L1: Intro to Computer Systems: Controlling Complexity Frans Kaashoek 6.033 Spring 2007

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Data Link Layer u Today: LANs other than Ethernet –token rings –switched networks –cellular technology u remaining issues –error detection.
Advertisements

COS 461 Fall 1997 Todays Lecture u introduction to data link layer –in other words, how LANs work u all about Ethernet today u next time: other LANs u.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IPv4 - The Internet Protocol Version 4
Network Layer – IPv4 Dr. Sanjay P. Ahuja, Ph.D.
Chapter 20 Network Layer: Internet Protocol Stephen Kim 20.1.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 24 Introduction to Computer Networks.
What's inside a router? We have yet to consider the switching function of a router - the actual transfer of datagrams from a router's incoming links to.
TCP/IP Protocol Suite 1 Chapter 7 Upon completion you will be able to: ARP and RARP Understand the need for ARP Understand the cases in which ARP is used.
Network Layer: IPv6 IS250 Spring 2010
The OSI Model and the TCP/IP Protocol Suite
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao
L1: Intro to Computer Systems: Complexity Frans Kaashoek and Robert Morris Spring 2009
L1: Intro to Computer Systems: Complexity Robert Morris and Frans Kaashoek Spring 2009
Department of Information Engineering 1 Objectives A basic understanding of the following –What is Internet? –What is client-server computing? –What is.
ECE358: Computer Networks Spring 2012
IPv6 Fundamentals Chapter 2: IPv6 Protocol
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Components 101 Travis Hill.
Borneo – An Example of Human Impact
Operating Systems COT 4600 – Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu, Th 3:00-4:00 PM.
Midterm Review - Network Layers. Computer 1Computer 2 2.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
2.1 Everything is Connected
ES 101. Module 2 IP Addressing & Routing. Last Lecture Wide area networking Definition of “packets”
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Extending LANs Fiber modems Repeaters Bridges Switches.
“The day they parachuted cats into Borneo!”
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Dr. John P. Abraham Professor UTPA
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Network Layer: Internet Protocol.
EECE 411: Design of Distributed Software Applications (or Distributed Systems 101) Matei Ripeanu
Chapter 20 Network Layer: Internet Protocol
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
In the early 1950s, there was an outbreak of a serious disease called malaria amongst the Dayak people of Borneo.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
ADDRESS MAPPING ADDRESS MAPPING The delivery of a packet to a host or a router requires two levels of addressing: logical and physical. We need to be able.
Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9 Introduction To Data-Link Layer 9.# 1
Network Models.
Lecture 3 By Miss Irum Matloob.
Chapter 19 Network Layer Protocols
MODULE I NETWORKING CONCEPTS.
Net 323: NETWORK Protocols
Introduction Principles of System Design
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTPA
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
Data Communications and Networking
COT 5611 Operating Systems Design Principles Spring 2012
Dr. John P. Abraham Professor UTPA
Net 323 D: Networks Protocols
COMP/ELEC 429/556 Fall 2017 Homework #1
The internet AOU University Dr Radwan-Associate Lecturer
Why study Software Engineering ?
NET 323D: Networks Protocols
Computer Networks Protocols
Presentation transcript:

L1: Intro to Computer Systems: Controlling Complexity Frans Kaashoek Spring

Logistics: Schedule has all assignments Every class meeting has preparation/assignment First deliverable is due Tuesday 2/13. To help you: read the Therac paper before Friday’s writing recitation. Fill out sign up sheet and return at the end of lecture ( if you didn’t do so yesterday) We will post sections assignment tonight

Emergent Property Example Experimental Ethernet design: 3Mbit/s All senders share single cable Send successful when there is no collision Must send for 2*5  seconds = 30 bits Header is: 5 bytes = 40 bits First Ethernet standard: 10 Mbit/s Must send for 2*20  seconds = 400 bits Header is: 14 bytes  Need to pad packets to at least 50 bytes  Minimum packet size!

Propagation of Effects Example (C. Cole 1969) WHO attempted to control malaria in North Borneo Sprayed villages with DDT Wiped mosquitos, but …. Roaches collected DDT in tissue Lizards ate roaches and became slower Easy target for cats Cats didn’t deal with DDT well and died Forest rats moved into villages Rats carried the bacillus for the plague  WHO replaced malaria with the plague

Galileo in 1638 “To illustrate briefly, I have sketched a bone whose natural length has been increased three times and whose thickness has been multiplied until, for a correspondingly large animal, it would perform the same function which the small bone performs for its small animal. From the figures here shown you can see how out of proportion the enlarged bone appears. Clearly then if one wishes to maintain in a great giant the same proportion of limb as that found in an ordinary man he must either find a harder and stronger material for making the bones, or he must admit a diminution of strength in comparison with men of medium stature; for if his height be increased inordinately he will fall and be crushed under his own weight. Whereas, if the size of a body be diminished, the strength of that body is not diminished in the same proportion; indeed the smaller the body the greater its relative strength. Thus a small dog could probably carry on his back two or three dogs of his own size; but I believe that a horse could not carry even one of his own size.”

Incommensurate scaling Scaling mouse to size of an elephant (Haldane 1928) Volume ~ O(n 3 ) Bone strength ~ cross section ~ O(n 2 ) Scaling the Internet IPv4 has 32 bit addresses; limited networks (2 16 ) Network Address Translators and IPv6 Scaling Ethernet from 10Mbit/s to 1Gbit/s Minimum packet size: 40x100Mbit/s = 4,000 bits 100 Mbit/s: shorten the maximum cable length to 250m 1 Gbit/s: increase minimum packet size to 512 bytes Switched architecture: don’t share cable

Example: more goals, more complexity operating systems Millions of lines of source code

Example: interacting features, more complexity Call forwarding Call Number Deliver blocking Automatic callback Itemised billing ACB ?? A B CNDB ACB + IB A calls B, B is busy Once B is done, B calls A A’s number on appears on B’s bill

Principles Principle escalating complexity Avoid excessive generality Law of diminishing returns ….. Many more to come ….

Class plan Next lecture: computer systems are different Naming: glueing modules together Client/server: enforced modularity Networks: hard boundaries between modules Reliability and transactions: handing failures Security: handling malicious failures