Question? Leave a message!

Computer Networking for Beginners

Computer Networking: Principles, Protocols and Practice and best computer networking books for beginners | download free pdf
TomTheron Profile Pic
Published Date:09-07-2017
Website URL
Computer Networking : Principles, Protocols and Practice Release0.25 Olivier Bonaventure October 30, 2011 Saylor URL: The Saylor FoundationCHAPTER 2 Introduction When the first computers were built during the second world war, they were expensive and isolated. However, after about twenty years, as their prices gradually decreased, the first experiments began to connect computers together. In the early 1960s, researchers including Paul Baran, Donald Davies or Joseph Licklider independently published the first papers describing the idea of building computer networks Baran Licklider1963 . Given the cost of computers, sharing them over a long distance was an interesting idea. In the US, the ARPANET started in 1969 and continued until the mid 1980s LCCD09. In France, Louis Pouzin developed the Cyclades network Pouzin1975. Many other research networks were built during the 1970s Moore. At the same time, the telecommunication and computer industries became interested in computer networks. The telecommunication industry bet on the X25. The computer industry took a completely different approach by designing Local Area Networks (LAN). Many LAN technologies such as Ethernet or Token Ring were designed at that time. During the 1980s, the need to interconnect more and more computers led most computer vendors to develop their own suite of networking protocols. Xerox developed XNS , DEC chose DECNet Malamud1991 , IBM developed SNA McFadyen1976 , Microsoft introduced NetBIOS Winston2003 , Apple bet on Appletalk SAO1990 . In the research community, ARPANET was decommissioned and replaced by TCP/IP LCCD09 and the reference implementation was developed inside BSD Unix McKusick1999. Universities who were already running Unix could thus adopt TCP/IP easily and vendors of Unix workstations such as Sun or Silicon Graphics included TCP/IP in their variant of Unix. In parallel, the ISO, with support from the governments, worked on developing an open 1 Suite of networking protocols. In the end, TCP/IP became the de facto standard that is not only used within the research community. During the 1990s and the early 2000s, the growth of the usage of TCP/IP continued, and today proprietary protocols are seldom used. As shown by the figure below, that provides the estimation of the number of hosts attached to the Internet, the Internet has sustained large growth throughout the last 20+ years. Figure 2.1: Estimation of the number of hosts on the Internet 1 Open in ISO terms was in contrast with the proprietary protocol suites whose specification was not always publicly available. The US government even mandated the usage of the OSI protocols (see RFC 1169), but this was not sufficient to encourage all users to switch to the OSI protocol suite that was considered by many as too complex compared to other protocol suites. 5 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Recent estimations of the number of hosts attached to the Internet show a continuing growth since 20+ years. However, although the number of hosts attached to the Internet is high, it should be compared to the number of mobile phones that are in use today. More and more of these mobile phones will be connected to the Inter- net. Furthermore, thanks to the availability of TCP/IP implementations requiring limited resources such as uIP Dunkels2003, we can expect to see a growth of TCP/IP enabled embedded devices. Figure 2.2: Estimation of the number of mobile phones Before looking at the services provided by computer networks, it is useful to agree on some terminology that is widely used in networking literature. First of all, computer networks are often classified in function of the geographical area that they cover • LAN : a local area network typically interconnects hosts that are up to a few or maybe a few tens of kilome- ters apart. • MAN : a metropolitan area network typically interconnects devices that are up to a few hundred kilometers apart 2 • WAN : a wide area network interconnect hosts that can be located anywhere on Earth Another classification of computer networks is based on their physical topology. In the following figures, physical links are represented as lines while boxes show computers or other types of networking equipment. Computer networks are used to allow several hosts to exchange information between themselves. To allow any host to send messages to any other host in the network, the easiest solution is to organise them as a full-mesh, with a direct and dedicated link between each pair of hosts. Such a physical topology is sometimes used, especially when high performance and high redundancy is required for a small number of hosts. However, it has two major drawbacks : • for a network containing n hosts, each host must have n-1 physical interfaces. In practice, the number of physical interfaces on a node will limit the size of a full-mesh network that can be built n(n1) • for a network containing n hosts, links are required. This is possible when there are a few nodes 2 in the same room, but rarely when they are located several kilometers apart The second possible physical organisation, which is also used inside computers to connect different extension cards, is the bus. In a bus network, all hosts are attached to a shared medium, usually a cable through a single interface. When one host sends an electrical signal on the bus, the signal is received by all hosts attached to the bus. A drawback of bus-based networks is that if the bus is physically cut, then the network is split into two isolated networks. For this reason, bus-based networks are sometimes considered to be difficult to operate and maintain, especially when the cable is long and there are many places where it can break. Such a bus-based topology was used in early Ethernet networks. A third organisation of a computer network is a star topology. In such topologies, hosts have a single physical interface and there is one physical link between each host and the center of the star. The node at the center of the star can be either a piece of equipment that amplifies an electrical signal, or an active device, such as a piece 2 In this book, we focus on networks that are used on Earth. These networks sometimes include satellite links. Besides the network technologies that are used on Earth, researchers develop networking techniques that could be used between nodes located on different planets. Such an Inter Planetary Internet requires different techniques than the ones discussed in this book. See RFC 4838 and the references therein for information about these techniques. 6 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Figure 2.3: A Full mesh network Figure 2.4: A network organised as a Bus of equipment that understands the format of the messages exchanged through the network. Of course, the failure of the central node implies the failure of the network. However, if one physical link fails (e.g. because the cable has been cut), then only one node is disconnected from the network. In practice, star-shaped networks are easier to operate and maintain than bus-shaped networks. Many network administrators also appreciate the fact that they can control the network from a central point. Administered from a Web interface, or through a console-like connection, the center of the star is a useful point of control (enabling or disabling devices) and an excellent observation point (usage statistics). Figure 2.5: A network organised as a Star A fourth physical organisation of a network is the Ring topology. Like the bus organisation, each host has a single physical interface connecting it to the ring. Any signal sent by a host on the ring will be received by all hosts attached to the ring. From a redundancy point of view, a single ring is not the best solution, as the signal only travels in one direction on the ring; thus if one of the links composing the ring is cut, the entire network fails. In practice, such rings have been used in local area networks, but are now often replaced by star-shaped networks. In metropolitan networks, rings are often used to interconnect multiple locations. In this case, two parallel links, composed of different cables, are often used for redundancy. With such a dual ring, when one ring fails all the traffic can be quickly switched to the other ring. A fifth physical organisation of a network is the tree. Such networks are typically used when a large number of customers must be connected in a very cost-effective manner. Cable TV networks are often organised as trees. In practice, most real networks combine part of these topologies. For example, a campus network can be organised as a ring between the key buildings, while smaller buildings are attached as a tree or a star to important buildings. 7 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Figure 2.6: A network organised as a Ring Figure 2.7: A network organised as a Tree 8 Chapter 2. Introduction Saylor URL: The Saylor Foundationtuxlinux Computer Networking : Principles, Protocols and Practice, Release 0.25 Or an ISP network may have a full mesh of devices in the core of its network, and trees to connect remote users. Throughout this book, our objective will be to understand the protocols and mechanisms that are necessary for a network such as the one shown below. S R ISP2 R R R R ISP2 R RR ISP2 R R RS R PSTN R R ISP1 ADSL Figure 2.8: A simple internetwork The figure above illustrates an internetwork, i.e. a network that interconnects other networks. Each network is illustrated as an ellipse containing a few devices. We will explain throughout the book the different types of devices and their respective roles enabling all hosts to exchange information. As well as this, we will discuss how networks are interconnected, and the rules that guide these interconnections. We will also analyse how the bus, ring and mesh topologies are used to build real networks. The last point of terminology we need to discuss is the transmission modes. When exchanging information through a network, we often distinguish between three transmission modes. In TV and radio transmission, broadcast is often used to indicate a technology that sends a video or radio signal to all receivers in a given geographical area. Broadcast is sometimes used in computer networks, but only in local area networks where the number of recipients is limited. The first and most widespread transmission mode is called unicast . In the unicast transmission mode, information is sent by one sender to one receiver. Most of today’s Internet applications rely on the unicast transmission mode. The example below shows a network with two types of devices : hosts (drawn as computers) and intermediate nodes (drawn as cubes). Hosts exchange information via the intermediate nodes. In the example below, when host S uses unicast to send information, it sends it via three intermediate nodes. Each of these nodes receives the information from its upstream node or host, then processes and forwards it to its downstream node or host. This is called store and forward and we will see later that this concept is key in computer networks. A second transmission mode is multicast transmission mode. This mode is used when the same information must be sent to a set of recipients. It was first used in LANs but later became supported in wide area networks. When a sender uses multicast to send information to N receivers, the sender sends a single copy of the information and the network nodes duplicate this information whenever necessary, so that it can reach all recipients belonging to the destination group. To understand the importance of multicast transmission, consider source S that sends the same information to destinations A, C and E. With unicast, the same information passes three times on intermediate nodes 1 and 2 and twice on node 4. This is a waste of resources on the intermediate nodes and on the links between them. With multicast transmission, host S sends the information to node 1 that forwards it downstream to node 2. This node creates a copy of the received information and sends one copy directly to host E and the other downstream to node 4. Upon reception of the information, node 4 produces a copy and forwards one to node A and another to node C. Thanks to multicast, the same information can reach a large number of receivers while being sent only once on each link. 9 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 E A S B C D Figure 2.9: Unicast transmission E A S B C D Figure 2.10: Multicast transmission 10 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 The last transmission mode is the anycast transmission mode. It was initially defined in RFC 1542. In this transmission mode, a set of receivers is identified. When a source sends information towards this set of receivers, the network ensures that the information is delivered to one receiver that belongs to this set. Usually, the receiver closest to the source is the one that receives the information sent by this particular source. The anycast transmission mode is useful to ensure redundancy, as when one of the receivers fails, the network will ensure that information will be delivered to another receiver belonging to the same group. However, in practice supporting the anycast transmission mode can be difficult. A S B Figure 2.11: Anycast transmission In the example above, the three hosts marked with are part of the same anycast group. When host S sends information to this anycast group, the network ensures that it will reach one of the members of the anycast group. The dashed lines show a possible delivery via nodes 1, 2 and 4. A subsequent anycast transmission from host S to the same anycast group could reach the host attached to intermediate node 3 as shown by the plain line. An anycast transmission reaches a member of the anycast group that is chosen by the network in function of the current network conditions. 2.1 Services and protocols An important aspect to understand before studying computer networks is the difference between a service and a protocol. In order to understand the difference between the two, it is useful to start with real world examples. The traditional Post provides a service where a postman delivers letters to recipients. The Post defines precisely which types of letters (size, weight, etc) can be delivered by using the Standard Mail service. Furthermore, the format of the envelope is specified (position of the sender and recipient addresses, position of the stamp). Someone who wants to send a letter must either place the letter at a Post Office or inside one of the dedicated mailboxes. The letter will then be collected and delivered to its final recipient. Note that for the regular service the Post usually does not guarantee the delivery of each particular letter, some letters may be lost, and some letters are delivered to the wrong mailbox. If a letter is important, then the sender can use the registered service to ensure that the letter will be delivered to its recipient. Some Post services also provide an acknowledged service or an express mail service that is faster than the regular service. In computer networks, the notion of service is more formally defined in X200 . It can be better understood by considering a computer network, whatever its size or complexity, as a black box that provides a service to users , as shown in the figure below. These users could be human users or processes running on a computer system. Many users can be attached to the same service provider. Through this provider, each user must be able to exchange messages with any other user. To be able to deliver these messages, the service provider must be able to unambiguously identify each user. In computer networks, each user is identified by a unique address, we will discuss later how these addresses are built and used. At this point, and when considering unicast transmission, the main characteristic of these addresses is that they are unique. Two different users attached to the network cannot use the same address. 2.1. Services and protocols 11 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 User B User A Service Access Point Primitives Service provider ("the network") Figure 2.12: Users and service provider Throughout this book, we will define a service as a set of capabilities provided by a system (and its underlying elements) to its user. A user interacts with a service through a service access point. Note that as shown in the figure above, users interact with one service provider. In practice, the service provider is distributed over several hosts, but these are implementation details that are not important at this stage. These interactions between a user and a service provider are expressed in X200 by using primitives, as show in the figure below. These primitives are an abstract representation of the interactions between a user and a service provider. In practice, these interactions could be implemented as system calls for example. User A User B X.request X.response X.confirm X.indication Service provider ("the network") Figure 2.13: The four types of primitives Four types of primitives are defined : • X.request. This type of primitive corresponds to a request issued by a user to a service provider • X.indication. This type of primitive is generated by the network provider and delivered to a user (often related to an earlier and remote X.request primitive) • X.response. This type of primitive is generated by a user to answer to an earlier X.indication primitive • X.confirm. This type of primitive is delivered by the service provide to confirm to a user that a previous X.request primitive has been successfully processed. Primitives can be combined to model different types of services. The simplest service in computer networks is 3 called the connectionless service . This service can be modelled by using two primitives : • Data.request(source,destination,SDU). This primitive is issued by a user that specifies, as parameters, its (source) address, the address of the recipient of the message and the message itself. We will use Service Data Unit (SDU) to name the message that is exchanged transparently between two users of a service. • Data.indication(source,destination,SDU). This primitive is delivered by a service provider to a user. It contains as parameters a Service Data Unit as well as the addresses of the sender and the destination users. When discussing the service provided in a computer network, it is often useful to be able to describe the inter- actions between the users and the provider graphically. A frequently used representation is the time-sequence diagram. In this chapter and later throughout the book, we will often use diagrams such as the figure below. A time-sequence diagram describes the interactions between two users and a service provider. By convention, the users are represented in the left and right parts of the diagram while the service provider occupies the middle of the diagram. In such a time-sequence diagram, time flows from the top, to the bottom of the diagram. Each primitive 3 This service is called the connectionless service because there is no need to create a connection before transmitting any data in contrast with the connection-oriented service. 12 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 is represented by a plain horizontal arrow, to which the name of the primitive is attached. The dashed lines are used to represent the possible relationship between two (or more) primitives. Such a diagram provides information about the ordering of the different primitives, but the distance between two primitives does not represent a precise amount of time. The figure below provides a representation of the connectionless service as a time-sequence diagram. The user on the left, having address S, issues a Data.request primitive containing SDU M that must be delivered by the service provider to destination D. The dashed line between the two primitives indicates that the Data.indication primitive that is delivered to the user on the right corresponds to the Data.request primitive sent by the user on the left. Source Provider Destination DATA.request(S, D, "M") DATA.indication(S, D, "M") Time Figure 2.14: A simple connectionless service There are several possible implementations of the connectionless service, which we will discuss later in this book. Before studying these realisations, it is useful to discuss the possible characteristics of the connectionless service. A reliable connectionless service is a service where the service provider guarantees that all SDUs submitted in Data.requests by a user will eventually be delivered to their destination. Such a service would be very useful for users, but guaranteeing perfect delivery is difficult in practice. For this reason, computer networks usually support an unreliable connectionless service. An unreliable connectionless service may suffer from various types of problems compared to a reliable connec- tionless service. First of all, an unreliable connectionless service does not guarantee the delivery of all SDUs. This can be expressed graphically by using the time-sequence diagram below. In practice, an unreliable connectionless service will usually deliver a large fraction of the SDUs. However, since the delivery of SDUs is not guaranteed, the user must be able to recover from the loss of any SDU. A second imperfection that may affect an unreliable connectionless service is that it may duplicate SDUs. Some unreliable connectionless service providers may deliver an SDU sent by a user twice or even more. This is illustrated by the time-sequence diagram below. Finally, some unreliable connectionless service providers may deliver to a destination a different SDU than the one that was supplied in the Data.request. This is illustrated in the figure below. When a user interacts with a service provider, it must precisely know the limitations of the underlying service to be able to overcome any problem that may arise. This requires a precise definition of the characteristics of the underlying service. Another important characteristic of the connectionless service is whether it preserves the ordering of the SDUs sent by one user. From the user’s viewpoint, this is often a desirable characteristic. This is illustrated in the figure below. However, many connectionless services, and in particular the unreliable services, do not guarantee that they will always preserve the ordering of the SDUs sent by each user. This is illustrated in the figure below. 2.1. Services and protocols 13 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Source Provider Destination DATA.request(S, D, "Msg") Time Figure 2.15: An unreliable connectionless service may loose SDUs Source Provider Destination DATA.request(S, D, "Msg") DATA.indication(S, D, "Msg") DATA.indication(S, D, "Msg") Time Figure 2.16: An unreliable connectionless service may duplicate SDUs 14 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Source Provider Destination DATA.request(S, D, "Msg") DATA.indication(S, D, "XYZ") Time Figure 2.17: An unreliable connectionless service may deliver erroneous SDUs Figure 2.18: A connectionless service that preserves the ordering of SDUs sent by a given user Source Provider Destination DATA.request(S, D, "A") DATA.request(S, D, "B") DATA.indication(S, D, "B") DATA.indication(S, D, "A") Time Figure 2.19: A connectionless service that does not preserve the ordering of SDUs sent by a given user 2.1. Services and protocols 15 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 The connectionless service is widely used in computer networks as we will see later in this book. Several variations to this basic service have been proposed. One of these is the confirmed connectionless service. This service uses a Data.confirm primitive in addition to the classical Data.request and Data.indication primitives. This primitive is issued by the service provider to confirm to a user the delivery of a previously sent SDU to its recipient. Note that, like the registered service of the post office, the Data.confirm only indicates that the SDU has been delivered to the destination user. The Data.confirm primitive does not indicate whether the SDU has been processed by the destination user. This confirmed connectionless service is illustrated in the figure below. Source Provider Destination DATA.request(S, D, "M") DATA.indication(S, D, "M") DATA.confirm Time Figure 2.20: A confirmed connectionless service The connectionless service we have described earlier is frequently used by users who need to exchange small SDUs. Users needing to either send or receive several different and potentially large SDUs, or who need structured exchanges often prefer the connection-oriented service. An invocation of the connection-oriented service is divided into three phases. The first phase is the establishment of a connection. A connection is a temporary association between two users through a service provider. Several connections may exist at the same time between any pair of users. Once established, the connection is used to transfer SDUs. Connections usually provide one bidirectional stream supporting the exchange of SDUs between the two users that are associated through the connection. This stream is used to transfer data during the second phase of the connection called the data transfer phase. The third phase is the termination of the connection. Once the users have finished exchanging SDUs, they request to the service provider to terminate the connection. As we will see later, there are also some cases where the service provider may need to terminate a connection itself. The establishment of a connection can be modelled by using four primitives : Connect.request, Connect.indication, Connect.response and Connect.confirm. The Connect.request primitive is used to request the establishment of a connection. The main parameter of this primitive is the address of the destination user. The service provider delivers a Connect.indication primitive to inform the destination user of the connection attempt. If it accepts to establish a connection, it responds with a Connect.response primitive. At this point, the connection is considered to be open and the destination user can start sending SDUs over the connection. The service provider processes the Connect.response and will deliver a Connect.confirm to the user who initiated the connection. The delivery of this primitive terminates the connection establishment phase. At this point, the connection is considered to be open and both users can send SDUs. A successful connection establishment is illustrated below. The example above shows a successful connection establishment. However, in practice not all connections are successfully established. One reason is that the destination user may not agree, for policy or performance reasons, to establish a connection with the initiating user at this time. In this case, the destination user responds to the Connect.indication primitive by a Disconnect.request primitive that contains a parameter to indicate why the connection has been refused. The service provider will then deliver a Disconnect.indication primitive to inform the initiating user. A second reason is when the service provider is unable to reach the destination user. This might happen because the destination user is not currently attached to the network or due to congestion. In these 16 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Source Provider Destination CONNECT.request CONNECT.indication CONNECT.response Destination considers CONNECT.confirm connection open Source considers connection open Time Figure 2.21: Connection establishment cases, the service provider responds to the Connect.request with a Disconnect.indication primitive whose reason parameter contains additional information about the failure of the connection. Source Provider Destination CONNECT.request CONNECT.indication DISCONNECT.request Connection rejected by destination DISCONNECT.indication CONNECT.request DISCONNECT.indication Connection rejected by provider Time Figure 2.22: Two types of rejection for a connection establishment attempt Once the connection has been established, the service provider supplies two data streams to the communicating users. The first data stream can be used by the initiating user to send SDUs. The second data stream allows the responding user to send SDUs to the initiating user. The data streams can be organised in different ways. A first organisation is the message-mode transfer. With the message-mode transfer, the service provider guarantees that one and only one Data.indication will be delivered to the endpoint of the data stream for each Data.request primitive issued by the other endpoint. The message-mode transfer is illustrated in the figure below. The main advantage of the message-transfer mode is that the recipient receives exactly the SDUs that were sent by the other user. If each SDU contains a command, the receiving user can process each command as soon as it receives a SDU. Unfortunately, the message-mode transfer is not widely used on the Internet. On the Internet, the most popular connection-oriented service transfers SDUs in stream-mode. With the stream-mode, the service provider supplies a byte stream that links the two communicating users. The sending user sends bytes by using Data.request primitives that contain sequences of bytes as SDUs. The service provider delivers SDUs containing consecutive bytes to the receiving user by using Data.indication primitives. The service provider ensures that all the bytes sent at one end 2.1. Services and protocols 17 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 SourceProviderDestination CONNECT.request CONNECT.indication CONNECT.response CONNECT.confirm DATA.request("A") DATA.indication("A") DATA.request("BCD") DATA.indication("BCD") DATA.request("EF") DATA.indication("EF") Time Figure 2.23: Message-mode transfer in a connection oriented service of the stream are delivered correctly in the same order at the other endpoint. However, the service provider does not attempt to preserve the boundaries of the SDUs. There is no relation enforced by the service provider between the number of Data.request and the number of Data.indication primitives. The stream-mode is illustrated in the figure below. In practice, a consequence of the utilisation of the stream-mode is that if the users want to exchange structured SDUs, they will need to provide the mechanisms that allow the receiving user to separate successive SDUs in the byte stream that it receives. As we will see in the next chapter, application layer protocols often use specific delimiters such as the end of line character to delineate SDUs in a bytestream. SourceProviderDestination CONNECT.request CONNECT.indication CONNECT.response CONNECT.confirm DATA.request("AB") DATA.indication("A") DATA.request("CD") DATA.indication("B") DATA.request("EF") DATA.indication("C") DATA.indication("DEF") Time Figure 2.24: Stream-mode transfer in a connection oriented service The third phase of a connection is when it needs to be released. As a connection involves three parties (two users and one service provider), any of them can request the termination of the connection. Usually, connections are terminated upon request of one user once the data transfer is finished. However, sometimes the service provider may be forced to terminate a connection. This can be due to lack of resources inside the service provider or because one of the users is not reachable anymore through the network. In this case, the service provider will issue Disconnect.indication primitives to both users. These primitives will contain, as parameter, some information about the reason for the termination of the connection. Unfortunately, as illustrated in the figure below, when a 18 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 service provider is forced to terminate a connection it cannot guarantee that all SDUs sent by each user have been delivered to the other user. This connection release is said to be abrupt as it can cause losses of data. Source Provider Destination Connection opened Connection opened DATA.request("A") DATA.request("B") DATA.indication("A") DATA.indication("C") DISCONNECT.indication DISCONNECT.indication Time Figure 2.25: Abrupt connection release initiated by the service provider An abrupt connection release can also be triggered by one of the users. If a user needs, for any reason, to terminate a connection quickly, it can issue a Disconnect.request primitive and to request an abrupt release. The service provider will process the request, stop the two data streams and deliver the Disconnect.indication primitive to the remote user as soon as possible. As illustrated in the figure below, this abrupt connection release may cause losses of SDUs. Source Provider Destination Connection opened Connection opened DATA.request("A") DATA.request("B") DATA.indication("A") DISCONNECT.req(abrupt) DATA.request("C") DISCONNECT.indication Time Figure 2.26: Abrupt connection release initiated by a user To ensure a reliable delivery of the SDUs sent by each user over a connection, we need to consider the two streams that compose a connection as independent. A user should be able to release the stream that it uses to send SDUs once it has sent all the SDUs that it planned to send over this connection, but still continue to receive SDUs over the opposite stream. This graceful connection release is usually performed as shown in the figure below. One user issues a Disconnect.request primitive to its provider once it has issued all its Data.request primitives. The service provider will wait until all Data.indication primitives have been delivered to the receiving user before issuing the Disconnnect.indication primitive. This primitive informs the receiving user that it will no longer receive SDUs over this connection, but it is still able to issue Data.request primitives on the stream in the opposite direction. Once the user has issued all of its Data.request primitives, it issues a Disconnnect.request primitive to request the termination of the remaining stream. The service provider will process the request and deliver the corresponding Disconnect.indication to the other user once it has delivered all the pending Data.indication primitives. At this 2.1. Services and protocols 19 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 point, all data has been delivered and the two streams have been released successfully and the connection is completely closed. Source Provider Destination Connection opened Connection opened DATA.request("A") DATA.request("C") DATA.request("B") DATA.indication("A") DISCONNECT.req(graceful) Source - Destination DATA.indication("B") connection closed DISCONNECT.ind(graceful) DATA.indication("C") DATA.request("D") DATA.indication("D") DISCONNECT.req(graceful) DISCONNECT.ind(graceful) Connection closed Connection closed Time Figure 2.27: Graceful connection release Note: Reliability of the connection-oriented service An important point to note about the connection-oriented service is its reliability. A connection-oriented service can only guarantee the correct delivery of all SDUs provided that the connection has been released gracefully. This implies that while the connection is active, there is no guarantee for the actual delivery of the SDUs exchanged as the connection may need to be released abruptly at any time. 2.2 The reference models Given the growing complexity of computer networks, during the 1970s network researchers proposed various reference models to facilitate the description of network protocols and services. Of these, the Open Systems Interconnection (OSI) model Zimmermann80 was probably the most influential. It served as the basis for the standardisation work performed within the ISO to develop global computer network standards. The reference 4 model that we use in this book can be considered as a simplified version of the OSI reference model . 2.2.1 The five layers reference model Our reference model is divided into five layers, as shown in the figure below. Starting from the bottom, the first layer is the Physical layer. Two communicating devices are linked through a physical medium. This physical medium is used to transfer an electrical or optical signal between two directly connected devices. Several types of physical mediums are used in practice : • electrical cable. Information can be transmitted over different types of electrical cables. The most common ones are the twisted pairs that are used in the telephone network, but also in enterprise networks and coaxial cables. Coaxial cables are still used in cable TV networks, but are no longer used in enterprise networks. Some networking technologies operate over the classical electrical cable. • optical fiber. Optical fibers are frequently used in public and enterprise networks when the distance be- tween the communication devices is larger than one kilometer. There are two main types of optical fibers : multimode and monomode. Multimode is much cheaper than monomode fiber because a LED can be 4 An interesting historical discussion of the OSI-TCP/IP debate may be found in Russel06 20 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Application Transport Network Datalink Physical Physical transmission medium Figure 2.28: The five layers of the reference model used to send a signal over a multimode fiber while a monomode fiber must be driven by a laser. Due to the different modes of propagation of light, monomode fibers are limited to distances of a few kilometers while multimode fibers can be used over distances greater than several tens of kilometers. In both cases, repeaters can be used to regenerate the optical signal at one endpoint of a fiber to send it over another fiber. • wireless. In this case, a radio signal is used to encode the information exchanged between the communi- cating devices. Many types of modulation techniques are used to send information over a wireless channel and there is lot of innovation in this field with new techniques appearing every year. While most wireless networks rely on radio signals, some use a laser that sends light pulses to a remote detector. These optical techniques allow to create point-to-point links while radio-based techniques, depending on the directionality of the antennas, can be used to build networks containing devices spread over a small geographical area. An important point to note about the Physical layer is the service that it provides. This service is usually an unreliable connection-oriented service that allows the users of the Physical layer to exchange bits. The unit of information transfer in the Physical layer is the bit. The Physical layer service is unreliable because : • the Physical layer may change, e.g. due to electromagnetic interferences, the value of a bit being transmitted • the Physical layer may deliver more bits to the receiver than the bits sent by the sender • the Physical layer may deliver fewer bits to the receiver than the bits sent by the sender The last two points may seem strange at first glance. When two devices are attached through a cable, how is it possible for bits to be created or lost on such a cable ? This is mainly due to the fact that the communicating devices use their own clock to transmit bits at a given bit rate. Consider a sender having a clock that ticks one million times per second and sends one bit every tick. Every microsecond, the sender sends an electrical or optical signal that encodes one bit. The sender’s bit rate is thus 1 5 Mbps. If the receiver clock ticks exactly every microsecond, it will also deliver 1 Mbps to its user. However, if the receiver’s clock is slightly faster (resp. slower), than it will deliver slightly more (resp. less) than one million bits every second. This explains why the physical layer may lose or create bits. Note: Bit rate In computer networks, the bit rate of the physical layer is always expressed in bits per second. One Mbps is one million bits per second and one Gbps is one billion bits per second. This is in contrast with memory specifica- tions that are usually expressed in bytes (8 bits), KiloBytes ( 1024 bytes) or MegaBytes (1048576 bytes). Thus transferring one MByte through a 1 Mbps link lasts 8.39 seconds. 5 Having perfectly synchronised clocks running at a high frequency is very difficult in practice. However, some physical layers introduce a feedback loop that allows the receiver’s clock to synchronise itself automatically to the sender’s clock. However, not all physical layers include this kind of synchronisation. 2.2. The reference models 21 Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 Bit rate Bits per second 3 1 Kbps 10 6 1 Mbps 10 9 1 Gbps 10 12 1 Tbps 10 Bits 01010010100010101001010 Physical layer Physical layer Physical transmission medium Figure 2.29: The Physical layer The physical layer allows thus two or more entities that are directly attached to the same transmission medium to exchange bits. Being able to exchange bits is important as virtually any information can be encoded as a sequence of bits. Electrical engineers are used to processing streams of bits, but computer scientists usually prefer to deal with higher level concepts. A similar issue arises with file storage. Storage devices such as hard-disks also store streams of bits. There are hardware devices that process the bit stream produced by a hard-disk, but computer scientists have designed filesystems to allow applications to easily access such storage devices. These filesystems are typically divided into several layers as well. Hard-disks store sectors of 512 bytes or more. Unix filesystems group sectors in larger blocks that can contain data or inodes representing the structure of the filesystem. Fi- nally, applications manipulate files and directories that are translated in blocks, sectors and eventually bits by the operating system. Computer networks use a similar approach. Each layer provides a service that is built above the underlying layer and is closer to the needs of the applications. The Datalink layer builds on the service provided by the underlying physical layer. The Datalink layer allows two hosts that are directly connected through the physical layer to exchange information. The unit of information exchanged between two entities in the Datalink layer is a frame. A frame is a finite sequence of bits. Some Datalink layers use variable-length frames while others only use fixed-length frames. Some Datalink layers provide a connection-oriented service while others provide a connectionless service. Some Datalink layers provide reliable delivery while others do not guarantee the correct delivery of the information. An important point to note about the Datalink layer is that although the figure below indicates that two entities of the Datalink layer exchange frames directly, in reality this is slightly different. When the Datalink layer entity on the left needs to transmit a frame, it issues as many Data.request primitives to the underlying physical layer as there are bits in the frame. The physical layer will then convert the sequence of bits in an electromagnetic or optical signal that will be sent over the physical medium. The physical layer on the right hand side of the figure will decode the received signal, recover the bits and issue the corresponding Data.indication primitives to its Datalink layer entity. If there are no transmission errors, this entity will receive the frame sent earlier. Frames DatalinkDatalink PhysicalPhysical Figure 2.30: The Datalink layer The Datalink layer allows directly connected hosts to exchange information, but it is often necessary to exchange information between hosts that are not attached to the same physical medium. This is the task of the network layer. The network layer is built above the datalink layer. Network layer entities exchange packets. A packet is a finite sequence of bytes that is transported by the datalink layer inside one or more frames. A packet usually 22 Chapter 2. Introduction Saylor URL: The Saylor FoundationComputer Networking : Principles, Protocols and Practice, Release 0.25 contains information about its origin and its destination, and usually passes through several intermediate devices called routers on its way from its origin to its destination. Network Packets Network Packets Network Datalink Datalink Datalink Physical layer Physical layer Physical layer Figure 2.31: The network layer Most realisations of the network layer, including the internet, do not provide a reliable service. However, many applications need to exchange information reliably and so using the network layer service directly would be very difficult for them. Ensuring the reliable delivery of the data produced by applications is the task of the transport layer. Transport layer entities exchange segments. A segment is a finite sequence of bytes that are transported inside one or more packets. A transport layer entity issues segments (or sometimes part of segments) as Data.request to the underlying network layer entity. There are different types of transport layers. The most widely used transport layers on the Internet are TCP ,that provides a reliable connection-oriented bytestream transport service, and UDP ,that provides an unreliable connection-less transport service. Segments Transport Transport Network Network Network Datalink Datalink Datalink Physical layer Physical layer Physical layer Figure 2.32: The transport layer The upper layer of our architecture is the Application layer. This layer includes all the mechanisms and data structures that are necessary for the applications. We will use Application Data Unit (ADU) to indicate the data exchanged between two entities of the Application layer. ADU Application Application Transport Transport Network Network Network Datalink Datalink Datalink Physical layer Physical layer Physical layer Figure 2.33: The Application layer 2.2.2 The TCP/IP reference model In contrast with OSI, the TCP/IP community did not spend a lot of effort defining a detailed reference model; in fact, the goals of the Internet architecture were only documented after TCP/IP had been deployed Clark88. RFC 1122 , which defines the requirements for Internet hosts, mentions four different layers. Starting from the top, these are : • an Application layer • a Transport layer • an Internet layer which is equivalent to the network layer of our reference model • a Link layer which combines the functionalities of the physical and datalink layers of our five-layer reference model Besides this difference in the lower layers, the TCP/IP reference model is very close to the five layers that we use throughout this document. 2.2. The reference models 23 Saylor URL: The Saylor Foundation