DATA COMMUNICATOIN NETWORKING

Similar documents
1 Introduction: Network Applications

File Transfer Protocol (FTP) & SSH

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

FTP and . Computer Networks. FTP: the file transfer protocol

CMPE 80N: Introduction to Networking and the Internet

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Cookies Overview and HTTP Proxies

FTP: the file transfer protocol

Network Technologies

DATA COMMUNICATOIN NETWORKING

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Lecture 8a: WWW Proxy Servers and Cookies

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Wireshark Lab: HTTP SOLUTION

FTP: the file transfer protocol

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

CPSC Network Programming. , FTP, and NAT.

Review of Networking Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

Application Layer: HTTP and the Web. Srinidhi Varadarajan

Computer Networking LAB 2 HTTP

Streaming Stored Audio & Video

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Lecture 8a: WWW Proxy Servers and Cookies

TFTP TRIVIAL FILE TRANSFER PROTOCOL OVERVIEW OF TFTP, A VERY SIMPLE FILE TRANSFER PROTOCOL FOR SIMPLE AND CONSTRAINED DEVICES

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Introduction to Computer Security Benoit Donnet Academic Year

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

CONTENT of this CHAPTER

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

Computer Networks - CS132/EECS148 - Spring

DATA COMMUNICATOIN NETWORKING

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Proxies. Chapter 4. Network & Security Gildas Avoine

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections

Preventing credit card numbers from escaping your network

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Multi-Homing Dual WAN Firewall Router

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN

Chapter 2 Application Layer

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW

How To Understand The Power Of The Internet

First Midterm for ECE374 02/25/15 Solution!!

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

CSCI-1680 SMTP Chen Avin

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Ranch Networks for Hosted Data Centers

Principles of Network Applications. Dr. Philip Cannata

Lecture 2. Internet: who talks with whom?

Elluminate Live! Access Guide. Page 1 of 7

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

The Web History (I) The Web History (II)

ReadyNAS Remote White Paper. NETGEAR May 2010

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

The Hyper-Text Transfer Protocol (HTTP)

Setting Up Scan to SMB on TaskALFA series MFP s.

Internet Technology 2/13/2013

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

BASIC ANALYSIS OF TCP/IP NETWORKS

Configuring your client to connect to your Exchange mailbox

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

Massey University Wireless Network - Client

Step-by-Step Configuration

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

Student Motivation in Computer Networking Courses

Elluminate Live! Access Guide. Page 1 of 7

Lab Developing ACLs to Implement Firewall Rule Sets

Deployment Guide Microsoft IIS 7.0

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1

Bandwidth Aggregation, Teaming and Bonding

Network Configuration Settings

How to Make the Client IP Address Available to the Back-end Server

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Internet Access to a DVR365

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

Configuring Network Address Translation (NAT)

Virtual Server in SP883

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

How do I load balance FTP on NetScaler?

Security. TestOut Modules

Chapter 8 Security Pt 2

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Configuring User Identification via Active Directory

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

Transcription:

DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction

Course Overview Basics of Computer Networks Internet & Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer Advanced Topics Case Studies of Computer Networks Internet Applications Network Management Network Security Introduction 2

User-Server State: Cookies Four Components Cookie header line of HTTP response Cookie header line in next HTTP request message Back-end database at Web site Cookie file kept on user s host, managed by user s browser Introduction 3

Cookies client ebay 8734 cookie file ebay 8734 amazon 1678 usual http request msg usual http response set-cookie: 1678 Amazon creates ID 1678 for user create entry backend database one week later: usual http request msg cookie: 1678 usual http response msg cookiespecific action access access ebay 8734 amazon 1678 Introduction usual http request msg cookie: 1678 usual http response msg cookiespecific action 4

Cookies Usage Usage Authorization Shopping Carts Recommendations User session state (Web email) Keeping State protocol endpoints: maintain state at sender/receiver over multiple transactions cookies: http messages carry state cookies and privacy cookies permit sites to learn a lot about you you may supply name and e-mail to sites Introduction 5

Web Caches (Proxy Server) Goal: satisfy client request without involving origin User sets browser Web accesses via cache Browser sends all HTTP requests to cache Object in cache cache returns object client proxy origin Else cache requests object from origin, then returns object to client client origin Introduction 6

Web Catching Cache acts as both client and for original requesting client client to origin Typically cache is installed by ISP university, company, residential ISP Why Web Catching? Reduce response time for client request Reduce traffic on an institution s access link Internet dense with caches: enables poor content providers to effectively deliver content (so too does P2P file sharing) Introduction 7

Web Catching Example Example Average object size: 100kbits Average request rate from browser to origin s: 15/sec public Internet origin s Average Data rate to Browsers: 1.50Mbps RTT from institutional router to any high origin : 2sec institutional network 1.54 Mbps access link 1 Gbps LAN Access link rate: 1.54Mbps Introduction 8

Web Catching Example Example LAN utilization: 15% Access link utilization = 99% Total delay = Internet delay + access delay + LAN delay = 2 sec + minutes + usecs Increase access link speed to 154Mbps LAN utilization: 15% Access link utilization = 9.9% Total delay = Internet delay + access delay + LAN delay = 2 sec + msecs + usecs Cache with hit rate 0.4 Access link utilization: 60% of requests use access link Data rate to browsers over access link = 0.6*1.50 Mbps =.9 Mbps Utilization = 0.9/1.54 = 0.58 Total delay = 0.6 * (delay from origin s) +0.4 * (delay when satisfied at cache) = 0.6 (~2.01) + 0.4 (~msecs) = ~ 1.2 secs less than with 154 Mbps link (and cheaper too!) Introduction 9

Conditional GET Goal: don t send object if cache has up-to-date cached version no object transmission delay lower link utilization Cache: specify date of cached copy in HTTP request If-modified-since: <date> Server: response contains no object if cached copy is up-todate: HTTP/1.0 304 Not Modified client HTTP request msg If-modified-since: <date> HTTP response HTTP/1.0 304 Not Modified HTTP request msg If-modified-since: <date> HTTP response HTTP/1.0 200 OK <data> object not modified before <date> object modified after <date> Introduction 10

FTP: File Transfer Protocol user at host FTP user interface FTP client local file system file transfer FTP remote file system Transfer to/from remote host Client/ model Client: side that initiates transfer (either to/from remote) Server: remote host ftp: RFC 959 ftp : port 21 Introduction 11

FTP: Separate Control & Data FTP client contacts FTP at port 21, using TCP TCP control connection, port 21 Client authorized over control connection FTP client TCP data connection, port 20 FTP Client browses remote directory, sends commands over control connection When receives file transfer command, opens 2 nd TCP data connection (for file) to client After transferring one file, closes data connection Server opens another TCP data connection to transfer another file control connection: out of band FTP maintains state : current directory, earlier authentication Introduction 12

FTP: Commands & Responses sample commands: sent as ASCII text over control channel USER username PASS password LIST return list of file in current directory RETR filename retrieves (gets) file sample return codes: status code and phrase (as in HTTP) 331 Username OK, password required 125 data connection already open; transfer starting 425 Can t open data connection STOR filename stores (puts) file onto remote host 452 Error writing file Introduction 13