Review. CSC358 - Introduction to Computer Networks

Similar documents
The OSI and TCP/IP Models. Lesson 2

Architecture and Performance of the Internet

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Protocols and Architecture. Protocol Architecture.

How To Design A Layered Network In A Computer Network

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Protocol Architecture

Lecture 28: Internet Protocols

How To Understand The Layered Architecture Of A Network

How To Understand The Internet From A Telephone To A Computer (For A Computer)

Objectives of Lecture. Network Architecture. Protocols. Contents

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Protocols. Packets. What's in an IP packet

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Networking Test 4 Study Guide

Computer Networks CS321

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Communication Networks. MAP-TELE 2011/12 José Ruela

1 Introduction to mobile telecommunications

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Overview of TCP/IP. TCP/IP and Internet

CPS221 Lecture: Layered Network Architecture

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

The Transport Layer. Antonio Carzaniga. October 24, Faculty of Informatics University of Lugano Antonio Carzaniga

How To Understand The Internet Of S (Netware)

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Protocol Data Units and Encapsulation

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Transport Layer. Chapter 3.4. Think about

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

How do I get to

Computer Networks & Security 2014/2015

Data Communication Networks Introduction

Transport Layer Protocols

Data Communication and Computer Network

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Lecture Computer Networks

The TCP/IP Reference Model

Chapter 1: Introduction

Introduction to Computer Networks

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Computer Networks and the Internet

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Network Programming TDC 561

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Access Control: Firewalls (1)

CS335 Sample Questions for Exam #2

PART OF THE PICTURE: The TCP/IP Communications Architecture

Internet Concepts. What is a Network?

IT Data Communication and Networks (Optional)

Network Models and Protocols

Zarządzanie sieciami telekomunikacyjnymi

IT4405 Computer Networks (Compulsory)

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Chapter 1 Computer Networks and the Internet

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Data Communication Networks and Converged Networks

Topics: 1. HTTP, DNS, and SMTP Examples 2. Layered Architectures 3. OSI Reference Model 4. TCP/IP Reference Model. Garcia: Sections

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Layered Architectures and Applications

Final for ECE374 05/06/13 Solution!!

How To Understand And Understand Network Theory

technology standards and protocol for ip telephony solutions

IP - The Internet Protocol

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSCI 362 Computer and Network Security

Transport and Network Layer

RARP: Reverse Address Resolution Protocol

Ethernet. Ethernet. Network Devices

Chapter 2 - The TCP/IP and OSI Networking Models

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

PART-A Questions. 9. What are the two parts of message inside the envelope?

Network Edge and Network Core

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

THE TCP/IP PROTOCOL SUITE

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Internet Control Protocols Reading: Chapter 3

The OSI Model and the TCP/IP Protocol Suite

Top-Down Network Design

Overview of Computer Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Computer System Design: Laws, Principles, Trends - II

First Semester Examinations 2011/12 INTERNET PRINCIPLES

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

The TCP/IP Protocol Suite

Internet structure: network of networks

CSCI Topics: Internet Programming Fall 2008

Mathatma Gandhi University

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Network Security TCP/IP Refresher

Transcription:

Review

Review

Review

How to Send a Message over a Network? Routing Addressing Reliable Data Transfer Congestion Control

How to Master Complexity? Computer networks are very complex; many issues to address: connection setup, message segmentation, multiplexing, routing, flow control, security, error control, encoding, addressing,... Useful method for dealing with complexity is using modularity. break complex problem into simpler sub-problems use black box (input/output) abstraction for sub-problems

How to Master Complexity? Computer networks are very complex; many issues to address: connection setup, message segmentation, multiplexing, routing, flow control, security, error control, encoding, addressing,... Useful method for dealing with complexity is using modularity. break complex problem into simpler sub-problems use black box (input/output) abstraction for sub-problems

How to Master Complexity? Computer networks are very complex; many issues to address: connection setup, message segmentation, multiplexing, routing, flow control, security, error control, encoding, addressing,... Useful method for dealing with complexity is using modularity. break complex problem into simpler sub-problems use black box (input/output) abstraction for sub-problems

How to Master Complexity? Computer networks are very complex; many issues to address: connection setup, message segmentation, multiplexing, routing, flow control, security, error control, encoding, addressing,... Useful method for dealing with complexity is using modularity. break complex problem into simpler sub-problems use black box (input/output) abstraction for sub-problems

How to Master Complexity? Computer networks are very complex; many issues to address: connection setup, message segmentation, multiplexing, routing, flow control, security, error control, encoding, addressing,... Useful method for dealing with complexity is using modularity. break complex problem into simpler sub-problems use black box (input/output) abstraction for sub-problems

SMTP (Simple Mail Transfer Protocol) S: 220 sf.com C: HELO toronto.edu S: 250 Hello toronto.edu, pleased to meet you C: MAIL FROM: <alice@toronto.edu> S: 250 alice@toronto.edu... Sender ok C: RCPT TO: <bob@sf.com> S: 250 bob@sf.com... Recipient ok C: DATA S: 354 Enter mail, end with "." on a line by itself C: How are you? C: See you soon. C:. S: 250 Message accepted for delivery C: QUIT S: 221 sf.com closing connection

Modularity for Computer Networks Hierarchical Layering: The type of functional modularity used for computer networks is hierarchical layering. What is special about this architecture is that it is distributed and connected through unreliable links with delays. Example: Postal Service When I bring a letter to the post office, I don t know how it gets delivered from there. The office clerk doesn t know the exact details either, and so on.

Modularity for Computer Networks Hierarchical Layering: The type of functional modularity used for computer networks is hierarchical layering. What is special about this architecture is that it is distributed and connected through unreliable links with delays. Example: Postal Service When I bring a letter to the post office, I don t know how it gets delivered from there. The office clerk doesn t know the exact details either, and so on.

Modularity for Computer Networks Hierarchical Layering: The type of functional modularity used for computer networks is hierarchical layering. What is special about this architecture is that it is distributed and connected through unreliable links with delays. Example: Postal Service When I bring a letter to the post office, I don t know how it gets delivered from there. The office clerk doesn t know the exact details either, and so on.

Layered Network Architecture Application Layer Transport Layer Network Layer Data Link Layer Physical Layer

Layered Network Architecture Application Layer Transport Layer Network Layer Data Link Layer Physical Layer There are several ways to define a layered network architecture. In this course, we consider the 5 Internet layers. Another model consists of the 7 OSI layers.

Outline Description of the different network layers Issues in layered network architecture > Read Chapter 1 in Textbook

Goals Know what the different layers do Know how layers interact Terminology: peer process, protocol, service

Application Layer Service: Supports applications Tasks: Connection Setup Flow control Error control Protocols: HTTP to support Web, SMTP to support email, FTP to support file transfer. Location: End Systems/Hosts

Application Layer Service: Supports applications Tasks: Connection Setup Flow control Error control Protocols: HTTP to support Web, SMTP to support email, FTP to support file transfer. Location: End Systems/Hosts

Application Layer Service: Supports applications Tasks: Connection Setup Flow control Error control Protocols: HTTP to support Web, SMTP to support email, FTP to support file transfer. Location: End Systems/Hosts

Application Layer Service: Supports applications Tasks: Connection Setup Flow control Error control Protocols: HTTP to support Web, SMTP to support email, FTP to support file transfer. Location: End Systems/Hosts

SMTP (Simple Mail Transfer Protocol) S: 220 sf.com C: HELO toronto.edu S: 250 Hello toronto.edu, pleased to meet you C: MAIL FROM: <alice@toronto.edu> S: 250 alice@toronto.edu... Sender ok C: RCPT TO: <bob@sf.com> S: 250 bob@sf.com... Recipient ok C: DATA S: 354 Enter mail, end with "." on a line by itself C: How are you? C: See you soon. C:. S: 250 Message accepted for delivery C: QUIT S: 221 sf.com closing connection

Transport Layer Service: Prepares messages for being transported over the network. Tasks: Message fragmentation and reassembly Flow Control Congestion control Error control Connection setup Protocols: TCP (Transmission Control Protocol), UDP (User Datagram Protocol) Location: End Systems/Hosts

Transport Layer Service: Prepares messages for being transported over the network. Tasks: Message fragmentation and reassembly Flow Control Congestion control Error control Connection setup Protocols: TCP (Transmission Control Protocol), UDP (User Datagram Protocol) Location: End Systems/Hosts

Transport Layer Service: Prepares messages for being transported over the network. Tasks: Message fragmentation and reassembly Flow Control Congestion control Error control Connection setup Protocols: TCP (Transmission Control Protocol), UDP (User Datagram Protocol) Location: End Systems/Hosts

Transport Layer Service: Prepares messages for being transported over the network. Tasks: Message fragmentation and reassembly Flow Control Congestion control Error control Connection setup Protocols: TCP (Transmission Control Protocol), UDP (User Datagram Protocol) Location: End Systems/Hosts

Network Layer Service: Sends data units over the network Tasks: Routing Addressing Congestion control Protocols: IP (Internet Protocol) Location: End Systems/Hosts + Routers

Network Layer Service: Sends data units over the network Tasks: Routing Addressing Congestion control Protocols: IP (Internet Protocol) Location: End Systems/Hosts + Routers

Network Layer Service: Sends data units over the network Tasks: Routing Addressing Congestion control Protocols: IP (Internet Protocol) Location: End Systems/Hosts + Routers

Network Layer Service: Sends data units over the network Tasks: Routing Addressing Congestion control Protocols: IP (Internet Protocol) Location: End Systems/Hosts + Routers

Data Link Layer Service: Sends data units over a link Tasks: Framing Error control Retransmissions Protocols: ARQ (Automatic Repeat Request), CSMA/CD for Ethernet and Wave LAN. Location: End Systems/Hosts + Routers

Data Link Layer Service: Sends data units over a link Tasks: Framing Error control Retransmissions Protocols: ARQ (Automatic Repeat Request), CSMA/CD for Ethernet and Wave LAN. Location: End Systems/Hosts + Routers

Data Link Layer Service: Sends data units over a link Tasks: Framing Error control Retransmissions Protocols: ARQ (Automatic Repeat Request), CSMA/CD for Ethernet and Wave LAN. Location: End Systems/Hosts + Routers

Data Link Layer Service: Sends data units over a link Tasks: Framing Error control Retransmissions Protocols: ARQ (Automatic Repeat Request), CSMA/CD for Ethernet and Wave LAN. Location: End Systems/Hosts + Routers

Physical Layer Service: Sends bits over a link Tasks: Modem (Modulator/Demodulator) Location: End Systems/Hosts + Routers

Physical Layer Service: Sends bits over a link Tasks: Modem (Modulator/Demodulator) Location: End Systems/Hosts + Routers

Physical Layer Service: Sends bits over a link Tasks: Modem (Modulator/Demodulator) Location: End Systems/Hosts + Routers

The Roller-Coaster Ride of a Message

A Closer Look

Terminology Peer or Peer Processes: Members of the same layer at different locations Protocol: Set of rules for how peers interact Protocol Stack: Set of protocol used (one per layer) Network Architecture or Network Reference Model: Set of layers that used for a network.

Terminology Peer or Peer Processes: Members of the same layer at different locations Protocol: Set of rules for how peers interact Protocol Stack: Set of protocol used (one per layer) Network Architecture or Network Reference Model: Set of layers that used for a network.

Terminology Peer or Peer Processes: Members of the same layer at different locations Protocol: Set of rules for how peers interact Protocol Stack: Set of protocol used (one per layer) Network Architecture or Network Reference Model: Set of layers that used for a network.

Terminology Peer or Peer Processes: Members of the same layer at different locations Protocol: Set of rules for how peers interact Protocol Stack: Set of protocol used (one per layer) Network Architecture or Network Reference Model: Set of layers that used for a network.

Growing Data Units Protocol Data Unit (PDU) Protocol Control Information (PCI) or Header Service Data Unit (SDU)

Growing Data Units Protocol Data Unit (PDU) Protocol Control Information (PCI) or Header Service Data Unit (SDU)

Growing Data Units Protocol Data Unit (PDU) Protocol Control Information (PCI) or Header Service Data Unit (SDU)

Growing Data Units Protocol Data Unit (PDU) Protocol Control Information (PCI) or Header Service Data Unit (SDU)

Question: Why Layers?

Layer Functions Error Control: makes the logical channel between two peer processes reliable. Flow Control: avoids overwhelming a slower peer process with protocol data units. Segmentation and Reassembly of Data Units Multiplexing: allows several higher-level sessions to share a single lower-level connection. Connection Setup: provides handshaking between peer processes.

Layer Functions Error Control: makes the logical channel between two peer processes reliable. Flow Control: avoids overwhelming a slower peer process with protocol data units. Segmentation and Reassembly of Data Units Multiplexing: allows several higher-level sessions to share a single lower-level connection. Connection Setup: provides handshaking between peer processes.

Layer Functions Error Control: makes the logical channel between two peer processes reliable. Flow Control: avoids overwhelming a slower peer process with protocol data units. Segmentation and Reassembly of Data Units Multiplexing: allows several higher-level sessions to share a single lower-level connection. Connection Setup: provides handshaking between peer processes.

Layer Functions Error Control: makes the logical channel between two peer processes reliable. Flow Control: avoids overwhelming a slower peer process with protocol data units. Segmentation and Reassembly of Data Units Multiplexing: allows several higher-level sessions to share a single lower-level connection. Connection Setup: provides handshaking between peer processes.

Layer Functions Error Control: makes the logical channel between two peer processes reliable. Flow Control: avoids overwhelming a slower peer process with protocol data units. Segmentation and Reassembly of Data Units Multiplexing: allows several higher-level sessions to share a single lower-level connection. Connection Setup: provides handshaking between peer processes.

Service Types Connection-Oriented: Connection setup through handshaking. After connection setup, data messages can be exchanged. During the handshaking, parameters used in the protocol can be exchanged/negotiated (to provide reliable data transfer, flow control, congestion control, etc.). Connectionless: No connection setup. Data messages are sent immediately. A connectionless service is by its nature unreliable.

Service Types Connection-Oriented: Connection setup through handshaking. After connection setup, data messages can be exchanged. During the handshaking, parameters used in the protocol can be exchanged/negotiated (to provide reliable data transfer, flow control, congestion control, etc.). Connectionless: No connection setup. Data messages are sent immediately. A connectionless service is by its nature unreliable.

Distributed Protocols

Issues Reliability Performance/Quality-of-Service (QoS)

Issues Reliability Performance/Quality-of-Service (QoS)

Issues Reliability Performance/Quality-of-Service (QoS)

Quality of Service Factors Determining the Quality of Service Delay Packet Loss Transmission Rate

Quality of Service Factors Determining the Quality of Service Delay Packet Loss Transmission Rate

Quality of Service Factors Determining the Quality of Service Delay Packet Loss Transmission Rate

Quality of Service Factors Determining the Quality of Service Delay Packet Loss Transmission Rate Why is Quality of Service Important?

Delay Processing Delay Queueing Delay Transmission Delay Propagation Delay

Delay Processing Delay Queueing Delay Transmission Delay Propagation Delay

Delay Processing Delay Queueing Delay Transmission Delay Propagation Delay

Delay Processing Delay Queueing Delay Transmission Delay Propagation Delay

Queueing Delay

Transmission Delay vs. Propagation Delay

Approach 1 Reliable Data Transfer 2 Tools for Performance Analysis/QoS Evaluation 3 Modelling and Analysis of Protocols 4 Implementation Issues