CSC461-CN-Lecture-11-Feb.-4-2013
-
Upload
manishya-krishna -
Category
Documents
-
view
214 -
download
0
Transcript of CSC461-CN-Lecture-11-Feb.-4-2013
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 1/45
BITS PilaniPilani | Dubai | Goa | Hyderabad
Network VirtualizationLecture - 11, February 4, 2013
Rahul Banerjee, PhD (CSE)
Professor, Department of Computer Science & Information Systems
E-mail: [email protected]
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 2/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
• Network Virtualization
• Network-based Virtualization
• Current State-of-the-art and Evolving Research
Directions• From Clusters and Grids to Clouds
• Wearable Computing
• Ubiquitous or Pervasive Computing
• Select References to the literature • Summary
Interaction Points
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 3/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
• LAN Virtualization:
– LAN Emulation
– Virtual LANs (VLANs)
• WAN Virtualization: – WAN Emulation
– Virtual Private Networks (VPNs)
• OvertheInternet
• OverNon-InternetInfrastructure
• Sub-IP-levelVPNs
• IP-levelandHigherLevelVPNs
Network Virtualization
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 4/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
• What is a VLAN?
• How can we create a VLAN?
• Benefits of a VLAN
• Disadvantages of a VLAN
• Types of Contemporary VLANs
• VLAN Standards• IEEE 802.1q
• VLAN Tagging & Trunking
Virtual LAN (VLAN)
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 5/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
• What is LAN Emulation?
• When do we do LAN Emulation?
• Examples of LAN Emulation
• Advantages of LAN Emulation
• Disadvantages of LAN Emulation
• LAN Emulation versus LAN Simulation
LAN Emulation
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 6/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
• Need for WAN Virtualization• Contemporary practices involved in WAN
Virtualization – Public WANs
• Examples:TheInternet,TheNKN – Private WANs
• Examples:TTSL,TC,RelianceWANs
– Virtualized Private WANs / Virtual PrivateNetworks
• Examples:BITS-Connect2.0MPLS-VPN,BITSERPMPLSVPN
WAN Virtualization
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 7/45BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Network-based Virtualization
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 8/45
OfClusters,GridsandClouds• Networks:
– Asetofautonomouscompute/communicaQonnodesinterconnectedforthepurposeofmeaningfulresourcesharing,requiresupporQngprotocolstacks,not
transparenttotheusers
• Clusters
– Homogeneous(plaorm/OS),allinvolvednodesoenbelongtoasingleenQty
andfrequentlydesignedforhigh-performancecompuQng,maybelimitedtooneormorerackswithinthesameroom(example:HPCclusters),easiesttodeploy
andmanage
• Grids
– Oenheterogeneous(plaorm/OS),FrequentlyspreadovermulQplenetworks
andnetworktypes,mayinvolvesingleormulQpleorganizaQons,requiregreater
effortindeploymentandadministraQon
• Clouds
– Maybepublic,privateandhybrid,supportmulQplelevelsofabstracQons/
virtualizaQon,typicallyspreadoverwideareas,expectedtobetransparenttothe
user,offerthehighestlevelsofredundancy/availability,
F e b r u a r y 4
, 2 0 1 3
( c ) D r .
R a h u l B a n e r j e e ,
B I T S P i l a
n i
, I N D I A
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 9/45
Afewpointsofsignificance
• VirtualizaQonistheunderlyingcommontechnologyinvolvedinallthethreeparadigms
• Networkingisthekeyenableringredientineach
ofthesecases
• Cost-effecQveness,robustnessandscalability
improveaswemovefromclustertocloudbut
overheadsandinternalcomplexityaddup
F
e b r u a r y 4
, 2 0 1 3
( c ) D r .
R a h u l B a n e r j e e ,
B I T S P i l a
n i
, I N D I A
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 10/45
TypesofClouds&Associated
VirtualizaQon
• TypesofClouds:ClassificaQon-1<basis:modelofoperaQon>
– PublicClouds(mulQ-tenancy,widevariaQons,mulQ-
service,on-demandcapacityaddiQonacommonfeature)
– PrivateClouds(singletenancy,limitedvariaQons,higher
capitalinvestments,greatercontrol,moresecure)
– HybridClouds(near-opQmalbestofbothworlds,if
configuredwell)
•
TypesofClouds:ClassificaQon-2<basis:devicevirtualizaQon>
– InfrastructureCloud,ComputaQonalCloudetc.
• TypesofClouds:ClassificaQon-3<basis:servicevirtualizaQon>
– Plaormasaservice,Sowareasaservice,Storageasa
service,CollaboraQon&SharingServicesetc.
F
e b r u a r y 4
, 2 0 1 3
( c ) D r .
R a h u l B a n e r j e e ,
B I T S P i l a
n i
, I N D I A
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 11/45
Case-StudyofofaNetwork-BasedMulQ-siteCollaboraQonSystemDesign
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 12/45BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Project BITS-Connect 2.0
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 13/45
WearableCompuQngElements
February4,2013 (c)Dr.RahulBanerjee,BITSPilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 14/45
E-FabricofaWearableGarment
February4,2013 (c)Dr.RahulBanerjee,BITSPilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 15/45
Paradiso&Starner’sShoes<1995>for
ElectricalEnergyGeneraQon
February4,2013 (c)Dr.RahulBanerjee,BITSPilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 16/45
PervasiveCompuQngwithAR
February4,2013 (c)Dr.RahulBanerjee,BITSPilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 17/45
References
• Larry L. Peterson & Bruce S. Davie: Computer Networks: A Systems Approach,Fifth Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011. <System designapproach>
• S. Keshav: Computer Networking: An Engineering Approach, PearsonEducation, New Delhi, 1997.
• A. S. Tanenbaum: Computer Networks, Fifth Edition, Pearson Education, NewDelhi, 2012. <Conceptual Approach>
• Y. Zheng and S. Akhtar: Networks for Computer Scientists and Engineers,Oxford University Press, New York, 2002. <Structural approach>
• A. Leon Garcia and I. Widjaja: Communication Networks: FundamentalConcepts and Key Architectures, Second Edition, Tata McGraw-Hill, New Delhi,2004.
• Mohammed G. Gouda: Elements of Network Protocol Design, Wiley Student
Edition, John Wiley & Sons (Pte.) Ltd., Singapore, 2004.• Thomas G. Robertazzi: Computer Networks and Systems: Queuing Theory and
Performance Evaluation, Third Edition, Springer-Verlag, New York, 2000.<Analytical approach>
04/02/13 (c)Dr.RahulBanerjee,BITSPilani,INDIA 17
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 18/45
What is next?
Subsequentlecturesshallintroduceyoutothefollowingtopics:<notinthesameordernecessarily>
• Topologiesinvolved
• Performance
• ualityofService
• Reliability
• Security
• ProtocolsandMechanismsinvolved
• MethodsofSimulaQon
• Sengupaphysicalsystemandconfiguringit
• NetworkAnalysis
04/02/13 (c)Dr.RahulBanerjee,BITSPilani,INDIA 18
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 19/45
References
• Larry L. Peterson & Bruce S. Davie: Computer Networks: A Systems Approach,Fifth Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011. <System designapproach>
• S. Keshav: Computer Networking: An Engineering Approach, PearsonEducation, New Delhi, 1997.
• A. S. Tanenbaum: Computer Networks, Fifth Edition, Pearson Education, NewDelhi, 2012. <Conceptual Approach>
• Y. Zheng and S. Akhtar: Networks for Computer Scientists and Engineers,Oxford University Press, New York, 2002. <Structural approach>
• A. Leon Garcia and I. Widjaja: Communication Networks: FundamentalConcepts and Key Architectures, Second Edition, Tata McGraw-Hill, New Delhi,2004.
• Mohammed G. Gouda: Elements of Network Protocol Design, Wiley Student
Edition, John Wiley & Sons (Pte.) Ltd., Singapore, 2004.• Thomas G. Robertazzi: Computer Networks and Systems: Queuing Theory and
Performance Evaluation, Third Edition, Springer-Verlag, New York, 2000.<Analytical approach>
© Dr. Rahul Banerjee, BITS, Pilani (India)04/02/13 (c)Dr.RahulBanerjee,BITSPilani,INDIA 19
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 20/45
04/02/13 (c)Dr.RahulBanerjee,BITSPilani,INDIA 20
ArchitectureoftheInternet1of2
• Brief Historical Notes:
– Initiated by the US Department of Defense (DoD) through its Advanced Research Project Agency (ARPA) and was hence called ARPANet.
– Originally, it was a point-to-point WAN involving only four nodesacross the USA.
– Original architecture that led to ARPANET has evolved over the years
that have passed by. – In later years, ARPA / DARPA dissociated with it and allowed to this tobe blossomed into the Global Public Internet as we see it now.
• Current Status: – It is loosely hierarchical.
– Has no single body that owns it or rigidly controls it. ---Mostly run through volunteer efforts and by consensus.
– Runs several services, in a distributed manner, includingthe immensely popular World-Wide Web.
– Is helped by global cooperation including those from
governments and corporates apart from academia
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 21/45
04/02/13 (c)Dr.RahulBanerjee,BITSPilani,INDIA 21
ArchitectureoftheInternet2of2
•
Currently, Internet architecture is designed for the best-effort delivery and is largely governed by the IAB of theInternet Society (ISoc). – ISoc has many sub-organs which facilitate evolution and
coordinated maintenance of the Internet. – IESG steers the ISoc in a general way the engineering issues
are resolved. – IETF workgroups do the ground work and by a democraticprocess helps community in building up engineering solutionsthrough IETF drafts and standards (RFCs) etc.
• Currently, the TCP/IP stack is the dominant protocolstack over which the Internet runs.
• Keeping the needs of expansion and improvement, thisprotocol family has continually evolved over last 30+years. – Current version of IP is IPv6, although IPv4 is still dominant in
use.
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 22/45
04/02/13 (c)Dr.RahulBanerjee,BITSPilani,INDIA 22
WhatistheInternettoday?
• Wide Area Network of variety of networks• Global
• Public• Not transparent, as yet
• Hybrid topology but largely hierarchical• No single controller
• Internet Society (ISoc) oversees, assists ---does not control
• QoS, Security continue to have issues – partly atleast
• Web, mail, commerce, education, entertainment,sharing continue to dominate its applicationspace
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 23/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Project BITS-Connect 2.0
The Immersive Tele-presence Rooms
•
This is how an18-seater
immersive tele-
presence room
looks like at all
the Indiancampuses.
• Chancellor’soffice
isequippedwith
onetwo-seatersystem
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 24/45
(c)Dr.RahulBanerjee,BITS,Pilani,India
24
A Few More Networking Terms
•
Repeaters / Repeater Hubs / Shared Hubs: where usually Physicallayer / level exist with L1-protocol data unit (raw bits) regeneration andonward transmission
• Managed Hubs / Layer-2 Switching Hubs: where Physical and Data Linklayers / levels exist with ability to handle and deliver Layer-2-protocoldata unit (frame)
• Bridges: where Physical and Data Link layers / levels exist with L2-
protocol data unit (frame) processing and forwarding• Switches: where Physical and Data Link and / or Network (sometimes
even higher) layers / levels exist with Layer-2 and / or Layer-3-protocoldata unit (frame / packet) processing, switched routing / forwarding
• Routers: where Physical and Data Link and Network layers / levels existwith L3-protocol data unit (packet) processing, routing and forwarding
• Gateways: where two or more different networks meet and may requireprotocol / message translation capabilities
• Clouds: abstraction of node connectivity in the networking context<details hidden>
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 25/45
Frames:LinkLayer(L-2)DataUnits
• Frame• TheunitofDataasexpressedattheDataLinkLayer
(Layer-2oftheHypothe0calmodelusedforinstruc0on)isconvenQonallycalledaFrame.
• FramescantakedifferentformatsandsizesdependingupontheprotocolinquesQon
• FramesdoincludefieldslikesynchronizaQon,addressing,payload,control-informaQonetc.
• FrameForwarding• Theprocessofmovingframesfromoneporttoanotherina
bridgeorswitch.
25 (c) Dr. Rahul Banerjee,BITS, Pilani, India
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 26/45
Frames:Factorsthatmaer!
• Synchronization: Transmitter & Receiver need tobe in sync
• Start Delimiter: Required to mark starting bit
• End Delimiter: Required to mark the end bit
• Control Information: Information suggesting datahandling and interpretation
• Error Detection / Correction / Retransmission
• Flow Control: Required for avoiding data lossdue to overflow at receiving end
• Data Length: Needed if data-field is not of fixedsize
26 (c) Dr. Rahul Banerjee,BITS, Pilani, India
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 27/45
LogicalViewofa10-GbpsUnit
hp://www.ovislinkcorp.co.uk/linkd.GIF
7 1 6 6 2 46=<15
00 4
Pre SFD DA SALengthType
Data unit+ pad
FCS
FrameStructure-10GigabitEthernet(IEEE802.3aeforLAN,WANandMAN)
ItusesthesameMACframeastheEthernet.
hp://www.javvin.com/pics/10GigE.gif&imgrefurl=hp://www.javvin.com/protocol10GigE.html&usg=__VuNx4T-UphUAzm-
_AEsDqMqvzL=&h=374&w=576&sz=34&hl=en&start=10&um=1&itbs=1&tbnid=JlvKsLiP2xuOfM:&tbnh=87&tbnw=134&prev=/images%3Fq%3Dgigabit%2Bethernet%26hl%3Den%26safe%3Doff%26um%3D1
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 28/45
SummaryofDifferencesBetweenL-2Switches,
Routers(L-3)andL-3Switches
• BridgesandLayer-2switchesdividethe
networkintosegmentsormicro-segments
(apartfromhelpinginLayer-2protocol
translaQon,management,securityetc.)
• Ineffect,wecansaythat
– Layer-2Switches/Bridgesseparatecollision
domains
– Layer-2Switches/Bridgescancarryoutprotocol
translaQons
04/02/13 (c)Dr.RahulBanerjee,SDETUnit,BITS-Pilani,INDIA
28
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 29/45
SummaryofDifferencesBetweenL-2Switches,
Routers(L-3)andL-3Switches
• RoutersareLayer-3deviceswhohandleLayer-3packetrouQngwithinand
outsidethelocalnetwork/internetworkandthereforeeffecQvely
separatebroadcastdomainswhichendatitsdifferentnetworkinterfaces
eachofwhichcarriesaseparateSubnet-idenQfier/Subnet-address(apart
fromLayer-3protocoltranslaQon,monitoring,securityandmanagement)
• Thus,ineffect,wecansaythat:
– RoutersSeparatebroadcastdomains(eachofsuchbroadcastdomainswhich
endatitsdifferentnetworkinterfaceseachofwhichcarriesaseparate
Subnet-idenQfier/Subnet-address)
– RouterscancarryoutinteriorrouQngand/orexteriorrouQng,depending
upontheirlocaQoninthenetwork – RouterscancarryoutprotocoltranslaQons(intermsofprotocol-specific
packetformatsaswellasintermsofallowingappropriatelyformaed
selecQvedataspecifictorouQngprotocolstheymaysupport).
04/02/13 (c)Dr.RahulBanerjee,SDETUnit,BITS-Pilani,INDIA
29
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 30/45
SummaryofDifferencesBetweenL-2Switches,
Routers(L-3)andL-3Switches
• Layer-3switchesaredeviceswhichcanhandleallfuncQonaliQesofLayer-2Switchesaswellasfast(oenbasedonheader/tag/labelswitching)Layer-3
packetrouQngwithinbutnotoutsidethelocalnetwork/internetwork;and
therefore,effecQvelyseparatebroadcastdomainswhichendatitsdifferent
LANinterfaceseachofwhichcarriesaseparateSubnet-idenQfier/Subnet-
address(apartfromopQonalLayer-3protocoltranslaQon,monitoring,securityandmanagement)
• Thus,ineffect,wecansaythat:
– L-3SwitchesSeparatebroadcastdomains(eachofsuchbroadcastdomainswhich
endatitsdifferentLANinterfaceseachofwhichcarriesaseparateSubnet-
idenQfier/Subnet-address) – L-3SwitchescancarryoutfastinteriorrouQng/packet-switchingoenbasedon
header/tag/labelswitching
– Layer-3Switches,opQonally,cancarryoutprotocoltranslaQons(intermsof
protocol-specificpacketformats).
04/02/13 (c)Dr.RahulBanerjee,SDETUnit,BITS-Pilani,INDIA
30
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 31/45
InsideaLayer-2Switch
• ElementsofaLayer-2Switch
– Processors(Front-endProcessorsonLineCards)for
FrameRouQng
– MulQpleBuffersforMulQpleueues
– SharedI/OBusorRing(1st/2ndGen.)/Switching
Fabric(3rdGen.)
– I/PLineControllers(ILC)
– O/PLineControllers(OLC)
31 (c)Dr.RahulBanerjee,BITS,Pilani,India
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 32/45
SomeMoreTermsofRelevance• Collision Domain
– The set of all stations connected to a networkwhere faithful detection of a collision can occur.
– A collision domain terminates at a switch port.• Late Collision
– A failure of the network in which the collision
indication arrives too late in the frametransmission to be automatically dealt with by themedium access control (MAC) Protocol.
– The defective frame may not be detected by allstations requiring that the application layer detectand retransmit the lost frame, resulting in greatlyreduced throughput.
• CRC
– Cyclic Redundancy Check is an error-checkingtechnique used to ensure the fidelity of receiveddata.
32 (c) Dr. Rahul Banerjee, BITS, Pilani, India
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 33/45
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
• Current State-of-the-art and Evolving Research
Directions
• Sensor Networks
• Wearable Computing
• Ubiquitous or Pervasive Computing
• Select References to the literature
• Summary
Interaction Points
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 34/45
WirelessCommunicaQoninWearables
February4,2013 (c)Dr.RahulBanerjee,BITSPilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 35/45
UserInterface&Sensors
February4,2013 (c)Dr.RahulBanerjee,BITSPilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 36/45
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 37/45
(c)Dr.RahulBanerjee,BITS,Pilani,India 37
IntroducingSomeTermsRelatedtoNetworks
• Channel <application-level logical / virtualcommunication path>
• Services: Functionalities provided by a layer /protocol / entity
• Interfaces: Peer-to-Peer / Layer-to-Layer / entity-to-entity
• Service Access Points: defined addresses / portsthrough which data / parameters are passed
• Tunneling <Encapsulation & Decapsulation>
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 38/45
What do we mean by a Network
Protocol? – Perspective-1:
• A Network Protocol is a set of rules and conventionsleading to a set of pre-defined requests / commandsand responses for any meaningful communication /exchange of control / information / both
– Perspective-2:
• A Network Protocol may also be viewed as abstractinterfaces in terms of operations associated with aninterface definition in the context of one or moreservices on offer along with the set of parameters,form, format, message types, meanings associatedwith the messages and even mechanism of handling
select kinds of possible failures. – Perspective-3: • A Network Protocol may be seen as a pair of modules
implementing the interfaces between two layers or peers
(c)Dr.RahulBanerjee,BITS-Pilani,INDIA
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 39/45
ProtocolGraphs
• A graph showing interrelation of various collaboratingprotocols at different levels is called a Protocol Graph.
• In a protocol graph, each protocol is represented as anode.
HTTP
TCP UDP
IP
TFTP
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 40/45
ExampleofaSimpleProtocol
GraphasapplicabletotheInternet
HTTP FTP TFTP
TCP UDP
IP
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 41/45
ProtocolRepresentaQon
• There exist numerous schemes of
representation of a given Protocol.
• One common way to specify a Protocol is
to represent it as a State Transition
Diagram.
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 42/45
ProtocolValidaQon
• A Protocol needs to be proven correctbefore it is implemented.
• There exist quite a few ways of formal and
semi-formal verification of Protocols.• One common technique is to first
represent a protocol a State Transition
Diagram and then examine it for its‘completeness’, ‘reachability’ and / or points of weakness etc.
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 43/45
AnExampleProtocol
• Let’s take one of the simplestsituations in which there exist twonetwork nodes N1 and N2interconnected through a bi-directional communication link.
• Let’s assume that that it isrequired that primarily N1 wouldbe sending the data to N2 using asimple mechanism over this linkand only one unit of data (frame)would travel at a time over thelink.
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 44/45
(c)Dr.RahulBanerjee,BITS,Pilani,India 44
AFewMeasuresofNetworkPerformance
• Performance Measures – Available Performance – Measured Performance
• Bandwidth: – Width of the usable / allotted Frequency band
– Rate of data transfer in bits per second • Throughput: Actual measured rate of achievable data transfer in
bits per second
• Bandwidth has often a value greater than that of the Throughput
• Round-Trip Time (RTT)
• Latency: Delays of various kinds• ‘ Delay x Bandwidth’ metric
• Quality of Service
7/28/2019 CSC461-CN-Lecture-11-Feb.-4-2013
http://slidepdf.com/reader/full/csc461-cn-lecture-11-feb-4-2013 45/45
NetworkArchitecture&ReferenceModels• Architecture versus Reference Model: A
simplistic perspective: – Network Architecture:
• It may be seen as a detailed generic blueprint withunambiguous definitions of services, interfaces,organization and defined protocols that helps in design
and implementation of a set of relevant protocol stack /suite based network / internetwork
– Network Reference Model:
• It is the same as the architecture minus the specificallydefined readily usable protocols.
• Examples: – TCP/IP Architecture
– OSI Reference Model & OSI Architecture