计算机网络第五版(英文版).ppt

上传人:wuy****n92 文档编号:86914472 上传时间:2023-04-15 格式:PPT 页数:88 大小:4.12MB
返回 下载 相关 举报
计算机网络第五版(英文版).ppt_第1页
第1页 / 共88页
计算机网络第五版(英文版).ppt_第2页
第2页 / 共88页
点击查看更多>>
资源描述

《计算机网络第五版(英文版).ppt》由会员分享,可在线阅读,更多相关《计算机网络第五版(英文版).ppt(88页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、Computer NetworksThe course is a part of the Excellent Course Program(1)Review last lectureRandomly choose students to answer some questions,and record the grade.Discuss some interesting topicsOne 10 students per group One of them makes a presentationWrite short reports and answer the problems after

2、 each chaptersEach student must do themRecord the gradeExperimentsIn Computer Networks LabThe course is a part of the Excellent Course Program(2)Total point(Note that the final grade components may change!)Final exam(40%),middle exam(20%),experiments(20%),reports/problems(10%),and others(10%)After s

3、tudy Chapter 4,there will be mid-term examExploring StudySome subjects for exploring studyIf you have novel idea,you will get bonus points.The course is a part of the Excellent Course Program(3)Welcome to our research lab(1)网络传输中流媒体QoE 保障理论与方法研究(NSFC:61073154)P2P网络中语义场模型及关键技术研究(Applying NSFC project

4、)Mobile Cloud Computing Platform for Real Time Business Intelligence ApplicationsCo-operator:The Hong Kong Polytechnic UniversityApplying Doctor foundation in MOEThe course is a part of the Excellent Course Program(4)Welcome to our research lab(2)物联网高速接入和应用技术Co-operator:EPFL正申请上海市科委项目 This is a Bili

5、ngual CourseWhy we give this bilingual course?To meet the needs of excellent engineer training program and internationalizationOur aimText book,exercises,test,and examination will be 100%in English.PPT will exceed 95%in EnglishGiving the lecture and discussion will be more then 60%in EnglishIt is im

6、portant to ensure the quality of teaching.We will gradually increase the percentage of English language.ReferenceText Book:Andrew S.Tanenbaum,David J.Wetherall,“Computer Networks”,5th Ed.,2010,Addison-Wesley.James F.Kurose,Keith W.Ross,“Computer Networks:A Top-Down Approach”,5th Ed.,2010,Addison-Wes

7、ley.Larry L.Peterson,Bruce S.Davie,“Computer Networks:A System Approach”,5th Ed.,2011,Elsevier.高传善等著,计算机网络教程,1994,复旦大学出版社。ReferenceDouglas Comer,“Internetworking With TCP/IP volume 1:Principles,Protocols,and Architecture”,5th Ed.,2006,Pearson.Andrew S.Tanenbaum,Maarten Van Steen,“Distributed Systems

8、:Principles and Paradigms”,2nd Ed.,2008,Pearson.Some papersIETF RFCsThe Most Important Journals IEEE-ACM Transaction on Networking:Bimonthly,ISSN:1063-6692IEEE NETWORK:Bimonthly,ISSN:0890-8044The Most Important Conferences ACM SIGCOMM:IEEE Infocom:ACM SIGMETRICS:China Computer FederationEvaluating a

9、cademic achievementClass A is top important of journal and conferenceClass B is very important of journal and conference Class C is important of journal and conferenceWebsites and online courses IntroductionChapter 11.1 What Is Computer NetworksComputer networks are collections of autonomous compute

10、rs,e.g.,the InternetComputer Networks vs.Distributed SystemsThe key distinction is software systems,especially OS.Complex NetworksScale-free networksSmall-world networks Source:Albert-Lszl Barabsi,“The physics of the Web”,Physics World 14,(2001)Source:David Lazer et al.,“Computational Social Science

11、”,SCIENCE,323,721-724(2009)Exploring Study(1)1.Use complex network theory and dynamics of human behavior(DHB)to analyze social networks and optimize social networking service(SNS).2.Research on opinion evolution and interference model on Internet,specially on social networking service(SNS).1.2 Uses

12、of Computer Networks(1)Computer Cluster A computer cluster consists of a set of loosely connected computers that work together so that in many respects they can be viewed as a single system.From Wikipedia1.2 Uses of Computer Networks(2)Cloud Computing(1)From WikipediaInfrastructure as a Service(IaaS

13、)Platform as a Service(PaaS)Software as a Service(SaaS)1.2 Uses of Computer Networks(3)Cloud Computing(2)ArchitectureFrom Wikipedia1.2 Uses of Computer Networks(4)Cloud Computing(3)Deployment ModelsPrivate Cloud Community CloudPublic CloudHybrid CloudSource:Wikipedia1.2 Uses of Computer Networks(5)C

14、lient-server moduleThe Network maybe VPN which is over InternetProvide many services over the networkThe Web is an example of client-server computing.E-commerceRequestReply1.2 Uses of Computer Networks(6)Triple-Play Networks(1)青海省公检法信息通信网为例IconRouter1.2 Uses of Computer Networks(7)Triple-Play Networ

15、ks(2)Switch1.2 Uses of Computer Networks(8)Triple-Play Networks(3)1.2 Uses of Computer Networks(9)Peer-to-Peer NetworksThey are overlay networksThere are no fixed clients and servers1.2 Uses of Computer Networks(10)The Category of Network Use(1)Resource sharingPerson-to-person communicationVoIP,vide

16、o conferenceDesktop sharingInstant messaging,like Skype,MSN,QQ,etc.Blog,TwitterWiki,like Wikipedia,etc.E-commerce,includes online auctionsEntertainment,like MP3,IPTV,games,etc.1.2 Uses of Computer Networks(11)The Category of Network Use(2)Ubiquitous computing(Ubicomp,普适计算)/Ubiquitous networks(Ubinet

17、,泛在网络)Wireless Sensor networks(WSN)Power-line networksRFID(Radio Frequency IDentification)Internet of things(IOT,物联网)UbinetIOTWSNSource:WikipediaSource:邬贺铨,中国下一代互联网的研究和CNGI项目1.2 Uses of Computer Networks(12)Wireless Networks and Mobile ComputingWiFi,cellular networks,WSN,etc.Sensor networks can be b

18、uilt with ZigBee,WiFi,etc.Smart phonesGPSM-commerceWearable computersSource:Wikipedia1.3 Network Hardware(1)Transmission technologyPoint-to-point linksIt is Important to find good route from the source to the destination.UnicastingBroadcast linksBroadcasting,multicasting1.3 Network Hardware(2)Networ

19、ks can be classified by their scaleScaleTypeVicinityPAN(Personal Area Network)Building/CampusLAN(Local Area Network)CityMAN(Metropolitan Area Network)CountryWAN(Wide Area Network)PlanetThe Internet(network of all networks)1.3.1 Personal Area NetworkConnect devices over the range of a personPAN can b

20、e built with Bluetooth,ZigBee,or RFID1.3.2 Local Area NetworkConnect devices in a home or office buildingCalled enterprise network in a companyHow the sharing communication channel is allocated?1.3.3 Metropolitan Area NetworkExample MAN based on cable TVWiMAX1.3.4 Wide Area Network(1)Subnet is colle

21、ction of lines and routersThe transmission line may own lines or lease SDH linksExample WAN connecting three branch officesTag router switch/Multi-service switch router(MSR)1.3.4 Wide Area Network(2)A VPN(Virtual Private Network)is a WAN built from virtual links that run on top of the Internet.1.3.4

22、 Wide Area Network(3)An ISP(Internet Service Provider)network is also a WAN.Routing algorithmForwarding algorithm1.3.4 Wide Area Network(4)Make use of wireless technologiesSatellite systemsCellular telephone network1.3.5 InternetworkingInternet vs.internetSubnet workGatewayProblems4,5,7,8,91.4 Netwo

23、rk SoftwareProtocol layersDesign Issues for the LayersConnection-Oriented vs.ConnectionlessService PrimitivesRelationship of Services to Protocols1.4.1 Protocol layers(1)Protocol layering is the main structuring method used to divide up network functionality.Each layer communicates only by using the

24、 one belowLower layer services are accessed by an interfaceAt bottom,messages are carried by the mediumEach protocol instance talks virtually to its peerVirtual communication Physical communication1.4.1 Protocol layers(2)Each lower layer adds its own header(with control information)to the message to

25、 transmit and removes it on receiverLayers may also split and join messages,etc.1.4.1 Protocol layers(3)Information transmission unit1.4.2 Design Issues for the LayersEach layer solves a particular problem but must include mechanisms to address a set of recurring design issuesIssueExample mechanisms

26、 at different layersReliability despite failuresCodes for error detection/correction(3.2,3.3)Routing around failures(5.2)Network growth and evolutionAddressing(5.6)and naming(7.1)Protocol layering(1.3)Allocation of resources like bandwidth Multiple access(4.2)Congestion control(5.3,6.3)Security agai

27、nst various threatsConfidentiality of messages(8.6)Web security(8.9)1.4.3 Connection-Oriented vs.Connectionless(1)Connection-oriented,must be set up for ongoing use(and torn down after use),e.g.,phone callConnectionless,messages are handled separately,e.g.,postal delivery1.4.3 Connection-Oriented vs

28、.Connectionless(2)In connection-oriented serviceEstablishes a connection,uses the connection,and then releases the connection.When a connection is established,negotiation has to do with getting both sides to agree on some parameters or values to be used during the communication.In the most cases the

29、 bits arrive to receiver in the order they were sentMessage sequences vs.byte streams1.4.3 Connection-Oriented vs.Connectionless(3)In connectionless serviceStore-and-forward switching vs.cut-through switchingIt is possible that the messages arrive to receiver out of order they were sent.Unreliable c

30、onnectionless service is called datagramReliable service vs.unreliable service Must have acknowledgement or need not one1.4.4 Service Primitives(1)A service is provided to the layer above as primitivesHypothetical example of service primitives that may provide a reliable byte stream(connection-orien

31、ted)service1.4.4 Service Primitives(2)Hypothetical example of how these primitives may be used for a client-server interactionClientServerLISTEN(0)ACCEPT RECEIVESEND(4)DISCONNECT(6)CONNECT(1)SENDRECEIVEDISCONNECT(5)Connect requestAccept responseRequest for dataReplyDisconnectDisconnect(2)(3)1.4.5 Re

32、lationship of Services to ProtocolsA layer provides a service to the one above verticalA layer talks to its peer using a protocol horizontalProblems:15,181.5 Reference ModelsThe OSI Reference ModelThe TCP/IP Reference ModelModel used for this CourseCritique of OSI and TCP/IP1.5.1 The OSI Reference M

33、odelA principled,international standard,seven layer model to connect different systemsProvides functions needed by usersConverts different representationsManages task dialogsProvides end-to-end deliverySends packets over multiple linksSends frames of informationSends bits as signals1.5.2 The TCP/IP

34、Reference ModelA four layer model derived from experimentation;omits some OSI layers and uses the IP as the network layer.IP is the“narrow waist”of the InternetProtocols are shown in their respective layers1.5.3 Model used for this CourseIt is based on the TCP/IP model but we call out the physical l

35、ayer and look beyond Internet protocols.1.5.4 Critique of OSI&TCP/IPOSI+Very influential model with clear conceptsModels,protocols and adoption all bogged down by politics and complexityTCP/IP+Very successful protocols that worked well and thrivedWeak model derived after the fact from protocols1.6 E

36、xample NetworksThe Internet3G mobile phone networksWireless LANsRFID and sensor networks1.6.1 Internet(1)Overview of the Internet architecture1.6.1 Internet(2)Access network is the physical links that connect an end system to the edge routerThe technology includesADSLEthernetFTTHWiFiWiMAXMobile comm

37、unicationFrom KUROSE&ROSS,Computer Networking:A Top-Down Approach,5th Edition1.6.1 Internet(3)The modern Internet is more complex(1)ISP networks serve as the Internet backboneISPs connect or peer to exchange traffic at IXPsWithin each network routers switch packetsBetween networks,traffic exchange i

38、s set by business agreements1.6.1 Internet(4)The modern Internet is more complex(2)Customers connect at the edge by many meansCable,DSL,Fiber-to-the-Home,3G/4G wireless,dialupData centers concentrate many servers(“the cloud”)Most traffic is content from data centers(esp.video)The architecture contin

39、ues to evolve1.6.1 Internet(5)ICANN(The Internet Corporation for Assigned Names and Numbers)announced Available Pool of unallocated IPv4 Internet Addresses Now Completely Emptied in Feb.3,2011US,EU(European Union),and Japan have scheduled for IPv4 to convert into IPv61.6.1 Internet(6)Source:邬贺铨,中国下一

40、代互联网的研究和CNGI项目1.6.1 Internet(7)Chinas Next Generation Internet(CNGI)Source:邬贺铨,中国下一代互联网的研究和CNGI项目1.6.2 3G mobile phone networks(1)3G network is based on spatial cells;each cell provides wireless service to mobiles within it via a base station1.6.2 3G mobile phone networks(2)Base stations connect to

41、the core network to find other mobiles and send data to the phone network and InternetArchitecture of UMTS 3G network1.6.2 3G mobile phone networks(3)As mobiles move,base stations hand them off from one cell to the next,and the network tracks their locationSoft handover vs.hard handoverHandover1.6.2

42、 3G mobile phone networks(4)SecuritySIM(Subscriber Identity Module)cardAuthenticationCryptographic keys on the chip are used to encrypt transmissionsEncryption cell phone4G and WiMAX1.6.3 Wireless LANs(1)Two different communication modes in 802.11Infrastructure wireless LAN:Clients communicate via a

43、n AP(Access Point)that is wired to the rest of the network.Ad hoc networks:clients can communicate directly in same radio rang.1.6.3 Wireless LANs(2)Signals in the 2.4GHz ISM band vary in strength due to many effects,such as multipath fading due to reflectionsrequires complex transmission schemes,e.

44、g.,OFDM1.6.3 Wireless LANs(3)Radio broadcasts interfere with each other,and radio ranges may incompletely overlapCSMA(Carrier Sense Multiple Access)designs are used1.6.3 Wireless LANs(4)MobilityOver a single 802.11 networkAcross different networks(IEEE 802.21)Security(802.11i)WEP(Wireless Equivalent

45、 Privacy)was flawed and brokenWPA2(WiFi Protected Access)WAPI(Wireless Authentication Privacy Infrastructure):China standard(GB 15629)1.6.4 RFID&Sensor Networks(1)Passive UHF RFID networks everyday objectsTags(stickers with not even a battery)are placed(or embedded)on objectsBackscatter:readers send

46、 signals that the tags reflect to communicate1.6.4 RFID&Sensor Networks(2)The Category of RFID TagsPassive RFID tags have neither an electric plug nor a battery.Active RFID has a power source in the tag.The Category Frequency of RFIDUHF RFID(Ultra-High Frequency RFID)tags communicate at distance of

47、several meters.It is used on shipping pallets and some drivers licenses.HF RFID(High Frequency RFID)is likely to be in the passports,credit cards,books,and noncontact payment systems.LF RFID(low Frequency RFID)is used for animal tracking.1.6.4 RFID&Sensor Networks(3)The Problems in Using RFIDMultipl

48、e tags in reading rageLike 802.11:wait for a short random intervalSecurityMalwareVirus1.6.4 RFID&sensor networks(4)Sensor networks spread small devices over an areaMultihop network:devices send sensed data to collector via wireless hopsProblems:24,251.6.4 RFID&sensor networks(4)Sensor networks sprea

49、d small devices over an area(2)The connections can be wired or wireless(Wireless)Mesh networkThe full mesh topology The partial mesh topology using self-healing algorithms The figures from Wikipedia1.7 Network StandardizationStandards define what is needed for interoperabilitySome of the many standa

50、rds bodiesBodyAreaExamplesITUTelecommunicationsG.992,ADSLH.264,MPEG4IEEECommunications802.3,Ethernet802.11,WiFiIETFInternetRFC 2616,HTTP/1.1RFC 1034/1035,DNSW3CWebHTML5 standardCSS standardDiscussing Topics(1-1)1.Problem 262.To know the organization of IEEE,ACM,and their related works.Write Short re

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育专区 > 大学资料

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁