Chapter 1 Introduction

Similar documents
CS 3516: Advanced Computer Networks

Course on Computer Communication and Networks. Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data

ECE 4400:427/527 - Computer Networks Spring 2017

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Introduction to the Application Layer. Computer Networks Term B14

CS 3516: Advanced Computer Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Goal and A sample Network App

Computer Networking Introduction

end systems, access networks, links circuit switching, packet switching, network structure

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

CMSC 322 Computer Networks Applications and End-To- End

Chapter 2 Application Layer

CSC 4900 Computer Networks: End-to-End Design

Chapter 2: Application layer

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter II: Application Layer

Chapter 1 Introduction

Introduction to computer networking

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3

Computer Networks & Security 2016/2017

Chapter 3 Transport Layer

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

CSC 401 Data and Computer Communications Networks

Review for Internet Introduction

CS 471G Friday, 11 January Introduction 2-1

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

Chapter 4 Network Layer: The Data Plane

Application Layer: HTTP

Review of Previous Lecture

Chapter 2 Application Layer

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

EECS 3214: Computer Network Protocols and Applications

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Chapter 2 Application Layer

Lecture 11. Transport Layer (cont d) Transport Layer 1

Chapter 4 Network Layer: The Data Plane

Web Protocols and Practice

Lecture Computer Networks WS 2016/2017

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Chapter 2 Application Layer

Part 1: Introduction. Goal: Review of how the Internet works Overview

CS 204: Advanced Computer Networks

Chapter 1 Introduction

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time

The Diffie-Hellman Key Exchange

Chapter 5 Network Layer: The Control Plane

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Network Architecture Models

DATA COMMUNICATOIN NETWORKING

System Programming. Introduction to computer networks

Chapter 2 Application Layer

Packet-switching: store-and-forward

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? Hardware view: What s the Internet?

Chapter 8 Network Security

Network Protocols and Architectures

Chapter 4 Network Layer: The Data Plane

Chapter 1 Introduction

Chapter 2 Application Layer

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Chapter 4 Network Layer: The Data Plane

RSC Part I: Introduction

Chapter 2 Communicating Over the Network

Application Layer Protocols

Internet Architecture I EECS 122: Lecture 2

Chapter 6 The Link Layer and LANs

INTRODUCTORY COMPUTER

Chapter 2 Application Layer

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks

Chapter 7: Multimedia Networking

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The Client Server Model and Software Design

Computer Networks. General Course Information. Addressing and Routing. Computer Networks 9/8/2009. Basic Building Blocks for Computer Networks

Chapter 3 Transport Layer

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Chapter 2 Application Layer

Networking Applications

CSCD 330 Network Programming

Chapter 3: Transport Layer. Chapter 3 Transport Layer. Chapter 3 outline. Transport services and protocols

Chapter 2 Application Layer

Client/Server Computing & Socket Programming

Chapter 8 Security. Computer Networking: A Top Down Approach

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Need For Protocol Architecture

Need For Protocol Architecture

Chapter 1 Introduction

Chapter 5 Network Layer: The Control Plane

CS4700/CS5700 Fundaments of Computer Networks

Chapter 1. Computer Networks and the Internet

Transcription:

Chapter 1 Introduction A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) that you mention their source (after all, we d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 Introduction 1-1

Chapter 1: roadmap 1.1 what is the Internet? 1.2 network edge end systems, access networks, links 1.3 network core packet switching, circuit switching, network structure 1.4 delay, loss, throughput in networks 1.5 protocol layers, service models 1.6 networks under attack: security 1.7 history Introduction 1-2

Protocol layers Networks are complex, with many pieces : hosts routers links of various media applications protocols hardware, software Question: is there any hope of organizing structure of network?. or at least our discussion of networks? Introduction 1-3

Organization of air travel ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing a series of steps Introduction 1-4

Layering of airline functionality ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below Introduction 1-5

Why layering? dealing with complex systems: explicit structure allows identification, relationship of complex system s pieces layered reference model for discussion modularization eases maintenance, updating of system change of implementation of layer s service transparent to rest of system e.g., change in gate procedure doesn t affect rest of system layering considered harmful? Introduction 1-6

Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements Ethernet, 802.111 (WiFi), PPP physical: bits on the wire application transport network link physical Introduction 1-7

ISO/OSI reference model presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack missing these layers! these services, if needed, must be implemented in application needed? application presentation session transport network link physical Introduction 1-8

Reference Models for Layering TCP/IP Model Application Transport Internetwork Host to Network FTP Ether net TCP/IP Protocols TCP Telnet HTTP IP UDP PacketPoint-to- Radio Point OSI Ref Model Application Presentation Session Transport Network Datalink Physical Top-down approach means we will first learn the application layer and then learn about lower layers *slide borrowed from Professor Koushik Kar in ECSE 9

segment datagram frame message H l H t H n H t H n H t M M M M source application transport network link physical Encapsulation link physical switch H l H n H n H t H t H t M M M M destination application transport network link physical H l H n H n H t H t M M network link physical H n H t M router Introduction 1-10

Chapter 2 Application Layer A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) that you mention their source (after all, we d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 Application Layer 2-11

Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic mail SMTP, POP3, IMAP 2.4 DNS 2.5 P2P applications 2.6 video streaming and content distribution networks 2.7 socket programming with UDP and TCP Application Layer 2-12

Chapter 2: application layer our goals: conceptual, implementation aspects of network application protocols transport-layer service models client-server paradigm peer-to-peer paradigm content distribution networks learn about protocols by examining popular application-level protocols HTTP FTP SMTP / POP3 / IMAP DNS creating network applications socket API Application Layer 2-13

Some network apps e-mail web text messaging remote login P2P file sharing multi-user network games streaming stored video (YouTube, Hulu, Netflix) voice over IP (e.g., Skype) real-time video conferencing social networking search Application Layer 2-14

Creating a network app write programs that: run on (different) end systems communicate over network e.g., web server software communicates with browser software no need to write software for network-core devices network-core devices do not run user applications applications on end systems allows for rapid app development, propagation application transport network data link physical application transport network data link physical application transport network data link physical Application Layer 2-15

Application architectures possible structure of applications: client-server peer-to-peer (P2P) Application Layer 2-16

Client-server architecture server: always-on host permanent IP address data centers for scaling client/server clients: communicate with server may be intermittently connected may have dynamic IP addresses do not communicate directly with each other Application Layer 2-17

P2P architecture no always-on server arbitrary end systems directly communicate peers request service from other peers, provide service in return to other peers self scalability new peers bring new service capacity, as well as new service demands peers are intermittently connected and change IP addresses complex management peer-peer Application Layer 2-18

Processes communicating process: program running within a host within same host, two processes communicate using inter-process communication (defined by OS) processes in different hosts communicate by exchanging messages clients, servers client process: process that initiates communication server process: process that waits to be contacted aside: applications with P2P architectures have client processes & server processes Application Layer 2-19

Sockets process sends/receives messages to/from its socket socket analogous to door sending process shoves message out door sending process relies on transport infrastructure on other side of door to deliver message to socket at receiving process application process socket application process controlled by app developer transport transport network link Internet network link controlled by OS physical physical Application Layer 2-20

Addressing processes to receive messages, process must have identifier host device has unique 32- bit IP address Q: does IP address of host on which process runs suffice for identifying the process? A: no, many processes can be running on same host identifier includes both IP address and port numbers associated with process on host. example port numbers: HTTP server: 80 mail server: 25 to send HTTP message to gaia.cs.umass.edu web server: IP address: 128.119.245.12 port number: 80 more shortly Application Layer 2-21

App-layer protocol defines types of messages exchanged, e.g., request, response message syntax: what fields in messages & how fields are delineated message semantics meaning of information in fields rules for when and how processes send & respond to messages open protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP proprietary protocols: e.g., Skype Application Layer 2-22

packet analyzer packet capture (pcap) copy of all Ethernet frames sent/receive d application (www browser, email client) application OS Transport (TCP/UDP) Network (IP) Link (Ethernet) Physical

Things to do Download Wireshark from www.wireshark.org and try capturing packets to/from your computer with it 24