EEC-484/584 Computer Networks Discussion Session for HTTP and DNS Wenbing Zhao

Slides:



Advertisements
Similar presentations
EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Advertisements

EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
HyperText Transfer Protocol (HTTP)
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
1 Lecture 10: TCP Performance Slides adapted from: Congestion slides for Computer Networks: A Systems Approach (Peterson and Davis) Chapter 3 slides for.
EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Chapter 2: Application Layer
The Internet Useful Definitions and Concepts About the Internet.
HyperText Transfer Protocol (HTTP) Computer Networks Computer Networks Spring 2012 Spring 2012.
EEC-484/584 Computer Networks Lecture 5 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Web, HTTP and Web Caching
EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
2: Application Layer World Wide Web (WWW). Introduction 1-2 Internet protocol stack (recap) r application: supporting network applications m FTP,
Trying out HTTP (client side) for yourself
CHAPTER 2. Creating a network app write programs that – run on (different) end systems – communicate over network – e.g., web server software communicates.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
20-1 Last time □ NAT □ Application layer ♦ Intro ♦ Web / HTTP.
Week 11: Application Layer1 Web and HTTP First some jargon r Web page consists of objects r Object can be HTML file, JPEG image, Java applet, audio file,…
CS 372 – introduction to computer networks* Wednesday June 30
Introduction 1 Lecture 6 Application Layer (HTTP) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
2: Application Layer1 Web and HTTP First some jargon Web page consists of base HTML-file which includes several referenced objects Object can be HTML file,
2: Application Layer1 Chapter 2 Application Layer Part 2: Web & HTTP These slides derived from Computer Networking: A Top Down Approach, 6 th edition.
1 Computer Communication & Networks Lecture 28 Application Layer: HTTP & WWW p Waleed Ejaz
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Hui Zhang, Fall Computer Networking Web, HTTP, Caching.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Application Layer 2-1 Chapter 2 Application Layer 2.2 Web and HTTP.
The Intranet.
Introduction to Internet. Chapter 1 Objectives Origins of the Internet Packets and Routers TCP/IP DNS HTTP URL Client-Server.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Lecture 23 Application Layer ELEN E6761: Communication Networks Instructor: Javad Ghaderi Slides adapted from “Computer Networking: A Top Down Approach”
Transport Layer3-1 TCP throughput r What’s the average throughout of TCP as a function of window size and RTT? m Ignore slow start r Let W be the window.
2: Application Layer 1 Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April.
1 Part VII Component-level Performance Models for the Web © 1998 Menascé & Almeida. All Rights Reserved.
Application Layer 2-1 Lecture 4: Web and HTTP. Web and HTTP First, a review… web page consists of objects object can be HTML file, JPEG image, Java applet,
Important r There will be NO CLASS on Friday 1/30/2015! r Please mark you calendars 1.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 COMP 431 Internet Services & Protocols HTTP Persistence & Web Caching Jasleen Kaur February 11, 2016.
EEC-484/584 Computer Networks Lecture 4 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Week 11: Application Layer 1 Web and HTTP r Web page consists of objects r Object can be HTML file, JPEG image, Java applet, audio file,… r Web page consists.
CSEN 404 Application Layer II Amr El Mougy Lamia Al Badrawy.
Communication Networks NETW 501 Tutorial 2
© Janice Regan, CMPT 128, Jan 2007 CMPT 371 Data Communications and Networking HTTP 0.
Lecture 5 Internet Core: Protocol layers. Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP 
تجارت الکترونیک سیار جلسه پنجم مدرس : دکتررامین کریمی.
2: Application Layer 1 Chapter 2 Application Layer These ppt slides are originally from the Kurose and Ross’s book. But some slides are deleted and added.
Introduction to Networks
The Intranet.
Department of Computer Science University of Calgary
HTTP request message: general format
Introduction to Communication Networks
Administrative Things
Web Caching? Web Caching:.
Department of Computer Science University of Calgary
ECE 671 – Lecture 16 Content Distribution Networks
Computer Communication & Networks
EEC-484/584 Computer Networks
CSE 461 HTTP and the Web.
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks
Presentation transcript:

EEC-484/584 Computer Networks Discussion Session for HTTP and DNS Wenbing Zhao

2 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Outline Web Caching DNS Resource Records Exercises

3 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Web Caching user sets browser: Web accesses via proxy server browser sends all HTTP requests to proxy server –object in cache: returns cached object –else cache requests object from origin server, then returns object to client Goal: satisfy client request without involving origin server client Proxy server client HTTP request HTTP response HTTP request HTTP response origin server origin server

4 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao More about Web Caching Proxy server acts as both client and server Typically proxy server is installed by ISP (university, company, residential ISP) Why Web caching? Reduce response time for client request Reduce traffic on an institution’s access link Internet dense with caches: enables “poor” content providers to effectively deliver content

5 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Non-Caching Example Assumptions Average object size = 100,000 bits Avg. request rate from institution’s browsers to origin servers = 15/sec Delay from institutional router to any origin server and back to router = 2 sec origin servers public Internet institutional network 10 Mbps LAN 1.5 Mbps access link

6 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Non-Caching Example Consequences Utilization on LAN = 15% Utilization on access link = 100% Total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + milliseconds origin servers public Internet institutional network 10 Mbps LAN 1.5 Mbps access link

7 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Non-Caching Example Possible solution Increase bandwidth of access link to, say, 10 Mbps Consequences Utilization on LAN = 15% Utilization on access link = 15% Total delay = Internet delay + access delay + LAN delay = 2 sec + msecs + msecs Often a costly upgrade origin servers public Internet institutional network 10 Mbps LAN 10 Mbps access link

8 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Caching Example Install proxy server Suppose hit rate is 0.4 Consequence 40% requests will be satisfied almost immediately 60% requests satisfied by origin server Utilization of access link reduced to 60%, resulting in negligible delays (say 10 msec) Total avg delay = Internet delay + access delay + LAN delay =.6*(2.01) secs +.4*milliseconds < 1.4 secs origin servers public Internet institutional network 10 Mbps LAN 1.5 Mbps access link Institutional Proxy server

9 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao URL Q1. Imagine that someone in the CS Department at Stanford has just written a new program that he wants to distribute by FTP. He puts the program in the FTP directory ftp/pub/freebies/newprog.c. What is the URL for this program likely to be?

10 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao HTTP and Caching Q2. The If-Modified-Since header can be used to check whether a cached page is still valid. Requests can be made for pages containing images, sound, video, and so on, as well as HTML. Do you think the effectiveness of this technique is better or worse for JPEG images as compared to HTML?

11 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Web and Caching Q3. Consider an institutional network connected to the internet. Suppose that the average object size is 900,000 bits and that the average request rate from the institution’s browsers to the origin servers is 1.5 requests per second. The bandwidth of the access link is 1.5 Mbps. Also suppose that the amount of time it takes from when the router on the Internet side of the access link forwards an HTTP request until it receives the response in two seconds on average. Model the total average response time as the sum of the average access delay (that is, the delay from Internet router to institution router) and the average Internet delay. (continued on next slide)

12 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Web and Caching Q3 (cont’d) For the average access delay, use  /(1-  ), where  is the average time required to send an object over the access link and  is the arrival rate of objects to the access link. –Find the total average response time. –Now suppose a cache is installed in the institutional LAN. Suppose the high rate is 0.4. Find the total response time.

13 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DNS Q4. DNS typically uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem, and if so, how is it solved?

14 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DNS Q5. Although it was not mentioned in the text, an alternative form for a URL is to use the IP address instead of its DNS name. An example of using an IP address is How does the browser know whether the name following the scheme is a DNS name or an IP address.

15 Fall Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DNS, Web, HTTP Q6. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a DNS look-up is necessary to obtain the IP address. Suppose that n DNS servers are visited before your host receives the IP address from DNS; the successive visits incur an RTT of RTT 1, …, RTT n. Further suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text. Let RTT 0 denote the RTT between the local host and the server containing the object. Assuming 0 transmission time of the object, how much time elapses from when the client clicks on the link until the client receives the object?