ECE/CS 372 introduction to computer networks Lecture 4

Similar documents
DNS and P2P File Sharing

DATA COMMUNICATOIN NETWORKING

First Midterm for ECE374 03/24/11 Solution!!

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

First Midterm for ECE374 03/09/12 Solution!!

Computer Networks - CS132/EECS148 - Spring

CSCI-1680 CDN & P2P Chen Avin

CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

1 Introduction: Network Applications

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

First Midterm for ECE374 02/25/15 Solution!!

Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

From Centralization to Distribution: A Comparison of File Sharing Protocols

Application Layer: HTTP and the Web. Srinidhi Varadarajan

Should Internet Service Providers Fear Peer-Assisted Content Distribution?

Domain Name System (DNS)

Distributed Systems Lecture 1 1

SiteCelerate white paper

How To Understand The Power Of A Content Delivery Network (Cdn)

AKAMAI WHITE PAPER. Delivering Dynamic Web Content in Cloud Computing Applications: HTTP resource download performance modelling

CSCI Topics: Internet Programming Fall 2008

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Lecture 8a: WWW Proxy Servers and Cookies

Key Components of WAN Optimization Controller Functionality

New York University Computer Science Department Courant Institute of Mathematical Sciences

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

Computer Networks & Security 2014/2015

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Final for ECE374 05/06/13 Solution!!

Performance Comparison of low-latency Anonymisation Services from a User Perspective

Wide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton)

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates

Giving life to today s media distribution services

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring Four parts

Computer Networks Homework 1

Large-Scale Web Applications

Application layer Protocols application transport

VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage)

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Digital Audio and Video Data

Dynamic Content Acceleration: Lightning-Fast Web Apps with Amazon CloudFront and Amazon Route 53

The Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst

ECE/CS 372 introduction to computer networks. Lecture 2. Midterm scheduled for Tuesday, May 7 th

Internet Content Distribution

Principles of Network Applications. Dr. Philip Cannata

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Chapter 2 Application Layer

SharePoint Performance Optimization

DATA COMMUNICATOIN NETWORKING

Network Applications

Multicast vs. P2P for content distribution

Web DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

Bandwidth consumption: Adaptive Defense and Adaptive Defense 360

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

Computer Networks and the Internet

Peer-to-Peer Networks

Master s Thesis. Design, Implementation and Evaluation of

Frequently Asked Questions

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

P2P: centralized directory (Napster s Approach)

Client/server and peer-to-peer models: basic concepts

Resource Pooling across the Internet. Mark Handley, UCL

Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Virtual machine interface. Operating system. Physical machine interface

RAID. RAID 0 No redundancy ( AID?) Just stripe data over multiple disks But it does improve performance. Chapter 6 Storage and Other I/O Topics 29

CS101 Lecture 19: Internetworking. What You ll Learn Today

Gatekeeper: Supporting Bandwidth Guarantees for Multi-tenant Datacenter Networks

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

Evolution of Peer-to-Peer Systems

IT Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4

Improving Deployability of Peer-assisted CDN Platform with Incentive

The Web History (I) The Web History (II)

Introduction: Why do we need computer networks?

Digital Communication in the Modern World Application Layer cont. DNS, SMTP

The BitTorrent Protocol

A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper

CGHub Client Security Guide Documentation

Measuring CDN Performance. Hooman Beheshti, VP Technology

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Content Delivery Networks

SuperGIS Server 3 High Availability Test Report

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Wireshark Lab: HTTP SOLUTION

The Internet. Charging for Internet. What does 1000M and 200M mean? Dr. Hayden Kwok-Hay So

Transcription:

ECE/CS 372 introduction to computer networks Lecture 4 Announcements: HW1 is due next Tuesday, April 16 th Extra credit due next Thursday, April 18 th h=p://wps.aw.com/ aw_kurose_network_3/21/5493/1406348.cw/index.html Acknowledgement: slides drawn heavily from Kurose & Ross Chapter 2, slide: 1

Web and HTTP: Review QuesPon A HTTP request consists of: 1 basic html object 2 referenced JPEG objects Each object is of size = 10 6 bits RTT = 1 second Transmission rate = 1Mbps Consider transmission delay of objects only QuesPon: how long it takes to receive the enpre page: a) Non- persistent connecpon b) Persistent without pipelining c) Persistent with pipelining inipate TCP connecpon RTT request file RTT file received time time Pme to transmit file Chapter 2, slide: 2

A HTTP request consists of: 1 basic html object 2 referenced JPEG objects Each object is of size = 10 6 bits RTT = 1 second Transmission rate = 1Mbps Consider transmission delay of objects only Web and HTTP: Review QuesPon Answer: (transmit Pme = 1 sec) a) 3+3+3=9 sec (inipate + request + transmit) for each of all 3 b) 1+2+2+2=7 sec inipate TCP connecpon RTT request file RTT file received time inipate + (request + transmit) for each of all 3 c) 1+2+3=6 sec inipate + (request + transmit for basic) + (one request for 2 + two transmits, one for each of the 2 objects) time Pme to transmit file Chapter 2, slide: 3

Web caches (or proxy server) Goal: sapsfy client request without involving origin server If page is needed, browser requests it from the Web cache Q: what if object not in cache?? cache requests object from origin server, then returns object to client client client Proxy server origin server origin server Chapter 2, slide: 4

More about Web caching Cache acts as both client and server Typically cache is installed by ISP (university, company, residential ISP) Why Web caching? reduce response time for client request reduce traffic on an institution s access link. Chapter 2, slide: 5

Caching example Assumptions avg. object size = 0.1x10 6 bits avg. request rate from institution to origin servers = 10/sec Internet delay = 2 sec Consequences utilization on LAN = 10% (LAN: local area network) utilization on access link = 100% total delay = Internet delay + access delay + LAN delay = 2 sec + 1 sec +.1 sec =3.1 sec unacceptable delay! institutional network public Internet 1 Mbps access link 10 Mbps LAN origin servers institutional cache Chapter 2, slide: 6

Caching example (cont) possible solution increase bandwidth of access link to, say, 10 Mbps public Internet origin servers consequence utilization on LAN = 10% utilization on access link = 10% Total delay = Internet delay + access delay + LAN delay = 2 sec +.1 sec +.1 sec = 2.2 sec often a costly upgrade total delay still dominated by Internet delay institutional network 10 Mbps access link 10 Mbps LAN institutional cache Chapter 2, slide: 7

Caching example (cont) origin servers 2 nd possible sol: web cache suppose hit rate is 0.4 (typically, between 0.3 & 0.7) consequence 40% requests will be sapsfied almost immediately and 60% requests sapsfied by origin server public Internet 1 Mbps access link uplizapon of access link reduced by 40%, giving an access delay in the order of milliseconds institutional network 10 Mbps LAN q Total delay = 0.4x(0.1) (LAN) + 0.6x(0.1+1+2) (LAN + access + Internet) = 1.9 sec total average delay reduced by about 40% institutional cache Chapter 2, slide: 8

Web cache (cont) Advantages are obvious: Reduce response time Reduce internet traffic Any problems with caches?? Local cache copies of web pages may not be up- to- date?? What do we do then? SoluPon Upon receiving a web request, a cache must consult origin server to check whether the requested page is up- to- date CondiPonal GET method v What: Sent by cache to origin server: check page status v When: For each new request: client checks with cache Chapter 2, slide: 9

Conditional GET Goal: don t send object if cache has up-to-date version How: cache specifies date of cached copy in HTTP request If-modified-since: <date> Server: response contains no object if cached copy is up-todate: HTTP/1.0 304 Not Modified cache HTTP request msg If-modifiedsince: <date> HTTP response HTTP/1.0 304 Not Modified HTTP request msg If-modifiedsince: <date> HTTP response HTTP/1.0 200 OK <data> server object not modified object modified Chapter 2, slide: 10

Chapter 2: Application layer Principles of network applications app architectures app requirements Web and HTTP P2P file sharing Chapter 2, slide: 11

File sharing approaches There are 2 approaches server Bob peers Centralized: Client-server architecture Distributed: P2P architecture (e.g., BitTorrent) server obtain list of peers trading chunks Alice peer Chapter 2, slide: 12

File sharing: P2P vs. client-server architectures Client-Server P2P Robustness to failure Scalability Security Performance Single point of failure Not scalable More secure Bottleneck Fault-tolerant Scalable Less secure Better Chapter 2, slide: 13

Comparing Client-Server, P2P architectures Question : What is the file distribution time: from one server to N hosts? File, size F Server u 1 d 1 u 2 u d 2 s u s : server upload bandwidth u i : client/peer i upload bandwidth d i : client/peer i download bandwidth d N u N Network (with abundant bandwidth) Chapter 2, slide: 14

Client-server: file distribution time server sequenpally sends N copies: F Server u u 2 1 d 1 u d s 2 time to send one copy: F/u s time to send N copies: NF/u s client i takes F/d i Pme to download QuesPon: What happens if client download rate is less than server s upload rate? d N u N Network (with abundant bandwidth) Time to distribute F to N clients using client/server approach = d cs = max { NF/u s, F/min(d i ) } increases linearly in N (for large N) Chapter 2, slide: 15

P2P: file distribution time server seed must send one copy: F/u s Pme client i takes F/d i Pme to download clients as aggregate must download NF bits - NF bits must be uploaded - max upload rate (limiting max download rate) is u s + Σu i F Server d N u N u u 2 1 d 1 u d s 2 Network (with abundant bandwidth) d P2P = max { F/u s, F/min(d i ), NF/(u s + Σu i) } i=1,n Chapter 2, slide: 16

Comparing Client-server, P2P architectures Server- client networks tend to perform slower when large number of users connect to server at the same Pme server must handle all user requests; performance is sacrificed P2P file sharing networks perform be=er with a large amount of users performance increases when number of users increases every client can be a server as well, when number of users increases, the number of providers also increases Minimum Distribution Time 3.5 3 2.5 2 1.5 1 0.5 0 P2P Client-Server 0 5 10 15 20 25 30 35 N Chapter 2, slide: 17

Chapter 2: Summary We covered general concepts, like: application architectures client-server, P2P application service requirements: reliability, bandwidth, delay Web and HTTP Non-Persistent, persistent, web cache Distribution time Client-server, P2P Chapter 2, slide: 18