Lecture 2: Internet Architecture

Size: px
Start display at page:

Download "Lecture 2: Internet Architecture"

Transcription

1 CS 3700 Networks and Distributed Systems Lecture 2: Internet Architecture Revised 1/6/14

2 Organizing Network Functionality 2

3 Organizing Network Functionality 2 Networks are built from many components! Networking technologies Ethernet, Wifi, Bluetooth, Fiber Optic, Cable Modem, DSL! Network styles Circuit switch, packet switch Wired, Wireless, Optical, Satellite! Applications , Web (HTTP), FTP, BitTorrent, VoIP How do we make all this stuff work together?!

4 Problem Scenario 3

5 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth

6 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth

7 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth

8 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth

9 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth Cellular

10 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth Cellular

11 Problem Scenario 3 Web Bittorrent VoIP Ethernet Bluetooth Cellular

12 Problem Scenario 3 Web Bittorrent VoIP Ethernet Bluetooth Cellular

13 Problem Scenario 3 Web Bittorrent VoIP This is a nightmare scenario Huge amounts of work to add new apps or media Limits growth and adoption Ethernet Bluetooth Cellular

14 More Problems 4 Bittorrent Bittorrent Ethernet

15 More Problems 4 Bittorrent Bittorrent Application endpoints may not be on the same media Ethernet

16 Solution: Use Indirection 5 Web Bittorrent Magical Network Abstraction Layer Ethernet Bluetooth

17 Solution: Use Indirection 5 Web Bittorrent API Magical Network Abstraction Layer Ethernet Bluetooth

18 Solution: Use Indirection 5 Web Bittorrent Magical Network Abstraction Layer API API API Ethernet Bluetooth

19 Solution: Use Indirection 5 Web Bittorrent Magical Network Abstraction Layer Ethernet Bluetooth

20 Solution: Use Indirection 5 Web Bittorrent VoIP Magical Network Abstraction Layer Ethernet Bluetooth

21 Solution: Use Indirection 5 Web Bittorrent VoIP Magical Network Abstraction Layer Ethernet Bluetooth Cellular

22 Solution: Use Indirection 5 Web Bittorrent VoIP Magical Network Abstraction Layer O(1) work to add new apps, media Few limits on new technology Ethernet Bluetooth Cellular

23 Layered Network Stack 6 Applications Layer N Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Layer 2 Layer 1 Physical Media

24 Layered Network Stack 6 Applications Layer N Layer 2 Layer 1 Physical Media Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Encapsulation! Interfaces define cross-layer interaction! Layers only rely on those below them

25 Layered Network Stack 6 Applications Layer N Layer 2 Layer 1 Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Encapsulation! Interfaces define cross-layer interaction! Layers only rely on those below them Flexibility! Reuse of code across the network! Module implementations may change Physical Media

26 Layered Network Stack 6 Applications Layer N Layer 2 Layer 1 Physical Media Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Encapsulation! Interfaces define cross-layer interaction! Layers only rely on those below them Flexibility! Reuse of code across the network! Module implementations may change Unfortunately, there are tradeoffs! Interfaces hide information! As we will see, may hurt performance

27 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more

28 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more How do we distribute functionality across devices?! Example: who is responsible for security? Switch Router Switch

29 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more How do we distribute functionality across devices?! Example: who is responsible for security? Switch Router Switch

30 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more How do we distribute functionality across devices?! Example: who is responsible for security? Switch Router Switch

31 8 Outline Layering The OSI Model Communicating The End-to-End Argument

32 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

33 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical All devices implement the first three layers Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

34 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Layers communicate peer-to-peer Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

35 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

36 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

37 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Layers communicate peer-to-peer Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

38 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

39 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

40 Layer Features 10 Application Presentation Session Transport Network Data Link Physical Service! What does this layer do? Interface! How do you access this layer? Protocol! How is this layer implemented?

41 Physical Layer 11 Application Presentation Session Transport Network Data Link Physical Service! Move information between two systems connected by a physical link Interface! Specifies how to send one bit Protocol! Encoding scheme for one bit! Voltage levels! Timing of signals Examples: coaxial cable, fiber optics, radio frequency transmitters

42 Data Link Layer 12 Application Presentation Session Transport Network Data Link Physical Service! Data framing: boundaries between packets! Media access control (MAC)! Per-hop reliability and flow-control Interface! Send one packet between two hosts connected to the same media Protocol! Physical addressing (e.g. MAC address) Examples: Ethernet, Wifi, DOCSIS

43 Network Layer 13 Application Presentation Session Transport Network Data Link Physical Service! Deliver packets across the network! Handle fragmentation/reassembly! Packet scheduling! Buffer management Interface! Send one packet to a specific destination Protocol! Define globally unique addresses! Maintain routing tables Example: Internet Protocol (IP), IPv6

44 Transport Layer 14 Application Presentation Session Transport Network Data Link Physical Service! Multiplexing/demultiplexing! Congestion control! Reliable, in-order delivery Interface! Send message to a destination Protocol! Port numbers! Reliability/error correction! Flow-control information Examples: UDP, TCP

45 Session Layer 15 Application Presentation Session Transport Network Data Link Physical Service! Access management! Synchronization Interface! It depends Protocol! Token management! Insert checkpoints Examples: none

46 Presentation Layer 16 Application Presentation Session Transport Network Data Link Physical Service! Convert data between different representations! E.g. big endian to little endian! E.g. Ascii to Unicode Interface! It depends Protocol! Define data formats! Apply transformation rules Examples: none

47 Application Layer 17 Application Presentation Session Transport Network Data Link Physical Service! Whatever you want :) Interface! Whatever you want :D Protocol! Whatever you want ;) Examples: turn on your smartphone and look at the list of apps

48 Encapsulation 18 How does data move through the layers? Data Application Presentation Session Transport Network Data Link Physical

49 Encapsulation 18 How does data move through the layers? Data Application Presentation Session Transport Network Data Link Physical

50 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical

51 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical

52 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical

53 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical

54 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical

55 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical

56 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

57 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

58 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

59 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

60 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

61 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

62 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data

63 Real Life Analogy 19

64 Real Life Analogy 19 Label contains routing info

65 Real Life Analogy 19 Postal Service

66 Real Life Analogy 19 Un-packing Postal Service

67 Real Life Analogy 19 Doesn t know how the Postal network works Doesn t know contents of letter Postal Service

68 Network Stack in Practice 20 Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical

69 Network Stack in Practice 20 Host 1 Switch Host 2 Application Transport Network Data Link Physical Network Data Link Physical Application Transport Network Data Link Physical

70 Network Stack in Practice 20 Host 1 Switch Host 2 Application Transport Network Data Link Network Data Link Application Transport Network Data Link

71 Network Stack in Practice 20 Host 1 Switch Host 2 FTP Client TCP IP Ethernet IP Ethernet FTP Server TCP IP Ethernet

72 Network Stack in Practice 20 Host 1 Switch Host 2 FTP Client TCP IP Ethernet IP Ethernet FTP Server TCP IP Ethernet

73 Network Stack in Practice 20 Host 1 Switch Host 2 Video Client Video Server UDP UDP IP IP IP Ethernet Ethernet Ethernet

74 Network Stack in Practice 20 Host 1 Switch Host 2 Video Client Video Server UDP UDP IP IP IP n n n

75 Encapsulation, Revisited 21 Web Server TCP IP Ethernet

76 Encapsulation, Revisited 21 Web Page Web Server TCP IP Ethernet

77 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP IP Ethernet

78 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP IP Ethernet

79 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header TCP Segment Web Page TCP IP Ethernet

80 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header TCP Segment Web Page TCP IP Header TCP Header HTTP Header Web Page IP Ethernet

81 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP TCP Segment IP Header TCP Header HTTP Header Web Page IP IP Datagram Ethernet

82 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP TCP Segment IP Header TCP Header HTTP Header Web Page IP IP Datagram Ethernet Header IP Header TCP Header HTTP Header Web Page Ethernet Trailer Ethernet

83 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP TCP Segment IP Header TCP Header HTTP Header Web Page IP IP Datagram Ethernet Header IP Header TCP Header HTTP Header Web Page Ethernet Trailer Ethernet Ethernet Frame

84 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

85 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

86 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

87 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

88 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

89 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Think about the difficulty of deploying IPv6 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

90 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, One Internet layer means all networks TCP, UDP, ICMP interoperate All applications function on all networks IPv4 Room for development above and below IP But, changing IP is insanely hard Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,

91 Orthogonal Planes 23 Control plane: How Internet paths are established Application Presentation Session Transport IP Data Link Physical

92 Orthogonal Planes 23 Control plane: How Internet paths are established Application Presentation Session Transport IP Data Link Physical BGP RIP OSPF Control Plane

93 Orthogonal Planes 23 Application Control plane: How Internet paths are established Presentation Well cover this later Session Transport IP Data Link Physical BGP RIP OSPF Control Plane

94 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2 Application Transport Network Data Link Network Data Link Application Transport Network Data Link

95 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2 Transport Application Network Data Link Network Data Link Application Transport Network Data Link

96 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2 Transport Application Network Data Link

97 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2

98 Reality Check 25 The layered abstraction is very nice

99 Reality Check 25 The layered abstraction is very nice Does it hold in reality?

100 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No.

101 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No. Firewalls Analyze application layer headers

102 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No. Firewalls Analyze application layer headers Transparent Proxies Simulate application endpoints within the network

103 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No. Firewalls Analyze application layer headers Transparent Proxies Simulate application endpoints within the network NATs Break end-to-end network reachability

104 26 Outline Layering The OSI Model Communicating The End-to-End Argument

105 From Layers to Eating Cake 27 IP gives us best-effort datagram forwarding! So simple anyone can do it! Large part of why the Internet has succeeded! but it sure isn t giving us much Layers give us a way to compose functionality! Example: HTTP over TCP for Web browsers with reliable connections but they do not tell us where (in the network) to implement the functionality

106 Where to Place Functionality 28 How do we distribute functionality across devices?! Example: who is responsible for security?????? Switch Router Switch

107 Where to Place Functionality 28 How do we distribute functionality across devices?! Example: who is responsible for security?????? Switch Router Switch The End-to-End Arguments in System Design! Saltzer, Reed, and Clark! The Sacred Text of the Internet! Endlessly debated by researchers and engineers

108 Basic Observation 29 Some applications have end-to-end requirements! Security, reliability, etc. Implementing this stuff inside the network is hard! Every step along the way must be fail-proof! Different applications have different needs End hosts! Can t depend on the network! Can satisfy these requirements without network level support

109 Example: Reliable File Transfer 30

110 Example: Reliable File Transfer 30

111 Example: Reliable File Transfer 30 Solution 1: Make the network reliable

112 Example: Reliable File Transfer 30 Integrity Check Integrity Check Integrity Check Solution 1: Make the network reliable

113 Example: Reliable File Transfer 30 Solution 1: Make the network reliable

114 Example: Reliable File Transfer 30 Solution 1: Make the network reliable

115 Example: Reliable File Transfer 30 Solution 1: Make the network reliable

116 Example: Reliable File Transfer 30 Solution 1: Make the network reliable

117 Example: Reliable File Transfer 30 Solution 1: Make the network reliable

118 Example: Reliable File Transfer 30 Solution 1: Make the network reliable App has to do a check anyway!

119 Example: Reliable File Transfer 30 Solution 1: Make the network reliable App has to do a check anyway! Solution 2: App level, end-to-end check, retry on failure

120 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure

121 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure

122 Example: Reliable File Transfer 31 Please Retry Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure

123 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure

124 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Full functionality can be built at App level Solution 2: App level, end-to-end check, retry on failure

125 Example: Reliable File Transfer 31 In-network implementation Doesn t reduce host complexity Does increase network complexity Increased overhead for apps that don t need functionality But, in-network performance may be better Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure

126 Conservative Interpretation 32

127 Conservative Interpretation 32 Don t implement a function at the lower levels of the system unless it can be completely implemented at this level (Peterson and Davie) Basically, unless you can completely remove the burden from end hosts, don t bother

128 Radical Interpretation 33 Don t implement anything in the network that can be implemented correctly by the hosts

129 Radical Interpretation 33 Don t implement anything in the network that can be implemented correctly by the hosts Make network layer absolutely minimal Ignore performance issues

130 Moderate Interpretation 34 Think twice before implementing functionality in the network If hosts can implement functionality correctly, implement it a lower layer only as a performance enhancement But do so only if it does not impose burden on applications that do not require that functionality and if it doesn t cost too much $ to implement

131 Reality Check, Again 35 Layering and E2E principals regularly violated Firewalls Transparent Proxies NATs Conflicting interests! Architectural purity! Commercial necessity

132 Takeaways 36 Layering for network functions! Helps manage diversity in computer networks! Not optimal for everything, but simple and flexible Narrow waist ensures interoperability, enables innovation E2E argument (attempts) to keep IP layer simple Think carefully when adding functionality into the network

CS4700/5700: Network fundamentals

CS4700/5700: Network fundamentals Cristina Nita-Rotaru CS4700/5700: Network fundamentals. 1: Organizing network functionality } Networks are built from many components } Networking technologies } Ethernet, Wifi, Bluetooth, Fiber Optic,

More information

TDTS21 Advanced Networking

TDTS21 Advanced Networking TDTS21 Advanced Networking Lecture 2: Hosts, the Internet architecture, and the E2E arguments Based on slides from D. Choffnes, P. Gill, and J. Rexford Revised Spring 2015 by N. Carlsson End hosts The

More information

CS4700/CS5700 Fundaments of Computer Networks

CS4700/CS5700 Fundaments of Computer Networks CS4700/CS5700 Fundaments of Computer Networks Lecture 5: Internet architecture Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

How does the Internet Look Like?

How does the Internet Look Like? Computer s EEE 448 Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Organizing Functionality s are built from many components ing technologies, Wifi, Bluetooth, Fiber Optic,

More information

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals. CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion

More information

Page 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"

Page 1. Goals for Today What Is A Protocol? CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument Goals for Today" CS162 Operating Systems and Systems Programming Lecture 10 Protocols, Layering and e2e Argument" What is a protocol?! Layering! End-to-end arguments!! October 3, 2011! Anthony D. Joseph

More information

CS 268: Lecture 4 (Internet Architecture & E2E Arguments)

CS 268: Lecture 4 (Internet Architecture & E2E Arguments) CS 268: Lecture 4 (Internet Architecture & E2E Arguments) Today s Agenda Course Theme Course overview History of the Internet Design goals Layering (review) Focus on the Internet Other topics covered,

More information

Internet Design Principles

Internet Design Principles Internet Design Principles EE 122: Intro to Communication Networks Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/ Materials

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Component Function Example

Component Function Example Network Components Component Names Component Function Example Application, or app, user Uses the network Skype, itunes, Amazon Host, or end-system, edge device, node, source, sink Router, or switch, node,

More information

Parts of a Network. app. router. link. host. Computer Networks 2

Parts of a Network. app. router. link. host. Computer Networks 2 Network Components Parts of a Network app host router link Computer Networks 2 Parts of a Network app host router link Computer Networks 3 Component Names Component Function Example Application, or app,

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 2: More layering and the end-to-end principle. Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 Today in

More information

416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018

416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018 416 Distributed Systems Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 3: Protocols & Layering Alex Snoeren (standing in for Stefan Savage) Yesterday How to send data from point A to point B? January 13, 2005 CSE 123A -- Lecture

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Lecture 3 Protocol Stacks and Layering

Lecture 3 Protocol Stacks and Layering Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?

More information

Network Architecture. TOC Architecture

Network Architecture. TOC Architecture Network Architecture Introduction Layering Example Internet Layers First Look Layering Step by Step Downside of Layering Interconnecting Networks The Internet TOC Architecture Introduction Issues: Inter-operability

More information

Network Reference Models

Network Reference Models Network Reference Models LECTURE (2) Network Reference Models A framework (guideline) for network implementation and troubleshooting. Divides complex functions into simpler components. Importance of reference

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early

More information

Network Architecture. EE 122, Fall 2013 Sylvia Ratnasamy

Network Architecture. EE 122, Fall 2013 Sylvia Ratnasamy Network Architecture EE 122, Fall 2013 Sylvia Ratnasamy http://inst.eecs.berkeley.edu/~ee122/ Administrivia l Enrollment l l Discussion sections are *not* the bottleneck to enrollment State of the waitlist

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

Peer entities. Protocol Layering. Protocols. Example

Peer entities. Protocol Layering. Protocols. Example Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

416 Distributed Systems. Networks review; Day 2 of 2 And start of RPC Jan 13, 2016

416 Distributed Systems. Networks review; Day 2 of 2 And start of RPC Jan 13, 2016 416 Distributed Systems Networks review; Day 2 of 2 And start of RPC Jan 13, 2016 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet? What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication

More information

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁 I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network

More information

The Internet. Overview. Network building blocks

The Internet. Overview. Network building blocks The Internet Lecture 24 Based in part on material from Computer Networks: A Systems Approach by Larry Peterson & Bruce Davie CS 638 Web Programming Overview Network building blocks Nodes: PC, special-purpose

More information

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1 EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

CS 204: Advanced Computer Networks

CS 204: Advanced Computer Networks CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

Lecture 2: Internet Structure

Lecture 2: Internet Structure Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements

More information

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1 CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards 1 Today s Lecture Layers and Protocols A bit about s 2 Network Communication: Lots of Functions

More information

Probability, Preview, and Principles

Probability, Preview, and Principles Probability, Preview, and Principles EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton

More information

Chapter 1. Computer Networks and the Internet

Chapter 1. Computer Networks and the Internet Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end

More information

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018 416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission

More information

Chapter 2 Network Architectures A global view

Chapter 2 Network Architectures A global view Chapter 2 Architectures A global view Professor Dongning uo Architecture Architecture, n. 2a: formation or construction as or as if as the result of conscious act, 2b: a unifying or coherent form or structure.

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Design Considerations : Computer Networking. Outline

Design Considerations : Computer Networking. Outline Design Considerations 15-744: Computer Networking L-2 Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments

More information

Networking Background

Networking Background Networking Background CMSC 414 October 30, 2017 General Overview We are going to take a quick look at What a network protocol is The abstract design of the network The 7-Layer network stack Protocols We

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Network Architecture COS 461: Computer Networks

Network Architecture COS 461: Computer Networks Network Architecture COS 461: Computer Networks Nick Feamster Spring 2015 Lectures: MW 10-10:50 am in CS 104 Acknowledgments: Lecture slides are from Computer networks course thought by Nick Feamster at

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration

More information

Design Principles : Fundamentals of Computer Networks Bill Nace

Design Principles : Fundamentals of Computer Networks Bill Nace Design Principles 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia No Paper Review for today

More information

Lecture 2 Protocol Stacks. Last Tuesday

Lecture 2 Protocol Stacks. Last Tuesday Lecture 2 Protocol Stacks David Andersen School of Computer Science Carnegie Mellon University 1-441 ing, Spring 200 http://www.cs.cmu.edu/~srini/1-441/s0/ 1 Last Tuesday The Big Picture» Goals: Efficiency

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Packet Switching, Layer Models and Protocol Suites

Packet Switching, Layer Models and Protocol Suites Packet Switching, Layer Models and Protocol Suites Course Code CCE 211 Course Title Data Communication Asst. Prof. Md Samsuzzaman, Ph.D. sobuzcce@cse.pstu.ac.bd http://www.cse.pstu.ac.bd/sobuzcse Computer

More information

Lecture 2: Layering & End-to-End

Lecture 2: Layering & End-to-End Lecture 2: Layering & End-to-End CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 2 Overview Layering Application interface Transport services Discussion

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet

More information

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 L1: Introduction Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/15/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures used in this presentation

More information

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.

Time : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A. COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 206 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #2 preview: Data Communications

More information

Page # Last Time. Lecture 2 Protocol Stacks and Layering. Today s Lecture. Why protocols and layering? What is a Protocol.

Page # Last Time. Lecture 2 Protocol Stacks and Layering. Today s Lecture. Why protocols and layering? What is a Protocol. Last Time Lecture Protocol Stacks and Layering David Andersen School of Computer Science Carnegie Mellon University - ing, Fall 00 http://www.cs.cmu.edu/~srini/-/f0/ The Big Picture» Goals: Efficiency

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture

More information

CS 520 Networking in the TCP/IP enviornment

CS 520 Networking in the TCP/IP enviornment CS 520 Networking in the TCP/IP enviornment Instructors: Dr. Esam Alwagait alwagait@ksu.edu.sa Dr. Mishari Almishari mialmishari@ksu.edu.sa Slide Set were original prepared by Dr. Tatsuya Susa Contacts

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

ECE 4400:427/527 - Computer Networks Spring 2017

ECE 4400:427/527 - Computer Networks Spring 2017 ECE 4400:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527

More information

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420 Based on the book Computer Networking: A Top Down Approach,

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

Networking and Internetworking 1

Networking and Internetworking 1 Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote

More information

CS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017

CS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017 CS 43: Computer Networks The Network Layer Kevin Webb Swarthmore College November 2, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network

More information

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:

Announcements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani: Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted

More information

Introduction to Networks (2) Networked Systems 3 Lecture 2

Introduction to Networks (2) Networked Systems 3 Lecture 2 Introduction to Networks (2) Networked Systems 3 Lecture 2 Lecture Outline Network Protocols Protocol Layering OSI Reference Model Protocol Standards 2 Network Protocols Communication occurs when hosts

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

Communication Networks

Communication Networks Session 2. Application and Layered Architectures Dongsoo S. Kim Electrical and Computer Engineering. Indiana U. Purdue U. Indianapolis Communication s Various services and flexibility architectures Grouping

More information

Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015

Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Oriana Riva, Department of Computer Science ETH Zürich Advanced Computer Networks 263-3501-00 Principles Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Last time Course introduction Principles

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Introduction to Computer Science 2017 Networking. Sören Schwertfeger

Introduction to Computer Science 2017 Networking. Sören Schwertfeger Sören Schwertfeger Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network of networks

More information

cs144 Midterm Review Fall 2010

cs144 Midterm Review Fall 2010 cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Networking Models OSI Model Created by International Organization Standardization

Networking Models OSI Model Created by International Organization Standardization Networking Models OSI Model Created by International Organization Standardization Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Email : Agha.m@mcit.gov.af

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Internet Architecture and Experimentation

Internet Architecture and Experimentation Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet

More information

Lecture 2: Links and Signaling

Lecture 2: Links and Signaling Lecture 2: Links and Signaling CSE 123: Computer Networks Alex C. Snoeren DISCUSSION @7pm Tomorrow Our Problem Communications is complicated Modulation and encoding bits Splitting sequences of bits into

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Last Time. Internet in a Day Day 2 of 1. Today: TCP and Apps

Last Time. Internet in a Day Day 2 of 1. Today: TCP and Apps Internet in a Day Day 2 of 1 Carnegie Mellon University 15-440, Distributed Systems Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports

More information

Network Layering CS 118

Network Layering CS 118 Network Layering Computer Network Fundamentals Peter Reiher Page 1 Outline What is a layer? Goals of layering Internet and the One Ring Page 2 What is a layer? A layer is: The largest set of parties (nodes)

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

ก ก Information Technology II

ก ก Information Technology II ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

Design Considerations : Computer Networking. Outline. Challenge 1: Address Formats. Challenge. How to determine split of functionality

Design Considerations : Computer Networking. Outline. Challenge 1: Address Formats. Challenge. How to determine split of functionality Design Considerations 15-744: Computer Networking L-2 Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

Network Architecture Models

Network Architecture Models School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare

More information

Page 1. Review: The Problem" Software System Modularity" Solution: Intermediate Layers"

Page 1. Review: The Problem Software System Modularity Solution: Intermediate Layers Review: The Problem" CS162 Operating Systems and Systems Programming Lecture 16 Layering" Transmission" Media" Skype " SSH" NFS" Coaxial " cable" Fiber" optic" HTTP" Packet" Radio" March 31, 2014 Anthony

More information