Computer Networks. Examples of network applica3ons. Applica3on Layer

Similar documents
Distributed Systems. 2. Application Layer

Network Applications

Principles of Network Applications. Dr. Philip Cannata

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Computer Networks & Security 2014/2015

Introdução aos Sistemas Distribuídos

1 Introduction: Network Applications

Transport Layer Services Mul9plexing/Demul9plexing. Transport Layer Services

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Introduc)on to Real- Time Applica)ons and Infrastructure development in the IETF

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Today s Lecture : Introduction to Telecommunication Networks Lectures 2: Protocol Stack. Applications and Application Protocols

InterCloud Exchange: pia5aforme neutrali di comunicazione tra sistemi di Cloud Compu:ng. Cosimo Anglano Lorenzo Benussi Andrea Casalegno Andrea

VIDEOCONFERENCING. Video class

Networked Virtual Spaces and Clouds. Magda El Zarki UC Irvine

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, Socket Programming

Introduction to Computer Networks

Architecture and Performance of the Internet

Chapter 3. Internet Applications and Network Programming

Network Edge and Network Core

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

internet technologies and standards

Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

LMS. OSI Layers and the Learning Management System. Over view

File Transfer Protocol (FTP) & SSH

Module 2 Overview of Computer Networks

SHORT DESCRIPTION OF THE PROJECT...3 INTRODUCTION...4 MOTIVATION...4 Session Initiation Protocol (SIP)...5 Java Media Framework (JMF)...

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Lecture 28: Internet Protocols

The TCP/IP Reference Model

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Interwise Connect. Working with Reverse Proxy Version 7.x

Network Configuration Settings

Mul$media Networking. #3 Mul$media Networking Semester Ganjil PTIIK Universitas Brawijaya. #3 Requirements of Mul$media Networking

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Rev Technology Document

OCS Training Workshop LAB14. Setup

TSIN02 - Internetworking

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

EXPLORER. TFT Filter CONFIGURATION

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Streaming Stored Audio & Video

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

By Kundan Singh Oct Communication

Internet Technology Voice over IP

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

TCP/IP Protocol Suite. Marshal Miller Chris Chase

02 Internet!= Web. Internet Technology. MSc in Communication Sciences Program in Technologies for Human Communication.

NUViA Unified Communications Cloud Service

Internet Services & Protocols Multimedia Applications, Voice over IP

Unit 23. RTP, VoIP. Shyam Parekh

SIP, Session Initiation Protocol used in VoIP

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Protocols. Packets. What's in an IP packet

An Introduction to VoIP Protocols

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

Three short case studies

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Basics of Port Forwarding on a Router for Security DVR s

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Advanced Higher Computing. Computer Networks. Homework Sheets

A Scalable Multi-Server Cluster VoIP System

SIP : Session Initiation Protocol

A Comparative Study of Signalling Protocols Used In VoIP

Frequently Asked Questions

Software-Powered VoIP

Internet Services & Protocols Multimedia Applications, Voice over IP

Transport and Network Layer

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

Review of Networking Basics. Yao Wang Polytechnic University, Brooklyn, NY11201

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Introduction: Why do we need computer networks?

Interactive telecommunication between people Analog voice

Network Programming TDC 561

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Chakchai So-In, Ph.D.

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia

Top-Down Network Design


Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

Kick starting science...

presentation DAD Distributed Applications Development Cristian Toma

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Pre Sales Communications

Internet Concepts. What is a Network?

TECHNICAL CHALLENGES OF VoIP BYPASS

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Chapter 4 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

IP-Telephony Real-Time & Multimedia Protocols

Computer System Management: Hosting Servers, Miscellaneous

Computer Networks. Instructor: Niklas Carlsson

Transcription:

Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice over IP real- 3me video conferencing grid compu3ng 2 1

Crea3ng a network app write programs that run on (different) end systems communicate over network e.g., web server sojware communicates with browser sojware No need to write sojware for network- core devices Network- core devices do not run user applica3ons applica3ons on end systems allows for rapid app development, propaga3on application transport network data link physical application transport network data link physical application transport network data link physical 3 Applica3on architectures Client- server Including data centers / cloud compu3ng Peer- to- peer (P2P) Hybrid of client- server and P2P 4 2

Client- server architecture client/server server: always- on host permanent IP address server farms for scaling clients: communicate with server may be intermipently connected may have dynamic IP addresses do not communicate directly with each other 5 Google Data Centers Es3mated cost of data center: $600M Google spent $2.4B in 2007 on new data centers Each data center uses 50-100 megawaps of power 3

Pure P2P architecture no always- on server arbitrary end systems directly communicate peers are intermipently connected and change IP addresses peer-peer Highly scalable but difficult to manage 7 Hybrid of client- server and P2P Skype voice- over- IP P2P applica3on centralized server: finding address of remote party: client- client connec3on: direct (not through server) Instant messaging cha]ng between two users is P2P centralized service: client presence detec3on/ loca3on user registers its IP address with central server when it comes online user contacts central server to find IP addresses of buddies 8 4

Processes communica3ng Process: program running within a host. within same host, two processes communicate using inter- process communica3on (defined by OS). processes in different hosts communicate by exchanging messages Client process: process that ini3ates communica3on Server process: process that waits to be contacted Note: applica3ons with P2P architectures have client processes & server processes 9 Sockets process sends/receives messages to/from its socket socket analogous to door sending process shoves message out door sending process relies on transport infrastructure on other side of door which brings message to socket at receiving process host or server process socket TCP with buffers, variables controlled by app developer controlled by OS Internet host or server process socket TCP with buffers, variables API: (1) choice of transport protocol; (2) ability to fix a few parameters 10 5

Addressing processes to receive messages, process must have iden/fier host device has unique 32- bit IP address Exercise: use ipconfig from command prompt to get your IP address (Windows) Q: does IP address of host on which process runs suffice for iden3fying the process? A: No, many processes can be running on same Iden/fier includes both IP address and port numbers associated with process on host. Example port numbers: HTTP server: 80 Mail server: 25 11 Applica3on- layer protocol defines Types of messages exchanged, e.g., request, response Message syntax: what fields in messages & how fields are delineated Message seman3cs meaning of informa3on in fields Rules for when and how processes send & respond to messages Public- domain protocols: defined in RFCs allows for interoperability e.g., HTTP, SMTP, BitTorrent Proprietary protocols: e.g., Skype, ppstream 12 6

What transport service does an app need? Data loss some apps (e.g., audio) can tolerate some loss other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing some apps (e.g., Internet telephony, interac3ve games) require low delay to be effec3ve Throughput some apps (e.g., mul3media) require a certain minimum amount of throughput to be effec3ve other apps ( elas3c apps ) make use of whatever throughput they get Security Encryp3on, data integrity, 13 Transport service requirements of common apps Application Data loss Throughput Time Sensitive file transfer e-mail Web documents real-time audio/video stored audio/video interactive games instant messaging no loss no loss no loss loss-tolerant loss-tolerant loss-tolerant no loss elastic elastic elastic audio: 5kbps-1Mbps video:10kbps-5mbps same as above few kbps up elastic no no no yes, 100 s msec yes, few secs yes, 100 s msec yes and no 14 7

Internet transport protocols services TCP service: connec/on- oriented: setup required between client and server processes reliable transport between sending and receiving process flow control: sender won t overwhelm receiver conges/on control: throple sender when network overloaded does not provide: 3ming, minimum throughput guarantees, security UDP service: unreliable data transfer between sending and receiving process does not provide: connec3on setup, reliability, flow control, conges3on control, 3ming, throughput guarantee, or security Q: why bother? Why is there a UDP? 15 Internet apps: applica3on, transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony Application layer protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] HTTP (eg Youtube), RTP [RFC 1889] SIP, RTP, proprietary (e.g., Skype) Underlying transport protocol TCP TCP TCP TCP TCP or UDP typically UDP 16 8