Suguru YAMAGUCHI. Nara Institute of Science and Technology Graduate School of Information Science. Information Network1 1
|
|
- Adele Hines
- 5 years ago
- Views:
Transcription
1 Suguru YAMAGUCHI Nara Institute of Science and Technology Graduate School of Information Science Information Network1 1
2 Review Application model Presentation layer What is P2P? How to build large-scale services? Information Network1 2
3 OSI TCP/IP Process Unit Address Application Presentation Application Message / Stream Session Transport Transport Transport Packet Port Network Internet IP Datagram IP address Data Link Network Interface Frame Datalink Address Physical Hardware Information Network1 3
4 Layers above the Session layer are called upper layer protocols defined for each application firmly constrained to application requests Information Network1 4
5 Defines a semantic unit of communication Transaction Session Defines process for communication unit Transaction Logging & Roll-back operation Session Termination Communication conceptual definition and fundamental processing from the application viewpoint Information Network1 5
6 Data expression form This layer forms a basis to correctly express data in different platforms example expression of 1 How many bytes are used?» 1, 2, 4, less than 1 byte (6 bits),. How about byte order?» Little Endian / Big Endian How about pre-transmission bit order?» MSB first, LSB first Information Network1 6
7 Framework protocol for concrete applications note that an application protocol is not an application SMTP (simple mail transfer protocol) is defined for exchange However, there exist many applications MTA: sendmail, qmail, postfix, etc. MUA: Eudora, Mozilla Thunderbird, MS/Outlook, etc. Information Network1 7
8 Information Network1 8
9 Communication Model Client / Server model Broadcast based parallelization Peer-to-Peer (P2P) model Process Model Side effect / no side effect Process semantics Atomic / checkpoint Functions End user services Network management Information Network1 9
10 client Request/reply server client Information Network1 10
11 Easy understanding of functional separation User interface: client Each process: server function aggregation, centralized resource management manageable structure Easy service discovery model Few servers responding to many clients Service discovered by Well-known address server + wellknown port (service type Dynamic binding was difficult naming model and management model were not decided scalability maintenance is difficult currently, dynamic binding is widely used (Sun RPC bind etc.) Information Network1 11
12 The server bears all of the processing bottlenecks needs a server scale expansion to build large-scale services guarantees good scalability many various challenges for large-scale services Does not match the bidirectional information exchange model the client makes use of information located at the server active use of client-side resources and services such as client-side injections of large quantities of information is unreasonable Information Network1 12
13 Broadcast type periodical information exchange through broadcast sharing information between all processes Information Network1 13
14 Commands are sent to up & running hosts using UDP broadcast can discover active hosts process on top of host affiliated to same port performs same processing broadcast for parallel processing using hosts that exist in same segment e.g rwhod Resolve limitations of being in the same segment by using TCP server federation originated in this technology space Information Network1 14
15 server client Request/reply server server Information Network1 15
16 Direct information exchange of user-owned resources all systems are both server and client Extremely popular Gnutella, Winny,.. Issues : information discovery, security assurance of the whole system Information Network1 16
17 Widespread perception by P2P service expansion Network structure built on top of another real network at the application layer virtualization of network structure IP layer Information Network1 17
18 Communication fails Packet loss Packet duplication Complex processing due to retransmission Side effects of processing How to keep idempotence of server response? Correct understanding about identification Purpose of execution Exactly once semantics At least once semantics At most once semantics Information Network1 18
19 idempotent client always gets the same results, when the same requests are processed by the server we can build a simple retransmission system by creating such processing system pay attention to processing that alter states Information Network1 19
20 Parallelization of idempotent processing is easy Enables large-scale processing by decomposing the server inner structure look like one server The Internet Idempotent processing load balancer cluster valid for load balance and fault management Side-effect processing process aggregation target : DB etc Information Network1 20
21 Information Network1 21
22 Non structured Binary ASCII Structured TLV: Type, Length, Value ASN.1 XML Information Network1 22
23 ease of treatment / power of expression XML ASN.1 ASCII TLV binary bandwidth efficiency Information Network1 23
24 Binary IP header (RFC791), TCP header (RFC793) defines difference between host bit order and network bit order adjustment of integer value manipulation ASCII FTP (RFC959) SMTP (RFC2821) POP3 (RFC1939) ensure data transmission even for channel that is not 8-bit clean Information Network1 24
25 : 220 ftp.isi.edu NcFTPd Server (free educational license) ready : USER anonymous : 331 Guest login ok, send your complete address as password : PASS : 230 Logged in anonymously : SYST : 215 UNIX Type: L : PWD : 257 "/" is cwd : TYPE I : 200 Type okay : CWD /in-notes : 250 "/in-notes" is new cwd. Information Network1 25
26 1758: 220 ns.ixj-mc.com ESMTP Sendmail 8.9.3p2+3.1W/3.7W/ns; Fri, 30 May :15: : EHLO mf.aist-nara.ac.jp 1758: 250 ns.ixj-mc.com Hello 168.pool3.ftthtokyo.att.ne.jp [ ], pleased to meet you 0025: MAIL SIZE= : 250 Sender ok 0025: RCPT 1758: 250 Recipient ok 0025: DATA 1758: 354 Enter mail, end with "." on a line by itself 0025: Received: from mf.aist-nara.ac.jp (localhost [ ]) (JST) Information Network1 26
27 Type, Length, Value OSPF (RFC2328) RADIUS (RFC2138) Structured information expression Type-dependent processing Enables to manipulate flexible-length data by inputting Length information Value defines each expression format Information Network1 27
28 XDR (extended Data Representation) for Sun RPC/ NFS (1980 s) ASN.1 (1980 s) XML (1990 s) Requirements wire efficiency ease of treatment description static typing, name space data self-description enhancement of tools and libraries Information Network1 28
29 (tag, length, value) Tag: ASN.1 type Length: size of the ASN.1 value Value: ASN.1 value ASN.1 type INTEGER OCTET STRING OBJECT IDENTIFIER SEQUENCE (array) Information Network1 29
30 Iso(1).org(3).dod(6).internet(1) Mgmt (2) Experimental (3) Private (4) defines data structure used in SNMP MIB-II (RFC1214), Structure of Management Information version 2 (SMIv2) (RFC2578) Information Network1 30
31 <?xml version = "1.0"?> <tag attribute="value"> <another-tag another-attribute="value" /> </tag attribute="value"> Information Network1 31
32 <?xml version='1.0' encoding='utf-8'?> <soap:envelope xmlns:soap=' xmlns:xsi=' xmlns:xsd=' xmlns:soapenc=' soap:encodingstyle=' <soap:body> <n:getquoteresponse xmlns:n='urn:xmethods-delayed-quotes'> <Result xsi:type='xsd:float'>7.92</result> </n:getquoteresponse> </soap:body> </soap:envelope> Information Network1 32
33 <?xml version="1.0" encoding="utf-8"?> <SOAP-ENV:Envelope xmlns:xsi=" xmlns:soap-enc=" xmlns:xsd=" SOAP-ENV:encodingStyle=" xmlns:soap-env=" <SOAP-ENV:Body> <namesp1:getquote xmlns:namesp1="urn:xmethods-delayed-quotes"> <symbol xsi:type="xsd:string">akam</symbol> </namesp1:getquote> </SOAP-ENV:Body> </SOAP-ENV:Envelope> Information Network1 33
34 Data self-description: RDF Enhancement of tools : XPath, XSLT, Enhancement of APIs: DOM, SAX, etc. Signature, encryption XML Digital Signature XML Encryption Information Network1 34
35 Systems using XML are widely used expression in XML XML processing system XML is common knowledge for network-related service creation XML is a required item XML has been widely used for data expression in other software soon expands to a standard method Programming Language XML Information Network1 35
36 Information Network1 36
37 Warez exchange and sharing warez file exchange and sharing by ftp, www and netnews does not come under the spotlight due to its small scale Appearance of file exchange application In the early days appearance of P2P application using Gnutella and Napster Middle and late period towards a refined shape as WinMX () and KaZaa () hybrid P2P Shift to file sharing appearance of Winny (2002) towards pure P2P more effective distribution by broadband Information Network1 37
38 client / server Hybrid P2P Pure P2P center : Server center : Server peer peer peer centralized rendezvous and communication with the server rendezvous at server, communication between peers both rendezvous and communication between peers FTP, WWW WinMX, KaZaa Gnutella, Freenet, Winny Information Network1 38
39 Napster Gnutella Winny WinMX LimeWire Share BitTorrent Cabos Information Network1 39
40 Features sharing mp3 file lists between peers and enabling exchange of these files Hybrid P2P chat application was implemented to Napster as a way file exchange purpose communication tool Biography Jun, 1999 developed by Shawn Fanning (Northeastern University) Jul, 2000 sued in court by RIAA, Napster network was stopped Oct, 2003 restored as a music distribution service Information Network1 40
41 Features enables publication of not only mp3 files but also various file formats no management server and no management organization implementation of pure P2P became the reference model of P2P file sharing software Biography Feb, 2000 released by developers of Nullsoft Mar, 2000 released, but stopped release by AOL for 24 hours various clones exists Information Network1 41
42 What is Winny file sharing application successor of WinMX was developed by a Japanese individual file sharing network software using pure P2P Winny became extremely popular due to its ease of use, and a file sharing network was built Biography 6, May, 2002 β version is released 5, May, β version is released 28, Nov, 2003 arrest of a Winny user, developer s house-search, development is interrupted 31, May, 2004 developer is indicted by the Kyoto district public prosecutors office, on grounds of a Copyright Act infringement 1, Jun, 2004 bailed out 13, Dec, 2006 court-ordered at Kyoto district court, found guilty (fined), appealed the same day Information Network1 42
43 2003 estimated 200,000 (network company survey) 2 millions (ACCS survey) users Nov, 2004 domestic traffic was reduced by 1/6 July, 2006 estimated 1.75 millions user Information Network1 43
44 Issues on the quality of the exchanged information distribution of copyrighted works distribution of counterfeited files and faked files spread of viruses Arising from file management due to the use of file as the information unit anyone can freely share a file can not delete a shared file impossible to identify the sharing source of a file has no way of knowing the reliability of a targeted file needs to exchange more structured information Information Network1 44
45 Potential customers has proved existence of a consumer layer that can be contents purchasers given appropriate price and availability Construction of an autonomous distribution network by users showed new solution for maintenance of distribution network possible information distribution infrastructure by introducing appropriate technologies Information Network1 45
46 Expectations for P2P Distribution Network cost reduction due to flow disintermediation direct distribution from creator to user distribution maintenance of minor products maintenance of distribution market Requirements for P2P distribution network File preservation User preservation Accounting Traceability of file Information Network1 46
47 Aggressive use of P2P network Oct, 2005 Nasper Japan is established by Tower Record and Nasper Kazza create business model by the distribution of promotion files, the delivery of pay files and advertisement Skype voice communication service by Gnutella technologies is widely used all over the world Information Network1 47
48 Segregation between physical network structure and application layer structure appearance of usable bandwidth stress state Is it possible to build overlay-friendly underlying networks? We can get a hint by elaborating overlay networks Research is also progressing on what kind of hinds can be obtained FY2010 I 12 48
49 E.g., in the case of an information storage service built as an overlay network. Which node hold the desired information? There exist many issues Potential search halt Does the search has been completed within the configured time? Is there any efficient information search method? Existence of hindering nodes What to do if some nodes do not relay the search? It is assumed that each node is not under the provider control What to do when search results include down nodes? FY2010 I 12 49
50 Information Network1 50
51 a few servers for many clients the whole is visible as a single server The Internet Idempotent processing load balancer cluster valid for load balance and fault management Side-effect processing process aggregation target : DB etc Information Network1 51
52 Required mechanism for load balancing Load balancer is widely used Operating principle LB manages termination point of TCP connection Server1: Client: The Internet Virtual server: Server2: Forwarding Table Src: Dst: [1-3] Server3: Information Network1 52
53 Which servers ended the connection? Various methods were designed and implemented round robin, minimum connection, performance observation fault management is also important how to detects when a server is down? How to hide the difference of server addresses When server-side uses a private IP address, we must rewrite address in communication No simple NAT sometimes address information is embedded into Cookie or HTTP payload some application protocols has side effects Information Network1 53
54 Server does not need to exist in the same network show multiple servers as a single one by using tunneling sometimes this technology is called server federation CDN (Contents Delivery Network) active load balancing has been generalized in ISPs Akamai.com is the pioneer of business service about CDN. Information Network1 54
55 server IX clients Information Network1 55
56 new contents are provided by server at data center(freshness control) Data Center clients individual ISPs provides contents for customer by CD server (well-managed access) Information Network1 56
57 load balance by routing information Root DNS server is a typical example Information Network1 57
58 HOST 2001::1 HOST HOST HOST 2001::1 2001::1 Information Network1 58
59 F root DNS Originally at ISC in Silicon Valley, Calif. Currently, Hong Kong & Amsterdam??? client request reaches the neighbor server that is on the shortest path depending on network routing Hong Kong, CN each server, while using the same address, distributes route information from each location. Amsterdam, NL Silicon Valley, Calif. Information Network1 59
60 FY2010 I 12 60
61 Real-Time Media Transmission Technology for voice and video transmission Real-Time Packet Transmission over Network Layer and Transport Layer Coding Techniques which are adapted to media characteristics at the upper layer Providing and sharing SDK (Software Development Kit) for building real applications FY2010 I 12 61
62 Internet: to support the real economy The Internet is a social infrastructure for trading money The security technologies become essential for the protection of assets Encryption, Authentication Technology, ID Management Technology Secure Distributed Information Management Service Backup for BCM (Business Continuity Management) Standardization of application protocols implementing the above services has started. FY2010 I 12 62
! Review! Application model! Presentation layer! What is P2P?! How to build large-scale services?
! Review! Application model! Presentation layer! What is P2P?! How to build large-scale services? Suguru YAMAGUCHI Nara Institute of Science and Technology Graduate School of Information Science Information
More informationApplication protocols & presentation layer
Application protocols & presentation layer Suguru Yamaguchi NAIST Overview = Application model = Presentation layer = Large scale services 1 TCP/IP Protocol Suites OSI TCP/IP Processing unit Identification
More informationP2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies
P2P Computing Nobuo Kawaguchi Graduate School of Engineering Nagoya University 1 In this lecture series Wireless Location Technologies Location Information Processing P2P Computing(Today) Plug and Play
More informationOverview of Hierarchical Protocol Architecture. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Overview of Hierarchical Protocol Architecture Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Overview Concept and structure of hierarchical protocol architecture
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationAdditional Material. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Information Network I/No.
Additional Material Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science 2010 Information Network I/No.4 1 ! Protocol Suites for the Internet! Widely used from LANs
More informationInformation Network I: The Application and Upper Layers
Information Network I: The Application and Upper Layers Youki Kadobayashi Doudou Fall Laboratory for Cyber Resilience Nara Institute of Science and Technology Outline Domain Name System World Wide Web
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationCPSC156a: The Internet Co-Evolution of Technology and Society
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 14: October 28, 2003 Peer-to-Peer File Sharing Napster Client-Server Client 1 MP3-file 1 MP3-file 2 MP3-file n Interaction hello ack
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationChapter 7. Local Area Network Communications Protocols
Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate
More informationCMSC 322 Computer Networks Applications and End-To- End
CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework
More informationExamination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS
Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationThe Client Server Model and Software Design
The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationGoal and A sample Network App
Application Layer Goal and A sample Network App Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software Little
More informationTCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02
TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)
More informationChapter 2: Application layer
Chapter 2: Application layer 2. Principles of network applications app architectures app requirements 2.2 Web and HTTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming
More informationHierarchical Protocol Architecture
Hierarchical Protocol Architecture Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science Why protocol architecture?! Hierarchical protocol architecture We ll
More informationHow Internet Works
How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If
More informationCommunication in Distributed Systems
Communication in Distributed Systems Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 Introduction Functions of Communication Transport data between processes, machines,
More informationDistributed Systems. 03. Remote Procedure Calls. Paul Krzyzanowski. Rutgers University. Fall 2017
Distributed Systems 03. Remote Procedure Calls Paul Krzyzanowski Rutgers University Fall 2017 1 Socket-based communication Socket API: all we get from the OS to access the network Socket = distinct end-to-end
More informationChapter 1 Introduction
Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationAsynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC
Asynchronous and Synchronous Messaging with Web Services and XML Ronald Schmelzer Senior Analyst ZapThink, LLC The Business Objective Automated Business Collaboration Facilitating exchange of information
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationComputer Networks Prof. Ashok K. Agrawala
CMSC417 Computer Networks Prof. Ashok K. Agrawala 2018Ashok Agrawala September 6, 2018 Fall 2018 Sept 6, 2018 1 Overview Client-server paradigm End systems Clients and servers Sockets Socket abstraction
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content
More informationHP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard
More informationInternet Structural View. The Internet software layers. Package-shipping example TCP UDP
Internet Structural View WAN/Backbone WAN/Campus WAN/Corporate WAN/ISP 1 2 Package-shipping example The Internet software layers SMTP, Telnet, FTP, POP3, IMAP TCP, UDP IP: RIP, BGP, OSPF 3 Ethernet, Wireless,
More informationCS 417 9/18/17. Paul Krzyzanowski 1. Socket-based communication. Distributed Systems 03. Remote Procedure Calls. Sample SMTP Interaction
Socket-based communication Distributed Systems 03. Remote Procedure Calls Socket API: all we get from the to access the network Socket = distinct end-to-end communication channels Read/write model Line-oriented,
More informationComputer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University
Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationWhat is the difference between unicast and multicast? (P# 114)
1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111
More informationCSC 4900 Computer Networks: End-to-End Design
CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationCSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1
CSMC 412 Computer Networks Prof. Ashok K Agrawala 2015 Ashok Agrawala Set 2 September 15 CMSC417 Set 2 1 Contents Client-server paradigm End systems Clients and servers Sockets Socket abstraction Socket
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2002 Lecture 13: Content Distribution Networks (plus some other applications) Stefan Savage Some slides courtesy Srini Seshan Today s class Quick examples of other
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationNetworks Fall This exam consists of 10 problems on the following 13 pages.
CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationIntroduction to the Application Layer. Computer Networks Term B14
Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P
More informationAdditional laboratory
Additional laboratory This is addicional laboratory session where you will get familiar with the working environment. Firstly, you will learn about the different servers present in the lab and how desktops
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationHierarchical Protocol Architecture. Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science
Hierarchical Protocol Architecture Youki Kadobayashi Nara Institute of Science and Technology Graduate School of Information Science Why protocol architecture? = Hierarchical protocol architecture We ll
More informationObjective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro
CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions
More informationTelematics Chapter 9: Peer-to-Peer Networks
Telematics Chapter 9: Peer-to-Peer Networks Beispielbild User watching video clip Server with video clips Application Layer Presentation Layer Application Layer Presentation Layer Session Layer Session
More informationApplication Layer Introduction; HTTP; FTP
Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers
More informationCS 640 Introduction to Computer Networks. Today s lecture. What is P2P? Lecture30. Peer to peer applications
Introduction to Computer Networks Lecture30 Today s lecture Peer to peer applications Napster Gnutella KaZaA Chord What is P2P? Significant autonomy from central servers Exploits resources at the edges
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationDesigning a Protocol. (c) Dan Cosma (c) Dan Cosma (c) Dan Cosma
Designing a Protocol 1. Choose the patterns of communication and data transmission 2. Establish the design goals 3. Choose the message format philosophy 4. Design the message structure: format, fields,
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More informationDebian/GNU Linux Networking
Debian/GNU Linux Networking Basics of the Networking Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Networking 1/41 Agenda 1 Networks 2 Ethernet 3 Internet Protocol 4 TCP 5 DHCP 6 Check Network
More informationToday s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications
CSE 123b Communications Software Spring 2004 Today s class Quick examples of other application protocols Mail, telnet, NFS Content Distribution Networks (CDN) Lecture 12: Content Distribution Networks
More informationPeer-to-Peer Networks
Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Quiz #1 is next week
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationInternet Architecture
Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use
More informationPeer to Peer Computing
Peer to Peer Computing These slides are based on the slides made available by the authors of Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationTCP/IP Transport Layer Protocols, TCP and UDP
TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark
More informationChapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 8 Announcements Plan for Today: Networks: TCP Firewalls Midterm 1: One week from Today! 2/17/2009 In class, short answer, multiple choice,
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationThe impact of fiber access to ISP backbones in.jp. Kenjiro Cho (IIJ / WIDE)
The impact of fiber access to ISP backbones in.jp Kenjiro Cho (IIJ / WIDE) residential broadband subscribers in Japan 2 million broadband subscribers as of September 25-4 million for DSL, 3 million for
More information2 Background: Service Oriented Network Architectures
2 Background: Service Oriented Network Architectures Most of the issues in the Internet arise because of inflexibility and rigidness attributes of the network architecture, which is built upon a protocol
More informationCCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer
CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationContent Search. Unstructured P2P. Jukka K. Nurminen
Content Search Unstructured P2P Jukka K. Nurminen *Partly adapted from original slides provided by Rüdiger Schollmeier and Jörg Eberspächer (Technische Universität München) 1 V1-Filename.ppt / yyyy-mm-dd
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationGuide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services
Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply
More informationNetworking: Network layer
control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer
More informationChapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication
Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationCMSC 332 Computer Networks P2P and Sockets
CMSC 332 Computer Networks P2P and Sockets Professor Szajda Announcements Programming Assignment 1 is due Thursday Where are we? What sorts of problems are we having? 2 Recap SMTP is the language that
More informationData Communication & Computer Networks MCQ S
Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay
More informationLab 3.4.3: Services and Protocols
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More informationPresentation Services. Presentation Services: Motivation
Presentation Services need for a presentation services ASN.1 declaring data type encoding data types implementation issues reading: Tannenbaum 7.3.2 Presentation Services: Motivation Question: suppose
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationCCNA R&S: Introduction to Networks. Chapter 10: The Application Layer
CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application
More informationNetworking and Internetworking 1
Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote
More informationInnovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017
Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationUseNet and Gossip Protocol
CPSC 426/526 UseNet and Gossip Protocol Ennan Zhai Computer Science Department Yale University Recall: Lec-1 Understanding: - Distributed systems vs. decentralized systems - Why we need both? red P2P network
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4 1 Lab schedule confirmation Mondays, 12:00-2:00pm Tuesdays, 11:00am-1:00pm Wednesdays, 4:00-6:00pm
More informationContent Search. Unstructured P2P
Content Search Unstructured P2P Prof. Jukka K. Nurminen Data Communications Software (DCS) Lab, Department of Computer Science and Engineering, Aalto University *Partly adapted from original slides provided
More information