CSC 4900 Computer Networks: End-to-End Design

Similar documents
CMSC 322 Computer Networks Applications and End-To- End

Goal and A sample Network App

Introduction to the Application Layer. Computer Networks Term B14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

CS 3516: Advanced Computer Networks

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Lecture 11. Transport Layer (cont d) Transport Layer 1

CS 3516: Advanced Computer Networks

EECS 3214: Computer Network Protocols and Applications

Review of Previous Lecture

Chapter 2 Application Layer

Client/Server Computing

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

Chapter II: Application Layer

Client/Server Computing & Socket Programming

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Chapter 2: Application layer

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Chapter 1 Introduction

Chapter 2 Application Layer

Application Layer: HTTP

Foundations of Telematics

Chapter 2 Application Layer

DATA COMMUNICATOIN NETWORKING

Hybrid of client-server and P2P. Pure P2P Architecture. App-layer Protocols. Communicating Processes. Transport Service Requirements

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Chapter 2 Application Layer

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

Computer Networks and Applications

Different Layers Lecture 21

Client/Server Computing & Socket Programming

ECE 4450:427/527 - Computer Networks Spring 2017

Transport layer Internet layer

Chapter 1 Introduction

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Last Time. Internet in a Day Day 2 of 1. Today: TCP and Apps

CSC 4900 Computer Networks:

PLEASE READ CAREFULLY BEFORE YOU START

CSC 4900 Computer Networks: Transport Layer

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Distributed Systems /640

NWEN 243. Networked Applications. Transport layer and application layer

SCS3004 Networking Technologies Application Layer Protocols

The Transmission Control Protocol (TCP)

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

CSC 4900 Computer Networks: Introduction

Chapter 2 Application Layer

Page # Last Time. Lecture 2 Protocol Stacks and Layering. Today s Lecture. Why protocols and layering? What is a Protocol.

PLEASE READ CAREFULLY BEFORE YOU START

Layered Model. DoD Model. ISO/OSI Model

CSC 4900 Computer Networks: P2P and Sockets

CMPE 80N: Introduction to Networking and the Internet

Web Protocols and Practice

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Chapter 2 Application Layer

Data Communication & Computer Networks MCQ S

CS 332: Computer Networks Introduction

CSC 4900 Computer Networks: Network Layer

Chapter 2: Application Layer. Chapter 2: application layer. outline. Some network apps. Client-server architecture. Application architectures

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F.

CS 457 Multimedia Applications. Fall 2014

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Chapter 7 Multimedia Networking

Transport Layer (TCP/UDP)

Deliver packets from srce to all other nodes Source duplication is inefficient: creation/transmission. in-network duplication

Data Communications and Networks Spring Syllabus and Reading Assignments

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CS 268: Internet Architecture & E2E Arguments. Today s Agenda. Scott Shenker and Ion Stoica (Fall, 2010) Design goals.

Data and Computer Communications

CSE3213 Computer Network I

Defining the Internet

Lecture 2 Protocol Stacks. Last Tuesday

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

Multimedia Networking

Network Communication

Need For Protocol Architecture

PLEASE READ CAREFULLY BEFORE YOU START

CSCD 330 Network Programming

Chapter 1: Introduction

Part 1: Introduction. Goal: Review of how the Internet works Overview

Internet and Intranet Protocols and Applications

Chapter 1: Conceptual Basis Section 1

Announcements. CS 5565 Network Architecture and Protocols. Queuing. Demultiplexing. Demultiplexing Issues (1) Demultiplexing Issues (2)

Review for Internet Introduction

CS 4390 Computer Networks. Transport Services and Protocols

Need For Protocol Architecture

Application Layer Protocols

Network Applications Principles of Network Applications

Page 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"

Lecture 05 Application Layer - I

Network Architecture

Transcription:

CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences

Review In the last two lectures, we discussed the fundamentals of networking at a high level hosts communicate over networks using protocols layered designs use encapsulation to provide an abstraction to network devices, e.g., routers, which relay packets to across the physical media that makes up the Internet Network delay is broken down into nodal processing, queueing, transmission delay, and propagation delay. Security is difficult - we need to think about it at every layer. Villanova University Department of Computing Sciences 2

Nice to Meet You Darwin s work significantly influenced science. Students in these fields would be hard-pressed to set up a meeting with him today. Computer Science is a very young discipline. Became an academic discipline in the 1960s. Many of the founders of our field are still alive! Villanova University Department of Computing Sciences 3

System Design End-To-End Arguments in System Design Saltzer, Reed, Clark Asks the question: Where should we place functionality? What do we mean by functionality? e.g.: reliable data transmission What do we mean by where? Recall the concept of network layers and the devices that interact with the layers Villanova University Department of Computing Sciences 4

Design Principle The Principle: The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the endpoints of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement. -- Saltzer et al. What does this mean in layman s terms? Villanova University Department of Computing Sciences 5

An Example Reliable data transmission Consider a file transferred across a network It is all a matter of context What happens to performance if we strictly adhere to the principle? Other examples: guaranteed delivery, secure transmission, duplicate message suppression, in-order delivery We will discuss these concepts in more depth in the coming weeks Villanova University Department of Computing Sciences 6

Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 Electronic Mail SMTP, POP3, IMAP 2.4 DNS 2.5 P2P file sharing application transport network link physical Villanova University Department of Computing Sciences 7

Chapter 2: Application Layer Our goals: conceptual, implementation aspects of network application protocols transport-layer service models client-server paradigm peer-to-peer paradigm learn about protocols by examining popular application-level protocols HTTP SMTP / POP3 / IMAP DNS programming network applications socket API Villanova University Department of Computing Sciences 8

Some network apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Internet telephone Real-time video conference Massive parallel computing Streaming stored video clips Villanova University Department of Computing Sciences 9

Creating a network app Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software little software written for devices in network core network core devices do not run user application code application on end systems allows for rapid app development, propagation Villanova University Department of Computing Sciences 10

Application architectures Client-server Peer-to-peer (P2P) Hybrid of client-server and P2P Villanova University Department of Computing Sciences 11

Client-server architecture server: always-on host permanent IP address server farms for scaling clients: communicate with server may be intermittently connected may have dynamic IP addresses Client-Server do not communicate directly with each other Villanova University Department of Computing Sciences 12

Pure P2P architecture No always-on server Arbitrary end systems directly communicate Peers are intermittently connected and change IP addresses Peer to Peer self scalability new peers bring new service capacity, as well as new service demands Peers are intermittently connected and change IP addresses Complex management Villanova University Department of Computing Sciences 13

Hybrid of client-server and P2P Skype Internet telephony app Finding address of remote party: centralized server(s) Client-client connection is direct (not through server) Instant messaging Chatting between two users is P2P Presence detection/location centralized: User registers its IP address with central server when it comes online User contacts central server to find IP addresses of buddies Villanova University Department of Computing Sciences 14

Processes communicating Process: program running within a host. within same host, two processes communicate using inter-process communication (defined by OS). processes in different hosts communicate by exchanging messages Client process: process that initiates communication Server process: process that waits to be contacted Note: applications with P2P architectures have client processes & server processes Villanova University Department of Computing Sciences 15

Sockets process sends/receives messages to/from its socket socket analogous to door sending process shoves message out door sending process relies on transport infrastructure on other side of door which brings message to socket at receiving process API: (1) choice of transport protocol; (2) ability to fix a few parameters (lots more on this later) Villanova University Department of Computing Sciences 16

Addressing processes to receive messages, process must have identifier host device has unique 32-bit IP address Q: does IP address of host on which process runs suffice for identifying the process? Villanova University Department of Computing Sciences 17

Addressing processes to receive messages, process must have identifier host device has unique 32-bit IP address Q: does IP address of host on which process runs suffice for identifying the process? Answer: NO, many processes can be running on same host identifier includes both IP address and port numbers associated with process on host. Example port numbers: HTTP server: 80 Mail server: 25 to send HTTP message to www.csc.villanova.edu web server: IP address: 153.104.202.74 Port number: 80 Villanova University Department of Computing Sciences 18

App-layer protocol defines Types of messages exchanged, e.g., request, response Message syntax: what fields in messages & how fields are delineated Message semantics meaning of information in fields Public-domain protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP Proprietary protocols: e.g., Skype Rules for when and how processes send & respond to messages Villanova University Department of Computing Sciences 19

What transport service does an app need? Data Loss Prevention some apps (e.g., audio) can tolerate some loss other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing some apps (e.g., Internet telephony, interactive games) require low delay to be effective Throughput some apps (e.g., multimedia) require minimum amount of bandwidth to be effective other apps ( elastic apps ) make use of whatever bandwidth they get Security Encryption, integrity? Villanova University Department of Computing Sciences 20

Transport service requirements of common apps Application Data loss Bandwidth Time Sensitive file transfer no loss elastic no e-mail no loss elastic no Web documents no loss elastic no real-time audio/video loss-tolerant audio: 5kbps- 1Mbps video:10kbps- 5Mbps yes, 100 s msec stored audio/video loss-tolerant same as above yes, few secs interactive games loss-tolerant few kbps up yes, 100 s msec instant messaging no loss elastic yes and no Villanova University Department of Computing Sciences 21

Internet transport protocols services TCP service: connection-oriented: setup required between client and server processes reliable transport: between sending and receiving process flow control: sender won t overwhelm receiver congestion control: throttle sender when network overloaded UDP service: unreliable data transfer: between sending and receiving process does not provide: connection setup, reliability, flow control, congestion control, timing, or bandwidth guarantee Q: Why bother? Why is there a UDP? does not provide: timing, minimum bandwidth guarantees Villanova University Department of Computing Sciences 22

Internet apps: application, transport protocols Application Application layer protocol Underlying transport protocol e-mail SMTP [RFC 2821] TCP remote terminal access Telnet [RFC 854] TCP Web HTTP [RFC 2616] TCP file transfer FTP [RFC 959] TCP streaming multimedia Internet telephony proprietary (e.g. RealNetworks) proprietary (e.g., Vonage,Dialpad) TCP or UDP typically UDP Villanova University Department of Computing Sciences 23

Next Time... Textbook Chapter 2.2, 2.4 Remember, you need to read it BEFORE you come to class! Homework Stay on top of homework #1! Villanova University Department of Computing Sciences 24