Sie sind auf Seite 1von 6

Introduction (chapter 1)

Computer networks
A computer network is a collection of computers that are able to exchange information.
Computer networks are layers of software, each layer is called middleware.

Goals
Goals of computer networks:
• Resource sharing (making programs available to anyone on the internet)
• Communication (email, VoIP, etc)
• eCommerce (Webshops)

Forms
Forms of computer networks:
• Server-client model (client requests, server responds)
• Peer-to-peer model (requests and responses between computers, no server in between)

Network hardware
Types of transmission technology
• Broadcast: the communication channel is shared by all the machines in the network,
packets are sent by any machine, are received by all others machines in the network.
Each machine will check the address field of the incoming packet and only the target
machine will respond.
• Multicast: broadcast where multiple systems may respond to packets
• Point to point / unicast: to one specific machine, here finding good routes is important

Scale of networks

Personal area networks


Connecting with peripherals. E.g. Bluetooth
Local area networks
Connecting multiple computers with a switch. A switch is a device that has multiple ports
connecting to a number of computers. A switch sends incoming packets to the right computer
by analyzing the addresses in the packets. Large LANs can be created by using a number of
switches plugged into each other or using larger switches

Both wireless and wired networks can be divided into static and dynamic designs. A static
allocation would be dividing time into discrete intervals and give each connection a chance to
communicate using a round-robin algorithm. Dynamic allocations for a common channel are
either centralized or decentralized.

An example of a centralized dynamic allocation are cellular networks, where a base station
determines which phone can communicate next. Decentralized dynamic allocation just means
each device can determine by itself when it should transmit. More on this later.

Metropolitan area networks


Connecting computers in cities, but not really used anymore. Examples are city cable tv
networks

Wide area networks


Each computer is called a host, the rest of the network connecting to these hosts are called a
(communication) subnet

A wide area network consists of transmission lines (copper, fiberoptic) and switching elements
which are also commonly called routers.

This makes a WAN very similar to large LANs. The differences are:
• the hosts and subnet are owned by different people
• WAN routers will often connect different kinds of networks (ethernet, SONET, etc.)
• often an Internet Service Provider (ISP) builds and maintains these networks, and
customers connect to the ISPs network

Network scales
• Subnet: A collection of routers and communication lines owned by a network operator.
Does not include hosts themself.
• Network: subnet + hosts
• Internetwork: When distinct networks are interconnected.
• Gateway: connects two different networks, to create an internetwork

Network software
Network hierarchy
Each layer in the network stack acts like it's talking to the same layer on another machine. In
reality only the lowest, physical layer actually is.

Each layer adds some extra information (i.e. headers) to the sent data so it can be decoded
again on the other end. In each layer errors can occur, so the lower you get, the more error
correcting mechanisms should be present. This is difficult as error correcting codes also add
overhead so sometimes its most useful to just be able to detect errors and resend data.

Layers can offer two different types of service:


• when a layer is connection-oriented one can compare it to a telephone, where the
sender dials up the receiver and when there is a connection it sends data. While
connecting, connection parameters can be negotiated.
• a connectionless layer is modeled after a postal system. Each message carries the full
destination address and is routed through the network independent of all other
messages.
• unacknowleged (unreliable) connectionless services are often called datagram services.

Store and forward switching: each intermediate node waits until it received a full message
before sending it to the next node
Cut through switching: the retransmission of a message is started before it is fully received

Message sequence: each message has a clear boundary and when two messages are sent
they arrive as two distinct messages.
Byte streams: there are no clear boundaries. When a message is received there is no way to tell
if they were sent as two separate messages, or as one large message.

Some applications like file transfer rely on stable connections where messages are always
received correctly in the right order without errors. Other applications like VoIP do not require
this and actually benefit from not having it as the overhead would be unacceptable.

Services
A service is formally specified by a set of primitives (operations) available to user process to
access the service. The difference between a service and a protocol is that a service is a set of
primitives that a layer provides to a layer above it. A protocol is a set of rules governing the
format and meaning of messages.

Network layers
OSI
The OSI reference model
In OSI there are 7 layers according to the following rules:
• a layer should be created when a different abstraction is needed
• each layer should perform a well defined function
• the function of each layer should be chosen with an eye toward defining internationally
standardized protocols
• the layer boundaries should be chosen to minimize the information flow across the
interfaces
• the number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does
not become unwieldy

The OSI reference model's layers are


• Layer 1: Physical transmit raw bits (e.g. DSL/ISDN), copper cables
• Layer 2: Data link breaks data up in frames to be transmitted. Detects many
transmission errors (e.g. Ethernet/WLAN). A sublayer of this is the Medium Access
Control Layer
• Layer 3: Network controls operation of the subnet. Determines routing of packets (e.g.
IP/ICMP), how do we get a packet from A to B?
• Layer 4: Transport Splits up large amounts of data in to smaller units. This is the first
layer that is truly end to end. The layers below are between machines and can have many
intermediate machines like routers (e.g. TCP/UDP). You might have to interact with the
transport layer when writing an application (for video streams you might interact with the
transport layer to make sure it doesn't resend frames that didn't arrive)
• Layer 5: Session Allows users on different machines to control dialog, do token
management and synchronizing data. This includes checkpointing long transmissions
so in the event of a system crash the transmission can continue
• Layer 6: Presentation Concerned with syntax and semantics of the transmitted data.
Allows high level data structures to be serialized and transmitted.
• Layer 7: Application High level protocols (e.g. browsers, FTP, HTTP, Telnet)

Critiques of OSI
• Bad timing: when OSI came around, companies did not want to support both OSI and
TCP/IP. This meant that every company was waiting for every other company to support
OSI first.
• Bad technology: some layers in OSI are almost empty (session, presentation) and this
makes it pretty inefficient.
• Bad implementations: this got OSI to be associated with poor quality.

TCP/IP
The TCP/IP model skips a few layers of the OSI model. It uses the following layers
• Layer 1: Network interface the OSI data link and physical layers
• Layer 2: Internet the OSI network layer
• Layer 3: Transport the OSI transport layer
• Layer 4: Application the OSI session, presentation and application layers

Critiques of TCP/IP
Mostly that it does not clearly distinguish the concepts of services, interfaces and protocols.

Network standardization
De facto: standards established by their wide usage like HTTP, WWW etc.
De Jure (by law): made by treaties between countries and some organisations like ITU, ISO,
IETF, IEEE

Some de facto standards evolve to be de jure. This is the case with HTTP which was quickly
picked up by IETF.

Example networks
The internet
Not really a network at all, but a huge collection of different networks.

The ARPANET
One of the first internets by the US Department of Defense

NSFNET
Mostly a followup of ARPANET

Architecture of the internet


A common way to connect to an ISP is to use the phone line to a house.
• DSL (digital subscriber line) is a system that reuses the phone line for data transmission.
You need a (DSL) modem to interpret the signals. At first dial up modems were used but
these are rare nowadays.
• More and more you see FTTH (fibre to the home) which is a specialized fiberglass
network for internet access.

Either way, you connect to your ISP's IXPs (internet exchange point). One of the largest is the
Amsterdam Internet Exchange.

Mobile phone networks


• AMPS (Advanced mobile phone system) is the first generation of large scale wireless
communication networks for mobile phones
• GSM (Global system for mobile communications) is the second generation of this which
is still the most widely used. It has been upgraded to 2G, 3G and 4G.
• Wireless LAN and IEEE 802.11: also called WIFI. Uses access points to emit radio waves
around a specific frequency to allow devices to communicate to the internet. Ad hoc
networks are networks directly between two computers without an access point. (i.e. Wifi
hotspots)
• RFID:
• Passive: no power source is present. Read only.
• Active: a power source is present. Can change it's transmission and read other
tags.
• RFID is used to network small everyday objects that are close together.

Das könnte Ihnen auch gefallen