CS551: End to End Argument Saltzer88 Christos Papadopoulos (http://netweb.usc.edu/cs551/)http://netweb.usc.edu/cs551/)

Slides:



Advertisements
Similar presentations
The End-to-End Principle Anthony D. Joseph Joe Hellerstein CS262a November 28, 2001.
Advertisements

CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
International Standards Organization Open Systems Interconnect (OSI) Reference Model Advanced Computer Networks.
EEC-681/781 Distributed Computing Systems Lecture 4 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
The data link layer Skills: none IT concepts: LAN, medium access, Ethernet and WiFi protocols, why standards win This work is licensed under a Creative.
TCP/IP summary Skills: none IT concepts: review This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Ryan Huebsch CS294-4 P2P Systems – 9/29/03.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Computer Network Architecture and Programming
1 CPE 400 / 600 Computer Communication Networks Dr. Mehmet Gunes slides are modified from S.K. Kasera and J. Kurose & K. Ross.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
File Systems (2). Readings r Silbershatz et al: 11.8.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Introduction 1 Lecture 23 Link Layer (Error Detection/Correction) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 1: Overview of the Data Link layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose,
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
EPL606 Topic 1 Introduction Part B - Design Considerations 1 The majority of the slides in this course are adapted from the accompanying slides to the.
CH2 System models.
1 Version 3.0 Module 11 TCP Application and Transport.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
Transport Layer OSI Model. The transport layer is responsible for the segmentation and the delivery of a message from one process to another.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Network Applications and Layered Architectures Protocols OSI Reference Model.
TCP/IP Transport and Application (Topic 6)
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Networking Models  The OSI Model  The TCP/IP Model.
OSI Model. Topics What is the OSI Model? What is a Protocol? Why 7 Layers? The 7 Layers – Application – Presentation – Session – Transport – Network –
TCP/IP Protocols Contains Five Layers
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
1 Transport Layer Lecture 7 Imran Ahmed University of Management & Technology.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer introduction,
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
END-TO-END ARGUMENTS IN SYSTEM DESIGN J.H. Salter, D.P. Reed and D.D. Clark Presented by Sui-Yu Wang.
Computer Network Overview Ikjun Yeom. 2 What is a computer network? a collection of computing nodes and links connecting the nodes why we need it? –to.
GLOBAL EDGE SOFTWERE LTD1 R EMOTE F ILE S HARING - Ardhanareesh Aradhyamath.
Chapter 16 Protocols and Layering. Network Communication Protocol an agreement that specifies the format and meaning of messages computers exchange Network.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
END-TO-END Arguments in System Design END-TO-END Arguments in System Design J. SaltzerD. Reed D. Clark M.I.T. Laboratory, 1981 Presented By Mohammad Malli.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
End-to-End Arguments in System Design CSCI 634, Fall 2010.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
CS533 - Concepts of Operating Systems End-to-End Arguments in System Design Presentation by David Florey.
Chapter 16 - TCP: Software For Reliable Communication Introduction A Packet Switching System Can Be Overrun (merging highways) TCP Helps IP Guarantee Delivery.
ENGS 112 Lecture 3 Packet Switching Chapter 3, Walrand WWW links, eg.
Major OS Components CS 416: Operating Systems Design, Spring 2001 Department of Computer Science Rutgers University
Tunneling Continued/ End-to-End Principle CS 4251: Computer Networking II Nick Feamster Spring 2008.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
# 1 6/8/2016 CS 147- Computer Architecture Network Communication and YOU By Ali Farsio.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Presented by Muhammad Abu Saqer
OSI Protocol Stack Given the post man exemple.
CSE 542: Operating Systems
CSE 542: Operating Systems
Announcements You need to register separately for the class mailing list and online paper review system. Do it now so that we can work out any “bugs”.
Presentation transcript:

CS551: End to End Argument Saltzer88 Christos Papadopoulos (

The End-to-end Argument Deals with where to place protocol functionality –Inside the network (in switching elements), or –At the edges

Key Ideas The end-to-end argument –don’t duplicate functionality in multiple levels if you have to do it at the top anyway Duplicate functionality has a cost associated with it – better spend it on other things Need to be general: Additional functionality may help some but may actually hurt other applications

Example: Reliability Consider copying a file –want an end-to-end checksum Steps: –A reads from disk to memory; sends over network –network moves data from A to B –B gets data from network; writes to disk Possible faults: –disk IO errors, buffer overruns in NIC, memory errors, network corruption or congestion, computer crashes

Other Examples Encrypted data transfer Duplicate message suppression Guaranteed FIFO message delivery Transactions in a DB

Caveat: Performance Consider file copy again Reliability at physical, link, network, transport, application layers –need some physical redundancy (coding) –sometimes want link repair (Ethernet retransmission after collision, wireless links) –network level repair (TCP) –application level checks (checksum) multiple levels may be needed for performance

End2End: A Broader View What breaks end2end connectivity? –NAT –Web caches –Transparent web proxies –Others? Is this bad and why? –Think of the client-server model..

Difficulty: What Is the “End”? Consider secure communication: –me to my bank over SHTTP: app-level –me from USC to ISI over ssh: app-level –my computer to ISI over a virtual private network (VPN): network-layer –my computer to the wireless base-station over with WEP: link-layer –my PIN number in my head to the ATM (?) Lower-layers have benefits (wider coverage) –but may increase risks