CMSC 322 Computer Networks Applications and End-To- End

Similar documents
CSC 4900 Computer Networks: End-to-End Design

Goal and A sample Network App

Introduction to the Application Layer. Computer Networks Term B14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 4

CS 3516: Advanced Computer Networks

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Lecture 11. Transport Layer (cont d) Transport Layer 1

Review of Previous Lecture

EECS 3214: Computer Network Protocols and Applications

Chapter 2 Application Layer

CS 3516: Advanced Computer Networks

Client/Server Computing

Client/Server Computing & Socket Programming

Chapter II: Application Layer

Lecture 04: Application Layer (Part 01) Principles and the World Wide Web (HTTP) Dr. Anis Koubaa

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Chapter 2: Application layer

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 1 Introduction

CSC358 Week 2. Adapted from slides by J.F. Kurose and K. W. Ross. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

Foundations of Telematics

Chapter 2 Application Layer

Application Layer: HTTP

Chapter 2 Application Layer

Hybrid of client-server and P2P. Pure P2P Architecture. App-layer Protocols. Communicating Processes. Transport Service Requirements

DATA COMMUNICATOIN NETWORKING

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Chapter 2 Application Layer

Computer Networks and Applications

Different Layers Lecture 21

CS 640: Introduction to Computer Networks. Today s Lecture. Page 1

Client/Server Computing & Socket Programming

CS 332: Computer Networks Introduction

ECE 4450:427/527 - Computer Networks Spring 2017

Transport layer Internet layer

Chapter 1 Introduction

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Last Time. Internet in a Day Day 2 of 1. Today: TCP and Apps

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Layered Model. DoD Model. ISO/OSI Model

Internet Architecture & Performance. What s the Internet: nuts and bolts view

SCS3004 Networking Technologies Application Layer Protocols

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Web Protocols and Practice

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Transport Layer (TCP/UDP)

Distributed Systems /640

NWEN 243. Networked Applications. Transport layer and application layer

The Transmission Control Protocol (TCP)

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 2 Application Layer

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

Deliver packets from srce to all other nodes Source duplication is inefficient: creation/transmission. in-network duplication

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

PLEASE READ CAREFULLY BEFORE YOU START

CMSC 332 Computer Networks P2P and Sockets

CMPE 80N: Introduction to Networking and the Internet

Chapter 7 Multimedia Networking

Data Communication & Computer Networks MCQ S

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F.

Chapter 2 Application Layer

Chapter 1: Introduction

CS 457 Multimedia Applications. Fall 2014

Page # Last Time. Lecture 2 Protocol Stacks and Layering. Today s Lecture. Why protocols and layering? What is a Protocol.

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Announcements. CS 5565 Network Architecture and Protocols. Queuing. Demultiplexing. Demultiplexing Issues (1) Demultiplexing Issues (2)

PLEASE READ CAREFULLY BEFORE YOU START

Defining the Internet

Multimedia Networking

Chapter 2: Application layer

CSE3213 Computer Network I

Chapter 2: Application Layer. Chapter 2: application layer. outline. Some network apps. Client-server architecture. Application architectures

Application Layer Protocols

Data Communications and Networks Spring Syllabus and Reading Assignments

Network Communication

Part 1: Introduction. Goal: Review of how the Internet works Overview

CSC 4900 Computer Networks: Introduction

Chapter 1: Conceptual Basis Section 1

TSIN02 - Internetworking

Chapter 1. Computer Networks and the Internet

Chapter 2: outline. 2.1 principles of network applications. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

CSCD 330 Network Programming

Lecture 2 Protocol Stacks. Last Tuesday

Data Networks. Lecture 1: Introduction. September 4, 2008

Network Applications Principles of Network Applications

Internet and Intranet Protocols and Applications

CMSC 332 Computer Networks Network Layer

Review for Internet Introduction

A Whirlwind Introduction to the Internet. A Whirlwind Introduction to the Internet Overview

Page 1. Goals for Today" What Is A Protocol?" CS162 Operating Systems and Systems Programming Lecture 10. Protocols, Layering and e2e Argument"

Data and Computer Communications

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Introduction to computer networking

Transcription:

CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks

Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework 1 to be assigned shortly Start it when I post it! It will take time! CMSC 332: Computer Networks 2

Review In the previous two slide sets, we discussed the fundamentals of networking at a high level hosts communicate over networks using protocols layered designs use encapsulation to provide an abstraction to network devices, e.g., routers, which relay packets to across the physical media that makes up the Internet Network delay is broken down into nodal processing, queueing, transmission delay, and propagation delay. Security is difficult - we need to think about it at every layer. CMSC 332: Computer Networks 3

Nice to Meet You Darwin s work significantly influenced science. Students in these fields would be hard-pressed to set up a meeting with him today. Computer Science is a very young discipline. Became an academic discipline in the 1960s. Many of the founders of our field are still alive! CMSC 332: Computer Networks 4

System Design End-To-End Arguments in System Design Saltzer, Reed, Clark Asks the question: Where should we place functionality? What do we mean by functionality? e.g.: reliable data transmission What do we mean by where? Recall the concept of network layers and the devices that interact with the layers CMSC 332: Computer Networks 5

Design Principle The Principle: The function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the endpoints of the communication system. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the communication system may be useful as a performance enhancement.) -- Saltzer et al. What does this mean in layman s terms? CMSC 332: Computer Networks 6

An Example Reliable data transmission Consider a file transferred across a network It is all a matter of context What happens to performance if we strictly adhere to the principle? Other examples: guaranteed delivery, secure transmission, duplicate message suppression, in-order delivery We will discuss these concepts in more depth in the coming weeks CMSC 332: Computer Networks 7

Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P file sharing application transport network link physical CMSC 332: Computer Networks 8

Chapter 2: Application Layer Our goals: conceptual, implementation aspects of network application protocols transport-layer service models client-server paradigm peer-to-peer paradigm learn about protocols by examining popular application-level protocols HTTP FTP SMTP / POP3 / IMAP DNS programming network applications socket API CMSC 332: Computer Networks 9

Some network apps E-mail Web Instant messaging Remote login P2P file sharing (e.g., KaZaa) Internet telephone Real-time video conference Massive parallel computing Multi-user network games Streaming stored video clips CMSC 332: Computer Networks 10

Creating a network app Write programs that run on different end systems and communicate over a network. application transport network data link physical e.g., Web: Web server software communicates with browser software little software written for devices in network core network core devices do not run user application code application on end systems allows for rapid app development, propagation application transport network data link physical application transport network data link physical CMSC 332: Computer Networks 11

Chapter 2: Application layer 2.1 Principles of Network Applications 2.2 Web and HTTP 2.3 File Transfer: FTP 2.4 Electronic Mail in the Internet 2.5 DNS - Internet Directory Service 2.6 P2P Applications 2.7-2.8 Socket Programming CMSC 332: Computer Networks 12

Application architectures Client-server Peer-to-peer (P2P) Hybrid of client-server and P2P CMSC 332: Computer Networks 13

Client-server architecture server: always-on host permanent IP address server farms for scaling clients: client/server communicate with server may be intermittently connected may have dynamic IP addresses do not communicate directly with each other CMSC 332: Computer Networks 14

Pure P2P architecture no always-on server arbitrary end systems directly communicate peers are intermittently connected and change IP addresses peer-peer example: Gnutella, KaZaa Highly scalable but difficult to manage CMSC 332: Computer Networks 15

Hybrid of client-server and P2P Skype Internet telephony app Finding address of remote party: centralized server(s) Client-client connection is direct (not through server) Instant messaging Chatting between two users is P2P Presence detection/location centralized: User registers its IP address with central server when it comes online User contacts central server to find IP addresses of buddies CMSC 332: Computer Networks 16

Processes communicating Process: program running within a host. within same host, two processes communicate using inter-process communication (defined by OS). processes in different hosts communicate by exchanging messages Client process: process that initiates communication Server process: process that waits to be contacted Note: applications with P2P architectures have client processes & server processes CMSC 332: Computer Networks 17

Sockets process sends/receives messages to/from its socket socket analogous to door sending process shoves message out door sending process relies on transport infrastructure on other side of door which brings message to socket at receiving process host or server process socket TCP with buffers, variables controlled by app developer controlled by OS Internet host or server process socket TCP with buffers, variables API: (1) choice of transport protocol; (2) ability to fix a few parameters (lots more on this later) CMSC 332: Computer Networks 18

Addressing processes to receive messages, process must have identifier host device has unique 32-bit IP address Q: does IP address of host on which process runs suffice for identifying the process? CMSC 332: Computer Networks 19

Addressing processes to receive messages, process must have identifier host device has unique 32-bit IP address Q: does IP address of host on which process runs suffice for identifying the process? Answer: NO, many processes can be running on same host identifier includes both IP address and port numbers associated with process on host. Example port numbers: HTTP server: 80 Mail server: 25 to send HTTP message to www.cse.psu.edu web server: IP address: 130.203.4.2 Port number: 80 more shortly CMSC 332: Computer Networks 20

App-layer protocol defines Types of messages exchanged, e.g., request, response Message syntax: what fields in messages & how fields are delineated Public-domain protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP Proprietary protocols: e.g., Skype Message semantics meaning of information in fields Rules for when and how processes send & respond to messages CMSC 332: Computer Networks 21

What transport service does an app need? Data loss some apps (e.g., audio) can tolerate some loss other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing some apps (e.g., Internet telephony, interactive games) require low delay to be effective Bandwidth some apps (e.g., multimedia) require minimum amount of bandwidth to be effective other apps ( elastic apps ) make use of whatever bandwidth they get Security Encryption, integrity? CMSC 332: Computer Networks 22

Transport service requirements of common apps Application Data loss Bandwidth Time Sensitive file transfer e-mail Web documents real-time audio/video stored audio/video interactive games instant messaging no loss no loss no loss loss-tolerant loss-tolerant loss-tolerant no loss elastic elastic elastic audio: 5kbps-1Mbps video:10kbps-5mbps same as above few kbps up elastic no no no yes, 100 s msec yes, few secs yes, 100 s msec yes and no CMSC 332: Computer Networks 23

Internet transport protocols services TCP service: connection-oriented: setup required between client and server processes reliable transport: between sending and receiving process flow control: sender won t overwhelm receiver congestion control: throttle sender when network overloaded UDP service: unreliable data transfer between sending and receiving process does not provide: connection setup, reliability, flow control, congestion control, timing, or bandwidth guarantee Q: Why bother? Why is there a UDP? does not provide: timing, minimum bandwidth guarantees CMSC 332: Computer Networks 24

Internet apps: application, transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony Application layer protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] proprietary (e.g. RealNetworks) proprietary (e.g., Vonage,Dialpad) Underlying transport protocol TCP TCP TCP TCP TCP or UDP typically UDP CMSC 332: Computer Networks 25

Next Time Discuss Web and FTP Read Sections 2.2 and 2.3 Project 2 will be posted - keep an eye out! CMSC 332: Computer Networks 26