计算机网络第五版(英文版)_第1页
计算机网络第五版(英文版)_第2页
计算机网络第五版(英文版)_第3页
计算机网络第五版(英文版)_第4页
计算机网络第五版(英文版)_第5页
已阅读5页,还剩83页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Computer NetworksProf. Dalu ZhangEmail: , The course is a part of the Excellent Course Program (1)Review last lectureRandomly choose students to answer some questions, and record the grade.Discuss some interesting topicsOne 10 students per group One of them makes a presentationWrite short reports an

2、d answer the problems after each chaptersEach student must do themRecord the gradeExperimentsIn Computer Networks LabThe course is a part of the Excellent Course Program (2)Total point (Note that the final grade components may change!)Final exam (40%), middle exam (20%), experiments (20%), reports/p

3、roblems (10%), and others (10%)After study Chapter 4, there will be mid-term examExploring StudySome subjects for exploring studyIf you have novel idea, you will get bonus points.The course is a part of the Excellent Course Program (3)Welcome to our research lab(1)网络传输中流媒体QoE 保障理论与方法研究(NSFC:61073154

4、)P2P网络中语义场模型及关键技术研究(Applying NSFC project)Mobile Cloud Computing Platform for Real Time Business Intelligence ApplicationsCo-operator: The Hong Kong Polytechnic UniversityApplying Doctor foundation in MOEThe course is a part of the Excellent Course Program (4)Welcome to our research lab(2)物联网高速接入和应用

5、技术Co-operator: EPFL正申请上海市科委项目 This is a Bilingual CourseWhy we give this bilingual course?To meet the needs of excellent engineer training program and internationalizationOur aimText book, exercises, test, and examination will be 100% in English.PPT will exceed 95% in EnglishGiving the lecture and d

6、iscussion will be more then 60% in EnglishIt is important to ensure the quality of teaching.We will gradually increase the percentage of English language.ReferenceText Book: Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks”, 5th Ed., 2010, Addison-Wesley.James F. Kurose, Keith W. Ross, “C

7、omputer Networks: A Top-Down Approach”, 5th Ed., 2010, Addison-Wesley.Larry L. Peterson, Bruce S. Davie, “Computer Networks: A System Approach”, 5th Ed., 2011, Elsevier.高传善等著,计算机网络教程,1994,复旦大学出版社。ReferenceDouglas Comer, “Internetworking With TCP/IP volume 1: Principles, Protocols, and Architecture”,

8、 5th Ed., 2006, Pearson.Andrew S.Tanenbaum, Maarten Van Steen, “Distributed Systems: Principles and Paradigms”, 2nd Ed., 2008, Pearson.Some papersIETF RFCsThe Most Important Journals IEEE-ACM Transaction on Networking: Bimonthly,ISSN: 1063-6692IEEE NETWORK:Bimonthly,ISSN: 0890-8044The Most Important

9、 Conferences ACM SIGCOMM:IEEE Infocom: ACM SIGMETRICS: China Computer FederationEvaluating academic achievementClass A is top important of journal and conferenceClass B is very important of journal and conference Class C is important of journal and conferenceWebsites and online courses IntroductionC

10、hapter 11.1 What Is Computer NetworksComputer networks are collections of autonomous computers, e.g., the InternetComputer Networks vs. Distributed SystemsThe key distinction is software systems, especially OS.Complex NetworksScale-free networksSmall-world networks Source: Albert-Lszl Barabsi, “The

11、physics of the Web”, Physics World 14, (2001) Source: David Lazer et al., “Computational Social Science”, SCIENCE, 323, 721-724 (2009) Exploring Study (1)Use complex network theory and dynamics of human behavior (DHB) to analyze social networks and optimize social networking service (SNS).Research o

12、n opinion evolution and interference model on Internet, specially on social networking service (SNS).1.2 Uses of Computer Networks (1)Computer Cluster A computer cluster consists of a set of loosely connected computers that work together so that in many respects they can be viewed as a single system

13、.From Wikipedia1.2 Uses of Computer Networks (2)Cloud Computing (1)From WikipediaInfrastructure as a Service(IaaS)Platform as a Service(PaaS)Software as a Service(SaaS)1.2 Uses of Computer Networks (3)Cloud Computing (2)ArchitectureFrom Wikipedia1.2 Uses of Computer Networks (4)Cloud Computing (3)De

14、ployment ModelsPrivate Cloud Community CloudPublic CloudHybrid CloudSource: Wikipedia1.2 Uses of Computer Networks (5)Client-server moduleThe Network maybe VPN which is over InternetProvide many services over the networkThe Web is an example of client-server computing.E-commerceRequestReply1.2 Uses

15、of Computer Networks (6)Triple-Play Networks (1)青海省公检法信息通信网为例IconRouter1.2 Uses of Computer Networks (7)Triple-Play Networks (2)Switch1.2 Uses of Computer Networks (8)Triple-Play Networks (3)1.2 Uses of Computer Networks (9)Peer-to-Peer NetworksThey are overlay networksThere are no fixed clients and

16、 servers1.2 Uses of Computer Networks (10)The Category of Network Use (1)Resource sharingPerson-to-person communicationVoIP, video conferenceDesktop sharingInstant messaging, like Skype, MSN, QQ, etc.Blog, TwitterWiki, like Wikipedia, etc.E-commerce, includes online auctionsEntertainment, like MP3,

17、IPTV, games, etc. 1.2 Uses of Computer Networks (11)The Category of Network Use (2)Ubiquitous computing (Ubicomp, 普适计算) / Ubiquitous networks (Ubinet, 泛在网络)Wireless Sensor networks (WSN)Power-line networksRFID (Radio Frequency IDentification)Internet of things (IOT, 物联网)UbinetIOTWSNSource: Wikipedia

18、Source: 邬贺铨, 中国下一代互联网的研究和CNGI项目1.2 Uses of Computer Networks (12)Wireless Networks and Mobile ComputingWiFi, cellular networks, WSN, etc.Sensor networks can be built with ZigBee, WiFi, etc.Smart phonesGPSM-commerceWearable computersSource: Wikipedia1.3 Network Hardware (1)Transmission technologyPoin

19、t-to-point linksIt is Important to find good route from the source to the destination.UnicastingBroadcast linksBroadcasting, multicasting1.3 Network Hardware (2)Networks can be classified by their scaleScaleTypeVicinityPAN (Personal Area Network) Building/CampusLAN (Local Area Network) CityMAN (Metr

20、opolitan Area Network) CountryWAN (Wide Area Network) PlanetThe Internet (network of all networks)1.3.1 Personal Area NetworkConnect devices over the range of a personPAN can be built with Bluetooth, ZigBee, or RFID1.3.2 Local Area NetworkConnect devices in a home or office buildingCalled enterprise

21、 network in a companyHow the sharing communication channel is allocated?1.3.3 Metropolitan Area NetworkExample MAN based on cable TVWiMAX1.3.4 Wide Area Network (1)Subnet is collection of lines and routersThe transmission line may own lines or lease SDH linksExample WAN connecting three branch offic

22、esTag router switch / Multi-service switch router (MSR)1.3.4 Wide Area Network (2)A VPN (Virtual Private Network) is a WAN built from virtual links that run on top of the Internet.1.3.4 Wide Area Network (3)An ISP (Internet Service Provider) network is also a WAN.Routing algorithmForwarding algorith

23、m1.3.4 Wide Area Network (4)Make use of wireless technologiesSatellite systemsCellular telephone network1.3.5 InternetworkingInternet vs. internetSubnet vs. networkGatewayProblems4, 5, 7, 8, 91.4 Network SoftwareProtocol layersDesign Issues for the LayersConnection-Oriented vs. ConnectionlessService

24、 PrimitivesRelationship of Services to Protocols1.4.1 Protocol layers (1)Protocol layering is the main structuring method used to divide up network functionality.Each layer communicates only by using the one belowLower layer services are accessed by an interfaceAt bottom, messages are carried by the

25、 mediumEach protocol instance talks virtually to its peerVirtual communication Physical communication1.4.1 Protocol layers (2)Each lower layer adds its own header (with control information) to the message to transmit and removes it on receiverLayers may also split and join messages, etc.1.4.1 Protoc

26、ol layers (3)Information transmission unit1.4.2 Design Issues for the LayersEach layer solves a particular problem but must include mechanisms to address a set of recurring design issuesIssueExample mechanisms at different layersReliability despite failuresCodes for error detection/correction (3.2,

27、3.3)Routing around failures (5.2)Network growth and evolutionAddressing (5.6) and naming (7.1)Protocol layering (1.3)Allocation of resources like bandwidth Multiple access (4.2)Congestion control (5.3, 6.3)Security against various threatsConfidentiality of messages (8.6)Web security (8.9)1.4.3 Conne

28、ction-Oriented vs. Connectionless (1)Connection-oriented, must be set up for ongoing use (and torn down after use), e.g., phone callConnectionless, messages are handled separately, e.g., postal delivery1.4.3 Connection-Oriented vs. Connectionless (2)In connection-oriented serviceEstablishes a connec

29、tion, uses the connection, and then releases the connection.When a connection is established, negotiation has to do with getting both sides to agree on some parameters or values to be used during the communication.In the most cases the bits arrive to receiver in the order they were sentMessage seque

30、nces vs. byte streams1.4.3 Connection-Oriented vs. Connectionless (3)In connectionless serviceStore-and-forward switching vs. cut-through switchingIt is possible that the messages arrive to receiver out of order they were sent.Unreliable connectionless service is called datagramReliable service vs.

31、unreliable service Must have acknowledgement or need not one1.4.4 Service Primitives (1)A service is provided to the layer above as primitivesHypothetical example of service primitives that may provide a reliable byte stream (connection-oriented) service1.4.4 Service Primitives (2)Hypothetical examp

32、le of how these primitives may be used for a client-server interactionClientServerLISTEN (0)ACCEPT RECEIVESEND (4)DISCONNECT (6)CONNECT (1)SENDRECEIVEDISCONNECT (5)Connect requestAccept responseRequest for dataReplyDisconnectDisconnect(2)(3)1.4.5 Relationship of Services to ProtocolsA layer provides

33、 a service to the one above verticalA layer talks to its peer using a protocol horizontalProblems: 15, 181.5 Reference ModelsThe OSI Reference ModelThe TCP/IP Reference ModelModel used for this CourseCritique of OSI and TCP/IP1.5.1 The OSI Reference ModelA principled, international standard, seven l

34、ayer model to connect different systemsProvides functions needed by usersConverts different representationsManages task dialogsProvides end-to-end deliverySends packets over multiple linksSends frames of informationSends bits as signals1.5.2 The TCP/IP Reference ModelA four layer model derived from

35、experimentation; omits some OSI layers and uses the IP as the network layer.IP is the “narrow waist” of the InternetProtocols are shown in their respective layers1.5.3 Model used for this CourseIt is based on the TCP/IP model but we call out the physical layer and look beyond Internet protocols.1.5.

36、4 Critique of OSI & TCP/IPOSIVery influential model with clear conceptsModels, protocols and adoption all bogged down by politics and complexityTCP/IPVery successful protocols that worked well and thrivedWeak model derived after the fact from protocols1.6 Example NetworksThe Internet3G mobile phone

37、networksWireless LANsRFID and sensor networks1.6.1 Internet (1)Overview of the Internet architecture1.6.1 Internet (2)Access network is the physical links that connect an end system to the edge routerThe technology includesADSLEthernetFTTHWiFiWiMAXMobile communicationFrom KUROSE & ROSS, Computer Net

38、working: A Top-Down Approach, 5th Edition1.6.1 Internet (3)The modern Internet is more complex (1)ISP networks serve as the Internet backboneISPs connect or peer to exchange traffic at IXPsWithin each network routers switch packetsBetween networks, traffic exchange is set by business agreements1.6.1

39、 Internet (4)The modern Internet is more complex (2)Customers connect at the edge by many meansCable, DSL, Fiber-to-the-Home, 3G/4G wireless, dialupData centers concentrate many servers (“the cloud”)Most traffic is content from data centers (esp. video)The architecture continues to evolve1.6.1 Inter

40、net (5)ICANN (The Internet Corporation for Assigned Names and Numbers) announced Available Pool of unallocated IPv4 Internet Addresses Now Completely Emptied in Feb. 3, 2011US, EU (European Union), and Japan have scheduled for IPv4 to convert into IPv61.6.1 Internet (6)Source: 邬贺铨, 中国下一代互联网的研究和CNGI项

41、目1.6.1 Internet (7)Chinas Next Generation Internet (CNGI)Source: 邬贺铨, 中国下一代互联网的研究和CNGI项目1.6.2 3G mobile phone networks (1)3G network is based on spatial cells; each cell provides wireless service to mobiles within it via a base station1.6.2 3G mobile phone networks (2)Base stations connect to the co

42、re network to find other mobiles and send data to the phone network and InternetArchitecture of UMTS 3G network1.6.2 3G mobile phone networks (3)As mobiles move, base stations hand them off from one cell to the next, and the network tracks their locationSoft handover vs. hard handoverHandover1.6.2 3

43、G mobile phone networks (4)SecuritySIM (Subscriber Identity Module) cardAuthenticationCryptographic keys on the chip are used to encrypt transmissionsEncryption cell phone4G and WiMAX1.6.3 Wireless LANs (1)Infrastructure wireless LAN: Clients communicate via an AP (Access Point) that is wired to the

44、 rest of the network.Ad hoc networks: clients can communicate directly in same radio rang.1.6.3 Wireless LANs (2)Signals in the 2.4GHz ISM band vary in strength due to many effects, such as multipath fading due to reflectionsrequires complex transmission schemes, e.g., OFDM1.6.3 Wireless LANs (3)Rad

45、io broadcasts interfere with each other, and radio ranges may incompletely overlapCSMA (Carrier Sense Multiple Access) designs are used1.6.3 Wireless LANs (4)MobilityOver a single 802.11 networkAcross different networks (IEEE 802.21)Security (802.11i)WEP (Wireless Equivalent Privacy) was flawed and

46、brokenWPA2 (WiFi Protected Access)WAPI (Wireless Authentication Privacy Infrastructure): China standard (GB 15629)1.6.4 RFID & Sensor Networks (1)Passive UHF RFID networks everyday objectsTags (stickers with not even a battery) are placed (or embedded) on objectsBackscatter: readers send signals tha

47、t the tags reflect to communicate1.6.4 RFID & Sensor Networks (2)The Category of RFID TagsPassive RFID tags have neither an electric plug nor a battery. Active RFID has a power source in the tag.The Category Frequency of RFIDUHF RFID (Ultra-High Frequency RFID) tags communicate at distance of severa

48、l meters. It is used on shipping pallets and some drivers licenses.HF RFID (High Frequency RFID) is likely to be in the passports, credit cards, books, and noncontact payment systems.LF RFID (low Frequency RFID) is used for animal tracking.1.6.4 RFID & Sensor Networks (3)The Problems in Using RFIDMu

49、ltiple tags in reading rageLike 802.11: wait for a short random intervalSecurityMalwareVirus1.6.4 RFID & sensor networks (4)Sensor networks spread small devices over an areaMultihop network: devices send sensed data to collector via wireless hopsProblems: 24, 251.6.4 RFID & sensor networks (4)Sensor

50、 networks spread small devices over an area (2)The connections can be wired or wireless(Wireless) Mesh networkThe full mesh topology The partial mesh topology using self-healing algorithms The figures from Wikipedia1.7 Network StandardizationStandards define what is needed for interoperabilitySome o

51、f the many standards bodiesBodyAreaExamplesITUTelecommunicationsG.992, ADSLH.264, MPEG4IEEECommunications802.3, Ethernet802.11, WiFiIETFInternetRFC 2616, HTTP/1.1RFC 1034/1035, DNSW3CWebHTML5 standardCSS standardDiscussing Topics (1-1)Problem 26To know the organization of IEEE, ACM, and their related works.Write Short reports (1-1)Go to IETFs Web site, , to see what they are doing. Pick a project

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论