• Non ci sono risultati.

Chapter 15 – Part 2 Networks

N/A
N/A
Protected

Academic year: 2021

Condividi "Chapter 15 – Part 2 Networks"

Copied!
21
0
0

Testo completo

(1)

Chapter 15 – Part 2 Networks

The Internal Operating System

The Architecture of Computer Hardware and Systems Software:

An Information Technology Approach 3rd Edition, Irv Englander

John Wiley and Sons 2003

Wilson Wong, Bentley College Linda Senne, Bentley College

(2)

Network Basics

 Communication paths

 Protocol standards

 Data transmission

 By character or byte at a time

 By sending the entire message at a time

 By subdividing the messages into packets and sending each packet at a time

Frames are packets that have been further

subdivided to meet requirements of the media

(3)

Packet Header

 Also known as the preamble

 Contains

 Description of the packet

 Destination address of receiver

 Source address of sender

 Information about the data being sent

(4)

Advantages of Packets

 Reduces communication overhead

 Reasonable unit for routing of data

 Alternative to dedicating a channel for the entire length of the message

 Packets from several sources can share a single channel

 Each sender/receiver pair appears to have a channel to itself

 Receiving computer can process an entire block of

data instead of a character or byte at a time

(5)

OSI Reference Model

 Open Systems Interconnection Model

 Developed by International Standards Organization (ISO)

 Contains seven layers

 All People Seem To Need Data Processing

 People Do Not Through Sausage Pizza Away

 Application

 Presentation

 Session

 Transport

 Network

 Data Link

 Physical

(6)

Layers of the OSI Model

(7)

OSI Physical Layer

 Responsible for transmission of bits

 Implemented primarily through hardware

 Encompasses signaling method,

electrical and mechanical interfaces

 Example: RS-232, 10Base5

(8)

OSI Data Link Layer

 Responsible for error-free, reliable transmission of data

 Frames sized for compatibility with the MAC protocol

 Flow control, error detection and correction, retransmission

 Uses MAC addresses

(9)

OSI Network Layer

 Responsible for addressing and routing of messages to final destination

 Breaks up messages into frames that meet the requirements of intervening networks

 Local network – no routing

 Physical address is appended to each packet

 Symbolic addresses are converted to physical address through a lookup table

 External network – routing required

 External tables are used to assist in routing

(10)

OSI Transport Layer

 Ultimate final address of destination is determined

 All end-to-end communication including intermediate nodes

(11)

OSI Session Layer

 Establishes a dialogue between two applications or processes between systems

 Terminates connection at end of session

 Manages logins, password

exchange, logoffs

(12)

OSI Presentation Layer

 Provides format and code conversion services

 Examples

 File conversion from ASCII to Unicode

 Encryption, decryption

 Data reformatting

 Conversion between data formats used by

(13)

OSI Application Layer

• Provides utilities and tools for

application programs and users

(14)

TCP/IP

 Transmission Control Protocol/Internet Protocol

 Physical and Data Link layers are not specified by the TCP/IP protocol

 Internet Protocol

 Implemented in workstations and routers

 Messages are segmented into packets and are re- assembled at the other end

 Uses IP for addressing and routing between networks

 Transport

 Reliable end-to-end connectivity

(15)

TCP & UDP

 Most TCP/IP applications use TCP for transport layer

 TCP provides a connection (logical

association) between two entities to regulate flow check errors

 UDP (User Datagram Protocol) does not

maintain a connection, and therefore does not

guarantee delivery, preserve sequences, or

protect against duplication

(16)

Comparison of OSI and TCP/IP

(17)

Network Services

 Protocol Stacks

 Sockets

 Network file transfers

 Print services

 Web services

 Messaging services

 Application program access to network services

 RPC – remote procedure calls

 Security and network management services

 Remote processing and login services

(18)

Network File Transfers

 FTP

 Internet file transfer protocol

 Logical names for machine or drive

 Windows

 Network files can be accessed

transparently by being mounted directly

into the current file system

(19)

Access for a Networked

Operating System

(20)

Network Systems

 Distributed system

 Collection of independent computers that appear to the users of the systems as a single computer

 Client-Server system

 Control is centralized in the server computer

 Client computers have network access limited to services provided by the servers

 Peer-to-Peer system

(21)

Copyright 2003 John Wiley & Sons

All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the permissions Department, John Wiley & Songs, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the

information contained herein.”

Riferimenti

Documenti correlati

18 This clarifies why the ventilated extension from six to ten years in the duration of loans covered by public guarantees could mitigate the problem without solving it. To solve

High-level scheduling Adding a program to the pool of programs to be executed. Short-term

Analysis of the flocculation process taking into consideration the forces that affect particles aggregation, as well as forces acting in the reaction tank, allows to

La prima parte della tesi riguarda un’analisi dei testi del filosofo francese (Cahiers pour une morale, Morale et subjectivité, Détermination et liberté) e, in modo particolare,

The novelty of the thesis mainly resides in the use of novel data-sets, the careful analysis of the impact of the Great Recession on the labour markets of the

The results show that high levels of economic growth and development can be obtained in all the different political systems; therefore, the main difference among the four types

Software and services vendors who provide cloud-enabled application solutions. Services vendors may provide cloud business and technical consulting as well as

Aunque se tiende a pensar que los modelos más antiguos de edificios que se conservan no eran propiamente arquitectónicos, tal y como señala Gentil Baldrich: «La mera