channel” transporting datagrams from sender to receiver?

example services for individual datagrams:

guaranteed delivery guaranteed delivery

with less than 40 msec delay

example services for a flow of datagrams:

in-order datagram delivery

guaranteed minimum bandwidth to flow

restrictions on changes in inter-packet spacing

Page 14: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-14

Network layer service models:

NetworkArchitecture

Internet

ATM

ATM

ATM

ATM

ServiceModel

best effort

CBR

VBR

ABR

UBR

Bandwidth

none

constantrateguaranteedrateguaranteed minimumnone

Loss

no

yes

yes

no

no

Order

no

yes

yes

yes

yes

Timing

no

yes

yes

no

no

Congestionfeedback

no (inferredvia loss)nocongestionnocongestionyes

no

Guarantees ?

Page 15: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Content:• Introduction

- Network layer- Routing and forwarding- Network service model

• Virtual circuit and datagram networks- Connection oriented and connectionless- Virtual circuit- Datagram

UniMAP

Topic 1 Network Layer - Revisited

Page 16: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-16

Connection, connection-less service datagram network provides network-

layer connectionless service virtual-circuit network provides network-

layer connection service analogous to TCP/UDP connecton-

oriented / connectionless transport-layer services, but: service: host-to-host no choice: network provides one or

the other implementation: in network core

Page 17: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-17

Virtual circuits

call setup, teardown for each call before data can flow each packet carries VC identifier (not destination host

address) every router on source-dest path maintains “state” for

each passing connection link, router resources (bandwidth, buffers) may be

allocated to VC (dedicated resources = predictable service)

“source-to-dest path behaves much like telephone circuit” performance-wise network actions along source-to-dest path

Page 18: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-18

VC implementation

a VC consists of:1. path from source to destination2. VC numbers, one number for each link

along path3. entries in forwarding tables in routers

along path packet belonging to VC carries VC

number (rather than dest address) VC number can be changed on each

link. new VC number comes from forwarding

table

Page 19: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-19

VC forwarding table12 22 32

12

3

VC numberinterfacenumber

Incoming interface Incoming VC # Outgoing interface Outgoing VC #

1 12 3 222 63 1 18 3 7 2 171 97 3 87… … … …

forwarding table innorthwest router:

VC routers maintain connection state information!

Page 20: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-20

applicationtransportnetworkdata linkphysical

Virtual circuits: signaling protocols used to setup, maintain teardown VC used in ATM, frame-relay, X.25 not used in today’s Internet

1. initiate call 2. incoming call3. accept call4. call connected

5. data flow begins 6. receive dataapplicationtransportnetworkdata linkphysical

Page 21: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-21

Datagram networks no call setup at network layer routers: no state about end-to-end

connections no network-level concept of “connection”

packets forwarded using destination host address

1. send datagrams

applicationtransportnetworkdata linkphysical

applicationtransportnetworkdata linkphysical

2. receive datagrams

Page 22: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-22

123

Datagram forwarding table

IP destination address in arriving packet’s header

routing algorithm

local forwarding tabledest address output

linkaddress-range 1address-range 2address-range 3address-range 4

3221

4 billion IP addresses, so rather than list individual destination addresslist range of addresses(aggregate table entries)

Page 23: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-23

Destination Address Range

11001000 00010111 00010000 00000000through 11001000 00010111 00010111 11111111

11001000 00010111 00011000 00000000through11001000 00010111 00011000 11111111

11001000 00010111 00011001 00000000through11001000 00010111 00011111 11111111

otherwise

Link Interface

0

1

2

3 Q: but what happens if ranges don’t divide up so nicely?

Datagram forwarding table

Page 24: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-24

Longest prefix matching

Destination Address Range

11001000 00010111 00010*** *********

11001000 00010111 00011000 *********

11001000 00010111 00011*** *********

otherwise

DA: 11001000 00010111 00011000 10101010

examples:

DA: 11001000 00010111 00010110 10100001 which interface?which interface?

when looking for forwarding table entry for given destination address, use longest address prefix that matches destination address.

longest prefix matching

Link interface

0

1

2

3

Page 25: Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD hasnahahmad@unimap.edu.my 012-4210 492 School of Computer & Communication Engineering

Network Layer 4-25

Datagram or VC network: why?

Internet (datagram) data exchange among

computers “elastic” service, no strict

timing req. many link types

different characteristics uniform service difficult

“smart” end systems (computers) can adapt, perform

control, error recovery simple inside

network, complexity at “edge”

ATM (VC) evolved from

telephony human conversation:

strict timing, reliability requirements

need for guaranteed service

“dumb” end systems telephones complexity inside

network