Beruflich Dokumente
Kultur Dokumente
The network operating system (NOS) in this configuration has networking capability, users are aware of the specific assortment of
computers and resources in the network and can access the resources by logging on to the appropriate remote host or by transferring data
from the remote computer to their own.
A distributed operating system provides good control for distributed computing systems and allows their resources to be accessed in a
unified way. A distributed operating system represents a total view across multiple computer systems for controlling and managing resources
without local dependencies. Management is a cooperative process that encompasses every resource and involves every site. A distributed
operating system is composed of four managers: Device Manager, File Manager, Processor Manager, Memory Manager. At a minimum, the
distributed operating system must provide the following components: process or object management, memory management, file management,
device management, and network management. A distributed operating system offers several important advantages over older operating
systems and NOSs, including:
easy and reliable resource sharing,
faster computation,
adequate load balancing,
good reliability,
dependable electronic communications among the network’s users.
Processors are referred to as sites, hosts, and nodes. “Site” indicates a specific location in a network containing one or more computer
systems; “Host” indicates a specific computer system found at a site whose services and resources can be used from remote locations; “Node”
(or, more formally, “node name”) refers to the name assigned to a computer system connected to a network to identify it to other computers
in the network.
Network Topologies
Sites in any networked system can be physically or logically connected to one another in a certain topology, the geometric arrangement of
connections (cables, wireless, or both) that link the nodes. The most common topologies are star, ring, bus, tree, and hybrid. In each topology,
there are trade-offs among the need for fast communication among all sites, the tolerance of failure at a site or communication link, the cost
of long communication lines, and the difficulty of connecting one site to a large number of other sites. The star, ring, bus, tree, and hybrid
topologies are normally used to construct local area networks.
Four criteria:
• Basic cost: the expense required to link the various sites in the system
• Communications cost: the time required to send a message from one site to another
• Reliability: assurance of communication even if a link or system site fails
• User environment: critical parameters for successful business environment
Star
A star topology, sometimes called a hub or centralized topology because transmitted data passes through the central controller. Star topology
enables data to be transmitted from a sender to a receiver. Star topology permits easy routing because the central station knows the path to all
other sites. The central control point makes access to the network controlled easily, and priority status can be given to selected sites.
However, this centralization of control requires that the central site be extremely reliable and able to handle all network traffic, no matter how
heavy.
Ring
All sites are connected in a closed loop, with the first site connected to the last. A ring network can connect to other networks via the bridge
or gateway, depending on the protocol used by each network. The protocol is the specific set of rules used to control the flow of messages
through the network. If the other network has the same protocol, then a bridge is used to connect the networks. If the other network has a
different protocol, a gateway is used. Data is transmitted in packets that also contain source and destination address fields. Each packet is
passed from node to node in one direction only. Every node must be functional for the network to perform properly.
Bus
All sites are connected to a single communication line running the length of the network. Messages from any site circulate in both directions
through the entire communication line and can be received by all other sites. One site sends a message at a time successfully. A control
mechanism is needed to prevent collisions. Data may pass directly from one device to another, or it may be routed to an end point controller
at the end of the line
Tree
This is a collection of buses connected by branching cable with no closed loops. Bridges are used as special fitters between buses of the same
protocol and as translators to those with different protocols to create networks that can operate at speeds highly responsive to the hosts in the
network. A message from any site can be received by all other sites until it reaches the end points. If a message reaches an end point
controller without being accepted by a host, the end point controller absorbs it. Advantage is that message traffic still flows even if single
node fails.
Hybrid
A hybrid topology is some combination of any of the four topologies. The transmission medium used may vary from one topology to another.
The objective of a hybrid configuration is to select among the strong points of each topology and combine them to meet that system’s
communications requirements most effectively.
Network Types
Networks are grouped according to the physical distances they cover. Networks are generally divided into local area networks, metropolitan
area networks, and wide area networks.
A gateway, on the other hand, is a more complex device and software used to connect two or more local
area networks or systems that use different protocols. A gateway translates one network’s protocol into
another. Gateways resolve hardware and software incompatibilities.
Metropolitan Area Network
A metropolitan area network (MAN) defines a configuration spanning an area larger than a LAN, ranging from several blocks of buildings
to an entire city, but not exceeding a circumference of 100 kilometers. MANs can be owned and operated as public utilities, providing the
means for internetworking several LANs. A MAN is a high-speed network often configured as a logical ring. Depending on the protocol
used, messages are either transmitted in one direction using only one ring, or in both directions using two counter-rotating rings. One ring
always carries messages in one direction and the other always carries messages in the opposite direction.
Addressing Conventions
Network sites need to determine how to uniquely identify their users so they can communicate with each other and access each other’s
resources. Names, addresses, and routes are required because sites aren’t directly connected to each other except over point-to-point links;
therefore, addressing protocols are used. Addressing Protocols: fulfill the need to uniquely identify users. Addressing Protocols are closely
related to the site network topology and geographic location. There is a distinction between local name and global name. Local name refers to
the name by which a unit is known within its own system, whereas global names refer to the name the name by which a unit is known outside
its own system. Local names and global names must follow standard name conventions (lengths, formats).
Example of addressing convention: Internet Address
someone@icars.lis.pitt.edm is a typical example of the Domain Name Service protocol.
The domain name server is the general purpose data query service. Domain Name Service is hierarchical. Periods are used to separate
components. Domain names are read from left to right.
Take into consideration this email address: someone@icars.lis.pitt.edm
someone is the logical user
icarus is the host for the user called someone,
lis is the net machine for icarus,
pitt is the cluster for lis, and
edu is the network for the university of Pittsburgh
Routing Strategies
Router: is an internetworking device which is primarily software driven. Routers direct traffic between two different types of LANs or
between two network segments (different protocol addresses). Routers generally direct traffic of data packets. Once the data is at the proper
network, the router makes sure that the correct node in the network receives it. The role of routers changes as network designs change…
(Network Layer operation). The router connects sites to other sites and Internet.
Router Functions include securing information generated in predefined areas, choosing fastest route from one point to another, and providing
redundant network connections.
Connection Models
Communication network is concerned about: moving data from one point to another, minimizing transmission costs, providing full
connectivity.
Circuit switching
Uses a Dedicated communication path. Established between two hosts before transmission begins. Circuit Switching can easily be observed
in telephone systems. Unfortunately, there is a delay before signal transfer begins while connection is set up.
Packet switching
Uses the Store-and-forward technique before sending a message. A message is divided into multiple equal-sized units (packets) at destination.
Packets reassembled into original long format, header contains pertinent packet information Packet switching provides greater line efficiency
because a single node to node circuit can be shared by several packets and does not sit idle over long periods of time. Packet switching allows
users to allocate message priority. Packet switching networks are more reliable because nodes are connected by more than one link, which
makes packet switching networks flexible.
There are two ways of selecting the path: datagrams, virtual circuits
Datagrams: have packet destination and sequence number added to information. This allows for uniquely identifying message
to owning packet. Each packet handled is independently. The packet route is selected as each packet is accepted. At
destination all packets of same message are reassembled. Datagrams diminish congestion and provide reliability. Messages are
not delivered until all packets are accounted for. Receiving node requests retransmission of lost or damaged packets.
Datagrams send incoming packets through less heavily used paths and it provides more reliability because alternate paths may
be set up upon node failure.
Virtual circuit: In virtual circuit the complete path from sender to receiver is established before transmission starts. All
message packets use the same route. Any node can have several virtual circuits to any other node. Routing decision is made
once for all packets belonging to the same message. This speeds up transmission. There are disadvantages however, all virtual
circuits fail upon one failure. It is difficult to resolve congestion (in heavy traffic)
Conflict Resolution
Device sharing requires access control methods to facilitates equal and fair network access.
Token Passing
A token is a special electronic message. It is generated and passed from node to node. Only node with token is allowed to
transmit, then passes token to the next receiving node. Two typical topologies are: Bus and Ring, and are popular because
access is fast and collisions are nonexistent.
Token-bus Network
The token is passed to each node in turn. Data is attached; and packet is sent to destination. The receiving node copies data;
adds acknowledgment; returns packet to sending node. The sending node passes token to next node in logical sequence. Node
order is determined by a cooperative decentralized algorithm. Turns are then determined by priority based on node activity.
There is higher overhead at each node than does CSMA/CD and nodes have long waits before receiving the token.
Token-ring
Is the most widely used protocol for ring topology. The token moves between nodes in turn. Token moves in one direction
only. To send a message, nodes must wait for free token to come by. Receiving node copies packet message in the packet and
sets copied bit indicating successful receipt.
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is probably the oldest transport protocol standard. It’s the basis for
internet communications and is the most widely used protocol today. TCP/IP is a file transfer protocol; large files can be sent
across sometimes unreliable networks with a high probability that the files will arrive error free. Transmission Control
Protocol /Internet Protocol emphasizes internetworking and provides connectionless services. Transmission Control Protocol
/Internet Protocol model organizes communication system with three main components: processes, hosts, and networks. The
TCP/IP model has four layers: Network Access Layer, Internet Layer, Host-Host layer, Process/Application layer.
Internet Layer
Equivalent to OSI model network layer performing routing functions. Implemented within gateways and hosts. Example:
Internet Protocol (IP) which provides connectionless service for end systems to communicate across one or more networks.
Host-Host Layer
The Host-Host layer is equivalent to the transport and session layers of the OSI model. Transfer data between two processes
on different host computers. Services provided by the host-host layer also include error checking, flow control, manipulate
connection control signals. An example is the Transmission Control Protocol (TCP), which provides a reliable end-end data
transfer service.
Process/Application Layer
The process/application layer is equivalent to both the presentation and application layers of the OSI model. This layer includes
protocols for computer-to-computer resource sharing and terminal-to-computer remote access. Examples include FTP, SMTP,
Telnet.