Vous êtes sur la page 1sur 8

Network Services and Internal Network Operation The main function of a n/w is to transfer info among the users

that are connected to the n/w or inter n/w. In the fig given below, the transfer may involve a single block of info or a sequence of blocks that are temporally related. In case of a single block of info, we are interested in having the block to be delivered correctly to the destination and in the delay experienced in traversing he n/w.

t0 Network

t1

In case of a sequence of blocks, we are interested not only in receiving the blocks correctly and in right sequence but also in delivering a relatively unimpaired temporal relation. The fig given below is transport protocol that operates end to end across a n/w. The transport layer processes at the end systems accept messages from their previous layer and transfer these messages by xchanging segments end to end across the n/w. The fig shows the interface at which the n/w service is visible to the transport layer. The n/w service is nothing but the transport layer and the manner in which the n/w operates to provide the service is irrelevant.
Messages
Transport layer Network service Network layer Network layer Data link layer Physical layer Network layer Data link layer Physical layer Network layer Data link layer Physical layer

Message s Segments
Transport layer Network service

End system

Data link layer Physical layer

End system

The n/w service can either be connection-oriented or connectionless. A connectionless service is very simple, with only two basic interactions b/w the transport layer and the n/w layer and n/w layer that are i) ii) A request to the n/w that it sends a packet and an indication from the n/w that a packet has arrived. The user can request transmission of a packet at any time, and does not need to inform the n/w layer that the user intends to transmit info ahead of time.

A connectionless service puts total responsibility for error control, sequencing and flow control on the end-system transport layer. The n/w service can be connection-oriented. In connection-oriented the transport layer cannot request transmission of info until a connection has been setup. The essential pts here are that the n/w layer must be informed abt the new flow i.e. abt to be applied to the n/w and that the n/w layer maintains state info abt the flows it is handling. A connection-release procedure may also be required to terminate the connection. It is clear that providing connection-oriented service entails greater complexity than connectionless service in the n/w layer. 1. 2. 3. 4. The services offered by n/w layer are: Best effort connectionless service. Low-delay connectionless service. Connection-oriented reliable stream service Connection oriented transfer of packets with delay bandwidth guarantees.

Internal Operations of Network The internal operation of n/w is connectionless if packets are transferred within the n/w as datagrams, so each packet is routed independently. Consequently packets may follow diff paths from a to b and so may arrive out of order. The internal operation of a n/w is connectionoriented iff packets follow VC(virtual circuit) that have been established from a source to a destination. Thus to provide communications b/w a & b, routing to set up a VC is done once and thereafter packets are simply forwarded along the established path. If resources are reserved during connection setup, then bandwidth, delay and loss guarantees can be provided. The fact that n/w offers both services but does not dictate hoe the n/w must operate internally. The approach suggested by the end to end argument keeps the n/w service as simple as possible while adding complexity at the edge only as required. This strategy fits very well with the need to grow n/ws to very large scale. A third category of func can be implemented either at the edge or inside the n/w. for eg, while congestion takes place inside the n/w, the remedy involves reducing input flows at the edge of the n/w.

C
12
1
2

21
1 1

End system

4 3 21

12

1 2 21

Mediu m

12

3
2 1

1 2 21

123

End system 4

A
layer 1 Physical entity

B Networ k

Data link layer entity

Network layer entity

3 Network layer 4

entity Transport layer entity

Congestion control has been implemented in the transport layer and in the n/w layer. Another set of function is concerned with making the n/w service independent of the underlying transmissionsystems.Like a different transmission system i.e optical verses wireless may have different limits..The n/w layer may be called upon to carry out segmentation inside the n/w .Alternatively the n/w could send error msg to the sending edge requesting that the packet size be reduced . PACKET N/W TOPOLOGY The user access packet in different way as a multiplexer as shown in the figure where the packets from a number of users share a transmission line.Here a single transmission line is shared in the access to wide area packet switching n/w.The multiplexer combines the typically bursty flows the individual computers in to aggregated flows that make efficient use of the transmission line .The different application within a single computer can generate multiple simultaneous flows to different destinations .From logical point of view the link can be viewed as carrying either a single aggregated flow or a number separate packet flows. LAn is another type of accessing method ,which provide the access to packet switching n/w in many environment.As shown in the figure computer are connected to a shared transmission medium .transmssion are broad cast to all computers in the n/w.Each computer is

identified by unique physical address and so each station listens for nits address to receive transmission.Broadcast and multicast transmission are easily provided in this environment. LAN allow the sharing of resources such as printers,databases and s/w among small community of users. Multiple LANs in an organization are interconnected into campus n/w with a structure shown in the fig.LANs for a large group of users such as department are interconnected in an extended LAN through the use of LAN switches,identified by s in the fig

Campus Network
To Internet or wide area network
Backbone Organization Servers

Servers have redundant connectivity to backbone

s
R

Gateway
R S S R R

Departmental Server s

S R

s s

High-speed Only outgoing campus leave packets backbone net LAN through connects dept router routers

s s s

Resources such as servers and databases that are primarily of use to this department are kept within the sub n/w .This approach reduces delays in accessing the resources and contains the level of traffic that leaves the sub n/w.Each sub n/w has access to the rest of the organization through a Router (R) that access the campus backbone n/w . A sub n/w also uses the campus backbone to reach the outside world such as the internet or other sites belonging to the orgnistion through a gateway router.Depending on the type of organization the gateway may implement firewall functions to control the traffic that is allowed into and out of the campus n/w . The routers in the campus n/w are interconnected to for the campus backbone n/w specified by the mesh of switches designated S..Typically for large organizations such as universities these routers are interconnected by using very high speed mean sin terme of giga bits Ethernet or anATM n/w The routers use the internet protocol which enables them to operate over various data link and n/w technologies.This approach allows the n/w to adapt to changes in traffic pattern as well as changes in topology due to the false in equipment.

Connecting to Internet Service Provider


Internet service provider

Border routers

Campus Network
Autonomous system or domain

Border routers Interdomain level

Intradomain level
s s s

LAN

network administered by single organization

The routers in the campus n/w form a domain or autonomus system.The term domain indicates that the routers run the sme routing protocol.The term autonomus system is used for one or more domains under a single administration.All routing decisions inside the autonomus system are independent of any other n/w. DATAGRAMS AND VIRTUAL CIRCUITS :

Datagram packet switching


In Datagram packet-switching it is a packet switching technology by which each packet, now called a datagram, is treated as a separate entity. Each packet is routed independently through the network. Therefore packets contain a header with the full information about the destination. The intermediate nodes examine the header of a packet and select an appropriate link to another node which is nearer to the destination. In this system, the packets do not follow a pre-established route, and the intermediate nodes do not require prior knowledge of the routes that will be used. The individual packets which form a data stream may follow different paths between the source and the destination. As a result, the packets may arrive at the destination out of order. When this occurs, the packets will have to be reassembled to form the original message. Because each packet is switched independently, there is no need for connection setup and no need to dedicate bandwidth in the form of a circuit.

Datagram packet switches use a variety of techniques to forward traffic; they are differentiated by how long it takes the packet to pass through the switch and their ability to filter out corrupted packets. There are three primary types of datagram packet switches:

Store and forward: buffers data until the entire packet is received and checked for errors. This prevents corrupted packets from propagating throughout the network but increases switching delay. Fragment free: filters out most error packets but doesn't necessarily prevent the propagation of errors throughout the network. It offers faster switching speeds and lower delay than store-andforward mode.

Cut through:does not filter errors; it switches packets at the highest throughput, offering the least forwarding delay. The most common datagram network is the Internet, which uses the IP network protocol. Applications

which do not require more than a best effort service can be supported by direct use of packets in a datagram network, using the User Datagram Protocol (UDP) transport protocol. Applications like voice and video communications and notifying messages to alert a user that she/he has received new email are using UDP. Applications like e-mail, web browsing and file upload and download need reliable communications, such as guaranteed delivery, error control and sequence control. This reliability ensures that all the data is received in the correct order without errors. It is provided by a protocol such as the Transmission Control Protocol (TCP) or the File Transfer Protocol (FTP). Virtual circuits

telecommunications and computer networks, a virtual circuit (VC), synonymous with virtual connection and virtual channel, is a connection orientedcommunication service that is delivered by means of packet mode communication. After a connection or virtual circuit is established between two nodes or application processes, a bit stream or byte stream may be delivered between the nodes; a virtual circuit protocol allows higher level protocols to avoid dealing with the division of data into segments, packets, or frames. Virtual circuit communication resembles circuit switching, since both are connection oriented, meaning that in both cases data is delivered in correct order, and signalling overhead is required during a connection establishment phase. However, circuit switching provides constant bit rate and latency, while these may vary in a virtual circuit service because of reasons such as: etc. varying packet queue lengths in the network nodes, varying bit rate generated by the application, varying load from other users sharing the same network resources by means of statistical multiplexing,

Switched Network Switch

Access Network

STRUCTURE OF SWITCH /ROUTER:

Controller

1 2 3

Interconnection fabric

Line card Line card Line card

Line card Line card Line card

1 2 3

Line card

Line card

Input ports Data path Control path (a)

Output ports

Vous aimerez peut-être aussi