COSC4377. Chapter 1: Roadmap

Similar documents
COSC4377. Chapter 1: Roadmap

CS 3516: Advanced Computer Networks

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Introduction to the Application Layer. Computer Networks Term B14

Network and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

Computer Networking Introduction

Chapter 1 Introduction

Computer Networks. Lecture 1: Introduction. Computer Networking: A Top Down Approach. Dr. Yaoqing Liu

Goal and A sample Network App

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

CMSC 322 Computer Networks Applications and End-To- End

CSC 4900 Computer Networks: End-to-End Design

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

CS 3516: Advanced Computer Networks

Chapter 2 Application Layer

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Chapter 2: Application layer

end systems, access networks, links circuit switching, packet switching, network structure

Chapter 2 Application Layer

Slides are an edited mashup of two books

Application Layer: HTTP

CSC 4900 Computer Networks: Introduction

EECS 3214: Computer Network Protocols and Applications

Introduction to Computer Networking II. Abdusy Syarif Informatics Department Faculty of Computer Science Universitas Mercu Buana

Chapter II: Application Layer

Review of Previous Lecture

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Outline. TCP/IP Internet

Lecture 11. Transport Layer (cont d) Transport Layer 1

Computer Networks. Instructor: Niklas Carlsson Office: B:476 Office Hours: TBA

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

DATA COMMUNICATOIN NETWORKING

CS 471G Friday, 11 January Introduction 2-1

Web Protocols and Practice

Chapter 2 Application Layer

TDTS06: Computer Networks

Chapter 2 Application Layer

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECE 4450:427/527 - Computer Networks Spring 2017

Agententechnologien in der Telekommunikation

Lecture Computer Networks WS 2016/2017

Chapter 2 Application Layer

Introduction to Data Communication

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Chapter 1 Introduction

Chapter 1 Introduction

Chapter 2 Application Layer

Client/Server Computing & Socket Programming

Chapter 1 Introduction

Chapter 1: roadmap parte B

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time

Client/Server Computing

CMSC 332: Computer Networks Intro (cont.)

Chapter 1 Introduction

Lecture 1 - Introduction

Goal Give an overview of the topic Approach Descriptive Use Internet as example. Content. What is the Internet?

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

CSEE 4119 Computer Networks. Chapter 1 Introduction (2/2) Introduction 1-1

CPSC 441 Computer Communications

Computer Networking: Internet and beyond

Introduction. General requirements

Chapter 7: Multimedia Networking

Computer Networking: A Top Down Approach

CSE 4213: Computer Networks II

Chapter 1 Introduction

Chapter 1 Introduction

Foundations of Telematics

Introduction to Computer Networking. Gang Wang Fall 2016

The Internet and the World Wide Web

Chapter 2 Application Layer

Δίκτυα Μετάδοσης Δεδομένων Data Networks. Introduction 1-1

Chapter 1 Introduction

Client/Server Computing & Socket Programming

Suprakash Datta. Office: LAS 3043 Phone: ext Course page:

Fundamentals of Information Systems

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

Computer Networks and Applications

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

CSEN 503 Introduction to Communication Networks

Computer Networking Introduction

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 2 Application Layer

CS 332: Computer Networks Introduction

Computer Networking A Top Down Approach 6th Solutions

Networking and Internetworking 1

Cisco Visual Networking Index: Forecast and Methodology,

Ice-Breaking. COMP 561: Computer Networks. Course Info. Course Info. Qian Zhang Spring 2008 HKUST

Chapter 1: Introduction

Fundamentals of Information Systems

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Different Layers Lecture 21

CSC Introduction to Computers and Their Applications. Background

Welcome to CS 340 Introduction to Computer Networking

RSC Part I: Introduction

Defining the Internet

Transcription:

Lecture 4 Chapter 1: Roadmap 1.1 what is the Internet? 1.2 network edge end systems, access networks, links 1.3 network core packet switching, circuit switching, network structure 1.4 delay, loss, throughput in networks 1.5 protocol layers, service models 1.6 networks under attack: security 1.7 history 2 1

1961: Kleinrock queueing theory shows effectiveness of packet switching 1964: Baran packetswitching in military nets 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational (the IMP by BB&N at UCLA, see UCLA video in last lecture) Internet history 1961-1972: Early packet-switching principles 1972: ARPAnet public demo NCP (Network Control Protocol) first host host protocol first e mail program ARPAnet has 15 nodes Derived from Kurose & Ross, 6 th Ed 3 ARPA Net, 1969,1971 Image courtesy Alex McKenzie http://personalpages.manchester.ac.uk/staff/ m.dodge/cybergeography/atlas/arpanet1.gif http://www.computerhistory.org/internet_history/ full_size_images/1969_4 node_map.gif 1970 http://cla.calpoly.edu/~lcall/204/8 10/ARPANET map.jpg http://www.let.leidenuniv.nl/history/ivh/arpanet1.gif 4 2

Internet history 1972-1980: Internetworking, new and proprietary nets 1970: ALOHAnet satellite network in Hawaii 1974: Cerf and Kahn architecture for interconnecting networks 1976: Ethernet at Xerox PARC late70 s: proprietary architectures: DECnet, SNA, XNA late 70 s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes Cerf and Kahn s internetworking principles: minimalism, autonomy no internal changes required to interconnect networks best effort service model stateless routers decentralized control define today s Internet architecture 5 1983: deployment of TCP/IP 1982: smtp e mail protocol defined 1983: DNS defined for name to IP address translation 1985: ftp protocol defined 1988: TCP congestion control Internet history 1980-1990: new protocols, a proliferation of networks new national networks: Csnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks 6 3

National Science Foundation Networks March 1986 April 1987 http://www.computerhistory.org/internet_history/ full_size_images/nsfnet_backbone.gif http://www.computerhistory.org/internet_history/ full_size_images/nsfnet_map.gif 1995 Texas GigaPoP on vbns UH, Rice, BCM 1996 http://www.merit.edu/research/images/map_t1.gif http://en.wikipedia.org/ wiki/file:vbns.jpg http://en.wikipedia.org/wiki/ File:NewNSFNETArchitecture.jpg 7 Internet history 1990, 2000 s: commercialization, the Web, new apps early 1990 s: ARPAnet decommissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: Web hypertext [Bush 1945, Nelson 1960 s] HTML, HTTP: Berners Lee 1994: Mosaic, later Netscape late 1990 s: commercialization of the Web late 1990 s 2000 s: more killer apps: instant messaging, P2P file sharing network security to forefront est. 50 million host, 100 million+ users backbone links running at Gbps 8 4

Early Internet2 http://www cs faculty.stanford.edu/~eroberts/courses/soco/projects/ 2003 04/internet 2/architecture.html 9 Internet history 2005 present ~750 million hosts Smartphones and tablets Aggressive deployment of broadband access Increasing ubiquity of high speed wireless access Emergence of online social networks: Facebook: soon one billion users Service providers (Google, Microsoft) create their own networks Bypass Internet, providing instantaneous access to search, emai, etc. E commerce, universities, enterprises running their services in cloud (eg, Amazon EC2) 10 5

Interplanetary Internet http://www.dtnrg.org/wiki/home http://tedxtalks.ted.com/video/tedxmidatlantic 2011 Vint Cerf 11 Interplanetary Internet http://public.ccsds.org/about/default.aspx 12 6

Interplanetary Internet Public involvement in voyages of discovery Plug-and-Play communications infrastructure Web-based scientific investigation 13 Earth Science Interplanetary Internet Deep Space Science Human Exploration Progressive, planned deployment of reusable communications infrastructure 2001 2003 2005 2007 2009 2011 In-depth Planetary Exploration 14 7

Internet Statistics 2.4 billion Internet users (June 2012, http://www.internetworldstats.com/stats.htm ) 35 billion hours/month spent on Internet = 3,995,444 years/month 1,110 million active Facebook users (March 2013, http://www.hashmeta.com/wp content/uploads/2013/05/facebooks_mobile_users.jpg ) 555 million active Twitter users (May, 2013, http://www.statisticbrain.com/twitter statistics ) 238 million registered LinkedIn users (August 2013, http://press.linkedin.com/about) 4 billion users/day at YouTube 1 billion queries per day at Google 800 million updates/day at Facebook 175 million Tweets/day at Twitter (2012, http://www.mediabistro.com/alltwitter/twitter stats_b32050) 60 hours of video uploads every minute at YouTube Unique visits/month (2012, http://www.theguardian.com/news/datablog/2012/jun/22/websitevisitor statistics nielsen may 2012 google) 173,003,000 Google 152,718,000 Facebook 142,919,000 Yahoo 127,504,000 YouTube 126,811,000 MSN/Windows Live/Bling http://www.mediabistro.com/alltwitter/online time_b22186 (May 2012) http://www.mediabistro.com/alltwitter/twitter 140 million active users_b19729 15 Internet Statistics Websites Name Description/Focus Date launched Registered users Registration Facebook General: Photos, Videos, Blogs, Apps. February 2004 1,110,000,000 Open to people 13 and older Twitter General. Micro blogging, RSS, updates July 15, 2006 555,000,000 Open to all ages Google+ General June 28, 2011 500,000,000 Open to people 13 and older Qzone General. In Simplified Chinese; caters for mainland China users 480,000,000 Open to the general public Sina Weibo Social microblogging site in Mainland China. August 14, 2009 300,000,000 Open Formspring Social Q&A November, 2009 290,000,000 Registration post responses and questions Habbo General for teens. Over 31 communities worldwide. Chat room and user profiles. August 2000 268,000,000 Open to people 13 and older LinkedIn Business and professional networking May 2003 238,000,000 Open to people 18 and older Renren Badoo Significant site in China. Was known as 校内 (Xiaonei) until August 2009. General, Meet new people & dating, Popular in Europe and Latin America 160,000,000 Open January 2006 190,000,000 Open to people 18 and older Vkontakte General, including music upload, listening and search. Popular in Russia and former Soviet republics. September 2006 123,612,100 Open Bebo General July 2005 117,000,000 Open to people 13 and older Tagged General. October 2004 100,000,000 Open Orkut General. Owned by Google Inc. Popular in India and Brazil January 22, 2004 100,000,000 Open to people 18 and older, (Google login) http://en.wikipedia.org/wiki/list_of_social_networking_websites 16 8

Introduction: summary covered a ton of material! Internet overview what s a protocol? network edge, core, access network packet switching versus circuit switching Internet structure performance: loss, delay, throughput layering, service models security history you now have: context, overview, feel of networking more depth, detail to follow! 17 Wireshark Demo 9

Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: If you use these slides (e.g., in a class) that you mention their source (after all, we d like people to use our book!) If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved 19 Chapter 2: Outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP 20 10

Chapter 2: Application layer our goals: conceptual, implementation aspects of network application protocols transport layer service models client server paradigm peer to peer paradigm learn about protocols by examining popular application level protocols HTTP FTP SMTP / POP3 / IMAP DNS creating network applications socket API 21 Some network apps e mail web text messaging remote login P2P file sharing multi user network games streaming stored video (YouTube, Hulu, Netflix) voice over IP (e.g., Skype) real time video conferencing social networking search 22 11

e mail and Messaging Statistics e mail 2.2 billion users (425 million gmail users June 2012) 155 billion emails are sent each day http://www.radicati.com/wp/wp content/uploads/2012/04/email Statistics Report 2012 2016 Brochure.pdf Key Global Telecom Indicators for the World (estimates) Over-the-Top (OTT) messaging v SMS messaging. OTT messages SMS MMS messages messages 2011 3,492 billion 7,844 billion 207 billion 2012 5,846 billion 8,600 billion 228 billion 2016 20,293 billion 9,554 billion 277 billion Sources: Portio Research Febuary 2012 Global millions Per 100 people Mobile cellular subscriptions 5,981 86.7 Fixed telephone lines 1,159 16.6 Active mobile broadband subscriptions 1,186 17.0 Fixed broadband subscriptions 591 8.5 Source: International Telecommunication Union (November 2011) via: mobi Thinking http://mobithinking.com/mobile marketing tools/latest mobilestats/c#mobilemessaging 23 Video on the Internet Top 10 U.S. Online Video Content Properties Ranked by Unique Video Viewers, March 2012 Total U.S. Home and Work Locations Content Videos Only (Ad Videos Not Included) Source: comscore Video Metrix Property Total Unique Viewers (000) Videos (000)* Minutes per Viewer Total Internet : Total Audience 181,062 36,984,872 1,304.8 Google Sites 146,097 15,748,884 424.6 Yahoo! Sites 60,609 814,838 72.4 VEVO 51,337 706,291 63.0 Facebook 45,073 247,010 21.3 Viacom Digital 44,251 547,732 63.2 AOL, Inc. 43,701 496,415 50.3 Turner Digital 42,917 288,887 24.8 Microsoft Sites 41,169 494,529 46.7 Comcast NBCUniversal 32,164 178,189 36.9 Hulu 31,104 1,010,527 275.2 *A video is defined as any streamed segment of audiovisual content, including both progressive downloads and live streams. For long-form, segmented content, (e.g. television episodes with ad pods in the middle) each segment of the content is counted as a distinct video stream. http://www.comscore.com/press_events/press_releases/2012/4/comscore_releases_march_2012_u.s._online_video_rankings 24 12

Some YouTube statistics > 1 billion unique visits each month 6 billion hrs watched each month 100 hrs of video uploaded every minute > 1 million subscriptions each day http://www.youtube.com/yt/press/statistics.html Ausgust2013 25 Internet Traffic Forecast Internet highlights In 2016 global IP traffic will reach 1.3 ZB/year or 110.3 EB/month, a compound annual growth rate (CAGR) of 29% from 2011. In 2016, the GB equivalent of all movies ever made will cross global IP networks every 3 minutes delivering 12.5 ZB every 5 minutes. There will be nearly three networked devices per capita in 2016, up from over one networked device per capita in 2011. IP traffic per capita will reach 15 GB/capita in 2016, up from 4 GB/capita in 2011. In 2016 non PC originated IP traffic will account for 31% of all IP traffic, up from 22% in 2011. In 2016 the non PC consumer internet traffic will account for 20% of the consumer internet traffic, up from 6% in 2011. PC originated traffic will grow at a CAGR of 28%, while TVs, tablets, smartphones, and business Internet machine to machine (M2M) modules will have growth rates of 42%, 116%, 119%, and 86%, respectively. In 2016, wired devices will account for 39% of IP traffic, while Wi Fi and mobile devices will account for 61%. In 2011, wired devices accounted for 55%. Busy hour IP traffic will increase nearly 5 fold by 2016, while average traffic will increase nearly 4 fold. Busy hour Internet traffic will reach 720 Tbps in 2016, the equivalent of 600 million people streaming Internet high definition video simultaneously. Video Highlights It would take over 6 million years to watch the amount of video that will cross global IP networks each month in 2016. Every second, 1.2 million minutes of video content will cross the network. Globally, in 2016 Internet video traffic will be 55% of all consumer Internet traffic, up from 51% in 2011 excluding video exchanged through peer to peer (P2P) file sharing. Video exceeded half of global consumer Internet traffic by year end 2011. The sum of all forms of video (TV, video on demand [VoD], Internet, and P2P) will be approximately 86% of global consumer traffic by 2016. Internet video to TV will increase 6 fold by 2016 accounting for 12% of consumer Internet video traffic, up from 8% in 2011. Video on demand traffic will triple by 2016 to an amount equivalent to 4 billion DVDs per month. High definition VoD surpassed standard definition by the end of 2011. By 2016, high definition Internet video will comprise 79% of VoD. Mobile Highlights Globally, mobile data traffic will increase 18 fold between 2011 and 2016 (a CAGR of 78%), reaching 10.8 EB/month by 2016. Global mobile data traffic will grow three times faster than fixed IP traffic from 2011 to 2016 from 2% to 10% of total IP traffic in 2016. Remark: Past forecasts have been accurate to within about 5%. http://www.cisco.com/en/us/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11 481360_ns827_Networking_Solutions_White_Paper.html 26 13

Creating a network app write programs that: run on (different) end systems communicate over network e.g., web server software communicates with browser software application transport network data link physical no need to write software for network core devices network core devices do not run user applications applications on end systems allows for rapid app development, propagation application transport network data link physical application transport network data link physical 27 Application architectures possible structure of applications: client server peer to peer (P2P) 28 14

Client server architecture server: always on host permanent IP address data centers for scaling client/server clients: communicate with server may be intermittently connected may have dynamic IP addresses do not communicate directly with each other 29 no always on server arbitrary end systems directly communicate peers request service from other peers, provide service in return to other peers self scalability new peers bring new service capacity, as well as new service demands peers are intermittently connected and change IP addresses complex management P2P architecture peer-peer 30 15

A P2P Application example: Bit Torrent BitTorrent is a peer to peer file sharing protocol in which files being distributed are divided into pieces. As each peer receives a new piece it becomes a source (of that piece) for other peers, relieving the original seed from having to send that piece to every computer or user wishing a copy. The task of distributing the file is shared by those who want it; it is entirely possible for the seed to send only a single copy of the file itself and eventually distribute to an unlimited number of peers. Peer to peer networks collectively are estimated to account for 43% to 70% of all Internet traffic (depending on geographical location) as of February 2009. As of January 2012, BitTorrent has 150 million active users according to BitTorrent, Inc with an estimated more than a quarter billion monthly users. At any given instant BitTorrent has, on average, more active users than YouTube and Facebook combined. (This refers to the number of active users at any instant and not to the total number of unique users.) In 2008, the CBC became the first public broadcaster in North America to make a full show available for download using BitTorrent. The Amazon S3 "Simple Storage Service" is a scalable Internet based storage service with a simple web service interface, equipped with built in BitTorrent support. http://en.wikipedia.org/wiki/bittorrent_(protocol) 31 Processes communicating process: program running within a host within same host, two processes communicate using inter process communication (defined by OS) processes in different hosts communicate by exchanging messages clients, servers client process: process that initiates communication server process: process that waits to be contacted aside: applications with P2P architectures have client processes & server processes 32 16

Sockets process sends/receives messages to/from its socket socket analogous to door sending process shoves message out door sending process relies on transport infrastructure on other side of door to deliver message to socket at receiving process application process socket application process controlled by app developer transport network link physical Internet transport network link physical controlled by OS 33 Addressing processes to receive messages, process must have identifier host device has unique 32 bit IP address Q: does IP address of host on which process runs suffice for identifying the process? A: no, many processes can be running on same host identifier includes both IP address and port numbers associated with process on host. example port numbers: HTTP server: 80 mail server: 25 to send HTTP message to gaia.cs.umass.edu web server: IP address: 128.119.245.12 port number: 80 more shortly 34 17

App layer protocol defines types of messages exchanged, e.g., request, response message syntax: what fields in messages & how fields are delineated message semantics meaning of information in fields rules for when and how processes send & respond to messages open protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP proprietary protocols: e.g., Skype 35 What transport service does an app need? data integrity some apps (e.g., file transfer, web transactions) require 100% reliable data transfer other apps (e.g., audio) can tolerate some loss timing some apps (e.g., Internet telephony, interactive games) require low delay to be effective throughput some apps (e.g., multimedia) require minimum amount of throughput to be effective other apps ( elastic apps ) make use of whatever throughput they get security encryption, data integrity, 36 18

Transport service requirements: common apps application data loss throughput time sensitive file transfer e-mail Web documents real-time audio/video stored audio/video interactive games text messaging no loss no loss no loss loss-tolerant loss-tolerant loss-tolerant no loss elastic elastic elastic audio: 5kbps-1Mbps video:10kbps-5mbps same as above few kbps up elastic no no no yes, 100 s msec yes, few secs yes, 100 s msec yes and no 37 Internet transport protocols services TCP service: reliable transport between sending and receiving process flow control: sender won t overwhelm receiver congestion control: throttle sender when network overloaded does not provide: timing, minimum throughput guarantee, security connection oriented: setup required between client and server processes TCP = Transmission Control Protocol UDP service: unreliable data transfer between sending and receiving process does not provide: reliability, flow control, congestion control, timing, throughput guarantee, security, orconnection setup, Q: why bother? Why is there a UDP? UDP = User Datagram Protocol 38 19

Internet apps: application, transport protocols application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony application layer protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] HTTP (e.g., YouTube), RTP [RFC 1889] SIP, RTP, proprietary (e.g., Skype) underlying transport protocol TCP TCP TCP TCP TCP or UDP TCP or UDP RTP = Real time Transport Control Protocol SIP = Session Initiation Protocol 39 Securing TCP TCP & UDP no encryption cleartext passwds sent into socket traverse Internet in cleartext SSL provides encrypted TCP connection data integrity end point authentication SSL is at app layer Apps use SSL libraries, which talk to TCP SSL socket API cleartext passwds sent into socket traverse Internet encrypted See Chapter 7 40 20