EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.

Slides:



Advertisements
Similar presentations
Dr. Philip Cannata 1 Computer Networking. Dr. Philip Cannata 2.
Advertisements

TA: Xifan Zheng Welcome to CPSC 441!
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture.
Introduction1-1 Chapter 1: Introduction Our goal:  get context, overview, “feel” of networking  more depth, detail later in course  approach: m descriptive.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Internet History and Architectural Principles
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.
Computer Networking Introduction, Part II.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 5 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Introduction Protocol “layers” Networks are complex, with many “pieces”:  hosts  routers  links of various media  applications  protocols  hardware,
1 Week 2 Lecture 1 Layers (basics) Dr. Fei Hu. Review last lecture 2.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
1: Introduction1 Internet History r 1961: Kleinrock - queueing theory shows effectiveness of packet- switching r 1964: Baran - packet- switching in military.
Course info1 1 st Semester 2007 MI305 Computer Networks  Instructor: Jen-Liang Cheng   Office: H501-1( 福田樓 )  Lectures:
1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware, software Question:
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Sockets process sends/receives messages to/from its socket
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
CPSC 411 Tutorial TA: Fang Wang. Fang Wang 9:00am-5:00pm, Mon-Fri.
TCP/IP Network.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
Lecture 1: Overview of Internet Architecture Communication Networks ELEN E6761 Instructor: Javad Ghaderi Lecture Slides adapted from “Computer Networking:
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
1 Computer Networks & The Internet Lecture 4 Imran Ahmed University of Management & Technology.
Internet History CS 4244: Internet Programming Dr. Eli Tilevich.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
CS 3830 Day 4 Introduction 1-1. Announcements  No office hour 12pm-1pm today only  Quiz on Friday  Program 1 due on Friday (put in DropBox on S drive)
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
“Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from source to router.
Lecture 1: Facts of network technologies developments
Introduction and Overview of Network and Telecommunications.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Introduction to Networks
EEC-484/584 Computer Networks
An Aleksandar,   Accounts have been created for any students in EECS 340 who did not already have one.  Physical access to the labs has.
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
ECE 4400:427/527 - Computer Networks Spring 2017
EEC-484/584 Computer Networks
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
EEC-484/584 Computer Networks
EEC-484/584 Computer Networks
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Presentation transcript:

EEC-484/584 Computer Networks Lecture 3 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer Networking book)

2 6/25/2015EEC-484/584: Computer Networks Outline Throughput in packet-switched networks Protocol layers, reference models Network standards Internet history Application layer –Principles of networked applications

3 EEC-484/584: Computer Networks Throughput Throughput: rate (bits/time unit) at which bits transferred between sender/receiver –Instantaneous: rate at given point in time –Average: rate over longer period of time server, with file of F bits to send to client link capacity R s bits/sec link capacity R c bits/sec pipe that can carry fluid at rate R s bits/sec) pipe that can carry fluid at rate R c bits/sec) server sends bits (fluid) into pipe 6/25/2015

4 EEC-484/584: Computer Networks Throughput (more) R s < R c What is average end-end throughput? R s bits/sec R c bits/sec R s > R c What is average end-end throughput? R s bits/sec R c bits/sec link on end-end path that constrains end-end throughput bottleneck link 6/25/2015

5 EEC-484/584: Computer Networks Throughput: Internet Scenario 10 connections (fairly) share backbone bottleneck link R bits/sec RsRs RsRs RsRs RcRc RcRc RcRc R Per-connection end-end throughput: min(R c,R s,R/10) In practice: R c or R s is often bottleneck 6/25/2015

6 EEC-484/584: Computer Networks Protocol “Layers” Networks are complex! many “pieces”: –hosts –routers –links of various media –applications –protocols –hardware, software Question: Is there any hope of organizing structure of network? Or at least our discussion of networks? 6/25/2015

7 EEC-484/584: Computer Networks Organization of Air Travel A series of steps ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing 6/25/2015

8 EEC-484/584: Computer Networks ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing ticket (complain) baggage (claim) gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing Layering of Airline Functionality Layers: each layer implements a service –Via its own internal-layer actions –Relying on services provided by layer below 6/25/2015

9 EEC-484/584: Computer Networks Why Layering? Dealing with complex systems: Explicit structure allows identification, relationship of complex system’s pieces –Layered reference model for discussion Modularization eases maintenance, updating of system –Change of implementation of layer’s service transparent to rest of system –E.g., change in gate procedure doesn’t affect rest of system 6/25/2015

10 EEC-484/584: Computer Networks Internet Protocol Stack Application: supporting network applications –HTTP, DNS, SMTP Transport: process-process data transfer –TCP, UDP Network: routing of datagrams from source to destination –IP, routing protocols Link: data transfer between neighboring network elements –PPP, Ethernet Physical: bits “on the wire” Application Transport Network Link Physical 6/25/2015

11 EEC-484/584: Computer Networks ISO/OSI Reference Model Presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine- specific conventions Session: synchronization, checkpointing, recovery of data exchange Internet stack “missing” these layers! –these services, if needed, must be implemented in application Application Presentation Session Transport Network Link Physical 6/25/2015

12 EEC-484/584: Computer Networks source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M network link physical link physical HtHt HnHn HlHl M HtHt HnHn M HtHt HnHn M HtHt HnHn HlHl M router switchEncapsulation message M HtHt M HnHn frame 6/25/2015

13 Network Standardization Why standard? –Only way to achieve interoperability –Standards also increase the market for products adhering to them –Two kinds of standards De facto – from the fact (standards that just happened) De jure – by law (formal, legal standards adopted by authorized organization) EEC-484/584: Computer Networks

14 6/25/2015 Treaty Organization between Nations United Nations ITU - International Telecommunications Union CCITT/ITU-T – telephone and data communications EEC-484/584: Computer Networks

15 6/25/2015 Voluntary, Nontreaty Organization ISO (International Standards Organization) issues standards on wide range of topics 200 TC (Technical Committees) TC97 – computers and info processing SC (Subcommittees) WG (Working Groups) ANSI (American National Standards Institute) EEC-484/584: Computer Networks

16 6/25/2015 IEEE 802 Standards EEC-484/584: Computer Networks

17 6/25/2015 Internet Standard Body Internet Society (used to be Internet Architecture Board) –Internet Research Task Force (IRTF) Concentrate on long term research –Internet Engineering Task Force (IETF) Deal with short term engineering issues Standardization process –Proposed standard: request for comments (RFCs) –Draft standard: after >= 4 month test by >= 2 sites –Internet standard: if convinced the idea is sound EEC-484/584: Computer Networks

18 Internet History 1961: Kleinrock - queueing theory shows effectiveness of packet-switching 1964: Baran - packet- switching in military nets 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1972: –ARPAnet public demonstration –NCP (Network Control Protocol) first host-host protocol –first program –ARPAnet has 15 nodes : Early packet-switching principles 6/25/2015

19 EEC-484/584: Computer Networks Internet History 1970: ALOHAnet satellite network in Hawaii 1974: Cerf and Kahn - architecture for interconnecting networks 1976: Ethernet at Xerox PARC late70’s: proprietary architectures: DECnet, SNA, XNA late 70’s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles: –Minimalism, autonomy - no internal changes required to interconnect networks –Best effort service model –Stateless routers –Decentralized control Define today’s internet architecture : Internetworking, new and proprietary nets 6/25/2015

20 EEC-484/584: Computer Networks Internet History 1983: deployment of TCP/IP 1982: SMTP protocol defined 1983: DNS defined for name-to-IP-address translation 1985: FTP protocol defined 1988: TCP congestion control New national networks: Csnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks : new protocols, a proliferation of networks 6/25/2015

21 EEC-484/584: Computer Networks Internet History Early 1990’s: ARPAnet decommissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) Early 1990s: Web –Hypertext [Bush 1945, Nelson 1960’s] –HTML, HTTP: Berners-Lee –1994: Mosaic, later Netscape –Late 1990’s: commercialization of the Web Late 1990’s – 2000’s: More killer apps: instant messaging, P2P file sharing Network security to forefront Est. 50 million host, 100 million+ users Backbone links running at Gbps 1990, 2000’s: commercialization, the Web, new apps 6/25/2015

22 EEC-484/584: Computer Networks Internet History 2007: ~500 million hosts Voice, Video over IP P2P applications: BitTorrent (file sharing), Skype (VoIP), PPLive (video) More applications: youtube, gaming Wireless, mobility 6/25/2015

23 EEC-484/584: Computer Networks Introduction: Summary Covered a “ton” of material! Internet overview What’s a protocol? Network edge, core, access network –Packet-switching versus circuit-switching –Internet structure Performance: loss, delay, throughput Layering, reference models Networking standards History You now have: Context, overview, “feel” of networking More depth, detail to follow! 6/25/2015

24 EEC-484/584: Computer NetworksWenbing Zhao Application Layer Protocols Principles of networked applications –Client server model –Sockets –Addressing –Protocol –What do we need from transport layer?

25 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao Creating a Network Application Write programs that –run on different end systems and –communicate over a network No need to write code for devices in subnet –Subnet devices do not run user application code –application on end systems allows for rapid app development, propagation application transport network data link physical application transport network data link physical application transport network data link physical

26 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao Inter-Process Communications Process: program running within a host Processes in different hosts communicate by exchanging messages Client process: process that initiates communication Server process: process that waits to be contacted More accurately, client and server should be regarded as the roles played by a process. A process can be both a client and a server

27 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao Sockets Process sends/receives messages to/from its socket For each point-to-point connection, there are two sockets, one on each side API (Application Programming Interface): (1) choice of transport protocol; (2) ability to fix a few parameters process TCP with buffers, variables socket host or server process TCP with buffers, variables socket host or server Internet Controlled by OS Controlled by app developer

28 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao Addressing To receive messages, a process must have an identifier Each host device has a unique 32-bit IP address Question: Does the IP address of the host on which the process runs suffice for identifying the process?

29 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao Addressing Identifier includes both IP address and port numbers (16-bit) associated with process on host Example port numbers: –HTTP server: 80 –SSH server: 22 To send HTTP request to academic.csuohio.edu Web server: –IP address: –Port number: 80

30 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao Application Layer Protocol Defines Types of messages exchanged –e.g., request, response Message syntax –what fields in messages & how fields are delineated Message semantics –meaning of information in fields Rules for when and how processes send & respond to messages Public-domain protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP Proprietary protocols: e.g., KaZaA

31 6/25/2015EEC-484/584: Computer NetworksWenbing Zhao What Transport Service Does an Application Need? Data loss some apps (e.g., audio) can tolerate some loss other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing some apps (e.g., Internet telephony, interactive games) require low delay to be “effective” Bandwidth some apps (e.g., multimedia) require minimum amount of bandwidth to be “effective” other apps (“elastic apps”) make use of whatever bandwidth they get

32 6/25/2015EEC-484/584: Computer Networks Exercise A system has an n-layer protocol hierarchy. Applications generate messages of length M bytes. At each of the layers, an h-byte header is added. What fraction of the network bandwidth is filled with headers?