Interplanetary Internet (IPN): An Architectural Definition
|
|
- Calvin Holt
- 8 years ago
- Views:
Transcription
1 Interplanetary Internet (IPN): An Architectural Definition
2 1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working Conclusions
3 1. Introduction Introduction (1) TCP/IP works well in terrestrial communication TCP/IP will also work well on other planets, on moons and in space crafts Reason: similiar propagation delay, bit error rate and bandwidth like on earth
4 1. Introduction Introduction (2) Differences between intraplanetary and interplanetary Internet: Propagation delay Low and asymmetric bandwidth Intermittent connectivity High bit error rate Problems with permanent power supply
5 1. Introduction Introduction (3) Chatty protocols like TCP/IP are relatively unattractive for an Interplanetary Internet IPNSIG was formed to develop protocols for an Interplanetary Internet
6 1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working Conclusions
7 2. Inter-Internet Dialogs Inter-Internet Dialogs 1 Principles of Design 2 The center of the IPN: the Bundle Layer Concept (store-and-forward overlay network) Reliability at the Bundle Layer 3 Bandwidth Allocation via Market Mechanisms: Starbucks
8 2. Inter-Internet Dialogs Principles of Design - Name Tuples Consisting of Administrative and Routing Parts Internet on Earth: Hierarchical Name Space: host name, [subdomain]+, top level domain, root e.g. www7.informatik. uni-wuerzburg.de Top Level Domains (TLD) geographic split (e.g. de, fr,...) organisational split (e.g. com, org, net, edu,...) Domain Name System (DNS) used mostly to translate between domain names and IP addresses
9 2. Inter-Internet Dialogs Principles of Design - Name Tuples Consisting of Administrative and Routing Parts Problems at the IPN: distributed nature of the DNS database zone transfers solutions?.sol with topological significance.com means.com ON EARTH
10 2. Inter-Internet Dialogs Principles of Design - Name Tuples Consisting of Administrative and Routing Parts Names in the IPN should consist of a tuple: {administrative part, routing part} e.g. { earth.sol} routing part serves purpose of new TLD Advantages: only the routing part must be resolvable everywhere routing part identifies Internet as IPN-Region e.g. earth.sol would be an IPN-Region including the entire Earth administrative part must only be resolvable at the corresponding IPN-Region
11 IPN-REGIONS
12 2. Inter-Internet Dialogs The center of the IPN: the Bundle Layer - Concept (store- and- forward overlay network) 1 Problem: intermittent connectivity reasons: physical, schedule-related, administrative 2 Problem: high priority interrupt traffic 3 Problem: varying communication environments including different transport protocols Information has to be stored for an indefinite period!
13 2. Inter-Internet Dialogs The center of the IPN: the Bundle Layer - Concept (store- and- forward overlay network) Possible solution: BUNDLE LAYER IPN-Nodes terminate the transport-layer protocols in the respective IPN-regions Informations should be stored at a higher layer before forwarded Bundle protocol store-and-forward overlay network
14 2. Inter-Internet Dialogs The center of the IPN: the Bundle Layer - Concept (store- and- forward overlay network) Concept: atomic bundle in the IPN it is the Bundle Layer operates end-to-end, not the transport layer protocol terminating the transport protocols at the IPN nodes, decouples the Internets in different IPN regions ADVANTAGE: modularity & extension aspects
15 2. Inter-Internet Dialogs The center of the IPN: the Bundle Layer - Concept (store- and- forward overlay network) An Example An Internet IPN-Backbone An Internet A B* C* D* E * = Custody Transfers Return Receipt
16 2. Inter-Internet Dialogs The center of the IPN: the Bundle Layer - Concept (store- and- forward overlay network) The Bundle Layer provides a lot of services to applications using it: late binding of destination name s administrative part to an address transmission of user s specification for reliability quality of service security provide error recovery mechanisms
17 2. Inter-Internet Dialogs The center of the IPN: the Bundle Layer - Reliability at the Bundle Layer End-to-end reliability can only be assured at the Bundle Layer each Bundle Layer entity is confident, that the transport layer operates successfully if failures occur: the prior custodian-node re-transmit any missing data Highly optimistic timers (minimize unnecessary Bundle Layer retransmission): give the Transport protocols every opportunity to complete reliable transmission
18 2. Inter-Internet Dialogs Bandwidth Allocation via Market Mechanisms: Starbucks To promote the performance of the IPN some sophisticated and adaptable bandwidth allocation system are required Idea: fare-paying packets source application (bundle sender) specifies total funds allocated, getting the bundle delivered to the destination
19 1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working Conclusions
20 3. Building a stable Backbone Building a stable Backbone for the IPN 1 Common things of IPN & terrestrial Backbones 2 Differences between interplanetary & terrestrial Backbones 3 Backbone Design Considerations
21 3. Building a stable Backbone Common things of IPN & terrestrial Backbones Terrestrial and extraterrestrial Internet: performance and capability are determined by capacity and stability of its backbone backbone links are between the highactivity subnets e.g. on Earth: between Chicago and Houston in the IPN: between Earth and Mars
22 3. Building a stable Backbone Differences between interplanetary & terrestrial Backbones different transmission medias: on earth: copper respectively optical fiber at the IPN: radiation - RF or optical different mode of connectivity between backbone POPs: on earth: connectivity structural & static at the IPN: connectivity operational, directed & highly dynamic
23 3. Building a stable Backbone Differences between interplanetary & terrestrial Backbones much higher costs of deploying, repairing and upgrading infrastructure at the IPN - Backbone higher costs of configuring, operating & managing the IPN - Backbone shortage and costs of electrical power speed of light is the most important constraint on IPN - Backbone operations
24 3. Building a stable Backbone Backbone Design Considerations 2 general constraints on the design of the IPN - Backbone: Bandwidth is not free, or even cheap. Interactive protocols don t work, at least not well.
25 3. Building a stable Backbone Backbone Design Considerations Design constraints must be accomodated at 4 layers of the protocol stack: physical layer: physical infrastructure of the IPN-Backbone consists mainly of antennas problems: accuracy in pointing & transmission scheduling at the backbones antennas all elements of the IPN-Backbone infrastructure must have in common: (a) one another s orbital dynamics (b) current time
26 3. Building a stable Backbone Backbone Design Considerations link layer: link protocols that minimizes overhead CCSDS protocol standards network layer: no interplanetary backbone functionality will be required at this layer transport layer: as discussed before: TCP will not be suitable! But: the Bundle Protocol residing just above the transport layer
27 3. Building a stable Backbone Backbone Design Considerations Bundle Protocol: relatively optimistic about transmission success but it must have transport-layer-like properties: recover from transmission failure at lower layers capacity for timeout detection and custodian-to-custodian retransmission
28 3. Building a stable Backbone Backbone Design Considerations Bundle Protocol: optimism results from the general trustworthiness of lower layers: When the Bundle Protocol runs over TCP in a deployed Internet, TCP s own retransmission regime automatically recovers from errors in the network and link layers, and only a failure in TCP itself will trigger retransmission at the bundle layer.
29 1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working Conclusions
30 4. IPN-Nodes IPN-Nodes - Types of IPN Nodes - Backbone Connectivity - IPN Gateway Routing - The Contact Scheduler - The Route Evaluation - The Dispatcher Algorithm - Example: end-to-end transfer - Possible Errors - Support of existing applications
31 4. IPN-Nodes Types of IPN Nodes Three types of IPN Nodes: - All nodes are bundle agents - Some bundle agents are able to act as IPN Relays - Some IPN Relays are also able to act as IPN Gateways
32 4. IPN-Nodes Backbone Connectivity IPN long-haul communication links are directional, mobile and highly scheduled When a bundle arrives at an IPN Gateway, some or all outbound routes may be down Interplanetary Internet should use store-andforward mechanisms to route bundles
33 4. IPN-Nodes IPN Gateway Routing Routing in IPN Gateways has three distinct parts: - The contact scheduler - The route evaluation algorithm - The dispatcher algorithm
34 4. IPN-Nodes IPN Gateway Routing- The contact scheduler Input: orbital mechanics, resources management Output: schedule for next-hop communication (planned contacts, duration, expected data rate) First centralized, later distributed contact scheduling algorithm
35 4. IPN-Nodes IPN Gateway Routing- The route evaluation Exchange of information with first-hop neighbors to build a picture of the IPN beyond first-hop neighbors Goal: distance-vector representation for routing Metrics are still in development
36 4. IPN-Nodes IPN Gateway Routing- The dispatcher algorithm Input: contact schedule, routing information, policy information, specifications provided by the bundle transport layer Output: Manifest for each next-hop contact
37 4. IPN-Nodes Summary of gateway routing Contact scheduler Policy information Bundle arrives Bundle send to next hop Routing Function Request Transmisson time Dispatcher Manifest
38 4. IPN-Nodes - Example: end-to-end transfer SRC Earth s IPN Region: earth.sol DNS 1 GW 1 DNS2 The Backbone IPN Region: ipn.sol GW 3 GW 4 GW 2 Venus IPN Region: venus.sol Jupiter s IPN Region: jupiter.sol DNS 3 DST Mars IPN Region: mars.sol
39 4. IPN-Nodes Example: end-to-end transfer Host IPN Regions Host name Tuples SRC earth.sol {src.jpl.nasa.gov, earth.sol} IPN GW1 IPN GW 2 earth.sol ipn.sol ipn.sol mars.sol {ipngw1.jpl.nasa.gov, earth.sol} {ipngw1.jpl.nasa.gov, ipn.sol} {ipngw2.nasa.mars.org, ipn.sol} {ipngw2.nasa.mars.org, mars.sol} DST mars.sol {dst.jpl.nasa.gov, mars.sol} Table 1: Host name Tuples
40 4. IPN-Nodes Example: end-to-end transfer Step 1: Bundle creation and first-hop transmission - Source host on earth has data that it wants to send to a destination host to mars - Bundle agent creates a bundle and stores it in persistent storage - Information in Bundle header: Bundle Idendifier, Source Host name Tuple, Custodian name Tuple, Time to live
41 4. IPN-Nodes Example: end-to-end transfer Item Value Description Destination Host name Destination application instance handle Source application instance handle Handling instructions Data {dst.jpl.nasa.gov, mars.sol} 0x x A Reliable delivery, priority IPN Name tuple of the destination Similiar to port number used to identify the source application instance for response processing The services requested from the bundle Table 2: Information passed from source application to bundle agent
42 4. IPN-Nodes Example: end-to-end transfer - Dispatcher finds, that next-hop neighbor is {ipngw1.jpl.nasa.com, earth.sol} - Bundle is sent via TCP
43 4. IPN-Nodes Example: end-to-end transfer Step 2: Bundle processing at first-hop destination: - IPN Gateway receives bundle via TCP and stores it in persistent storage - Bundle agent accepts custody of bundle, updates the bundleheader and informs the source - Source bundle agent deletes its copy of the bundle
44 4. IPN-Nodes Example: end-to-end transfer - Dispatcher checks time to live in the bundle - Dispatcher finds that next-hop neighbor is in the ipn.sol region {ipngw2.nasa.mars.org, ipn.sol} - Dispatcher provides time at which the bundle should be send to ipngw2 via Long Haul Transport Protocol (LTP) - Bundle is transmitted at the given time
45 4. IPN-Nodes Example: end-to-end transfer Step 3: Bundle processing at gateway to destination IPN region - Mars gateway receives bundle via LTP - Mars gateway stores bundle on persistant storage, accepts custody of the bundle and signalises success back to earth - Dispatcher returns, that the next-hop is the destination, that the proper protocol is TCP and that the destination is accessible immediately - Mars gateway forwards bundle to destination
46 4. IPN-Nodes Example: end-to-end transfer Step 4: Bundle processing at destination - Destination bundle agent receives bundle via TCP, stores it in persistant storage and accepts the custody of the bundle from ipngw2 - Bundle agent awakens destination application process identified by the Destination Application Instance Handle - Bundleagent deletesthe copy of the bundlewhen the application received it
47 4. IPN-Nodes - Possible Errors Possible Errors Unknowndestination region Invalid Source Application Bundle Parameter Syntax Error Bundle Parameter Semantic Error Invalid Node Name Insufficient buffer space DNS unreachable
48 4. IPN-Nodes - Possible Errors Possible Errors Time exceeded Source Entity Access denied Invalid Administrative Destination Name Invalid Destination Application End-to-end Access denied
49 4. IPN-Nodes - Support of existing applications Support of existing applications There is no clean way to support applications in the IPN SMTP is perhaps the only application that could possibly be tuned to work over interplanetary distances
50 1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working Conclusions
51 1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working Conclusions
5. Security in the IPN
1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working conclusions 5. Security 5.1. Introduction
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationBasic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
More informationNames & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationNetworking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)
Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationRouting Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
More informationAdvanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP
Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationCS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationTCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
More informationCS335 Sample Questions for Exam #2
CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationRoute Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
More informationIntroduction to TCP/IP
Introduction to TCP/IP Raj Jain The Ohio State University Columbus, OH 43210 Nayna Networks Milpitas, CA 95035 Email: Jain@ACM.Org http://www.cis.ohio-state.edu/~jain/ 1 Overview! Internetworking Protocol
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationDistance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
More informationHow the Internet Works? ( TCP/IP, DNS, HKIX )
How the Internet Works? ( TCP/IP, DNS, HKIX ) CSC1720 Introduction to Internet Essential Materials How computers send data? Channel Protocol Connection method Address CSC1720 Introduction to Internet 2
More informationEECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
More informationHow do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More information1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
More informationWhat is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
More informationInternet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
More informationComputer Networks & Security 2014/2015
Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationIntegration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More information524 Computer Networks
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
More informationSwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationHow To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
More informationComputer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
More informationA Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
More informationDynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
More informationIP Routing Configuring RIP, OSPF, BGP, and PBR
13 IP Routing Configuring RIP, OSPF, BGP, and PBR Contents Overview..................................................... 13-6 Routing Protocols.......................................... 13-6 Dynamic Routing
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationHow To Make A Delay Tolerant Network (Dtn) Work When You Can'T Get A Signal From A Long Delay (Tcp/Ip) To A Long Time (Tokus) Or From A Short Delay (Ip) (Tko
Delay / Disruption Tolerant Networking (DTN) Security Key Management Fred L. Templin fred.l.templin@boeing.com Mark Anderson, L2 Background The Internet Protocols (TCP/IP) are ubiquitous: Most widely-deployed
More informationArchitecture and Performance of the Internet
SC250 Computer Networking I Architecture and Performance of the Internet Prof. Matthias Grossglauser School of Computer and Communication Sciences EPFL http://lcawww.epfl.ch 1 Today's Objectives Understanding
More informationDG Forwarding Algorithm
DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router
More informationManagement Information Systems
Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods
More informationNetwork layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "
1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! Network layer" goals: "! understand principles behind layer services:" " layer service models" " forwarding versus routing" " how a
More information1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationFaculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
More informationΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
More informationTCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:
Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers
More informationMobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
More informationScaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
More informationComputer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
More informationNeighbour Discovery in IPv6
Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: hines@zitmail.uni-paderborn.de Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract
More informationLAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationLoad Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationFinal exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationGregSowell.com. Mikrotik Security
Mikrotik Security IP -> Services Disable unused services Set Available From for appropriate hosts Secure protocols are preferred (Winbox/SSH) IP -> Neighbors Disable Discovery Interfaces where not necessary.
More informationUnderstanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network
Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components
More information1.1 Prior Knowledge and Revision
1.1. PRIOR KNOWLEDGE AND REVISION 3 1.1 Prior Knowledge and Revision This topic assumes you already have some background knowledge of the Internet. You may have studied The Internet unit of Intermediate
More informationMultihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationConfiguring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
More informationEfficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More informationWe will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
More informationThe OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
More informationSecurity Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/
Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
More informationGiving life to today s media distribution services
Giving life to today s media distribution services FIA - Future Internet Assembly Athens, 17 March 2014 Presenter: Nikolaos Efthymiopoulos Network architecture & Management Group Copyright University of
More informationFacility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationDatagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
More informationHow To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationTCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
More information2.1.2.2.2 Variable length subnetting
2.1.2.2.2 Variable length subnetting Variable length subnetting or variable length subnet masks (VLSM) allocated subnets within the same network can use different subnet masks. Advantage: conserves the
More informationMPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationIP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
More informationΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science
ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users
More informationNetwork Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
More informationKT The Value Networking Company
KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous
More informationTopics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
More information