Title | Introduction lecture |
---|---|
Course | Computer Networks and Applications |
Institution | University of New South Wales |
Pages | 86 |
File Size | 3.5 MB |
File Type | |
Total Downloads | 82 |
Total Views | 137 |
introduction lecture...
Computer Networks and Applications COMP 3331/COMP 9331 Week 2
Introduction(Protocol Layering, Security) & Application Layer (Principles, Web) Reading Guide: Chapter 1, Sections 1.5 - 1.7 Chapter 2, Sections 2.1 – 2.2 1
1. Introduction: roadmap 1.1 what is the Internet? 1.2 network edge § end systems, access networks, links 1.3 network core § packet switching, circuit switching, network structure 1.4 delay, loss, throughput in networks 1.5 protocol layers, service models 1.6 networks under attack: security 1.7 history
2
Three (networking) design steps v
Break down the problem into tasks
v
Organize these tasks
v
Decide who does what
3
Tasks in Networking v
What does it take to send packets across country?
v
Simplistic decomposition: § Task 1: send along a single wire
§ Task 2: stitch these together to go across country v
This gives idea of what I mean by decomposition 4
Tasks in Networking (bottom up) Bits on wire v Packets on wire v Deliver packets within local network v Deliver packets across global network v Ensure that packets get to the destination v Do something with the data v
5
Resulting Modules Bits on wire (Physical) v Packets on wire (Physical) v Delivery packets within local network (Datalink) v Deliver packets across global network (Network) v Ensure that packets get to the dst. (Transport) v Do something with the data (Application) v
This is decomposition… Now, how do we organize these tasks? 6
Inspiration… v
CEO A writes letter to CEO B § Folds letter and hands it to administrative aide
» Aide: » Puts letter in envelope with CEO B’s full name Your days are numbered. » Takes to FedEx --Pat Dear John,
v
FedEx Office § Puts letter in larger envelope § Puts name and street address on FedEx envelope § Puts package on FedEx delivery truck
v
FedEx delivers to other company 7
The Path of the Letter “Peers” on each side understand the same things No one else needs to (abstraction) Lowest level has most packaging CEO Aide FedEx
Semantic Content Letter Identity Envelope Location Fedex Envelope (FE)
CEO Aide FedEx
8
The Path Through FedEx Higher “Stack” Highest Level of “Transit Stack” at Ends is Routing Partial “Stack” Truck Truck During Transit FE Sorting Office
Crate Airport
FE
FE Sorting Office
Crate Airport
New Crate
Sorting Office
Crate Airport
Deepest Packaging (Envelope+FE+Crate) at the Lowest Level of Transport
9
In the context of the Internet Applications …built on…
Reliable (or unreliable) transport …built on…
Best-effort global packet delivery …built on…
Best-effort local packet delivery …built on…
Physical transfer of bits 10
Internet protocol stack v application:
supporting network applications § FTP, SMTP, HTTP, Skype, ..
v transport:
process-process data
transfer
§ TCP, UDP
v network:
routing of datagrams from source to destination § IP, routing protocols
v link:
data transfer between neighboring network elements § Ethernet, 802.111 (WiFi), PPP
v physical:
bits “on the wire” 11
Three Observations v
Each layer: § Depends on layer below § Supports layer above § Independent of others
v
Multiple versions in layer § Interfaces differ somewhat § Components pick which lowerlevel protocol to use
v
But only one IP layer § Unifying protocol
Quiz: What are the benefits of layering? v v v
An Example: No Layering Application
Transmission Media
v
HTTP
ssh
Ethernet
Fiber optic
Skype
Wireless
No layering: each new application has to be reimplemented for every network technology !
2-14
An Example: Benefit of Layering v
Introducing an intermediate layer provides a common abstraction for various network technologies
Application
ssh
HTTP
Skype
Transport & Network Transmission Media Ethernet
Fiber optic
Wireless 15
Is Layering Harmful? v
Layer N may duplicate lower level functionality § E.g., error recovery to retransmit lost data
v
Information hiding may hurt performance § E.g. packet loss due to corruption vs. congestion
v
Headers start to get really big § E.g., typically TCP + IP + Ethernet headers add up to 54 bytes
v
Layer violations when the gains too great to resist § E.g., TCP-over-wireless
v
Layer violations when network doesn’t trust ends § E.g., Firewalls 16
Distributing Layers Across Network v
Layers are simple if only on a single machine § Just stack of modules interacting with those above/ below
v
But we need to implement layers across machines § Hosts § Routers § Switches
v
What gets implemented where?
17
What Gets Implemented on Host? v
Bits arrive on wire, must make it up to application
v
Therefore, all layers must exist at host!
18
What Gets Implemented on Router? v
Bits arrive on wire § Physical layer necessary
v
Packets must be delivered to next-hop § datalink layer necessary
v
Routers participate in global delivery § Network layer necessary
v
Routers don’t support reliable delivery § Transport layer (and above) not supported 19
Internet Layered Architecture host
host HTTP message
HTTP
TCP segment
TCP router IP
Ethernet interface
HTTP
IP packet
Ethernet interface
IP
TCP router
IP packet
SONET interface
SONET interface
IP
IP packet
Ethernet interface
IP
Ethernet interface
20 20
Logical Communication v
Layers interacts with peer’s corresponding layer
Application Transport Network Datalink
Network Datalink
Application Transport Network Datalink
Physical
Physical
Physical
Host A
Router
Host B 21
Physical Communication v v v
Communication goes down to physical network Then from network peer to peer Then up to relevant layer
Application Transport
Application Transport
Network Datalink Physical
Network Datalink Physical
Network Datalink Physical
Host A
Router
Host B 22
source message segment
M
Ht
M
datagram Hn Ht
M
frame
M
Hl Hn Ht
Encapsulation
application transport network link physical
link physical switch
M Ht
M
Hn Ht
M
Hl Hn Ht
M
destination
Hn Ht
M
application transport network link physical
Hl Hn Ht
M
network link physical
Hn Ht
M
router
23
1. Introduction: roadmap 1.1 what is the Internet? 1.2 network edge § end systems, access networks, links 1.3 network core § packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks 1.5 protocol layers, service models Self Study 1.6 networks under attack: security 1.7 history
24
Introduction: summary covered a “ton ” of material! v v v
v v v v
Internet overview what’s a protocol? network edge, core, access network § packet-switching versus circuit-switching § Internet structure performance: loss, delay, throughput layering, service models security history
you now have: v v
context, overview, “feel” of networking more depth, detail to follow!
25
2. Application Layer: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic mail § SMTP, POP3, IMAP
2.4 DNS
2.5 P2P applications 2.6 video streaming and content distribution networks (CDNs) 2.7 socket programming with UDP and TCP
26
2. Application layer our goals: v conceptual, implementation aspects of network application protocols § transport-layer service models § client-server paradigm § peer-to-peer paradigm
v
learn about protocols by examining popular application-level protocols § § § §
v
HTTP SMTP / POP3 / IMAP DNS Video streaming
creating network applications § socket API
27
Quiz: Can you name a few networked applications?
28
Creating a network app write programs that: v run on (different) end systems v communicate over network v e.g., web server software communicates with browser software Varying degrees of integration v Loose: email, web browsing v Medium: chat, Skype, remote file systems v Tight: process migration, distributed file systems no need to write software for network-core devices v network-core devices do not run user applications v applications on end systems allows for rapid app development, propagation
application transport network data link physical
application transport network data link physical
application transport network data link physical
29
Interprocess Communication (IPC) v
v
Processes talk to each other through Interprocess communication (IPC)
On a single machine:
Text
Text
Data
Data
§ Shared memory
v
Stack
Stack
P1
P2
Shared Segment
Across machines: § We need other abstractions (message passing)
30
Sockets v v
v
process sends/receives messages to/from its socket socket analogous to door § sending process shoves message out door § sending process relies on transport infrastructure on other side of door to deliver message to socket at receiving process Application has a few options, OS handles the details application
process
socket
application
process
transport
transport
network
network
link physical
Internet
link
controlled by app developer
controlled by OS
physical
31
Addressing processes v v v
to receive messages, process must have identifier host device has unique 32bit IP address Q: does IP address of host on which process runs suffice for identifying the process? § A: no, many processes can be running on same host
v
v
identifier includes both IP address and port numbers associated with process on host. example port numbers: § HTTP server: 80 § mail server: 25
v
to send HTTP message to cse.unsw.edu.au web server: § IP address: 129.94.242.51 § port number: 80
v
more on this in 2 weeks
32
Client-server architecture server: v v v
client/server
Exports well-defined request/ response interface long-lived process that waits for requests Upon receiving request, carries it out
clients: v v v
Short-lived process that makes requests “User-side” of application Initiates the communication
33
Client versus Server v
Server § Always-on host § Permanent IP address (rendezvous location) § Static port conventions (http: 80, email: 25, ssh: 22) § Data centres for scaling § May communicate with other servers to respond
v
Client § May be intermittently connected § May have dynamic IP addresses § Do not communicate directly with each other
34
P2P architecture v
no always-on server
§ No permanent rendezvous involved
v
v v
peer-peer
arbitrary end systems (peers) directly communicate Symmetric responsibility (unlike client/server) Often used for: § § § §
File sharing (BitTorrent) Games Video distribution, video chat In general: “distributed systems”
35
P2P architecture: Pros and Cons + peers request service from other peers, provide service in return to other peers
peer-peer
§ self scalability – new peers bring new service capacity, as well as new service demands
+ Speed: parallelism, less contention + Reliability: redundancy, fault tolerance + Geographic distribution - Fundamental
problems of decentralized
control § State uncertainty: no shared memory or clock § Action uncertainty: mutually conflicting decisions - Distributed
algorithms are complex
36
App-layer protocol defines v
v
v
v
types of messages exchanged, § e.g., request, response message syntax: § what fields in messages & how fields are delineated message semantics § meaning of information in fields rules for when and how processes send & respond to messages
open protocols: v defined in RFCs v allows for interoperability v e.g., HTTP, SMTP proprietary protocols: v e.g., Skype
37
What transport service does an app need? data integrity v some apps (e.g., file transfer, web transactions) require 100% reliable data transfer v other apps (e.g., audio) can tolerate some loss timing v some apps (e.g., Internet telephony, interactive games) require low delay to be “effective”
throughput v some apps (e.g., multimedia) require minimum amount of throughput to be “effective” v other apps (“elastic apps”) make use of whatever throughput they get security v encryption, data integrity, …
38
Transport service requirements: common apps application file transfer e-mail Web documents real-time audio/video stored audio/video interactive games Chat/messaging
data loss
throughput
time sensitive
no loss no loss no loss loss-tolerant
no elastic no elastic no elastic audio: 50kbps-1Mbps yes, 100’s msec video:100kbps-5Mbps loss-tolerant same as above yes, few msecs loss-tolerant few kbps up yes, 100’s msec no loss yes and no elastic
39
Internet transport protocols services TCP service: v
v v
v
v
UDP service:
reliable transport between v unreliable data transfer sending and receiving between sending and process receiving process flow control: sender won’t v does not provide: overwhelm receiver reliability, flow control, congestion control: throttle congestion control, sender when network timing, throughput overloaded guarantee, security, does not provide: timing, orconnection setup, minimum throughput guarantee, security connection-oriented: setup Q: why bother? Why required between client and is there a UDP? server processes NOTE: More on transport in Weeks 5 and 6
40
Internet apps: application, transport protocols application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony
application layer protocol
underlying transport protocol
SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] HTTP (e.g., YouTube), RTP [RFC 1889] SIP, RTP, proprietary (e.g., Skype)
TCP TCP TCP TCP TCP or UDP
TCP or UDP
41
2. Application Layer: outline 2.1 principles of network applications § app architectures § app requirements
2.2 Web and HTTP 2.3 electronic mail
2.5 P2P applications 2.6 video streaming and content distribution networks (CDNs) 2.7 socket programming with UDP and TCP
§ SMTP, POP3, IMAP
2.4 DNS
42
The Web – Precursor v
1967, Ted Nelson, Xanadu: § A world-wide publishing network that would allow information to be stored not as separate files but as connected literature § Owners of documents would be automatically paid via electronic means for the virtual copying of their documents
Ted Nelson
v
Coined the term “Hypertext”
43
The Web – History v
World Wide Web (WWW): a distributed database of “pages” linked through Hypertext Transport Protocol (HTTP) § First HTTP implementation - 1990 • Tim Berners-Lee at CERN
§ HTTP/0.9 – 1991 • Simple GET command for the Web Tim Berners-Lee
§ HTTP/1.0 –1992 • Client/Server information, simple caching
§ HTTP/1.1 - 1996 http://info.cern.ch/hypertext/WWW/TheProject.html 44
Web and HTTP First, a review… web page consists of objects v object can be HTML file, JPEG image, Java applet, audio file,… v web page consists of base HTML-file which includes several referenced objects v each object is addressable by a URL, e.g., v
www.someschool.edu/someDept/pic.gif host name
path name
45
Uniform Resource Locator (URL) protocol://host-name[:port]/directory-path/resource v v v v v
protocol: http, ftp, https, smtp, rtsp, etc. hostname: DNS name, IP address port: defaults to protocol’s standard port; e.g. http: 80 https: 443 directory path: hierarchical, reflecting file system resource: Identifies the desired resource
46
Uniform Resource Locator (URL) protocol://host-name[:port]/directory-path/resource v
Extend the idea of hierarchical hostnames to include anything in a file system § http://www.cse.unsw.edu.au/~salilk/papers/journals/TMC2012.pdf
v
Extend to program executions as well… § http://us.f413.mail.yahoo.com/ym/ShowLetter?box=%40B %40Bulk&MsgId=2604_1744106_29699_1123_1261_0_28917_3552_12899 57100&Search=&Nhead=f&YY=31454&order=down&sort=date&pos=0&vie w=a&head=b § Server side processing can be incorporated in the name
47
HTTP overview HTTP: hypertext transfer protocol v v
Web’s application layer protocol client/server model § client: browser that requests, receives, (using HTTP protocol) and “displays” Web objects § server: Web server sends (using HTTP protocol) objects in response to requests
PC runn...