Unit 8 Computer Network

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

Unit8ComputerNetworkSectionANetworkFundamentals•Theneedtoshareinformationandresourcesamongdifferentcomputershasledtolinkedcomputersystems,callednetworks,inwhichcomputersareconnectedsothatdatacanbetransferredfrommachinetomachine.Inthesenetworks,computeruserscanexchangemessagesandshareresources—suchasprintingcapabilities,softwarepackages,anddatastoragefacilities—thatarescatteredthroughoutthesystem.Theunderlyingsoftwarerequiredtosupportsuchapplicationshasgrownfromsimpleutilitypackagesintoanexpandingsystemofnetworksoftwarethatprovidesasophisticatednetworkwideinfrastructure.Inasense,networksoftwareisevolvingintoanetworkwideoperatingsystem.I.NetworkClassifications•Acomputernetworkisoftenclassifiedasbeingeitheralocalareanetwork(LAN),ametropolitanareanetwork(MAN),orawideareanetwork(WAN).ALANnormallyconsistsofacollectionofcomputersinasinglebuildingorbuildingcomplex.Forexample,thecomputersonauniversitycampusorthoseinamanufacturingplantmightbeconnectedbyaLAN.AMANisanetworkofintermediatesize,suchasonespanningalocalcommunity.AWANlinksmachinesoveragreaterdistance—perhapsinneighboringcitiesoronoppositesidesoftheworld.•Anothermeansofclassifyingnetworksisbasedonwhetherthenetwork’sinternaloperationisbasedondesignsthatareinthepublicdomainoroninnovationsownedandcontrolledbyaparticularentitysuchasanindividualoracorporation.(发明、商标等)不受专利权限制网络分类的另一种方式是根据网络的内部运行是基于无专利权保护的设计还是基于特定实体(如个人或公司)所拥有和控制的革新。前一种类型的网络称为开放式网络,后一种类型的网络称为封闭式网络,有时也称为专有网络。•Theinternetisanopensystem.Inparticular,communicationthroughouttheInternetisgovernedbyanopencollectionofstandardsknownastheTCP/IPprotocolsuite.Anyoneisfreetousethesestandardswithoutpayingfeesorsigninglicenseagreements.Anetworkoftheformertypeiscalledanopennetwork;anetworkofthelattertypeiscalledaclosed,orsometimesaproprietary,network.Incontrast,acompanysuchasNovellInc.mightdevelopsystemsforwhichitchoosestomaintainownershiprights,allowingthecompanytodrawincomefromsellingorleasingtheseproducts.Networksbasedonsuchsystemsareexamplesofclosednetworks.•Stillanotherwayofclassifyingnetworksisbasedonthetopologyofthenetwork,whichreferstothepatterninwhichthemachinesareconnected.Thebustopology,ringtopology,andstartopologyarethreepopulartopologies.Ofthese,thestarnetworkisperhapstheoldest,havingevolvedfromtheparadigmofalargecentralcomputerservingmanyusers.Asthesimpleterminalsemployedbytheseusersgrewintosmallcomputersthemselves,astarnetworkemerged.Apointtoemphasizeisthattheconnectionsbetweenmachinesinanetworkdonotneedtobephysical.Wirelessnetworks,usingradiobroadcasttechnology,arebecomingquitecommon.II.Protocols•Foranetworktofunctionreliably,itisimportanttoestablishrulesbywhichnetworkactivitiesareconducted.Suchrulesarecalledprotocols.Bydevelopingandadoptingprotocolstandards,vendersareabletobuildproductsfornetworkapplicationsthatarecompatiblewithproductsfromothervenders.Thus,thedevelopmentofprotocolstandardsisanindispensableprocessinthedevelopmentofnetworkingtechnologies.•Asanintroductiontotheprotocolconcept,letusconsidertheproblemofcoordinatingthetransmissionofmessagesamongcomputersinanetwork.Withoutrulesgoverningthiscommunication,allthecomputersmightinsistontransmittingmessagesatthesametimeormightfailtorelaymessageswhenthatassistanceisrequired.•Oneapproachtosolvingthisproblemisthetokenringprotocol,whichwasdevelopedbyIBMinthe1970sandcontinuestobeapopularprotocolinnetworksbasedontheringtopology.Inthisprotocol,allthemachinesinthenetworktransmitmessagesinonlyonecommondirection(Figure8A-1),meaningthatallmessagessentoverthenetworkmovearoundtheringinthesamedirectionbybeingforwardedfromcomputertocomputer.Whenamessagereachesitsdestination,thedestinationmachinekeepsacopyofitandforwardsacopyonaroundthering.Whentheforwardedcopyreachestheoriginatingcomputer,thatmachineknowthatthemessagemusthavereacheditsdestinationandremovesthemessagefromthering.Ofcourse,thissystemdependsoninter-machinecooperation.Ifamachineinsistsonconstantlytransmittingmessagesofitsownratherthanforwardingthoseoftheothermachines,nothingwillbeaccomplished.•Tosolvethisproblem,auniquebitpattern,calledatoken,ispassedaroundthering.Possessionofthistokengivesamachinetheauthoritytotransmititsownmessages;withoutatoken,amachineisonlyallowedtoforwardmessages.Normally,eachmachinemerelyrelaysthetokeninthesamemannerinwhichitrelaymessages.If,however,themachinereceivingthetokenhasmessagesofitsowntointroducetothenetwork,ittransmitsonemessagewhileholdingthetoken.Whenthismessagehascompleteditscyclearoundthering,themachineforwardsthetokentothenextmachineinthering.Likewise,whenthenextmachinereceivesthetoken,itcaneitherforwardthetokenimmediatelyortransmititsownnewmessagebeforesendingthetokenontothenextmachine.Inthismanner,eachmachineinthenetworkhasequalopportunitytointroducemessagesofitsownasthetokencirclesaroundthering.InanEthernetsystem,therighttotransmitmessagesiscontrolledbytheprotocolknownasCarrierSenseMultipleAccesswithCollisionDetection(CSMA/CD).Thisprotocoldictatesthateachmessagebebroadcasttoallthemachinesonthebus(Figure8A-2).•Anotherprotocolforcoordinatingmessagetransmiss

1 / 28
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功