SlideShare ist ein Scribd-Unternehmen logo
1 von 70
Understanding Operating Systems
          Fifth Edition

           Chapter 9
  Network Organization Concepts
Learning Objectives

• Several different network topologies - including the
  star, ring, bus, tree, and hybrid - and how they
  connect numerous hosts to the network
• Several types of networks: LAN, MAN, WAN, and
  wireless LAN
• The difference between circuit switching and packet
  switching, and examples of everyday use that favor
  each



Understanding Operating Systems, Fifth Edition       2
Learning Objectives (continued)

• Conflict resolution procedures that allow a network
  to share common transmission hardware and
  software effectively
• The two transport protocol models (OSI and TCP/IP)
  and how the layers of each one compare




Understanding Operating Systems, Fifth Edition      3
Basic Terminology

• Network
    – Collection of loosely coupled processors
    – Interconnected by communication links
        • Using cables, wireless technology, both
• Common goal
    – Provide convenient resource sharing
    – Control access
• General network configurations
    – Network operating system (NOS)
    – Distributed operating system (D/OS)
Understanding Operating Systems, Fifth Edition      4
Basic Terminology (continued)

• Network operating system (NOS)
    – Networking capability
        • Added to single-user operating system
    – Users aware of specific computers and resources in
      network
    – Access resources
        • Log on to remote host
        • Data transfer from remote host




Understanding Operating Systems, Fifth Edition             5
Basic Terminology (continued)

• Distributed operating system (D/OS)
    – Users not aware of specific computers and resources
      in network
        • Access remote resources as if local
    – Good control: distributed computing systems
        • Allows unified resource access
    – Total view across multiple computer systems
        • No local dependencies for controlling and managing
          resources
    – Cooperative management

Understanding Operating Systems, Fifth Edition                 6
Basic Terminology (continued)

• Distributed operating system (D/OS) (continued)
    – Comprised of four managers with a wider scope




Understanding Operating Systems, Fifth Edition        7
Basic Terminology (continued)

• Distributed operating system (D/OS) (continued)
    – Advantages over traditional systems
        •   Easy and reliable resource sharing
        •   Faster computation
        •   Adequate load balancing
        •   Good reliability
        •   Dependable communications among network users




Understanding Operating Systems, Fifth Edition              8
Basic Terminology (continued)

• Remote
    – Other processors and resources
• Local
    – Processor’s own resources
• Site
    – Specific location in network
        • One or more computers
• Host
    – Specific computer system at site
        • Services and resources used from remote locations

Understanding Operating Systems, Fifth Edition                9
Basic Terminology (continued)

• Node
    – Name assigned to computer system
        • Provides identification




Understanding Operating Systems, Fifth Edition   10
Network Topologies

• Physically or logically connected sites
• Star, ring, bus, tree, hybrid
• Topology tradeoffs
    –   Need for fast communication among all sites
    –   Tolerance of failure at a site or communication link
    –   Cost of long communication lines
    –   Difficulty connecting one site to large number of other
        sites



Understanding Operating Systems, Fifth Edition               11
Network Topologies (continued)

• Four basic criteria
    – Basic cost
        • Expense required to link various sites in system
    – Communications cost
        • Time required to send message from one site to
          another
    – Reliability
        • Assurance of site communication if link or site fails
    – User environment
        • Critical parameters for successful business investment


Understanding Operating Systems, Fifth Edition                    12
Star

• Transmitted data from sender to receiver
    – Passes through central controller
• Hub or centralized topology
• Advantages
    – Permits easy routing
    – Easy access control to network
• Disadvantages
    – Requires extremely reliable central site
    – Requires ability to handle all network traffic
        • No matter how heavy
Understanding Operating Systems, Fifth Edition         13
Star (continued)




Understanding Operating Systems, Fifth Edition   14
Ring
• Sites connected in closed loop
• May connect to other networks
    – Using bridge (same protocols)
    – Using gateway (different protocols)
• Data transmitted in packets
    – Source and destination address fields
• Packet passed from node to node
    – One direction only
• Every node must be functional
    – Bypass failed node needed for proper operation

Understanding Operating Systems, Fifth Edition         15
Ring (continued)




Understanding Operating Systems, Fifth Edition   16
Ring (continued)




Understanding Operating Systems, Fifth Edition   17
Ring (continued)




Understanding Operating Systems, Fifth Edition   18
Bus

•   Sites connect to single communication line
•   Messages circulate in both directions
•   One site sends messages at a time successfully
•   Need control mechanism
    – Prevent collision
• Data passes directly from one device to another
    – Data may be routed to end point controller at end of
      the line



Understanding Operating Systems, Fifth Edition               19
Bus (continued)




Understanding Operating Systems, Fifth Edition   20
Tree

• Collection of buses connected by branching cable
    – No closed loops
• Designers create networks using bridges
• Message from any site
    – Received by all other sites until reaching end point
• Reaches end point controller without acceptance
    – Host absorbs message
• Advantage
    – Message traffic still flows even if single node fails

Understanding Operating Systems, Fifth Edition                21
Tree (continued)




Understanding Operating Systems, Fifth Edition   22
Hybrid

• Strong points of each topology in combination
    – Effectively meet system communications
      requirements




Understanding Operating Systems, Fifth Edition    23
Hybrid (continued)




Understanding Operating Systems, Fifth Edition   24
Network Types

• Grouping
    – According to physical distances covered
• Characteristics blurring
• Network types
    – Local area networks (LAN)
    – Metropolitan area networks (MAN)
    – Wide area networks (WAN)




Understanding Operating Systems, Fifth Edition   25
Local Area Network

• Single office building, campus, similarly enclosed
  environment
    – Single organization owns/operates
• Communicate through common communication line
• Communications not limited to local area only
    – Component of larger communication network
    – Easy access to outside
        • Through bridge or gateway




Understanding Operating Systems, Fifth Edition         26
Local Area Network (continued)
• Bridge
    – Connects two or more geographically distant LANs
    – Same protocols
        • Bridge connecting two LANs using Ethernet
• Gateway
    – Connects two or more LANs or systems
    – Different protocols
        • Translates one network protocol into another
        • Resolves hardware and software incompatibilities
        • SNA gateway connecting microcomputer network to
          mainframe host

Understanding Operating Systems, Fifth Edition               27
Local Area Network (continued)

• Data rates: 100 Mbps to more than 40 Gbps
• Close physical proximity
    – Very high-speed transmission
• Star, ring, bus, tree, and hybrid
    – Normally used
• Transmission medium: varies
• Factors determining transmission medium
    – Cost, data rate, reliability, number of devices
      supported, distance between units


Understanding Operating Systems, Fifth Edition          28
Metropolitan Area Network

• Configuration spanning area larger than LAN
    – Several blocks of buildings to entire city
        • Not exceeding 100 km circumference
• Owned and operated by a single organization
    – Used by many individuals and organizations
    – May be owned and operated as public utilities
        • Means for internetworking several LANs
• High-speed network often configured as a logical
  ring


Understanding Operating Systems, Fifth Edition        29
Wide Area Network

• Interconnects communication facilities in different
  parts of a country or world
    – Operated as part of public utility
• Uses common carriers’ communications lines
    – Telephone companies
• Uses broad range of communication media
    – Satellite, microwaves
• WANs generally slower than LANs
    – Examples: ARPAnet (first WAN), Internet (most
      widely recognized WAN)
Understanding Operating Systems, Fifth Edition          30
Wireless Local Area Network

• LAN using wireless technology to connect
  computers or workstations
    – Located within range of network
• Security vulnerabilities
    – Open architecture; difficulty keeping intruders out




Understanding Operating Systems, Fifth Edition              31
Wireless Local Area Network
                 (continued)
• WiMAX standard 802.16
    – High bandwidth, long distances




Understanding Operating Systems, Fifth Edition   32
Software Design Issues

•   How do sites use addresses to locate other sites?
•   How are messages routed and how are they sent?
•   How do processes communicate with each other?
•   How are conflicting demands for resources
    resolved?




Understanding Operating Systems, Fifth Edition          33
Addressing Conventions

• Addressing protocols
    – Fulfill need to uniquely identify users
    – Closely related to site network topology and
      geographic location
• Distinction between local and global name
    – Local name within its own system
    – Global name outside its own system
        • Must follow standard name conventions (length,
          formats)



Understanding Operating Systems, Fifth Edition             34
Addressing Conventions (continued)
• Example: Internet address
    – someone@icarus.lis.pitt.edu
    – Uses Domain Name Service (DNS) protocol
         • General-purpose data query service
         • Hierarchical
• Domain names read left to right
    –   Logical user to host machine
    –   Host machine to net machine
    –   Net machine to cluster
    –   Cluster to network
• Periods separate components
Understanding Operating Systems, Fifth Edition   35
Routing Strategies

• Router
    – Internetworking device (primarily software driven)
    – Directs traffic
        • Between two different types of LANs
        • Between two network segments (different protocol
          addresses)
    – Network layer operation
    – Role changes (network designs changes)
• Connects sites
    – To other sites and Internet

Understanding Operating Systems, Fifth Edition               36
Routing Strategies (continued)
• Router functions
    – Securing information
        • Generated in predefined areas
    – Choosing fastest route
        • From one point to another
    – Providing redundant network connections
• Routing protocol considerations
    – Addressing, address resolution, message format,
      error reporting
• Address resolution
    – Maps hardware address

Understanding Operating Systems, Fifth Edition          37
Routing Strategies (continued)

• Message formats
    – Allow performance of protocol functions
        •   Finding new network nodes
        •   Determine whether they work (testing)
        •   Reporting error conditions
        •   Exchanging routing information
        •   Establishing connections (transmit data)
• Most widely used Internet routing protocols
    – Routing information protocol (RIP)
    – Open shortest path first (OSPF)

Understanding Operating Systems, Fifth Edition         38
Routing Strategies (continued)

• Routing information protocol (RIP)
    – Path selection based on node and hop number
        • Between source and destination
    – Path with smallest number of hops chosen (always)
    – Advantage
        • Easy to implement
    – Disadvantages
        • No consideration: bandwidth, data priority, network type
        • Update and reissue routing table: changes or not
        • Tables propagate (router to router)

Understanding Operating Systems, Fifth Edition                 39
Routing Strategies (continued)
• Open shortest path first (OSPF)
    – Network state determined first
    – Transmission path selected
    – Update messages sent when changes in routing
      environment occur
        • Reduces number of messages in internetwork
        • Reduces message size: not sending entire table
    – Disadvantages
        • Increased memory usage
        • Bandwidth savings offset by higher CPU usage
        • Shortest path calculation

Understanding Operating Systems, Fifth Edition             40
Connection Models
• Communication network concern
    – Moving data from one point to another
    – Minimizing transmission costs
    – Providing full connectivity
• Circuit switching
    – Dedicated communication path
        • Established between two hosts before transmission
          begins
    – Example: telephone system
    – Disadvantage
        • Delay before signal transfer begins

Understanding Operating Systems, Fifth Edition                41
Connection Models (continued)
• Packet switching
• Store-and-forward technique
    – Before sending message
        • Divide into multiple equal-sized units (packets)
    – At destination
        • Packets reassembled into original long format
        • Header contains pertinent packet information
• Advantages
    – More flexible, reliable
    – Greater line efficiency
    – Users allocate message priority
Understanding Operating Systems, Fifth Edition               42
Connection Models (continued)




Understanding Operating Systems, Fifth Edition   43
Connection Models (continued)




Understanding Operating Systems, Fifth Edition   44
Connection Models (continued)

• Datagrams
    – Packet destination and sequence number added to
      information
        • Uniquely identifying message to owning packet
    – Each packet handled independently
    – Route selected as each packet accepted
    – At destination
        • All packets of same message reassembled
    – Advantages
        • Diminishes congestion and provides reliability

Understanding Operating Systems, Fifth Edition             45
Connection Models (continued)

• Datagrams (continued)
    – Message not delivered until all packets accounted for
    – Receiving node requests retransmission
        • Lost or damaged packets
    – Advantages
        • Diminishes congestion
        • Sends incoming packets through less heavily used
          paths
        • More reliability
        • Alternate paths set up upon node failure


Understanding Operating Systems, Fifth Edition               46
Connection Models (continued)
• Virtual circuit
    – Complete path sender to receiver
        • Established before transmission starts
    – All message packets use same route
    – Several virtual circuits to any other node
    – Advantages
        • Routing decision made once
        • Speeds up transmission
    – Disadvantages
        • All virtual circuits fail upon one failure
        • Difficult to resolve congestion (in heavy traffic)

Understanding Operating Systems, Fifth Edition                 47
Conflict Resolution

• Device sharing requires access control methods
    – Facilitates equal and fair network access
• Access control techniques
    – Round robin
    – Reservation
    – Contention
• Medium access control protocols
    – Carrier sense multiple access (CSMA)
    – Token passing
    – Distributed-queue, dual bus

Understanding Operating Systems, Fifth Edition     48
Conflict Resolution (continued)

• Round robin
    – Node given certain time to complete transmission
    – Efficient
        • If many nodes transmitting over long time periods
    – Substantial overhead
        • If few nodes transmit over long time periods
• Reservation
    – Good if lengthy and continuous traffic
    – Access time on medium divided into slots
    – Node reserves future time slots

Understanding Operating Systems, Fifth Edition                49
Conflict Resolution (continued)
• Reservation (continued)
    – Good configuration
        • Several terminals connected to host through single I/O
          port
• Contention
    – No attempt to determine transmission turn
    – Nodes compete for medium access
    – Advantages and disadvantages
        • Easy implementation; works well under light to
          moderate traffic; better for short and intermittent traffic
        • Performance breaks down under heavy loads


Understanding Operating Systems, Fifth Edition                      50
Conflict Resolution (continued)

• Carrier sense multiple access (CSMA)
    – Contention-based protocol
    – Easy implementation (Ethernet)
    – Carrier sense
        • Node listens to/tests communication medium before
          transmitting messages
        • Prevents collision with node currently transmitting
    – Multiple access
        • Several nodes connected to same communication line
          as peers
        • Same level and equal privileges
Understanding Operating Systems, Fifth Edition                  51
Conflict Resolution (continued)

• CSMA Disadvantages
    – Collision
        • Two or more nodes transmit at same instant
    – Probability of collision increases
        • As nodes get further apart
    – Large or complex networks
        • Less appealing access protocol




Understanding Operating Systems, Fifth Edition         52
Conflict Resolution (continued)
• CSMA/CD
    –   Modification of CSMA
    –   Includes collision detection (Ethernet)
    –   Reduces wasted transmission capacity
    –   Prevents multiple nodes from colliding
         • Collisions not completely eliminated (reduced)
    – Implemented in Apple’s cabling system: LocalTalk
    – Collision occurrence involves small packet
         • Not actual data (in case of Apple CSMA/CA)
• No guarantee data will reach destination
    – Ensures error free data delivery
Understanding Operating Systems, Fifth Edition              53
Conflict Resolution (continued)

• Token Passing
    – Special electronic message (token)
        • Generated and passed node to node
    – Only node with token allowed to transmit
        • Then passes token
    – Fast access
    – Collisions nonexistent
    – Typical topologies
        • Bus
        • Ring

Understanding Operating Systems, Fifth Edition   54
Conflict Resolution (continued)

• Token-bus
    – Token passed to node in turn
        • Data attached; sent to destination
    – Receiving node
        • Copies data; adds acknowledgment; returns packet to
          sending node
    – Sending node passes token to next node in sequence
    – Initial node order determination
        • Cooperative decentralized algorithm
        • Then determined by priority based on node activity


Understanding Operating Systems, Fifth Edition                 55
Conflict Resolution (continued)

• Token-bus (continued)
    – Higher overhead at each node (than CSMA/CD)
    – Nodes have long waits before receiving token
• Token-ring
    – Token moves between nodes in turn
        • One direction only
    – To send message
        • Node must wait for free token
    – Receiving node copies packet message
        • Sets copied bit indicating successful receipt

Understanding Operating Systems, Fifth Edition            56
Conflict Resolution (continued)

• Distributed-queue, dual bus (DQDB)
• Dual-bus configuration
    – Each bus transports data one direction only
    – Steady stream of fixed-size slots
• Slots generated at end of each bus
    – Marked as free and sent downstream
        • Marked busy and written to
        • Written by nodes ready to transmit
    – Nodes read and copy data from slots
    – Continue travel toward end of bus: dissipate
Understanding Operating Systems, Fifth Edition       57
Conflict Resolution (continued)




Understanding Operating Systems, Fifth Edition   58
Conflict Resolution (continued)

• DQDB advantages
    –   Negligible delays under light loads
    –   Predictable queuing under heavy loads
    –   Suitable for MANs managing large file transfers
    –   Satisfy interactive users’ needs




Understanding Operating Systems, Fifth Edition            59
Transport Protocol Standards

• Network usage grew quickly (1980s)
• Need to integrate dissimilar network devices
    – Different vendors
• Creation of single universally adopted architecture
    – OSI reference model
    – TCP/IP




Understanding Operating Systems, Fifth Edition          60
OSI Reference Model

• Basis for connecting open systems
    – Distributed applications processing
• “Open”
    – Connect any two systems conforming to reference
      model and related standards
        • Vendor independent
• Similar functions collected together
    – Seven logical clusters (layers)




Understanding Operating Systems, Fifth Edition          61
Understanding Operating Systems, Fifth Edition   62
OSI Reference Model (continued)

• Layer 1: The Physical Layer
    – Describes mechanical, electrical, functional
      specifications
    – Transmits bits over communication line
        • Examples: 100Base-T, RS449, CCITT V.35
• Layer 2: The Data Link Layer
    – Establishes and controls physical communications
      path before data sent
    – Transmission error checking
    – Problem resolution (on other side)
        • Examples: HDLC and SDLC

Understanding Operating Systems, Fifth Edition           63
OSI Reference Model (continued)

• Layer 3: The Network Layer
    – Addressing and routing services moving data through
      network to destination
• Layer 4: The Transport Layer
    – Maintains reliable data transmission between end
      users
        • Example: Transmission Control Protocol (TCP)
• Layer 5: The Session Layer
    – Provides user-oriented connection service
    – Transfers data over communication lines
        • Example: TCP/IP

Understanding Operating Systems, Fifth Edition           64
OSI Reference Model (continued)

• Layer 6: The Presentation Layer
    – Data manipulation functions common to many
      applications
        • Formatting, compression, encryption
• Layer 7: The Application Layer
    – Application programs, terminals, computers
        • Access network
    – Provides user interface
    – Formats user data before passing to lower layers


Understanding Operating Systems, Fifth Edition           65
TCP/IP Model
• Transmission Control Protocol/Internet Protocol
  (TCP/IP)
    –   Oldest transport protocol standard
    –   Internet communications basis
    –   File-transfer protocol: send large files error free
    –   TCP/IP
         • Emphasizes internetworking
         • Provides connectionless services
    – Organizes communication system
    – Three components: processes, hosts, networks
    – Four layers

Understanding Operating Systems, Fifth Edition                66
TCP/IP Model (continued)




Understanding Operating Systems, Fifth Edition   67
TCP/IP Model (continued)

• Network Access Layer
    – Protocols provide access to communication network
    – Flow control, error control between hosts, security,
      and priority implementation performed
• Internet Layer
    – Equivalent to OSI model network layer performing
      routing functions
    – Implemented within gateways and hosts
    – Example: Internet Protocol (IP)


Understanding Operating Systems, Fifth Edition               68
TCP/IP Model (continued)

• Host-Host Layer
    – Transfer data between two processes
        • Different host computers
    – Error checking, flow control, manipulate connection
      control signals
    – Example: Transmission Control Protocol (TCP)
• Process/Application Layer
    – Protocols for computer-to-computer resource sharing
      and terminal-to-computer remote access
    – Examples: FTP, SMTP, Telnet

Understanding Operating Systems, Fifth Edition              69
Summary
• Network operating systems: coordinate functions
    – Memory Manager, Processor Manager, Device
      Manager, File Manager
    – Must meet owner reliability requirements
         • Detect node failures; change routing instructions to
           bypass; retransmit lost messages successfully
• Basic network organization concepts
    –   Terminology
    –   Network topologies and types
    –   Software design issues
    –   Transport protocol standards

Understanding Operating Systems, Fifth Edition                    70

Weitere ähnliche Inhalte

Was ist angesagt?

Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
2. network elements
2. network elements2. network elements
2. network elementsShyam Nagarajan
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49myrajendra
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyKarthikeyan Dhayalan
 
Os lab presentation
Os lab presentationOs lab presentation
Os lab presentationNadeem Qasmi
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)Dhani Ahmad
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devicesOnline
 
Network devices
Network devicesNetwork devices
Network devicesGopal Krishna
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devicesA Singh
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management DevicesRahul P
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )finalJai Kumar
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of networksharone singh
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)KarthicaMarasamy
 

Was ist angesagt? (20)

Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
2. network elements
2. network elements2. network elements
2. network elements
 
Internetworking.49
Internetworking.49Internetworking.49
Internetworking.49
 
Networking(CPM & PERT)
Networking(CPM & PERT)Networking(CPM & PERT)
Networking(CPM & PERT)
 
Chapter13
Chapter13Chapter13
Chapter13
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Os lab presentation
Os lab presentationOs lab presentation
Os lab presentation
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Internetworking devices
Internetworking devicesInternetworking devices
Internetworking devices
 
Network Management Devices
Network Management DevicesNetwork Management Devices
Network Management Devices
 
( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Unit01
Unit01Unit01
Unit01
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
 
Unit02
Unit02Unit02
Unit02
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
Lan internetworking devices
Lan internetworking devicesLan internetworking devices
Lan internetworking devices
 

Andere mochten auch

Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksLakshmi Sarvani Videla
 
Infrared lan's
Infrared lan'sInfrared lan's
Infrared lan'sMadhusudhan G
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-nsHattori Sidek
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)Sushant Kushwaha
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 

Andere mochten auch (7)

Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile Networks
 
Infrared lan's
Infrared lan'sInfrared lan's
Infrared lan's
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 

Ă„hnlich wie 01600 ppt ch09

02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ipmyl_1116
 
ENC 254_PPT_ch01.pptx
ENC 254_PPT_ch01.pptxENC 254_PPT_ch01.pptx
ENC 254_PPT_ch01.pptxshaker402
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2binakasehun2026
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksImdad Ullah
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptMekiPetitSeg
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptSmitNiks
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptssuser2cc0d4
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1WedgeB
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdfSanjayPradhan61
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overviewSyaiful Ahdan
 
Ch06 091120102157-phpapp01
Ch06 091120102157-phpapp01Ch06 091120102157-phpapp01
Ch06 091120102157-phpapp01Cleophas Rwemera
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
Network basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.pptNetwork basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.pptShehriyarShamsi
 

Ă„hnlich wie 01600 ppt ch09 (20)

02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
ENC 254_PPT_ch01.pptx
ENC 254_PPT_ch01.pptxENC 254_PPT_ch01.pptx
ENC 254_PPT_ch01.pptx
 
Ch06
Ch06Ch06
Ch06
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
CS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).pptCS553_ST7_Ch15-LANOverview (1).ppt
CS553_ST7_Ch15-LANOverview (1).ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
CS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.pptCS553_ST7_Ch15-LANOverview.ppt
CS553_ST7_Ch15-LANOverview.ppt
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
9781111306366 ppt ch9
9781111306366 ppt ch99781111306366 ppt ch9
9781111306366 ppt ch9
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdf
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Ch06 091120102157-phpapp01
Ch06 091120102157-phpapp01Ch06 091120102157-phpapp01
Ch06 091120102157-phpapp01
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
Network basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.pptNetwork basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.ppt
 

KĂĽrzlich hochgeladen

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 

KĂĽrzlich hochgeladen (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 

01600 ppt ch09

  • 1. Understanding Operating Systems Fifth Edition Chapter 9 Network Organization Concepts
  • 2. Learning Objectives • Several different network topologies - including the star, ring, bus, tree, and hybrid - and how they connect numerous hosts to the network • Several types of networks: LAN, MAN, WAN, and wireless LAN • The difference between circuit switching and packet switching, and examples of everyday use that favor each Understanding Operating Systems, Fifth Edition 2
  • 3. Learning Objectives (continued) • Conflict resolution procedures that allow a network to share common transmission hardware and software effectively • The two transport protocol models (OSI and TCP/IP) and how the layers of each one compare Understanding Operating Systems, Fifth Edition 3
  • 4. Basic Terminology • Network – Collection of loosely coupled processors – Interconnected by communication links • Using cables, wireless technology, both • Common goal – Provide convenient resource sharing – Control access • General network configurations – Network operating system (NOS) – Distributed operating system (D/OS) Understanding Operating Systems, Fifth Edition 4
  • 5. Basic Terminology (continued) • Network operating system (NOS) – Networking capability • Added to single-user operating system – Users aware of specific computers and resources in network – Access resources • Log on to remote host • Data transfer from remote host Understanding Operating Systems, Fifth Edition 5
  • 6. Basic Terminology (continued) • Distributed operating system (D/OS) – Users not aware of specific computers and resources in network • Access remote resources as if local – Good control: distributed computing systems • Allows unified resource access – Total view across multiple computer systems • No local dependencies for controlling and managing resources – Cooperative management Understanding Operating Systems, Fifth Edition 6
  • 7. Basic Terminology (continued) • Distributed operating system (D/OS) (continued) – Comprised of four managers with a wider scope Understanding Operating Systems, Fifth Edition 7
  • 8. Basic Terminology (continued) • Distributed operating system (D/OS) (continued) – Advantages over traditional systems • Easy and reliable resource sharing • Faster computation • Adequate load balancing • Good reliability • Dependable communications among network users Understanding Operating Systems, Fifth Edition 8
  • 9. Basic Terminology (continued) • Remote – Other processors and resources • Local – Processor’s own resources • Site – Specific location in network • One or more computers • Host – Specific computer system at site • Services and resources used from remote locations Understanding Operating Systems, Fifth Edition 9
  • 10. Basic Terminology (continued) • Node – Name assigned to computer system • Provides identification Understanding Operating Systems, Fifth Edition 10
  • 11. Network Topologies • Physically or logically connected sites • Star, ring, bus, tree, hybrid • Topology tradeoffs – Need for fast communication among all sites – Tolerance of failure at a site or communication link – Cost of long communication lines – Difficulty connecting one site to large number of other sites Understanding Operating Systems, Fifth Edition 11
  • 12. Network Topologies (continued) • Four basic criteria – Basic cost • Expense required to link various sites in system – Communications cost • Time required to send message from one site to another – Reliability • Assurance of site communication if link or site fails – User environment • Critical parameters for successful business investment Understanding Operating Systems, Fifth Edition 12
  • 13. Star • Transmitted data from sender to receiver – Passes through central controller • Hub or centralized topology • Advantages – Permits easy routing – Easy access control to network • Disadvantages – Requires extremely reliable central site – Requires ability to handle all network traffic • No matter how heavy Understanding Operating Systems, Fifth Edition 13
  • 14. Star (continued) Understanding Operating Systems, Fifth Edition 14
  • 15. Ring • Sites connected in closed loop • May connect to other networks – Using bridge (same protocols) – Using gateway (different protocols) • Data transmitted in packets – Source and destination address fields • Packet passed from node to node – One direction only • Every node must be functional – Bypass failed node needed for proper operation Understanding Operating Systems, Fifth Edition 15
  • 16. Ring (continued) Understanding Operating Systems, Fifth Edition 16
  • 17. Ring (continued) Understanding Operating Systems, Fifth Edition 17
  • 18. Ring (continued) Understanding Operating Systems, Fifth Edition 18
  • 19. Bus • Sites connect to single communication line • Messages circulate in both directions • One site sends messages at a time successfully • Need control mechanism – Prevent collision • Data passes directly from one device to another – Data may be routed to end point controller at end of the line Understanding Operating Systems, Fifth Edition 19
  • 20. Bus (continued) Understanding Operating Systems, Fifth Edition 20
  • 21. Tree • Collection of buses connected by branching cable – No closed loops • Designers create networks using bridges • Message from any site – Received by all other sites until reaching end point • Reaches end point controller without acceptance – Host absorbs message • Advantage – Message traffic still flows even if single node fails Understanding Operating Systems, Fifth Edition 21
  • 22. Tree (continued) Understanding Operating Systems, Fifth Edition 22
  • 23. Hybrid • Strong points of each topology in combination – Effectively meet system communications requirements Understanding Operating Systems, Fifth Edition 23
  • 24. Hybrid (continued) Understanding Operating Systems, Fifth Edition 24
  • 25. Network Types • Grouping – According to physical distances covered • Characteristics blurring • Network types – Local area networks (LAN) – Metropolitan area networks (MAN) – Wide area networks (WAN) Understanding Operating Systems, Fifth Edition 25
  • 26. Local Area Network • Single office building, campus, similarly enclosed environment – Single organization owns/operates • Communicate through common communication line • Communications not limited to local area only – Component of larger communication network – Easy access to outside • Through bridge or gateway Understanding Operating Systems, Fifth Edition 26
  • 27. Local Area Network (continued) • Bridge – Connects two or more geographically distant LANs – Same protocols • Bridge connecting two LANs using Ethernet • Gateway – Connects two or more LANs or systems – Different protocols • Translates one network protocol into another • Resolves hardware and software incompatibilities • SNA gateway connecting microcomputer network to mainframe host Understanding Operating Systems, Fifth Edition 27
  • 28. Local Area Network (continued) • Data rates: 100 Mbps to more than 40 Gbps • Close physical proximity – Very high-speed transmission • Star, ring, bus, tree, and hybrid – Normally used • Transmission medium: varies • Factors determining transmission medium – Cost, data rate, reliability, number of devices supported, distance between units Understanding Operating Systems, Fifth Edition 28
  • 29. Metropolitan Area Network • Configuration spanning area larger than LAN – Several blocks of buildings to entire city • Not exceeding 100 km circumference • Owned and operated by a single organization – Used by many individuals and organizations – May be owned and operated as public utilities • Means for internetworking several LANs • High-speed network often configured as a logical ring Understanding Operating Systems, Fifth Edition 29
  • 30. Wide Area Network • Interconnects communication facilities in different parts of a country or world – Operated as part of public utility • Uses common carriers’ communications lines – Telephone companies • Uses broad range of communication media – Satellite, microwaves • WANs generally slower than LANs – Examples: ARPAnet (first WAN), Internet (most widely recognized WAN) Understanding Operating Systems, Fifth Edition 30
  • 31. Wireless Local Area Network • LAN using wireless technology to connect computers or workstations – Located within range of network • Security vulnerabilities – Open architecture; difficulty keeping intruders out Understanding Operating Systems, Fifth Edition 31
  • 32. Wireless Local Area Network (continued) • WiMAX standard 802.16 – High bandwidth, long distances Understanding Operating Systems, Fifth Edition 32
  • 33. Software Design Issues • How do sites use addresses to locate other sites? • How are messages routed and how are they sent? • How do processes communicate with each other? • How are conflicting demands for resources resolved? Understanding Operating Systems, Fifth Edition 33
  • 34. Addressing Conventions • Addressing protocols – Fulfill need to uniquely identify users – Closely related to site network topology and geographic location • Distinction between local and global name – Local name within its own system – Global name outside its own system • Must follow standard name conventions (length, formats) Understanding Operating Systems, Fifth Edition 34
  • 35. Addressing Conventions (continued) • Example: Internet address – someone@icarus.lis.pitt.edu – Uses Domain Name Service (DNS) protocol • General-purpose data query service • Hierarchical • Domain names read left to right – Logical user to host machine – Host machine to net machine – Net machine to cluster – Cluster to network • Periods separate components Understanding Operating Systems, Fifth Edition 35
  • 36. Routing Strategies • Router – Internetworking device (primarily software driven) – Directs traffic • Between two different types of LANs • Between two network segments (different protocol addresses) – Network layer operation – Role changes (network designs changes) • Connects sites – To other sites and Internet Understanding Operating Systems, Fifth Edition 36
  • 37. Routing Strategies (continued) • Router functions – Securing information • Generated in predefined areas – Choosing fastest route • From one point to another – Providing redundant network connections • Routing protocol considerations – Addressing, address resolution, message format, error reporting • Address resolution – Maps hardware address Understanding Operating Systems, Fifth Edition 37
  • 38. Routing Strategies (continued) • Message formats – Allow performance of protocol functions • Finding new network nodes • Determine whether they work (testing) • Reporting error conditions • Exchanging routing information • Establishing connections (transmit data) • Most widely used Internet routing protocols – Routing information protocol (RIP) – Open shortest path first (OSPF) Understanding Operating Systems, Fifth Edition 38
  • 39. Routing Strategies (continued) • Routing information protocol (RIP) – Path selection based on node and hop number • Between source and destination – Path with smallest number of hops chosen (always) – Advantage • Easy to implement – Disadvantages • No consideration: bandwidth, data priority, network type • Update and reissue routing table: changes or not • Tables propagate (router to router) Understanding Operating Systems, Fifth Edition 39
  • 40. Routing Strategies (continued) • Open shortest path first (OSPF) – Network state determined first – Transmission path selected – Update messages sent when changes in routing environment occur • Reduces number of messages in internetwork • Reduces message size: not sending entire table – Disadvantages • Increased memory usage • Bandwidth savings offset by higher CPU usage • Shortest path calculation Understanding Operating Systems, Fifth Edition 40
  • 41. Connection Models • Communication network concern – Moving data from one point to another – Minimizing transmission costs – Providing full connectivity • Circuit switching – Dedicated communication path • Established between two hosts before transmission begins – Example: telephone system – Disadvantage • Delay before signal transfer begins Understanding Operating Systems, Fifth Edition 41
  • 42. Connection Models (continued) • Packet switching • Store-and-forward technique – Before sending message • Divide into multiple equal-sized units (packets) – At destination • Packets reassembled into original long format • Header contains pertinent packet information • Advantages – More flexible, reliable – Greater line efficiency – Users allocate message priority Understanding Operating Systems, Fifth Edition 42
  • 43. Connection Models (continued) Understanding Operating Systems, Fifth Edition 43
  • 44. Connection Models (continued) Understanding Operating Systems, Fifth Edition 44
  • 45. Connection Models (continued) • Datagrams – Packet destination and sequence number added to information • Uniquely identifying message to owning packet – Each packet handled independently – Route selected as each packet accepted – At destination • All packets of same message reassembled – Advantages • Diminishes congestion and provides reliability Understanding Operating Systems, Fifth Edition 45
  • 46. Connection Models (continued) • Datagrams (continued) – Message not delivered until all packets accounted for – Receiving node requests retransmission • Lost or damaged packets – Advantages • Diminishes congestion • Sends incoming packets through less heavily used paths • More reliability • Alternate paths set up upon node failure Understanding Operating Systems, Fifth Edition 46
  • 47. Connection Models (continued) • Virtual circuit – Complete path sender to receiver • Established before transmission starts – All message packets use same route – Several virtual circuits to any other node – Advantages • Routing decision made once • Speeds up transmission – Disadvantages • All virtual circuits fail upon one failure • Difficult to resolve congestion (in heavy traffic) Understanding Operating Systems, Fifth Edition 47
  • 48. Conflict Resolution • Device sharing requires access control methods – Facilitates equal and fair network access • Access control techniques – Round robin – Reservation – Contention • Medium access control protocols – Carrier sense multiple access (CSMA) – Token passing – Distributed-queue, dual bus Understanding Operating Systems, Fifth Edition 48
  • 49. Conflict Resolution (continued) • Round robin – Node given certain time to complete transmission – Efficient • If many nodes transmitting over long time periods – Substantial overhead • If few nodes transmit over long time periods • Reservation – Good if lengthy and continuous traffic – Access time on medium divided into slots – Node reserves future time slots Understanding Operating Systems, Fifth Edition 49
  • 50. Conflict Resolution (continued) • Reservation (continued) – Good configuration • Several terminals connected to host through single I/O port • Contention – No attempt to determine transmission turn – Nodes compete for medium access – Advantages and disadvantages • Easy implementation; works well under light to moderate traffic; better for short and intermittent traffic • Performance breaks down under heavy loads Understanding Operating Systems, Fifth Edition 50
  • 51. Conflict Resolution (continued) • Carrier sense multiple access (CSMA) – Contention-based protocol – Easy implementation (Ethernet) – Carrier sense • Node listens to/tests communication medium before transmitting messages • Prevents collision with node currently transmitting – Multiple access • Several nodes connected to same communication line as peers • Same level and equal privileges Understanding Operating Systems, Fifth Edition 51
  • 52. Conflict Resolution (continued) • CSMA Disadvantages – Collision • Two or more nodes transmit at same instant – Probability of collision increases • As nodes get further apart – Large or complex networks • Less appealing access protocol Understanding Operating Systems, Fifth Edition 52
  • 53. Conflict Resolution (continued) • CSMA/CD – Modification of CSMA – Includes collision detection (Ethernet) – Reduces wasted transmission capacity – Prevents multiple nodes from colliding • Collisions not completely eliminated (reduced) – Implemented in Apple’s cabling system: LocalTalk – Collision occurrence involves small packet • Not actual data (in case of Apple CSMA/CA) • No guarantee data will reach destination – Ensures error free data delivery Understanding Operating Systems, Fifth Edition 53
  • 54. Conflict Resolution (continued) • Token Passing – Special electronic message (token) • Generated and passed node to node – Only node with token allowed to transmit • Then passes token – Fast access – Collisions nonexistent – Typical topologies • Bus • Ring Understanding Operating Systems, Fifth Edition 54
  • 55. Conflict Resolution (continued) • Token-bus – Token passed to node in turn • Data attached; sent to destination – Receiving node • Copies data; adds acknowledgment; returns packet to sending node – Sending node passes token to next node in sequence – Initial node order determination • Cooperative decentralized algorithm • Then determined by priority based on node activity Understanding Operating Systems, Fifth Edition 55
  • 56. Conflict Resolution (continued) • Token-bus (continued) – Higher overhead at each node (than CSMA/CD) – Nodes have long waits before receiving token • Token-ring – Token moves between nodes in turn • One direction only – To send message • Node must wait for free token – Receiving node copies packet message • Sets copied bit indicating successful receipt Understanding Operating Systems, Fifth Edition 56
  • 57. Conflict Resolution (continued) • Distributed-queue, dual bus (DQDB) • Dual-bus configuration – Each bus transports data one direction only – Steady stream of fixed-size slots • Slots generated at end of each bus – Marked as free and sent downstream • Marked busy and written to • Written by nodes ready to transmit – Nodes read and copy data from slots – Continue travel toward end of bus: dissipate Understanding Operating Systems, Fifth Edition 57
  • 58. Conflict Resolution (continued) Understanding Operating Systems, Fifth Edition 58
  • 59. Conflict Resolution (continued) • DQDB advantages – Negligible delays under light loads – Predictable queuing under heavy loads – Suitable for MANs managing large file transfers – Satisfy interactive users’ needs Understanding Operating Systems, Fifth Edition 59
  • 60. Transport Protocol Standards • Network usage grew quickly (1980s) • Need to integrate dissimilar network devices – Different vendors • Creation of single universally adopted architecture – OSI reference model – TCP/IP Understanding Operating Systems, Fifth Edition 60
  • 61. OSI Reference Model • Basis for connecting open systems – Distributed applications processing • “Open” – Connect any two systems conforming to reference model and related standards • Vendor independent • Similar functions collected together – Seven logical clusters (layers) Understanding Operating Systems, Fifth Edition 61
  • 63. OSI Reference Model (continued) • Layer 1: The Physical Layer – Describes mechanical, electrical, functional specifications – Transmits bits over communication line • Examples: 100Base-T, RS449, CCITT V.35 • Layer 2: The Data Link Layer – Establishes and controls physical communications path before data sent – Transmission error checking – Problem resolution (on other side) • Examples: HDLC and SDLC Understanding Operating Systems, Fifth Edition 63
  • 64. OSI Reference Model (continued) • Layer 3: The Network Layer – Addressing and routing services moving data through network to destination • Layer 4: The Transport Layer – Maintains reliable data transmission between end users • Example: Transmission Control Protocol (TCP) • Layer 5: The Session Layer – Provides user-oriented connection service – Transfers data over communication lines • Example: TCP/IP Understanding Operating Systems, Fifth Edition 64
  • 65. OSI Reference Model (continued) • Layer 6: The Presentation Layer – Data manipulation functions common to many applications • Formatting, compression, encryption • Layer 7: The Application Layer – Application programs, terminals, computers • Access network – Provides user interface – Formats user data before passing to lower layers Understanding Operating Systems, Fifth Edition 65
  • 66. TCP/IP Model • Transmission Control Protocol/Internet Protocol (TCP/IP) – Oldest transport protocol standard – Internet communications basis – File-transfer protocol: send large files error free – TCP/IP • Emphasizes internetworking • Provides connectionless services – Organizes communication system – Three components: processes, hosts, networks – Four layers Understanding Operating Systems, Fifth Edition 66
  • 67. TCP/IP Model (continued) Understanding Operating Systems, Fifth Edition 67
  • 68. TCP/IP Model (continued) • Network Access Layer – Protocols provide access to communication network – Flow control, error control between hosts, security, and priority implementation performed • Internet Layer – Equivalent to OSI model network layer performing routing functions – Implemented within gateways and hosts – Example: Internet Protocol (IP) Understanding Operating Systems, Fifth Edition 68
  • 69. TCP/IP Model (continued) • Host-Host Layer – Transfer data between two processes • Different host computers – Error checking, flow control, manipulate connection control signals – Example: Transmission Control Protocol (TCP) • Process/Application Layer – Protocols for computer-to-computer resource sharing and terminal-to-computer remote access – Examples: FTP, SMTP, Telnet Understanding Operating Systems, Fifth Edition 69
  • 70. Summary • Network operating systems: coordinate functions – Memory Manager, Processor Manager, Device Manager, File Manager – Must meet owner reliability requirements • Detect node failures; change routing instructions to bypass; retransmit lost messages successfully • Basic network organization concepts – Terminology – Network topologies and types – Software design issues – Transport protocol standards Understanding Operating Systems, Fifth Edition 70