Lecture 2: Internet Architecture
|
|
- Steven Lloyd
- 5 years ago
- Views:
Transcription
1 CS 3700 Networks and Distributed Systems Lecture 2: Internet Architecture Revised 1/6/14
2 Organizing Network Functionality 2
3 Organizing Network Functionality 2 Networks are built from many components! Networking technologies Ethernet, Wifi, Bluetooth, Fiber Optic, Cable Modem, DSL! Network styles Circuit switch, packet switch Wired, Wireless, Optical, Satellite! Applications , Web (HTTP), FTP, BitTorrent, VoIP How do we make all this stuff work together?!
4 Problem Scenario 3
5 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth
6 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth
7 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth
8 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth
9 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth Cellular
10 Problem Scenario 3 Web Bittorrent Ethernet Bluetooth Cellular
11 Problem Scenario 3 Web Bittorrent VoIP Ethernet Bluetooth Cellular
12 Problem Scenario 3 Web Bittorrent VoIP Ethernet Bluetooth Cellular
13 Problem Scenario 3 Web Bittorrent VoIP This is a nightmare scenario Huge amounts of work to add new apps or media Limits growth and adoption Ethernet Bluetooth Cellular
14 More Problems 4 Bittorrent Bittorrent Ethernet
15 More Problems 4 Bittorrent Bittorrent Application endpoints may not be on the same media Ethernet
16 Solution: Use Indirection 5 Web Bittorrent Magical Network Abstraction Layer Ethernet Bluetooth
17 Solution: Use Indirection 5 Web Bittorrent API Magical Network Abstraction Layer Ethernet Bluetooth
18 Solution: Use Indirection 5 Web Bittorrent Magical Network Abstraction Layer API API API Ethernet Bluetooth
19 Solution: Use Indirection 5 Web Bittorrent Magical Network Abstraction Layer Ethernet Bluetooth
20 Solution: Use Indirection 5 Web Bittorrent VoIP Magical Network Abstraction Layer Ethernet Bluetooth
21 Solution: Use Indirection 5 Web Bittorrent VoIP Magical Network Abstraction Layer Ethernet Bluetooth Cellular
22 Solution: Use Indirection 5 Web Bittorrent VoIP Magical Network Abstraction Layer O(1) work to add new apps, media Few limits on new technology Ethernet Bluetooth Cellular
23 Layered Network Stack 6 Applications Layer N Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Layer 2 Layer 1 Physical Media
24 Layered Network Stack 6 Applications Layer N Layer 2 Layer 1 Physical Media Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Encapsulation! Interfaces define cross-layer interaction! Layers only rely on those below them
25 Layered Network Stack 6 Applications Layer N Layer 2 Layer 1 Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Encapsulation! Interfaces define cross-layer interaction! Layers only rely on those below them Flexibility! Reuse of code across the network! Module implementations may change Physical Media
26 Layered Network Stack 6 Applications Layer N Layer 2 Layer 1 Physical Media Modularity! Does not specify an implementation! Instead, tells us how to organize functionality Encapsulation! Interfaces define cross-layer interaction! Layers only rely on those below them Flexibility! Reuse of code across the network! Module implementations may change Unfortunately, there are tradeoffs! Interfaces hide information! As we will see, may hurt performance
27 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more
28 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more How do we distribute functionality across devices?! Example: who is responsible for security? Switch Router Switch
29 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more How do we distribute functionality across devices?! Example: who is responsible for security? Switch Router Switch
30 Key Questions 7 How do we divide functionality into layers?! Routing! Congestion control! Error checking! Security! Fairness! And many more How do we distribute functionality across devices?! Example: who is responsible for security? Switch Router Switch
31 8 Outline Layering The OSI Model Communicating The End-to-End Argument
32 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
33 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical All devices implement the first three layers Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
34 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Layers communicate peer-to-peer Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
35 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
36 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
37 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Layers communicate peer-to-peer Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
38 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
39 The ISO OSI Model 9 OSI: Open Systems Interconnect Model Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
40 Layer Features 10 Application Presentation Session Transport Network Data Link Physical Service! What does this layer do? Interface! How do you access this layer? Protocol! How is this layer implemented?
41 Physical Layer 11 Application Presentation Session Transport Network Data Link Physical Service! Move information between two systems connected by a physical link Interface! Specifies how to send one bit Protocol! Encoding scheme for one bit! Voltage levels! Timing of signals Examples: coaxial cable, fiber optics, radio frequency transmitters
42 Data Link Layer 12 Application Presentation Session Transport Network Data Link Physical Service! Data framing: boundaries between packets! Media access control (MAC)! Per-hop reliability and flow-control Interface! Send one packet between two hosts connected to the same media Protocol! Physical addressing (e.g. MAC address) Examples: Ethernet, Wifi, DOCSIS
43 Network Layer 13 Application Presentation Session Transport Network Data Link Physical Service! Deliver packets across the network! Handle fragmentation/reassembly! Packet scheduling! Buffer management Interface! Send one packet to a specific destination Protocol! Define globally unique addresses! Maintain routing tables Example: Internet Protocol (IP), IPv6
44 Transport Layer 14 Application Presentation Session Transport Network Data Link Physical Service! Multiplexing/demultiplexing! Congestion control! Reliable, in-order delivery Interface! Send message to a destination Protocol! Port numbers! Reliability/error correction! Flow-control information Examples: UDP, TCP
45 Session Layer 15 Application Presentation Session Transport Network Data Link Physical Service! Access management! Synchronization Interface! It depends Protocol! Token management! Insert checkpoints Examples: none
46 Presentation Layer 16 Application Presentation Session Transport Network Data Link Physical Service! Convert data between different representations! E.g. big endian to little endian! E.g. Ascii to Unicode Interface! It depends Protocol! Define data formats! Apply transformation rules Examples: none
47 Application Layer 17 Application Presentation Session Transport Network Data Link Physical Service! Whatever you want :) Interface! Whatever you want :D Protocol! Whatever you want ;) Examples: turn on your smartphone and look at the list of apps
48 Encapsulation 18 How does data move through the layers? Data Application Presentation Session Transport Network Data Link Physical
49 Encapsulation 18 How does data move through the layers? Data Application Presentation Session Transport Network Data Link Physical
50 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical
51 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical
52 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical
53 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical
54 Encapsulation 18 How does data move through the layers? Application Data Presentation Session Transport Network Data Link Physical
55 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical
56 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
57 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
58 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
59 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
60 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
61 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
62 Encapsulation 18 How does data move through the layers? Application Presentation Session Transport Network Data Link Physical Data
63 Real Life Analogy 19
64 Real Life Analogy 19 Label contains routing info
65 Real Life Analogy 19 Postal Service
66 Real Life Analogy 19 Un-packing Postal Service
67 Real Life Analogy 19 Doesn t know how the Postal network works Doesn t know contents of letter Postal Service
68 Network Stack in Practice 20 Host 1 Switch Host 2 Application Presentation Session Transport Network Data Link Physical Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
69 Network Stack in Practice 20 Host 1 Switch Host 2 Application Transport Network Data Link Physical Network Data Link Physical Application Transport Network Data Link Physical
70 Network Stack in Practice 20 Host 1 Switch Host 2 Application Transport Network Data Link Network Data Link Application Transport Network Data Link
71 Network Stack in Practice 20 Host 1 Switch Host 2 FTP Client TCP IP Ethernet IP Ethernet FTP Server TCP IP Ethernet
72 Network Stack in Practice 20 Host 1 Switch Host 2 FTP Client TCP IP Ethernet IP Ethernet FTP Server TCP IP Ethernet
73 Network Stack in Practice 20 Host 1 Switch Host 2 Video Client Video Server UDP UDP IP IP IP Ethernet Ethernet Ethernet
74 Network Stack in Practice 20 Host 1 Switch Host 2 Video Client Video Server UDP UDP IP IP IP n n n
75 Encapsulation, Revisited 21 Web Server TCP IP Ethernet
76 Encapsulation, Revisited 21 Web Page Web Server TCP IP Ethernet
77 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP IP Ethernet
78 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP IP Ethernet
79 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header TCP Segment Web Page TCP IP Ethernet
80 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header TCP Segment Web Page TCP IP Header TCP Header HTTP Header Web Page IP Ethernet
81 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP TCP Segment IP Header TCP Header HTTP Header Web Page IP IP Datagram Ethernet
82 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP TCP Segment IP Header TCP Header HTTP Header Web Page IP IP Datagram Ethernet Header IP Header TCP Header HTTP Header Web Page Ethernet Trailer Ethernet
83 Encapsulation, Revisited 21 HTTP Header Web Page Web Server TCP Header HTTP Header Web Page TCP TCP Segment IP Header TCP Header HTTP Header Web Page IP IP Datagram Ethernet Header IP Header TCP Header HTTP Header Web Page Ethernet Trailer Ethernet Ethernet Frame
84 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
85 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
86 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
87 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
88 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
89 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, TCP, UDP, ICMP IPv4 Think about the difficulty of deploying IPv6 Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
90 The Hourglass 22 HTTP, FTP, RTP, IMAP, Jabber, One Internet layer means all networks TCP, UDP, ICMP interoperate All applications function on all networks IPv4 Room for development above and below IP But, changing IP is insanely hard Ethernet, x, DOCSIS, Fiber, Coax, Twisted Pair, Radio,
91 Orthogonal Planes 23 Control plane: How Internet paths are established Application Presentation Session Transport IP Data Link Physical
92 Orthogonal Planes 23 Control plane: How Internet paths are established Application Presentation Session Transport IP Data Link Physical BGP RIP OSPF Control Plane
93 Orthogonal Planes 23 Application Control plane: How Internet paths are established Presentation Well cover this later Session Transport IP Data Link Physical BGP RIP OSPF Control Plane
94 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2 Application Transport Network Data Link Network Data Link Application Transport Network Data Link
95 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2 Transport Application Network Data Link Network Data Link Application Transport Network Data Link
96 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2 Transport Application Network Data Link
97 Orthogonal Planes 24 Data plane: How data is forwarded over Internet paths Host 1 Switch(es) Host 2
98 Reality Check 25 The layered abstraction is very nice
99 Reality Check 25 The layered abstraction is very nice Does it hold in reality?
100 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No.
101 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No. Firewalls Analyze application layer headers
102 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No. Firewalls Analyze application layer headers Transparent Proxies Simulate application endpoints within the network
103 Reality Check 25 The layered abstraction is very nice Does it hold in reality? No. Firewalls Analyze application layer headers Transparent Proxies Simulate application endpoints within the network NATs Break end-to-end network reachability
104 26 Outline Layering The OSI Model Communicating The End-to-End Argument
105 From Layers to Eating Cake 27 IP gives us best-effort datagram forwarding! So simple anyone can do it! Large part of why the Internet has succeeded! but it sure isn t giving us much Layers give us a way to compose functionality! Example: HTTP over TCP for Web browsers with reliable connections but they do not tell us where (in the network) to implement the functionality
106 Where to Place Functionality 28 How do we distribute functionality across devices?! Example: who is responsible for security?????? Switch Router Switch
107 Where to Place Functionality 28 How do we distribute functionality across devices?! Example: who is responsible for security?????? Switch Router Switch The End-to-End Arguments in System Design! Saltzer, Reed, and Clark! The Sacred Text of the Internet! Endlessly debated by researchers and engineers
108 Basic Observation 29 Some applications have end-to-end requirements! Security, reliability, etc. Implementing this stuff inside the network is hard! Every step along the way must be fail-proof! Different applications have different needs End hosts! Can t depend on the network! Can satisfy these requirements without network level support
109 Example: Reliable File Transfer 30
110 Example: Reliable File Transfer 30
111 Example: Reliable File Transfer 30 Solution 1: Make the network reliable
112 Example: Reliable File Transfer 30 Integrity Check Integrity Check Integrity Check Solution 1: Make the network reliable
113 Example: Reliable File Transfer 30 Solution 1: Make the network reliable
114 Example: Reliable File Transfer 30 Solution 1: Make the network reliable
115 Example: Reliable File Transfer 30 Solution 1: Make the network reliable
116 Example: Reliable File Transfer 30 Solution 1: Make the network reliable
117 Example: Reliable File Transfer 30 Solution 1: Make the network reliable
118 Example: Reliable File Transfer 30 Solution 1: Make the network reliable App has to do a check anyway!
119 Example: Reliable File Transfer 30 Solution 1: Make the network reliable App has to do a check anyway! Solution 2: App level, end-to-end check, retry on failure
120 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure
121 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure
122 Example: Reliable File Transfer 31 Please Retry Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure
123 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure
124 Example: Reliable File Transfer 31 Solution 1: Make the network reliable Full functionality can be built at App level Solution 2: App level, end-to-end check, retry on failure
125 Example: Reliable File Transfer 31 In-network implementation Doesn t reduce host complexity Does increase network complexity Increased overhead for apps that don t need functionality But, in-network performance may be better Solution 1: Make the network reliable Solution 2: App level, end-to-end check, retry on failure
126 Conservative Interpretation 32
127 Conservative Interpretation 32 Don t implement a function at the lower levels of the system unless it can be completely implemented at this level (Peterson and Davie) Basically, unless you can completely remove the burden from end hosts, don t bother
128 Radical Interpretation 33 Don t implement anything in the network that can be implemented correctly by the hosts
129 Radical Interpretation 33 Don t implement anything in the network that can be implemented correctly by the hosts Make network layer absolutely minimal Ignore performance issues
130 Moderate Interpretation 34 Think twice before implementing functionality in the network If hosts can implement functionality correctly, implement it a lower layer only as a performance enhancement But do so only if it does not impose burden on applications that do not require that functionality and if it doesn t cost too much $ to implement
131 Reality Check, Again 35 Layering and E2E principals regularly violated Firewalls Transparent Proxies NATs Conflicting interests! Architectural purity! Commercial necessity
132 Takeaways 36 Layering for network functions! Helps manage diversity in computer networks! Not optimal for everything, but simple and flexible Narrow waist ensures interoperability, enables innovation E2E argument (attempts) to keep IP layer simple Think carefully when adding functionality into the network
CS4700/5700: Network fundamentals
Cristina Nita-Rotaru CS4700/5700: Network fundamentals. 1: Organizing network functionality } Networks are built from many components } Networking technologies } Ethernet, Wifi, Bluetooth, Fiber Optic,
More informationTDTS21 Advanced Networking
TDTS21 Advanced Networking Lecture 2: Hosts, the Internet architecture, and the E2E arguments Based on slides from D. Choffnes, P. Gill, and J. Rexford Revised Spring 2015 by N. Carlsson End hosts The
More informationCS4700/CS5700 Fundaments of Computer Networks
CS4700/CS5700 Fundaments of Computer Networks Lecture 5: Internet architecture Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu
More informationHow does the Internet Look Like?
Computer s EEE 448 Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Organizing Functionality s are built from many components ing technologies, Wifi, Bluetooth, Fiber Optic,
More informationCS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.
CS 268: Internet Architecture & E2E Arguments Scott Shenker and Ion Stoica (Fall, 2010) 1 Today s Agenda Design goals Layering (review) End-to-end arguments (review) 2 1 Internet Design Goals Goals 0 Connect
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 17: Internet architecture Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion
More informationPage 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"
Goals for Today" CS162 Operating Systems and Systems Programming Lecture 10 Protocols, Layering and e2e Argument" What is a protocol?! Layering! End-to-end arguments!! October 3, 2011! Anthony D. Joseph
More informationCS 268: Lecture 4 (Internet Architecture & E2E Arguments)
CS 268: Lecture 4 (Internet Architecture & E2E Arguments) Today s Agenda Course Theme Course overview History of the Internet Design goals Layering (review) Focus on the Internet Other topics covered,
More informationInternet Design Principles
Internet Design Principles EE 122: Intro to Communication Networks Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/ Materials
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationComponent Function Example
Network Components Component Names Component Function Example Application, or app, user Uses the network Skype, itunes, Amazon Host, or end-system, edge device, node, source, sink Router, or switch, node,
More informationParts of a Network. app. router. link. host. Computer Networks 2
Network Components Parts of a Network app host router link Computer Networks 2 Parts of a Network app host router link Computer Networks 3 Component Names Component Function Example Application, or app,
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 2: More layering and the end-to-end principle. Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 Today in
More information416 Distributed Systems. Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018
416 Distributed Systems Networks review; Day 2 of 2 Fate sharing, e2e principle And start of RPC Jan 10, 2018 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 3: Protocols & Layering Alex Snoeren (standing in for Stefan Savage) Yesterday How to send data from point A to point B? January 13, 2005 CSE 123A -- Lecture
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationLecture 3 Protocol Stacks and Layering
Lecture 3 Protocol Stacks and ing Hui Zhang School of Computer Science Carnegie Mellon University 15-441 Networking, Fall 2007 http://www.cs.cmu.edu/~srini/15-441/f07/ 1 What is a Communication Network?
More informationNetwork Architecture. TOC Architecture
Network Architecture Introduction Layering Example Internet Layers First Look Layering Step by Step Downside of Layering Interconnecting Networks The Internet TOC Architecture Introduction Issues: Inter-operability
More informationNetwork Reference Models
Network Reference Models LECTURE (2) Network Reference Models A framework (guideline) for network implementation and troubleshooting. Divides complex functions into simpler components. Importance of reference
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationAnnouncements Computer Networking. What is the Objective of the Internet? Today s Lecture
Announcements 15-441 15-441 Computer ing 15-641 Lecture 2 Protocol Stacks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Sign up for piazza: https://piazza.com/cmu/fall2016/15441641 P1 will
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationNetwork Architecture. EE 122, Fall 2013 Sylvia Ratnasamy
Network Architecture EE 122, Fall 2013 Sylvia Ratnasamy http://inst.eecs.berkeley.edu/~ee122/ Administrivia l Enrollment l l Discussion sections are *not* the bottleneck to enrollment State of the waitlist
More informationCS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking
: Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationNetwork Architecture
Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,
More information416 Distributed Systems. Networks review; Day 2 of 2 And start of RPC Jan 13, 2016
416 Distributed Systems Networks review; Day 2 of 2 And start of RPC Jan 13, 2016 1 Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?
What s the Internet? Hardware view: What s the Internet? Hardware view: PC server wireless laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication
More informationIntroduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁
I Sören Schwertfeger 师泽仁 Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network
More informationThe Internet. Overview. Network building blocks
The Internet Lecture 24 Based in part on material from Computer Networks: A Systems Approach by Larry Peterson & Bruce Davie CS 638 Web Programming Overview Network building blocks Nodes: PC, special-purpose
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationLecture 2: Internet Structure
Lecture 2: Internet Structure COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross,
More informationNetworking and Internetworking 1
Networking and Internetworking 1 Today l Networks and distributed systems l Internet architecture xkcd Networking issues for distributed systems Early networks were designed to meet relatively simple requirements
More informationCS 640: Introduction to Computer Networks. Today s Lecture. Page 1
CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards 1 Today s Lecture Layers and Protocols A bit about s 2 Network Communication: Lots of Functions
More informationProbability, Preview, and Principles
Probability, Preview, and Principles EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More information416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018
416 Distributed Systems Networks review; Day 1 of 2 Jan 5 + 8, 2018 1 Distributed Systems vs. Networks Low level (c/go) Run forever Support others Adversarial environment Distributed & concurrent Resources
More informationNetworking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Internet Layers Internet Data Packet transmission
More informationChapter 2 Network Architectures A global view
Chapter 2 Architectures A global view Professor Dongning uo Architecture Architecture, n. 2a: formation or construction as or as if as the result of conscious act, 2b: a unifying or coherent form or structure.
More informationNetwork Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals
More informationDesign Considerations : Computer Networking. Outline
Design Considerations 15-744: Computer Networking L-2 Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments
More informationNetworking Background
Networking Background CMSC 414 October 30, 2017 General Overview We are going to take a quick look at What a network protocol is The abstract design of the network The 7-Layer network stack Protocols We
More informationOperating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski
Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,
More informationNetwork Architecture COS 461: Computer Networks
Network Architecture COS 461: Computer Networks Nick Feamster Spring 2015 Lectures: MW 10-10:50 am in CS 104 Acknowledgments: Lecture slides are from Computer networks course thought by Nick Feamster at
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Chen Avin (avin) Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Administrivia Sign and hand in Collaboration
More informationDesign Principles : Fundamentals of Computer Networks Bill Nace
Design Principles 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia No Paper Review for today
More informationLecture 2 Protocol Stacks. Last Tuesday
Lecture 2 Protocol Stacks David Andersen School of Computer Science Carnegie Mellon University 1-441 ing, Spring 200 http://www.cs.cmu.edu/~srini/1-441/s0/ 1 Last Tuesday The Big Picture» Goals: Efficiency
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationPacket Switching, Layer Models and Protocol Suites
Packet Switching, Layer Models and Protocol Suites Course Code CCE 211 Course Title Data Communication Asst. Prof. Md Samsuzzaman, Ph.D. sobuzcce@cse.pstu.ac.bd http://www.cse.pstu.ac.bd/sobuzcse Computer
More informationLecture 2: Layering & End-to-End
Lecture 2: Layering & End-to-End CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 2 Overview Layering Application interface Transport services Discussion
More informationHands-On Network Security: Practical Tools & Methods
Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network
More informationComputer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4 Good day, we will talk about IP version 4 that is the internet
More informationL1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L1: Introduction Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/15/2016 CSCI 445 Fall 2016 1 Acknowledgements Some pictures used in this presentation
More informationTime : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.
COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 206 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #2 preview: Data Communications
More informationPage # Last Time. Lecture 2 Protocol Stacks and Layering. Today s Lecture. Why protocols and layering? What is a Protocol.
Last Time Lecture Protocol Stacks and Layering David Andersen School of Computer Science Carnegie Mellon University - ing, Fall 00 http://www.cs.cmu.edu/~srini/-/f0/ The Big Picture» Goals: Efficiency
More informationBLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS
BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture
More informationCS 520 Networking in the TCP/IP enviornment
CS 520 Networking in the TCP/IP enviornment Instructors: Dr. Esam Alwagait alwagait@ksu.edu.sa Dr. Mishari Almishari mialmishari@ksu.edu.sa Slide Set were original prepared by Dr. Tatsuya Susa Contacts
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas
More informationECE 4400:427/527 - Computer Networks Spring 2017
ECE 4400:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi Tran (ECE-University of Akron) ECE 4400:427/527
More informationCourse on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420 Based on the book Computer Networking: A Top Down Approach,
More informationChapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach
Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationNetworking and Internetworking 1
Networking and Internetworking 1 To do q q Networks and distributed systems Internet architecture xkcd Internet history Early days ~1960 ARPA sponsored research on computer networking to enable remote
More informationCS 43: Computer Networks The Network Layer. Kevin Webb Swarthmore College November 2, 2017
CS 43: Computer Networks The Network Layer Kevin Webb Swarthmore College November 2, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network
More informationAnnouncements. TAs office hours: Mohamed Grissa: Mohamed Alkalbani:
Announcements TAs office hours: Mohamed Grissa: grissam@oregonstate.edu Tuesday: 4-5 Friday: 11-12 Mohamed Alkalbani: alkalbmo@oregonstate.edu Wednesday: 11-12 Thursday: 11-12 Lecture slides: Will be posted
More informationIntroduction to Networks (2) Networked Systems 3 Lecture 2
Introduction to Networks (2) Networked Systems 3 Lecture 2 Lecture Outline Network Protocols Protocol Layering OSI Reference Model Protocol Standards 2 Network Protocols Communication occurs when hosts
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More informationCommunication Networks
Session 2. Application and Layered Architectures Dongsoo S. Kim Electrical and Computer Engineering. Indiana U. Purdue U. Indianapolis Communication s Various services and flexibility architectures Grouping
More informationPatrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015
Oriana Riva, Department of Computer Science ETH Zürich Advanced Computer Networks 263-3501-00 Principles Patrick Stuedi, Qin Yin, Timothy Roscoe Spring Semester 2015 Last time Course introduction Principles
More informationCS 428/528 Computer Networks Lecture 01. Yan Wang
1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed
More informationComputer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan
Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationIntroduction to Computer Science 2017 Networking. Sören Schwertfeger
Sören Schwertfeger Outline Internet History of the Internet Internet Structure Internet Protocols Network layer details 1. Physical Layer 2. Data Link Layer 3. Network Layer Internet: Huge network of networks
More informationcs144 Midterm Review Fall 2010
cs144 Midterm Review Fall 2010 Administrivia Lab 3 in flight. Due: Thursday, Oct 28 Midterm is this Thursday, Oct 21 (during class) Remember Grading Policy: - Exam grade = max (final, (final + midterm)/2)
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationGoal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t
Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationNetworking Models OSI Model Created by International Organization Standardization
Networking Models OSI Model Created by International Organization Standardization Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Email : Agha.m@mcit.gov.af
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationInternet Architecture and Experimentation
Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet
More informationLecture 2: Links and Signaling
Lecture 2: Links and Signaling CSE 123: Computer Networks Alex C. Snoeren DISCUSSION @7pm Tomorrow Our Problem Communications is complicated Modulation and encoding bits Splitting sequences of bits into
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationLast Time. Internet in a Day Day 2 of 1. Today: TCP and Apps
Internet in a Day Day 2 of 1 Carnegie Mellon University 15-440, Distributed Systems Last Time Modularity, Layering, and Decomposition Example: UDP layered on top of IP to provide application demux ( ports
More informationNetwork Layering CS 118
Network Layering Computer Network Fundamentals Peter Reiher Page 1 Outline What is a layer? Goals of layering Internet and the One Ring Page 2 What is a layer? A layer is: The largest set of parties (nodes)
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationก ก Information Technology II
ก ก 202103 Information Technology II ก ก ก ก ก (LAN), ก LAN, ก ก (LAN) ก ก ก LAN ก LAN ก LAN Topology Bus LAN Star LAN Ring LAN Wireless LAN Wireless LAN Wireless ก (LAN) ก ก ก LAN ก LAN WAN ก Random Access
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More informationDesign Considerations : Computer Networking. Outline. Challenge 1: Address Formats. Challenge. How to determine split of functionality
Design Considerations 15-744: Computer Networking L-2 Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments
More informationNetworking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3
Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationPage 1. Review: The Problem" Software System Modularity" Solution: Intermediate Layers"
Review: The Problem" CS162 Operating Systems and Systems Programming Lecture 16 Layering" Transmission" Media" Skype " SSH" NFS" Coaxial " cable" Fiber" optic" HTTP" Packet" Radio" March 31, 2014 Anthony
More information