Networks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles

Similar documents
Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Slides for Chapter 3: Networking and Internetworking

cs144 Midterm Review Fall 2010

Chapter 5 OSI Network Layer

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Lecture 11: Networks & Networking

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Chapter 16 Networking

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 7: Internetworking See Chapter 3 of Colouris

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Chapter 7. Local Area Network Communications Protocols

Network Layer PREPARED BY AHMED ABDEL-RAOUF

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

1: Review Of Semester Provide an overview of encapsulation.

Networking interview questions

Chapter 6: Network Communications and Protocols

Data & Computer Communication

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

Video Streaming with the Stream Control Transmission Protocol (SCTP)

IP Address Assignment

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

ECE4110 Internetwork Programming. Introduction and Overview

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Data and Computer Communications

Scribe Notes -- October 31st, 2017

Lecture 8. Network Layer (cont d) Network Layer 1-1

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

Chapter 4: network layer

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Computer Networks (Introduction to TCP/IP Protocols)

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

TCP/IP and the OSI Model

Position of IP and other network-layer protocols in TCP/IP protocol suite

SUBJECT: DATA COMMUNICATION AND NETWORK SEMESTER: V SEMESTER COURSE: BCA SUBJECT TEACHER: Dr.K.Chitra Assistant Professor, Department of Computer

PLEASE READ CAREFULLY BEFORE YOU START

ETSF10 Internet Protocols Network Layer Protocols

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

EEC-484/584 Computer Networks

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

Computer Networks Security: intro. CS Computer Systems Security

1. IPv6 is the latest version of the TCP/IP protocol. What are some of the important IPv6 requirements?

University of Southern California EE450: Introduction to Computer Networks

EEC-484/584 Computer Networks

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Introduction to Internetworking

4. The transport layer

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Operating Systems CS 571

Chapter 2 Network Models 2.1

Copyleft 2005, Binnur Kurt. Objectives

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

ICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

CS3600 SYSTEMS AND NETWORKS

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Hands-On Network Security: Practical Tools & Methods

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CHAPTER-2 IP CONCEPTS

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

The Technologies Behind the Internet

Cisco CCNA (ICND1, ICND2) Bootcamp

CMSC 332 Computer Networks Network Layer

Router Architecture Overview

Introduction to Open System Interconnection Reference Model

The Network Layer and Routers

Data Communication & Networks G Session 7 - Main Theme Networks: Part I Circuit Switching, Packet Switching, The Network Layer

SEMESTER 1 Chapter 5 OSI Network Layer V What services does the network layer provide?

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Lecture 4 - Network Layer. Transport Layer. Outline. Introduction. Notes. Notes. Notes. Notes. Networks and Security. Jacob Aae Mikkelsen

ECE 650 Systems Programming & Engineering. Spring 2018

Chapter 4 Network Layer: The Data Plane

Department of Computer and IT Engineering University of Kurdistan. Network Layer. By: Dr. Alireza Abdollahpouri

Chapter 4: Network Layer

Network Layer: Control/data plane, addressing, routers

Computer Networks. Lecture 9 Network and transport layers, IP, TCP, UDP protocols

Need For Protocol Architecture

Introduction to TCP/IP networking

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Need For Protocol Architecture

TSIN02 - Internetworking

Chapter 4 Network Layer

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

CS1302 / Computer Networks

20-CS Cyber Defense Overview Fall, Network Basics

TSIN02 - Internetworking

Computer Networks with Internet Technology William Stallings. Chapter 2 Protocols and the TCP/IP Protocol Suite

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

Special expressions, phrases, abbreviations and terms of Computer Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

CS 421: COMPUTER NETWORKS FALL FINAL January 10, minutes

Transcription:

Networks Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles OSI protocol; routing TCP/IP layers and packet organization IP addresses and NAT firewalls IEEE 802 network standards example: Ethernet virtualization: overlay networks (diagrams from Coulouris et all Distributed Systems) COMP2310 Lecture 23: Networks 2014 1

Network Performance ([Coulouris&al Fig 3.1]) also at chip & board level! latency: time for 1st byte of message to arrive determined primarily through software overheads and routing delays data transfer rate: rate at which subsequent bytes arrive determined primarily by network s physical characteristic time to transmit message = latency + length data transfer rate COMP2310 Lecture 23: Networks 2014 2

Network Principles messages transmitted in packets of restricted length (MTU: max. transfer unit) switching schemes broadcast circuit switching: series connection for whole message (c.f. old telephony) packet switching: packets individually routed to destination internetworks: communication in which several networks are linked together protocols: typically layered, to simplify software interfaces, hide heterogeneity N layers requires N transfers of control and N copies (2!) [Coulouris&al Fig 3.3] encapsulation [Coulouris&al Fig 3.4]: layers in OSI model COMP2310 Lecture 23: Networks 2014 3

[Coulouris&al Fig 3.5] Open Systems Interconnection Model Layers OSI loses out to TCP/IP (90 s) COMP2310 Lecture 23: Networks 2014 4

Internetwork Layers and Transmission Issues transport addressing via an IP address and a port number port numbers 0..1023 reserved for services (server daemons with root permissions) packet delivery: (UDP) datagram: one-shot delivery; networks retains [Coulouris&al Fig 3.6] Internetwork layer a virtual layer sub-layers are not clearly distinguished from each other Transmission Issues: network layer packets have a header and data field no info virtual circuit: a route involving all intervening nodes is set up any number of packets can be (re-) transmitted; routed via virtual circuit number COMP2310 Lecture 23: Networks 2014 5

Routing routers are node s in the network (connected to several network links) routing is process of choosing links at each stage achieved by looking up a routing table on the destination s IP address ([Coulouris&al Fig 3.7]): routing in a wide area network ([Coulouris&al Fig 3.8]): routing tables for nodes A and B COMP2310 Lecture 23: Networks 2014 6

Example: Simplified View of a University Campus Network ([Coulouris&al Fig 3.10]) COMP2310 Lecture 23: Networks 2014 7

Pseudo-code for RIP Routing Algorithm Routers exchange information using the router information protocol send: each t seconds or when ÌÐ changes, send ÌÐ on each non-faulty outgoing link receive: whenever a routing table ÌÖ is received on link Ò: ÓÖ ÐÐ ÖÓÛ ÊÖ Ò ÌÖ { ÊÖ º ÐÒ Òµ { º Ó Ø ÊÖ º Ó Ø ½ ÊÖ º ÐÒ Ò ÊÖ ÊÖ º ØÒØÓÒ ÒÓØ Ò ÌÐ µ ÊÖ ØÓ ÌÐ ÒÛ ØÒØÓÒ ØÓ Ìл» ÓÖ ÐÐ ÖÓÛ ÊÐ Ò ÌÐ { Ð ÊÖ º ØÒØÓÒ ÊÐ º ØÒØÓÒ ²² ÊÖ º Ó Ø < ÊÐ º Ó Ø ÊÐ º ÐÒ Ò µµ ÊÐ ÊÖ ÊÖ º Ó Ø < ÊÐ º Ó Ø ÖÑÓØ ÒÓ ØØÖ ÖÓÙØ»» } }»» ÊÐ º ÐÒ Ò ÖÑÓØ ÒÓ ÑÓÖ ÙØÓÖØØÚ enables network to be adaptive to arrival of new nodes, changing traffic conditions etc COMP2310 Lecture 23: Networks 2014 8

Routing and Congestion Control once a node reaches its capacity, its packet queues grow to its maximum length has no option but to drop further traffic this can cause re-transmission of dropped packets: can result in devastating loss of network performance! rule of thumb: all nodes must keep within 80% of their capacity node only knows address of previous node in the route it can request previous node to slow down rate of sending when near capacity this can propagate back to original sender note: vulnerability of nodes to denial of service attacks! COMP2310 Lecture 23: Networks 2014 9

The Internet Protocol ([Coulouris&al Fig 3.12]) TCP/IP layers IP protocol two main higher-level protocols: transport control protocol (TCP): reliable, connection-oriented user datagram protocol (UDP): unreliable, datagram-based ([Coulouris&al Fig 3.12]) encapsulation in a TCP message ([Coulouris&al Fig 3.17]) IP packet layout COMP2310 Lecture 23: Networks 2014 10

Internet IP Addressing and Protocols ([Coulouris&al Fig 3.15]) internet address structure, showing field sizes in bits ([Coulouris&al Fig 3.16]) decimal representation of Internet addresses reliability: IP header has a checksum IP layer must also insert the physical address of message destination source address is also included but can be forged ( spoofing ) note: packets can be received in any order; requires message to be assembled (at TCP level) why we need cognitive protocols COMP2310 Lecture 23: Networks 2014 11

IP Addressing Issues and Solutions: NAT networks addressing scheme must be universal and efficient in its use of the space the latter is not well achieved with IPv4! solutions include IPv6 (128 bit addresses), address re-mapping schemes (e.g. CIDR) and NAT Network Address Translation Protocol ([Coulouris&al Fig 3.18]) nodes inside NAT-enabled router use a private IP addresses (e.g. 192.168.y.x) when send a packet, router records source IP address & port number in its address translation table router replaces this with its own IP address and a virtual port number when router receives external packet with this virtual port number, it replaces this with the internal node s IP address and port number COMP2310 Lecture 23: Networks 2014 12

Firewall Configurations ([Coulouris&al Fig 3.21]) provide control on services, behaviors and users controlling behaviors (e.g. spam) may require examining message contents also deep packet analysis is used COMP2310 Lecture 23: Networks 2014 13

IEEE 802 Network Standards and the Ethernet IEEE No. Name Title ([Coulouris&al Fig 3.22]) Reference 802.3 Ethernet CSMA/CD Networks (Ethernet) [IEEE 1985a] 802.4 Token Bus Networks [IEEE 1985b] 802.5 Token Ring Networks [IEEE 1985c] 802.6 Metropolitan Area Networks [IEEE 1994] 802.11 WiFi Wireless Local Area Networks [IEEE 1999] 802.15.1 Bluetooth Wireless Personal Area Networks [IEEE 2002] 802.15.4 ZigBee Wireless Sensor Networks [IEEE 2003] 802.16 WiMAX Wireless Metropolitan Area Networks [IEEE 2004a] Ethernets: widely used for local area networks based on contention bus: single connection medium to all nodes nodes ignore messages which do not have their destination address requires collision detection: when 2 nodes try to use bus at same time protocol is called medium access control (MAC) packet ( frame ) layout: bytes: 7 1 6 6 2 46..1500 4 preamble S dest n. source length data checksum COMP2310 Lecture 23: Networks 2014 14

Virtual Networks - Overlay Architecture ([Coulouris&al Fig 4.16]) Skype overlay architecture Overlay networks are virtual network sitting on top of an existing network offering new/enhanced services e.g. multicasts, secure communication enables existing network layers to be extensible e.g. Skype: peer-to-peer internet telephony super nodes (SN): hosts meeting criteria, i.e. high bandwidth and reachability other users selects an SN; 8 SNs might get contacted for user searches TCP used for call requests; TCP or UDP use for voice streaming COMP2310 Lecture 23: Networks 2014 15

Summary network architecture is layered in a stack headers for each level are appended as message moves down addressing is via IP number (to route message to destination machine) and a port (direct message to destination application) TCP is connection-based (broken into packets), reliable; UDP is datagram-based (one shot); unreliable TCP/IP-v4 addresses structured into various type running out of space NAT (virtual port numbers), IPv6 schemes security is an increasing concern! networks are a whole subject of study on their own! COMP2310 Lecture 23: Networks 2014 16