1 / 47

Data Communications and Networking

Data Communications and Networking. Jim Williams HONP-112 Week 7. What we will cover. Part 1: Networking overview Part 2: Data transfer methods Part 3: Communication Channels. Part 1: Networking Overview.

deliz
Télécharger la présentation

Data Communications and Networking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Communications and Networking Jim Williams HONP-112 Week 7

  2. What we will cover • Part 1: Networking overview • Part 2: Data transfer methods • Part 3: Communication Channels

  3. Part 1: Networking Overview • A Network consists of at least two computers, and other peripherals (like a printer) that are connected to each other. • It also contains the intermediate equipment that makes these connections possible. • Computer networks allow resources to be shared, and allows data to be transferred from one location to another.

  4. Why use networks? • Efficiency: For example, you can have one inventory database that is shared by many different store branches. • Economy/Ecology: For example, instead of buying and maintaining a printer for every computer in a classroom, you can just have one shared printer on the network.

  5. How is a network constructed • Network Interface Card (NIC) or the equivalent circuitry must be in each device that is connected to the network. • Communications channel(s): the appropriate physical wiring. • Separate machines that regulate how data is communicated along the network (some examples: hub, switch, router, gateway, bridge – some functionality may overlap). We will not discuss these details in this class.

  6. Geographic Types of Networks • A Local Area Network (LAN) covers a small geographical area (a house, office building, college campus, etc.) • A Wide Area Network (WAN) covers a large geographical area (a college with multiple campuses, a business with many store locations, etc.) • Frequently, WANs consist of multiple LANs that are connected to each other over long distances.

  7. Network Protocols • A Protocol means a “set of rules” that the computers on a network must understand in order to communicate with each other. • Different networks can use different protocols. Some you may have heard of include: • Ethernet (common for LANs and WANs) • TCP/IP – Transfer Control Protocol / Internet Protocol • HTTP – Hypertext Transfer Protocol (i.e. the WWW) • There are many others. Just know that a computer that understands one protocol cannot communicate with another computer that understands a different protocol. • However, in practice, MOST computers and other digital devices are configured to “understand” TCP/IP.

  8. Machine Addresses • Part of the network interface circuitry in a machine includes a unique address called a Machine Access Control (MAC) address. • These addresses are binary patterns which are 48 bits long. • How many bytes long are MAC addresses • How many possible MAC addresses are there? • Do you think it is possible to run out of MAC addresses? What then?

  9. IP Addresses • Besides MAC addresses, another way of identifying a computer is the IP Address. • This is only applicable of course devices that understand the TCP / IP protocol, and wish to operate over the Internet. • These addresses are binary patterns which are (at this time) 32 bits long. • How many bytes long are IP addresses • How many possible IP addresses are there? • As Internet use has increased, there is a danger of running out of available IP addresses. Think how you would solve the issue, then research how the issue is currently being handled.

  10. Two Primary Network Types • Peer-to-peer networks consist of numerous computers connected to each other, but there is no “main” computer in the system. • Example: file-sharing networks like bit torrent, limewire, etc. • Client-Server networks consist of a main computer called the “server,” and the multiple computers attached to it are called the “clients. • Example: the BlackBoard system at this college. You have to log into the BlackBoard server from your home computers (which function as the clients).

  11. Two Primary Network Types • Peer-to-peer networks consist of numerous computers connected to each other, but there is no “main” computer in the system. • Example: file-sharing networks like bit torrent, limewire, etc. • Client-Server networks consist of a main computer called the “server,” and the multiple computers attached to it are called the “clients. • Example: the BlackBoard system at this college. You have to log into the BlackBoard server from your home computers (which function as the clients).

  12. Network Topologies • Topologies describe the ways that machines are connected to each other on a network. • We will briefly discuss some – try to think of the advantages and disadvantages of each as we do.

  13. Ring and Mesh Topologies • Ring : Each machine on the network is attached to only and only two others. • Less expensive, but less resistant to failure • Mesh: Each machine is attached to every other machine • Very resistant to failure, but expensive to maintain.

  14. Star and Bus Topologies • Star : Each machine has a single connection to a central machine. • Very common for client-server networks. Network will fail if central machine goes down. • Bus: Each machine is connected to a single high-capacity data line called a “backbone” • Example: large telecommunications networks.

  15. Tree Topology • Tree : This is actually several star networks attached to a “backbone” that essentially connects networks to other networks. • Very common for wide–area networks of large businesses, universities, etc. that may have multiple physical locations, each with its own network.

  16. Part 2: Data transfer methods (sending / receiving) • Networks would be useless unless we were able to actually send data from one machine to another. • There are many ways to do this, but we will focus on one very common method that is shared by many types of network protocols.

  17. Asynchronous transfer • Data communication in most cases happens asynchronously. • This means that a single logical “piece” of data sent over the network (for instance a file, an e-mail message, etc.) is not transmitted “in order.” Rather it can be “broken up” into smaller pieces, and later “reassembled” once all the pieces arrive at the destination. It does not matter what order the pieces arrive in!

  18. Book/Pages analogy • Imagine you had written a book, and you were MAILING (using the Post Office) a copy to your editor. • But for some strange reason your editor only allows you (and all the other authors he works with) to mail one page at a time, in separate envelopes! There is of course no guarantee that all of the envelopes will arrive at the publisher in the correct order, etc. • Is this possible? Yes. But think for a minute what would be needed for this scheme to work successfully.

  19. Book/Pages – what we need • You (the sender) would need a way to communicate directly with the editor (the receiver). • The sender needs to tell the receiver to expect a new book. • The sender needs to know where to mail the pages to. • The receiver needs to know where the pages are being mailed from. • The receiver also needs to know what book the page is from (the same author may be mailing several books). • The receiver also needs to know how many pages each book should have. • The receiver needs a way to notify the sender if any pages are missing. The sender can the re-send. • The receiver needs a away to confirm with the sender that the entire book was received successfully.

  20. Book/Pages – envelopes • If we are mailing a letter, an envelope can contain the sender and receiver address. • If we wish, we can also write the title of the book, and something like “page number 7 of 153” on the envelope as well. • To keep things safe we can also write this information on each page that we put into the envelope (in case the envelope gets lost...).

  21. Book/Pages – receiving • The receiver will of course first divide the many envelopes he receives into separate stacks for each sender/book he receives books from. • Then he opens each envelope and assembles the book pages into the correct order as they come in. • If after a certain amount of time (days in this case??) there are still missing pages, based on what the total number of pages is, he will call the sender so the page can be re-sent.

  22. Author/Editor communication • Notice the various types of communication that need to happen: • Author tells editor to expect a book shipment (good thing to check – what if editor is on vacation/unavailable)? • Editor needs to ask author for any missing pages after an agreed-upon time. • Author needs to inform editor that the book has been received in its entirety, and author needs to confirm/agree. This marks the end of that transaction between the two parties.

  23. Sending a file over a network • When a file, or other single “piece” of data is send over a network, almost the same thing happens as in our hypothetical author/editor example. • The data is broken into smaller chunks called “packets” which are sent out to their destination on the network. • All the packets may not arrive at the same time, or even by the same means, but hopefully they all eventually get to their destination.

  24. Data packets • A data “packet” consists of two main parts. • There is a “header” which describes what the packet contains, where it is coming from, where it is going to, etc. This is simliar to the “envelope” in our example. • There is also the data itself the packet contains. This is similar to the “page” in our example. • Different protocols have different formats for packets. We will not be concerned with the technical details. Just know the principles.

  25. Errors and Acknowledgement • The sending machine must establish communication with the receiving machine. The receiving machine must of course respond in kind. In technical terms this is called a “handshake.” • When packets are received they must of course be re-assembled. • If any expected packets are missing, the receiving machine sends a special signal to the sending machine to re-send the packet. • When the file is successfully reassembled the receiving machine sends an “Acknowledgement” signal to the sending machine that the file was received. • The sending machine can then end the “handshake” and the transaction is complete.

  26. Sample Data Transfer Problem • Given: Our imaginary packet format is as follows: • Header: • File ID Number: • From: • To: • Total packets for this file: • Packet Number for this packet: • Data • 16 Byte “chunks”

  27. Sample Data Transfer - file • File: a text file that says “I love learning about data communication.” • Assume we are using ASCII (1 byte per character) as per our ASCII chart to store this data digitally. • So the file is 41 bytes long. We said that it needs to be broken up into 16-byte “chunks”. This means we need to break it up into three packets before we send it over the network.

  28. Sample Data Transfer - file • It is easiest at this point to express the file in hexadecimal bytes as per our ASCII chart.. • Then we can easily break up into our three packets. • “I love learning about data communication.” • Expressed in hexadecimal characters: • 49 20 6C 6F 76 65 20 6C 65 61 72 6E 69 6E 67 20 • 61 62 6F 75 74 20 64 61 74 61 20 63 6F 6D 6D 75 • 6E 69 63 61 74 69 6F 6E 2E

  29. Sample Data Transfer – packet data • Here is our hexadecimal representation of the file. Remember that a single ASCII byte is represented by two hex digits. So: • Packet 1 data: • 49 20 6C 6F 76 65 20 6C 65 61 72 6E 69 6E 67 20 • Packet 2 data: • 61 62 6F 75 74 20 64 61 74 61 20 63 6F 6D 6D 75 • Packet 3 data: • 6E 69 63 61 74 69 6F 6E 2E

  30. Sample Data Transfer – packet header • Each packet must also contain a header. We will be completely hypothetical and say that we can represent this however we wish. Let’s just keep our header in “plain English” for this exercise. Let’s use this header: • File ID: 435-2011-10-13-08:09:76.341AM • From: 435 • To: 3998 • Total number of packets: 3 • Packet number: (# of packet)

  31. Sample Data Transfer – a sample packet • Here is what packet 2 for this example may look like: • File ID: 435-2011-10-13-08:09:76.341AM • From: 435 • To: 3998 • Total number of packets: 3 • Packet Number: 2 • Packet Data: 61 62 6F 75 74 20 64 61 74 61 20 63 6F 6D 6D 75

  32. Data Transfer: Review • Understand the basics of how asynchronous transfer works. • I may give you packets and ask you to reassemble the text file (and also possibly identify any errors with the packets if that is the case!). • I may also give you a text file and tell you to break it into packets, using some clearly-defined hypothetical scheme.

  33. Part 3: Communication channels • The next slides will discuss data communication channels and their units of performance measurement. • We will also work out some hypothetical problems to determine how much time certain data transfers may take.

  34. Analog vs. digital again • Most communication channels (wires/lines) are suited for analog electrical signals (due to physical properites that are beyond this class) • So, before data is sent through a channel, it has to be modulated into an analog form (without getting too technical: 0s and 1s are translated into different “frequencies”). • When it is received by the other machine, it must be de-modulated back to digital form. • The device that does this is called a modulator/de-modulator, or “Modem” for short.

  35. Bandwidth • This term is used to describe the amount of data that can pass through a point in the network during some specified length of time. • The time element is very most important to keep in mind. Because, in this context, the bandwidth is what determines the speed in which the data can travel from one point to another.

  36. Water/Hose analogy • Imagine I wanted to pump 100 gallons of water from a lake into a storage tank. • I have two hoses I can choose from (a narrow garden hose, and a wide firefighter’s hose). • Of course, 100 gallons of water can pass through either hose with no problems. • But, through which hose will it take less TIME for the 100 gallons to pass through?

  37. Water/Hose analogy • Simple physics tells us that it will take longer for the same volume of liquid to move from point A to point B when confined to a smaller space, versus a larger space (because less water can reside in a smaller space - at a point in time - than in a larger space) • So, the same volume of water will take a longer time to move through the narrow hose, as opposed to the wider hose. • Looked at another way, we can pick a point on the hose and measure the volume of water which passes that point in a given time (like one second).

  38. Data Communication: Bandwidth • Bandwidth is a figure that describes how many bits can be communicated along the data communications channel in a given interval of time. • Different communications channels have different bandwidths (for various physical and technical reasons). • In most cases bandwidth is measured relative to Bits (as opposed to bytes). • So you will frequently see figures relative to kilobits (Kb), Megabits (Mb), etc. Notice the lower case “b” – which means a single bit.

  39. Some typical bandwidths ** • Ethernet (LAN): 100 Mbps • T1 backbone (WAN): 1.5 Mbps • T3 backbone (WAN): 44 Mbps • Telephone Modem: 56 Kbps • ADSL Modem: • 2 Mbps (download) / 512 Kbps (upload) • Cable Modem: • 5 Mbps (download) / 384Kbps (upload) • Fiber Optic Internet • 15Mbps (download) / 5Mbps (upload) ** IMPORTANT – These are just some samples. There are many variations – too numerous to mention. If you are curious about the bandwidth of your own personal network service (like Cable/DSL, etc.) contact your vendor.

  40. A caution about bandwidth figures • Bandwidth figures do not always give an accurate representation of real-world performance. • Many issues, including the current amount of other network activity, can cause performance to degrade and the data communication “speeds” to be much slower that the stated figures. • While “bandwidth” describes what a network is capable of, the term “throughput” is sometimes used to describe actual performance (of course this changes as the network conditions change).

  41. Sample Problem • I want to download a 6.5 MB file from the Internet. I am using an ASDL service capable of 2Mbps download bandwidth. Assuming that I am getting maximum throughput, how long, in seconds, will it take to down load the file? • You can do this two ways: express the file in terms of bits, or express the bandwidth in terms of bytes. • For this example we will use the first method.

  42. Sample Problem Continued • Express a 6.5 MB file size in terms of bits. • There are 8 bits for every byte, so we multiple 6.5 by 8 to get the size in bits. • 6.5 MB * 8 = 52 Mb (notice the small “b”). • From now on consider the file to be 52 Mb.

  43. Sample Problem Continued • Now, we know the file size is 52 Mb. We also know the bandwidth is 2 Mbps. • So divide the file size by the bandwidth. The Mb will “cancel out” and we will be left with a measurement in seconds. • X = 52 Mb / (2 Mb / sec) = 26 seconds

  44. What’s Missing? • When we discussed the file wise, we did NOT account for any breaking it up into packets, additional space for packet headers, etc. • We also did not adjust for any other issues that may impact the network performance. • This is because I am only trying to teach the basic principles of how we can calculate the network performance, given a file size and a bandwidth. • In real life there are many other factors that come into play, beyond the scope of this class. But hopefully these simplified problems will help you understand the concept.

  45. Sample Problem 2 • Let’s try another probem, stated in simpler terms: • Given: File size = 45 MB, bandwidth = 384 Kbps (cable upload speed) • How many minutes will it take to upload the file?

  46. Sample Problem 2 • File Size: 45MB * 8 = 360 Mb • ** file size now expressed as megabits • Bandwidth: 384 Kbps • X = 360 Mb / (384 Kb / sec) • X = 360 Mb / (.384 Mb / sec) • ** both figures expressed as megabits. (Remember K means “times a thousand” and M means “times a million”). • X = 937.5 sec • X = 937.5 sec / (60 sec / min) = 15.625 min • **answer expressed in minutes

  47. Communication Channels Review • For solving performance problems: • Know the time increments the answer is supposed to be in • Take care to do proper conversions to make sure both the file size and bandwidth are relative to the same units of measure (bits vs bytes). • Along with this, also make sure you handle the prefixes like Kilo- and Mega- correctly. • We did all these things in our second example problem. Know how to solve other problems of similar complexity.

More Related