1. Trang chủ
  2. » Giáo án - Bài giảng

The architecture of computer hardware and systems software an information technology approach ch15p2

20 99 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 20
Dung lượng 536 KB

Nội dung

Chapter 15 – Part Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach 3rd Edition, Irv Englander John Wiley and Sons  2003 Network Basics  Communication paths  Protocol standards  Data transmission  By character or byte at a time  By sending the entire message at a time  By subdividing the messages into packets and sending each packet at a time  Frames are packets that have been further subdivided to meet requirements of the media access control hardware protocol Chapter 15 15.2-2 Packet Header  Also known as the preamble  Contains     Description of the packet Destination address of receiver Source address of sender Information about the data being sent Chapter 15 15.2-3 Advantages of Packets  Reduces communication overhead  Reasonable unit for routing of data  Alternative to dedicating a channel for the entire length of the message  Packets from several sources can share a single channel  Each sender/receiver pair appears to have a channel to itself  Receiving computer can process an entire block of data instead of a character or byte at a time  Simplifies synchronization of the sending and receiving systems by providing clear start and stop points Chapter 15 15.2-4 OSI Reference Model  Open Systems Interconnection Model  Developed by International Standards Organization (ISO)  Contains seven layers  All People Seem To Need Data Processing  People Do Not Through Sausage Pizza Away Chapter 15        Application Presentation Session Transport Network Data Link Physical 15.2-5 Layers of the OSI Model Chapter 15 15.2-6 OSI Physical Layer  Responsible for transmission of bits  Implemented primarily through hardware  Encompasses signaling method, electrical and mechanical interfaces  Example: RS-232, 10Base5 Chapter 15 15.2-7 OSI Data Link Layer  Responsible for error-free, reliable transmission of data  Frames sized for compatibility with the MAC protocol  Flow control, error detection and correction, retransmission  Uses MAC addresses Chapter 15 15.2-8 OSI Network Layer  Responsible for addressing and routing of messages to final destination  Breaks up messages into frames that meet the requirements of intervening networks  Local network – no routing  Physical address is appended to each packet  Symbolic addresses are converted to physical address through a lookup table  External network – routing required  External tables are used to assist in routing message Chapter 15 15.2-9 OSI Transport Layer  Ultimate final address of destination is determined  All end-to-end communication including intermediate nodes Chapter 15 15.2-10 OSI Session Layer  Establishes a dialogue between two applications or processes between systems  Terminates connection at end of session  Manages logins, password exchange, logoffs Chapter 15 15.2-11 OSI Presentation Layer  Provides format and code conversion services  Examples     File conversion from ASCII to Unicode Encryption, decryption Data reformatting Conversion between data formats used by different email systems Chapter 15 15.2-12 OSI Application Layer • Provides utilities and tools for application programs and users Chapter 15 15.2-13 TCP/IP  Transmission Control Protocol/Internet Protocol  Physical and Data Link layers are not specified by the TCP/IP protocol  Internet Protocol  Implemented in workstations and routers  Messages are segmented into packets and are reassembled at the other end  Uses IP for addressing and routing between networks  Transport  Reliable end-to-end connectivity  Final delivery of packets  Application Chapter 15 15.2-14 TCP & UDP  Most TCP/IP applications use TCP for transport layer  TCP provides a connection (logical association) between two entities to regulate flow check errors  UDP (User Datagram Protocol) does not maintain a connection, and therefore does not guarantee delivery, preserve sequences, or protect against duplication Chapter 15 15.2-15 Comparison of OSI and TCP/IP Chapter 15 15.2-16 Network Services        Protocol Stacks Sockets Network file transfers Print services Web services Messaging services Application program access to network services  RPC – remote procedure calls  Security and network management services  Remote processing and login services Chapter 15 15.2-17 Network File Transfers  FTP  Internet file transfer protocol  Logical names for machine or drive  Windows  Network files can be accessed transparently by being mounted directly into the current file system  Unix / Linux Chapter 15 15.2-18 Access for a Networked Operating System Chapter 15 15.2-19 Network Systems  Distributed system  Collection of independent computers that appear to the users of the systems as a single computer  Client-Server system  Control is centralized in the server computer  Client computers have network access limited to services provided by the servers  Peer-to-Peer system  Any two computers can communicate with one another within security constraints Chapter 15 15.2-20 ... computer can process an entire block of data instead of a character or byte at a time  Simplifies synchronization of the sending and receiving systems by providing clear start and stop points Chapter... channel for the entire length of the message  Packets from several sources can share a single channel  Each sender/receiver pair appears to have a channel to itself  Receiving computer can... and Data Link layers are not specified by the TCP/IP protocol  Internet Protocol  Implemented in workstations and routers  Messages are segmented into packets and are reassembled at the other

Ngày đăng: 10/01/2018, 16:24