Suguru YAMAGUCHI. Nara Institute of Science and Technology Graduate School of Information Science. Information Network1 1

Size: px
Start display at page:

Download "Suguru YAMAGUCHI. Nara Institute of Science and Technology Graduate School of Information Science. Information Network1 1"

Transcription

1 Suguru YAMAGUCHI Nara Institute of Science and Technology Graduate School of Information Science Information Network1 1

2 Review Application model Presentation layer What is P2P? How to build large-scale services? Information Network1 2

3 OSI TCP/IP Process Unit Address Application Presentation Application Message / Stream Session Transport Transport Transport Packet Port Network Internet IP Datagram IP address Data Link Network Interface Frame Datalink Address Physical Hardware Information Network1 3

4 Layers above the Session layer are called upper layer protocols defined for each application firmly constrained to application requests Information Network1 4

5 Defines a semantic unit of communication Transaction Session Defines process for communication unit Transaction Logging & Roll-back operation Session Termination Communication conceptual definition and fundamental processing from the application viewpoint Information Network1 5

6 Data expression form This layer forms a basis to correctly express data in different platforms example expression of 1 How many bytes are used?» 1, 2, 4, less than 1 byte (6 bits),. How about byte order?» Little Endian / Big Endian How about pre-transmission bit order?» MSB first, LSB first Information Network1 6

7 Framework protocol for concrete applications note that an application protocol is not an application SMTP (simple mail transfer protocol) is defined for exchange However, there exist many applications MTA: sendmail, qmail, postfix, etc. MUA: Eudora, Mozilla Thunderbird, MS/Outlook, etc. Information Network1 7

8 Information Network1 8

9 Communication Model Client / Server model Broadcast based parallelization Peer-to-Peer (P2P) model Process Model Side effect / no side effect Process semantics Atomic / checkpoint Functions End user services Network management Information Network1 9

10 client Request/reply server client Information Network1 10

11 Easy understanding of functional separation User interface: client Each process: server function aggregation, centralized resource management manageable structure Easy service discovery model Few servers responding to many clients Service discovered by Well-known address server + wellknown port (service type Dynamic binding was difficult naming model and management model were not decided scalability maintenance is difficult currently, dynamic binding is widely used (Sun RPC bind etc.) Information Network1 11

12 The server bears all of the processing bottlenecks needs a server scale expansion to build large-scale services guarantees good scalability many various challenges for large-scale services Does not match the bidirectional information exchange model the client makes use of information located at the server active use of client-side resources and services such as client-side injections of large quantities of information is unreasonable Information Network1 12

13 Broadcast type periodical information exchange through broadcast sharing information between all processes Information Network1 13

14 Commands are sent to up & running hosts using UDP broadcast can discover active hosts process on top of host affiliated to same port performs same processing broadcast for parallel processing using hosts that exist in same segment e.g rwhod Resolve limitations of being in the same segment by using TCP server federation originated in this technology space Information Network1 14

15 server client Request/reply server server Information Network1 15

16 Direct information exchange of user-owned resources all systems are both server and client Extremely popular Gnutella, Winny,.. Issues : information discovery, security assurance of the whole system Information Network1 16

17 Widespread perception by P2P service expansion Network structure built on top of another real network at the application layer virtualization of network structure IP layer Information Network1 17

18 Communication fails Packet loss Packet duplication Complex processing due to retransmission Side effects of processing How to keep idempotence of server response? Correct understanding about identification Purpose of execution Exactly once semantics At least once semantics At most once semantics Information Network1 18

19 idempotent client always gets the same results, when the same requests are processed by the server we can build a simple retransmission system by creating such processing system pay attention to processing that alter states Information Network1 19

20 Parallelization of idempotent processing is easy Enables large-scale processing by decomposing the server inner structure look like one server The Internet Idempotent processing load balancer cluster valid for load balance and fault management Side-effect processing process aggregation target : DB etc Information Network1 20

21 Information Network1 21

22 Non structured Binary ASCII Structured TLV: Type, Length, Value ASN.1 XML Information Network1 22

23 ease of treatment / power of expression XML ASN.1 ASCII TLV binary bandwidth efficiency Information Network1 23

24 Binary IP header (RFC791), TCP header (RFC793) defines difference between host bit order and network bit order adjustment of integer value manipulation ASCII FTP (RFC959) SMTP (RFC2821) POP3 (RFC1939) ensure data transmission even for channel that is not 8-bit clean Information Network1 24

25 : 220 ftp.isi.edu NcFTPd Server (free educational license) ready : USER anonymous : 331 Guest login ok, send your complete address as password : PASS : 230 Logged in anonymously : SYST : 215 UNIX Type: L : PWD : 257 "/" is cwd : TYPE I : 200 Type okay : CWD /in-notes : 250 "/in-notes" is new cwd. Information Network1 25

26 1758: 220 ns.ixj-mc.com ESMTP Sendmail 8.9.3p2+3.1W/3.7W/ns; Fri, 30 May :15: : EHLO mf.aist-nara.ac.jp 1758: 250 ns.ixj-mc.com Hello 168.pool3.ftthtokyo.att.ne.jp [ ], pleased to meet you 0025: MAIL SIZE= : 250 Sender ok 0025: RCPT 1758: 250 Recipient ok 0025: DATA 1758: 354 Enter mail, end with "." on a line by itself 0025: Received: from mf.aist-nara.ac.jp (localhost [ ]) (JST) Information Network1 26

27 Type, Length, Value OSPF (RFC2328) RADIUS (RFC2138) Structured information expression Type-dependent processing Enables to manipulate flexible-length data by inputting Length information Value defines each expression format Information Network1 27

28 XDR (extended Data Representation) for Sun RPC/ NFS (1980 s) ASN.1 (1980 s) XML (1990 s) Requirements wire efficiency ease of treatment description static typing, name space data self-description enhancement of tools and libraries Information Network1 28

29 (tag, length, value) Tag: ASN.1 type Length: size of the ASN.1 value Value: ASN.1 value ASN.1 type INTEGER OCTET STRING OBJECT IDENTIFIER SEQUENCE (array) Information Network1 29

30 Iso(1).org(3).dod(6).internet(1) Mgmt (2) Experimental (3) Private (4) defines data structure used in SNMP MIB-II (RFC1214), Structure of Management Information version 2 (SMIv2) (RFC2578) Information Network1 30

31 <?xml version = "1.0"?> <tag attribute="value"> <another-tag another-attribute="value" /> </tag attribute="value"> Information Network1 31

32 <?xml version='1.0' encoding='utf-8'?> <soap:envelope xmlns:soap=' xmlns:xsi=' xmlns:xsd=' xmlns:soapenc=' soap:encodingstyle=' <soap:body> <n:getquoteresponse xmlns:n='urn:xmethods-delayed-quotes'> <Result xsi:type='xsd:float'>7.92</result> </n:getquoteresponse> </soap:body> </soap:envelope> Information Network1 32

33 <?xml version="1.0" encoding="utf-8"?> <SOAP-ENV:Envelope xmlns:xsi=" xmlns:soap-enc=" xmlns:xsd=" SOAP-ENV:encodingStyle=" xmlns:soap-env=" <SOAP-ENV:Body> <namesp1:getquote xmlns:namesp1="urn:xmethods-delayed-quotes"> <symbol xsi:type="xsd:string">akam</symbol> </namesp1:getquote> </SOAP-ENV:Body> </SOAP-ENV:Envelope> Information Network1 33

34 Data self-description: RDF Enhancement of tools : XPath, XSLT, Enhancement of APIs: DOM, SAX, etc. Signature, encryption XML Digital Signature XML Encryption Information Network1 34

35 Systems using XML are widely used expression in XML XML processing system XML is common knowledge for network-related service creation XML is a required item XML has been widely used for data expression in other software soon expands to a standard method Programming Language XML Information Network1 35

36 Information Network1 36

37 Warez exchange and sharing warez file exchange and sharing by ftp, www and netnews does not come under the spotlight due to its small scale Appearance of file exchange application In the early days appearance of P2P application using Gnutella and Napster Middle and late period towards a refined shape as WinMX () and KaZaa () hybrid P2P Shift to file sharing appearance of Winny (2002) towards pure P2P more effective distribution by broadband Information Network1 37

38 client / server Hybrid P2P Pure P2P center : Server center : Server peer peer peer centralized rendezvous and communication with the server rendezvous at server, communication between peers both rendezvous and communication between peers FTP, WWW WinMX, KaZaa Gnutella, Freenet, Winny Information Network1 38

39 Napster Gnutella Winny WinMX LimeWire Share BitTorrent Cabos Information Network1 39

40 Features sharing mp3 file lists between peers and enabling exchange of these files Hybrid P2P chat application was implemented to Napster as a way file exchange purpose communication tool Biography Jun, 1999 developed by Shawn Fanning (Northeastern University) Jul, 2000 sued in court by RIAA, Napster network was stopped Oct, 2003 restored as a music distribution service Information Network1 40

41 Features enables publication of not only mp3 files but also various file formats no management server and no management organization implementation of pure P2P became the reference model of P2P file sharing software Biography Feb, 2000 released by developers of Nullsoft Mar, 2000 released, but stopped release by AOL for 24 hours various clones exists Information Network1 41

42 What is Winny file sharing application successor of WinMX was developed by a Japanese individual file sharing network software using pure P2P Winny became extremely popular due to its ease of use, and a file sharing network was built Biography 6, May, 2002 β version is released 5, May, β version is released 28, Nov, 2003 arrest of a Winny user, developer s house-search, development is interrupted 31, May, 2004 developer is indicted by the Kyoto district public prosecutors office, on grounds of a Copyright Act infringement 1, Jun, 2004 bailed out 13, Dec, 2006 court-ordered at Kyoto district court, found guilty (fined), appealed the same day Information Network1 42

43 2003 estimated 200,000 (network company survey) 2 millions (ACCS survey) users Nov, 2004 domestic traffic was reduced by 1/6 July, 2006 estimated 1.75 millions user Information Network1 43

44 Issues on the quality of the exchanged information distribution of copyrighted works distribution of counterfeited files and faked files spread of viruses Arising from file management due to the use of file as the information unit anyone can freely share a file can not delete a shared file impossible to identify the sharing source of a file has no way of knowing the reliability of a targeted file needs to exchange more structured information Information Network1 44

45 Potential customers has proved existence of a consumer layer that can be contents purchasers given appropriate price and availability Construction of an autonomous distribution network by users showed new solution for maintenance of distribution network possible information distribution infrastructure by introducing appropriate technologies Information Network1 45

46 Expectations for P2P Distribution Network cost reduction due to flow disintermediation direct distribution from creator to user distribution maintenance of minor products maintenance of distribution market Requirements for P2P distribution network File preservation User preservation Accounting Traceability of file Information Network1 46

47 Aggressive use of P2P network Oct, 2005 Nasper Japan is established by Tower Record and Nasper Kazza create business model by the distribution of promotion files, the delivery of pay files and advertisement Skype voice communication service by Gnutella technologies is widely used all over the world Information Network1 47

48 Segregation between physical network structure and application layer structure appearance of usable bandwidth stress state Is it possible to build overlay-friendly underlying networks? We can get a hint by elaborating overlay networks Research is also progressing on what kind of hinds can be obtained FY2010 I 12 48

49 E.g., in the case of an information storage service built as an overlay network. Which node hold the desired information? There exist many issues Potential search halt Does the search has been completed within the configured time? Is there any efficient information search method? Existence of hindering nodes What to do if some nodes do not relay the search? It is assumed that each node is not under the provider control What to do when search results include down nodes? FY2010 I 12 49

50 Information Network1 50

51 a few servers for many clients the whole is visible as a single server The Internet Idempotent processing load balancer cluster valid for load balance and fault management Side-effect processing process aggregation target : DB etc Information Network1 51

52 Required mechanism for load balancing Load balancer is widely used Operating principle LB manages termination point of TCP connection Server1: Client: The Internet Virtual server: Server2: Forwarding Table Src: Dst: [1-3] Server3: Information Network1 52

53 Which servers ended the connection? Various methods were designed and implemented round robin, minimum connection, performance observation fault management is also important how to detects when a server is down? How to hide the difference of server addresses When server-side uses a private IP address, we must rewrite address in communication No simple NAT sometimes address information is embedded into Cookie or HTTP payload some application protocols has side effects Information Network1 53

54 Server does not need to exist in the same network show multiple servers as a single one by using tunneling sometimes this technology is called server federation CDN (Contents Delivery Network) active load balancing has been generalized in ISPs Akamai.com is the pioneer of business service about CDN. Information Network1 54

55 server IX clients Information Network1 55

56 new contents are provided by server at data center(freshness control) Data Center clients individual ISPs provides contents for customer by CD server (well-managed access) Information Network1 56

57 load balance by routing information Root DNS server is a typical example Information Network1 57

58 HOST 2001::1 HOST HOST HOST 2001::1 2001::1 Information Network1 58

59 F root DNS Originally at ISC in Silicon Valley, Calif. Currently, Hong Kong & Amsterdam??? client request reaches the neighbor server that is on the shortest path depending on network routing Hong Kong, CN each server, while using the same address, distributes route information from each location. Amsterdam, NL Silicon Valley, Calif. Information Network1 59

60 FY2010 I 12 60

61 Real-Time Media Transmission Technology for voice and video transmission Real-Time Packet Transmission over Network Layer and Transport Layer Coding Techniques which are adapted to media characteristics at the upper layer Providing and sharing SDK (Software Development Kit) for building real applications FY2010 I 12 61

62 Internet: to support the real economy The Internet is a social infrastructure for trading money The security technologies become essential for the protection of assets Encryption, Authentication Technology, ID Management Technology Secure Distributed Information Management Service Backup for BCM (Business Continuity Management) Standardization of application protocols implementing the above services has started. FY2010 I 12 62

! Review! Application model! Presentation layer! What is P2P?! How to build large-scale services?

! Review! Application model! Presentation layer! What is P2P?! How to build large-scale services? ! Review! Application model! Presentation layer! What is P2P?! How to build large-scale services? Suguru YAMAGUCHI Nara Institute of Science and Technology Graduate School of Information Science Information

More information

Application protocols & presentation layer

Application protocols & presentation layer Application protocols & presentation layer Suguru Yamaguchi NAIST Overview = Application model = Presentation layer = Large scale services 1 TCP/IP Protocol Suites OSI TCP/IP Processing unit Identification

More information

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play

More information

Overview of Hierarchical Protocol Architecture. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Overview of Hierarchical Protocol Architecture. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Overview of Hierarchical Protocol Architecture Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Overview Concept and structure of hierarchical protocol architecture

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.

Additional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No. Additional Material Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science 2010 Information Network I/No.4 1 ! Protocol Suites for the Internet! Widely used from LANs

More information

Information Network I: The Application and Upper Layers

Information Network I: The Application and Upper Layers Information Network I: The Application and Upper Layers Youki Kadobayashi Doudou Fall Laboratory for Cyber Resilience Nara Institute of Science and Technology Outline Domain Name System World Wide Web

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

CPSC156a: The Internet Co-Evolution of Technology and Society

CPSC156a: The Internet Co-Evolution of Technology and Society CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing Napster Client-Server Client 1 MP3-file 1 MP3-file 2 MP3-file n Interaction hello ack

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Goal and A sample Network App

Goal and A sample Network App Application Layer Goal and A sample Network App Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software Little

More information

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02 TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming

More information

Hierarchical Protocol Architecture

Hierarchical Protocol Architecture Hierarchical Protocol Architecture Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science Why protocol architecture?! Hierarchical protocol architecture We ll

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

Communication in Distributed Systems

Communication in Distributed Systems Communication in Distributed Systems Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Introduction Functions of Communication Transport data between processes, machines,

More information

Distributed Systems. 03. Remote Procedure Calls. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 03. Remote Procedure Calls. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 03. Remote Procedure Calls Paul Krzyzanowski Rutgers University Fall 2017 1 Socket-based communication Socket API: all we get from the OS to access the network Socket = distinct end-to-end

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC

Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC The Business Objective Automated Business Collaboration Facilitating exchange of information

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Computer Networks Prof. Ashok K. Agrawala

Computer Networks Prof. Ashok K. Agrawala CMSC417 Computer Networks Prof. Ashok K. Agrawala 2018Ashok Agrawala September 6, 2018 Fall 2018 Sept 6, 2018 1 Overview Client-server paradigm End systems Clients and servers Sockets Socket abstraction

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Internet Structural View. The Internet software layers. Package-shipping example TCP UDP

Internet Structural View. The Internet software layers. Package-shipping example TCP UDP Internet Structural View WAN/Backbone WAN/Campus WAN/Corporate WAN/ISP 1 2 Package-shipping example The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF 3 Ethernet, Wireless,

More information

CS 417 9/18/17. Paul Krzyzanowski 1. Socket-based communication. Distributed Systems 03. Remote Procedure Calls. Sample SMTP Interaction

CS 417 9/18/17. Paul Krzyzanowski 1. Socket-based communication. Distributed Systems 03. Remote Procedure Calls. Sample SMTP Interaction Socket-based communication Distributed Systems 03. Remote Procedure Calls Socket API: all we get from the to access the network Socket = distinct end-to-end communication channels Read/write model Line-oriented,

More information

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University

Computer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

CSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1

CSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1 CSMC 412 Computer Networks Prof. Ashok K Agrawala 2015 Ashok Agrawala Set 2 September 15 CMSC417 Set 2 1 Contents Client-server paradigm End systems Clients and servers Sockets Socket abstraction Socket

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2002 Lecture 13: Content Distribution Networks (plus some other applications) Stefan Savage Some slides courtesy Srini Seshan Today s class Quick examples of other

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

Introduction to the Application Layer. Computer Networks Term B14

Introduction to the Application Layer. Computer Networks Term B14 Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

Additional laboratory

Additional laboratory Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Hierarchical Protocol Architecture. Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science

Hierarchical Protocol Architecture. Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science Hierarchical Protocol Architecture Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science Why protocol architecture? = Hierarchical protocol architecture We ll

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

Telematics Chapter 9: Peer-to-Peer Networks

Telematics Chapter 9: Peer-to-Peer Networks Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session

More information

Application Layer Introduction; HTTP; FTP

Application Layer Introduction; HTTP; FTP Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers

More information

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications

CS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges

More information

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Designing a Protocol. (c) Dan Cosma (c) Dan Cosma (c) Dan Cosma

Designing a Protocol. (c) Dan Cosma (c) Dan Cosma (c) Dan Cosma Designing a Protocol 1. Choose the patterns of communication and data transmission 2. Establish the design goals 3. Choose the message format philosophy 4. Design the message structure: format, fields,

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

Debian/GNU Linux Networking

Debian/GNU Linux Networking Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network

More information

Today s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications

Today s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications CSE 123b Communications Software Spring 2004 Today s class Quick examples of other application protocols Mail, telnet, NFS Content Distribution Networks (CDN) Lecture 12: Content Distribution Networks

More information

Peer-to-Peer Networks

Peer-to-Peer Networks Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

Peer to Peer Computing

Peer to Peer Computing Peer to Peer Computing These slides are based on the slides made available by the authors of Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 8 Announcements Plan for Today: Networks: TCP Firewalls Midterm 1: One week from Today! 2/17/2009 In class, short answer, multiple choice,

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

The impact of fiber access to ISP backbones in.jp. Kenjiro Cho (IIJ / WIDE)

The impact of fiber access to ISP backbones in.jp. Kenjiro Cho (IIJ / WIDE) The impact of fiber access to ISP backbones in.jp Kenjiro Cho (IIJ / WIDE) residential broadband subscribers in Japan 2 million broadband subscribers as of September 25-4 million for DSL, 3 million for

More information

2 Background: Service Oriented Network Architectures

2 Background: Service Oriented Network Architectures 2 Background: Service Oriented Network Architectures Most of the issues in the Internet arise because of inflexibility and rigidness attributes of the network architecture, which is built upon a protocol

More information

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

Content Search. Unstructured P2P. Jukka K. Nurminen

Content Search. Unstructured P2P. Jukka K. Nurminen Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd

More information

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP) Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

CMSC 332 Computer Networks P2P and Sockets

CMSC 332 Computer Networks P2P and Sockets CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that

More information

Data Communication & Computer Networks MCQ S

Data Communication & Computer Networks MCQ S Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay

More information

Lab 3.4.3: Services and Protocols

Lab 3.4.3:  Services and Protocols Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

Presentation Services. Presentation Services: Motivation

Presentation Services. Presentation Services: Motivation Presentation Services need for a presentation services ASN.1 declaring data type encoding data types implementation issues reading: Tannenbaum 7.3.2 Presentation Services: Motivation Question: suppose

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

UseNet and Gossip Protocol

UseNet and Gossip Protocol CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4 1 Lab schedule confirmation Mondays, 12:00-2:00pm Tuesdays, 11:00am-1:00pm Wednesdays, 4:00-6:00pm

More information

Content Search. Unstructured P2P

Content Search. Unstructured P2P Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided

More information