Computer Communication1 Computer Communications DIT 420 EDA343 Summary.

Slides:



Advertisements
Similar presentations
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students,
Advertisements

Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Computer Communication1 Computer Communications Summary.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
CSIT435 Spring 2001 Final Examination Study Guide.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
Computer Communication1 Computer Communications Summary.
What’s the Internet: “nuts and bolts” view
Everything. MACIP End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: MACIP MACInterfaceMACInterface.
CS 5565 Network Architecture and Protocols Godmar Back Lecture 25.
Lecture 8 Modeling & Simulation of Communication Networks.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
OSI Model Routing Connection-oriented/Connectionless Network Services.
Chapter 5 Link Layer and LANs
Marina Papatriantafilou – Summary - flashback Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Course.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Introduction 1-1 Lecture 3 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516: These slides.
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
Introduction 1-1 Lecture 14 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516: These slides.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Our Last Class!!  summary  what does the future look like?
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
A day in the life: scenario
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 John Magee 11 July 2013 CS 101 Lecture 11: How do you “visit” a web page, revisted Slides adapted from Kurose and Ross, Computer Networking 5/e Source.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Introduction 1-1 Chapter 1: Computer networks and the Internet 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network.
The Transport Layer application transport network data link physical application transport network data link physical application transport network data.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Network Architecture and the OSI Reference Model Computer Networks Computer Networks Spring 2013 Spring 2013.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
Network Architecture and the OSI Reference Model Advanced Computer Networks Advanced Computer Networks C13 C13.
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Chapter 7 Application Layer 1 Some of the slides in this chapter are courtesy of Profs. Kurose/Ross and others.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Marina Papatriantafilou – Summary - flashback Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Course.
Internet Strucure Internet structure: network of networks Question: given millions of access ISPs, how to connect them together? access.
Introduction to Networks
Computer Networks Dr. Adil Yousif CS Lecture 1.
Virtualization of networks
Part 0: Networking Review
A Typical Connection Scenario
CS 280: Summary: A day in the life of a web request
Course Review 2015 Computer networks 赵振刚
OSI Protocol Stack Given the post man exemple.
Lecture 11: Link Layer Slides derived from those available on the site of the book “Computer Networking”, by Kurose and Ross, PEARSON.
Introduction to Networks
Chapter 6 The Data Link layer
Course on Computer Communication and Networks Lecture 16 Synthesis, Summary/flashback and Projection (related topics – continuation of study) EDA344/DIT.
Chapters 1~5 Overview Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley Prof. Hong Liu for ECE369 Adapted from.
Chapter 6 The Link Layer and LANs
Course on Computer Communication and Networks Lecture 16 Synthesis, Summary/flashback and Projection (related topics – continuation of study) EDA344/DIT.
Synthesis A day in the life of a web request
Wireless link layer: Cellular Networks; Mobility
Presentation transcript:

Computer Communication1 Computer Communications DIT 420 EDA343 Summary

Computer Communication2 Important for the exam When/where:Friday Dec 20, , H You may have with you: English-X dictionary no calculators, PDAs, etc (if/where numbers matter, do rounding) Grading 30-40, 41-50, (out of 60)= 3, 4, 5 (CTH) 30-50, (out of 60) = G, VG (GU) To think during last, summary-study Overview; critical eye; explain: why is this so? / How does it work?

Flashback Computer Communication3

4 Principles, Organisation Network Problems (in the order faced in the 1st intro): producer-consumer problems, flow and error control, manage access to shared (broadcast) transmission media, routing, congestion, connecting transparently different networks, serving different types of traffic, performance, mobility security Layering : principle, why

Computer Communication5 Highlights application- layer networking network security issues TCP/IP, LAN protocol stack delays performan ce routing, also with mobility multiple access protocols (wired, wireless) reliable data transfer datagram vs VC/conges tion control

Computer Communication6 Types of delay; performance Propagation, transmission, queueing, processing Throughput (effective bandwidth) Utilization (efficiency) Packet-switching: impact of store&forward TCP’s slow start Sliding windows performance A B propagation transmission nodal processing queuing

Computer Communication7 Reliable data transfer Guaranteed, in-order, correct delivery: Flow control: –stop&wait –sliding windows –sequence numbers –window sizes –dynamic windows (TCP) –performance Error detection: checksums, CRC Error control: go-back-n, selective repeat, FEC methods

Congestion Control Computer Communication8 RT traffic Datagram vs VC end-to-end comm.

Computer Communication9 Datagram vs VC end-to-end communication Conceptual differences Decisions, comparison, why

Computer Communication10 Congestion control (CC) why, how congestion occurs CC in TCP and performance; implied weaknesses CC in other ways, e.g. VC-based networks –RT-traffic resource reservation: traffic shaping and policing –rate-based

Computer Communication11 RT/streaming traffic Conceptual needs: packet/flow marking Admission control Traffic shaping & policing Packet scheduling (switches) Internet context Application-level solutions (FEC, playout delay, caching-CDN) Intserv, Diffserv

Computer Communication12 A E D CB F Routing, also with mobility Routing algorithms Forwarding Resource, policy issues Addressing mobility, tunneling Mobile Switching Center Public telephone network, and Internet Mobile Switching Center Complementary video links - IP addresses and subnets &list=PLE9F3F05C381ED8E8&feature=plcp - How does BGP choose its routes &feature=plcp

Computer Communication13 Medium access: multiple access methods Strategies: (functionality, appropriateness) Contention-based (random access), wired/wireless: –Aloha, CSMA(CD/CA) (collision-delay trade-off) Collision-free: –Channel partitioning: TDMA, FDMA, CDMA –Taking turns: token-passing, reservation-based A B C A’s signal strength space C’s signal strength

Computer Communication14 LANs & related link technologies Protocol Examples: wired, wireless Ethernet, ( wimax), GSM: Functionality, performance under low/high load Connecting devices; –functionalities and differences (Hubs, switches) –Algorithms for switch-”routing”: learning& forwarding of packets ARP switch

Computer Communication15 TCP/IP protocol stack (also applications), evolution Instantiation of network- solutions (Routing, Congestion Control, Flow & error control, applications, link layer technologies) Limitations, advantages, updates Application-layer networking (P2P applications, overlays, CDNs, multimedia/streaming application issues) application transport network link physical

Application-layer networking P2P applications Overlays multimedia/streaming applications … complement the networking infrastructure at application-layer (taking advantage of the network resources at the edge of the network) Computer Communication16

Computer Communication17 Security issues C, I, A and methods to achieve them Instantiation in Internet: RSA, PGP, authentication Firewalls and packet filtering secure sender s secure receiver channel data, control messages data Alice Bob Trudy

5-18 Synthesis: a day in the life of a web request r putting-it-all-together: synthesis! m goal: identify, review protocols (at all layers) involved in seemingly simple scenario: requesting www page m scenario: student attaches laptop to campus network, requests/receives

5-19 A day in the life: scenario Comcast network /13 Google’s network / web server DNS server school network /24 browser web page

5: DataLink Layer5-20 A day in the life… connecting to the Internet r connecting laptop needs to get its own IP address: use DHCP router (runs DHCP) DHCP UDP IP Eth Phy DHCP UDP IP Eth Phy DHCP r DHCP request encapsulated in UDP, encapsulated in IP, encapsulated in Ethernet r Ethernet frame broadcast (dest: FFFFFFFFFFFF ) on LAN, received at router running DHCP server r Ethernet demux’ed to IP demux’ed to UDP demux’ed to DHCP

5: DataLink Layer5-21 A day in the life… connecting to the Internet r DHCP server formulates DHCP ACK containing client’s IP address (and also IP address of first- hop router for client, name & IP address of DNS server) router (runs DHCP) DHCP UDP IP Eth Phy DHCP UDP IP Eth Phy DHCP r frame forwarded (switch learning) through LAN, demultiplexing at client Client now has IP address, knows name & addr of DNS server, IP address of its first-hop router r DHCP client receives DHCP ACK reply

5-22 A day in the life… ARP (before DNS, before HTTP) r before sending HTTP request, need IP address of DNS DNS UDP IP Eth Phy DNS r DNS query created, encapsulated in UDP, encapsulated in IP, encasulated in Eth. In order to send frame to router, need MAC address of router interface: ARP r ARP query broadcast, received by router, which replies with ARP reply giving MAC address of router interface r client now knows MAC address of first hop router, so can now send frame containing DNS query ARP query Eth Phy ARP ARP reply

5: DataLink Layer23 A day in the life… using DNS DNS UDP IP Eth Phy DNS r IP datagram containing DNS query forwarded via LAN switch from client to 1 st hop router r IP datagram forwarded from campus network to destination (DNS-server) network, routed (tables created by RIP, OSPF and BGP routing protocols) to DNS server r demux’ed to DNS server r DNS server replies to client with IP address of Comcast network /13 DNS server DNS UDP IP Eth Phy DNS

5-24 A day in the life… TCP connection carrying HTTP HTTP TCP IP Eth Phy HTTP r to send HTTP request, client first opens TCP socket to web server r TCP SYN segment (step 1 in 3-way handshake) inter- domain routed to web server r TCP connection established! web server SYN TCP IP Eth Phy SYN SYNACK r web server responds with TCP SYNACK

5-25 A day in the life… HTTP request/reply HTTP TCP IP Eth Phy HTTP r HTTP request sent into TCP socket r IP datagram containing HTTP request routed to r IP datgram containing HTTP reply routed back to client web server HTTP TCP IP Eth Phy r web server responds with HTTP reply (containing web page) HTTP r web page finally (!!!) displayed

Synthesis cont. 5-26

Internet structure: network of networks Question: given millions of access ISPs, how to connect them together? access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … …

Internet structure: network of networks Option: connect each access ISP to every other access ISP? access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … … … … … … connecting each access ISP to each other directly doesn’t scale: O(N 2 ) connections.

Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … Option: connect each access ISP to a global transit (imaginary) ISP? Customer and provider ISPs have economic agreement. global ISP

Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … But if one global ISP is viable business, there will be competitors …. ISP B ISP A ISP C

Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … But if one global ISP is viable business, there will be competitors …. which must be interconnected ISP B ISP A ISP C IXP peering link (no payment to each-other) Internet exchange point (ca 300 in the world; multiple ISPs peering/switching; 3 rd company)

Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … … and regional networks may arise to connect access nets to ISPS ISP B ISP A ISP C IXP regional net

Internet structure: network of networks access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net access net … … … … … … … and content provider networks (e.g., Google, Microsoft, Akamai ) may run their own network, to bring services, content close to end users ISP B ISP A ISP B IXP regional net Content provider network

Introduction Internet structure: network of networks  at center: small # of well-connected large networks  “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national & international coverage  A new form of content provider network (e.g, Google): private network that connects it data centers to Internet, often bypassing tier-1, regional ISPs 1-34 access ISP access ISP access ISP access ISP access ISP access ISP access ISP access ISP Regional ISP IXP Tier 1 ISP Google IXP

Computer Communication35 Thank you Reminder exam info: When/where:Friday Dec 20, , H You may have with you: m English-X dictionary m no calculators, PDAs, etc (if/where numbers matter, do rounding) Grading m 30-40, 41-50, (out of 60)= 3, 4, 5 (CTH) m 30-50, (out of 60) = G, VG (GU) To think during last, summary-study Overview; critical eye; explain: why is this so? / How does it work? Good luck with all your efforts! & Happy holiday season!