Professional Documents
Culture Documents
Lect1 - Introduction, OSI, Performance
Lect1 - Introduction, OSI, Performance
F303)
BITS Pilani Dr. Raja Muthalagu
Department of Computer Science
Dubai Campus
Basic information
During Lab
3. Mid Semester Lab Exam CB 5% TBA
hours
Categories of topology
bus topology
• Expensive
• Requires more cable and network equipment at the
start
• Not used as widely as bus topology
– Fewer equipment options
– Fewer options for expansion to high-speed
communication
• No security
star topology
• Advantages
– No Traffic
– Easy fault identification
– Robust
• Disadvantages
- Expensive- large number of cables, I/O port and
connections required.
A hybrid topology: a star backbone with three bus networks
Categories of Networks
company
network
Hi TCP connection
req.
Hi
TCP connection
Got the reply.
time? Get http://gaia.cs.umass.edu/index.htm
2:00
<file>
time
35
BITS Pilani, Dubai Campus
Protocols and Standards
36
BITS Pilani, Dubai Campus
Protocols and Standards
Standard Organizations
• Standard Creation Committees
• ISO (International Standard Organization)
• International Telecommunication Union-Telecommunication Standards
Sector (ITU-T)
• American National Standards Institute (ANSI)
• Institute of Electrical and Electronics Engineers (IEEE)
• Electronic Industries Association (EIA)
• Forums
• Regulatory Agencies: FCC (Federal Communications
Commissions)
Internet Standards
• Internet draft: Lifetime of only 6 month
• RFC (Request for Comment): After recommendation from
internet authorities, draft will be converted to RFC.
38
BITS Pilani, Dubai Campus
The network edge:
• end systems (hosts):
– run application programs
– e.g., WWW, email
– at “edge of network”
• client/server model
– client host requests, receives service
– from server
– e.g., WWW client (browser)/ server;
– email client/server
• peer-peer model:
– host interaction symmetric
– e.g.: teleconferencing
39
BITS Pilani, Dubai Campus
Network edge: connection-oriented
service
Goal: data transfer TCP service [RFC 793]
between end sys. reliable, in-order byte-
stream data transfer
handshaking: setup – dealing with loss:
(prepare for) data transfer acknowledgements and
retransmissions
ahead of time
flow control:
– set up “state” in two
– sender won’t overcome
communicating hosts receiver
TCP - Transmission Control congestion control:
Protocol – senders “slow down
sending rate” when
– Internet’s de-facto network congestion
connection-oriented detected
service
40
BITS Pilani, Dubai Campus
Network edge: connectionless service
41
BITS Pilani, Dubai Campus
The Network Core
• mesh of interconnected
routers
• the fundamental question:
how is data transferred
through net?
– circuit switching: dedicated circuit
per call: telephone net
– packet-switching: data sent thru
net in discrete “chunks”
42
BITS Pilani, Dubai Campus
Network Core: Circuit Switching
• End-end resources
reserved for “call”
• link bandwidth, switch
capacity
• dedicated resources: no
sharing
• circuit-like (guaranteed)
performance
• call setup required
43
BITS Pilani, Dubai Campus
Network Core: Circuit Switching
• network resources
(e.g., bandwidth)
divided into “pieces”
• pieces allocated to calls
• resource piece idle if not
used by owning call (no
sharing)
• dividing link bandwidth
into “pieces”
– frequency division
– time division
– code division
44
BITS Pilani, Dubai Campus
Network Core: Packet Switching
resource contention:
• each end-end data aggregate resource
stream divided into
demand can exceed
packets
amount available
• user A, B packets share congestion: packets
network resources
queue, wait for link use
• each packet uses full link store and forward:
bandwidth packets move one hop at
• resources used as a time
needed,division into “pieces”
Bandwidth transmit over link
Dedicated allocation wait turn at next link
Resource reservation
45
BITS Pilani, Dubai Campus
Network Core: Packet Switching
10 Mbs
A Ethernet statistical multiplexing C
1.5 Mbs
B
queue of packets 45 Mbs
waiting for output
link
D E
46
BITS Pilani, Dubai Campus
Packet-switched networks: routing
Goal: move packets among routers from source to
destination
– we’ll study several path selection algorithms
datagram network:
– destination address determines next hop
– routes may change during session
47
BITS Pilani, Dubai Campus
Access networks and physical media
49
BITS Pilani, Dubai Campus
Institutional access: local area networks
50
BITS Pilani, Dubai Campus
Wireless access networks
51
BITS Pilani, Dubai Campus
Open Systems Interconnection (OSI)
Model
7 Application
•Session layer provides mechanism for controlling
the dialogue between the two end systems. It
6 Presentation defines how to start, control and end conversations
(called sessions) between applications.
•This layer requests for a logical connection to be
5 Session established on an end-user’s request.
•Any necessary log-on or password validation is
4 Transport also handled by this layer.
•Session layer is also responsible for terminating
the connection.
3 Network •This layer provides services like dialogue discipline
which can be full duplex or half duplex.
2 Data Link
Session layer is responsible for,
•Dialog control
•Token management
1 Physical
•Synchronization and checkpointing
BITS Pilani, Dubai Campus
SESSION Layer
1 Physical
80
BITS Pilani, Dubai Campus
TCP/IP Protocol Suite
81
BITS Pilani, Dubai Campus
Types of address
11111111.11111111.00000000.00000000
255.255.0.0
Example 2:
11111111.11111111.10000000.00000000
255.255.192.0
BITS Pilani, Dubai Campus
Logical Address (IP addresses)
753
Solution
We can calculate the throughput as
Solution
We can calculate the propagation time as
Solution
We can calculate the propagation and transmission time
as shown on the next slide:
Solution
We can calculate the propagation and transmission
times as shown on the next slide.
How long does it take to send a file of 640,000 bits from host A to host
B over a circuit-switched network?
Solution:
For a TDM link, time is divided into frames of fixed duration and each frame is
divided into a fixed number of time slots. When the network establish a
connection across a link, the network dedicates one time slot in every frame to
the connection. These slots are edicated for the sole use of that connection,
with a time slot available for use (in every frame) to transmit the connection's
data.
Each circuit has a transmission rate of (1.536 Mbps)/24 = 64 Kbps, so it takes
(640bits)/(64 Kbps) = 10 seconds to transmit the file. To this 10 seconds we
add the circuit establishment time, giving 10.5 seconds to send the file. Note
that the transmission time is independent of the number links: the transmission
time would be 10 seconds if the end-to-end circuit passes through one link or
one-hundred links.
Calculate the total time required to transfer a 1.5-MB file in the following cases,
assuming a RTT of 80 ms, a packet size of 1 KB and an initial 2×RTT of
“handshaking” before data is sent.
(a)The bandwidth is 10 Mbps, and data packets can be sent continuously.
(b)The bandwidth is 100 Mbps, but after we finish sending each data packet, we must
wait one RTT before sending the next.
Solution:
(a) The bandwidth is 10 Mbps, and data packets can be sent continuously.
total time = initial handshaking + network delay
initial handshaking = 2*RTT = 2*80 ms = 160 ms.
Delay = propagation delay + transmission delay (assuming processing & queuing
delays are not significant).
= 40 ms + (1.5-MB / 10 Mbps)
= 40 ms + (1.5*1,048,576 B / 10*1,000,000 bps)
= 40 ms + (1.5*1,048,576*8 b / 10*1,000,000 bps)
= 40 ms + (12,582,912 bits / 10,000,000 bps)
= 40 ms + 1.26 s
= 40 ms + 1260 ms
= 1300 ms
» total time = initial handshaking + network delay
= 160 ms + 1300 ms
= 1460 ms
= 1.46 s
Calculate the total time required to transfer a 1000-KB file in the following cases,
assuming an RTT of 100 ms, a packet size of 1 KB and an initial 2 × RTT of
“handshaking” before data is sent.
(a)The bandwidth is 1.5 Mbps, and data packets can be sent continuously.
(b)The bandwidth is 1.5 Mbps, but after we finish sending each data packet we must
wait one RTT before sending the next