Verteilte Systeme. ISO- Referenzmodell. 2. Transport Layer (Wdh) OSI- Modell = Open Systems Interconnection Referenzmodell!

Similar documents
Network Programming TDC 561

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Overview of TCP/IP. TCP/IP and Internet

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

LESSON Networking Fundamentals. Understand TCP/IP

Network Models OSI vs. TCP/IP

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

The OSI and TCP/IP Models. Lesson 2

EXPLORER. TFT Filter CONFIGURATION

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Network Models and Protocols

Lecture 28: Internet Protocols

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Objectives of Lecture. Network Architecture. Protocols. Contents

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Internetworking and IP Address

The TCP/IP Reference Model

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

IT4405 Computer Networks (Compulsory)

Data Communication I

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Detailed Table of Contents

Cisco Configuring Commonly Used IP ACLs

Mathatma Gandhi University

Chapter 11. User Datagram Protocol (UDP)

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Network Security TCP/IP Refresher

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

8.2 The Internet Protocol

Linux MDS Firewall Supplement

Computer Networks/DV2 Lab

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Protocols. Packets. What's in an IP packet

UPPER LAYER SWITCHING

Computer Networks CS321

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

Data Communication Networks Introduction

Networking Test 4 Study Guide

Firewall VPN Router. Quick Installation Guide M73-APO09-380

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Multi-Homing Dual WAN Firewall Router

Communications and Computer Networks

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

A network monitoring tool for student training

3.2.2 Bandwidth Requirements

Transport Layer Protocols

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

Overview of Computer Networks

Ethernet. Ethernet. Network Devices

NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER.

Writing Client/Server Programs in C Using Sockets (A Tutorial) Part I. Session Greg Granger grgran@sas. sas.com. SAS/C & C++ Support

MANAGING NETWORK COMPONENTS USING SNMP

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

RARP: Reverse Address Resolution Protocol

Network Simulation Traffic, Paths and Impairment

Protocol Architecture

Layered Architectures and Applications

Network Security Fundamentals

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CPS221 Lecture: Layered Network Architecture

Cross-platform TCP/IP Socket Programming in REXX

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Communication Networks MAP-TELE 2012/13

Review: Lecture 1 - Internet History

CompTIA Network+ (Exam N10-005)

Internet Protocols. Addressing & Services. Updated:

Transport and Network Layer

Internetworking With TCP/IP

Protocols and Architecture. Protocol Architecture.

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Unit 4. Introduction to TCP/IP. Overview. Description. Unit Table of Contents

CSCI 362 Computer and Network Security

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Windows Sockets Network Programming

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

How do I get to

How To Design A Layered Network In A Computer Network

M3-R3: INTERNET AND WEB DESIGN

TCP/IP Basis. OSI Model

Basic Operation & Management of TCP/IP Networks

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internet Protocols. Background CHAPTER

Networking Basics and Network Security

Architecture and Performance of the Internet

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Chapter 5. Data Communication And Internet Technology

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Transcription:

Verteilte Systeme 2. Transport Layer (Wdh) ISO- Referenzmodell OSI- Modell = Open Systems Interconnection Referenzmodell! Protokollfamilien Realisierung Ebene 1-3: Hardware (Firmware) Netzwerk- Controller Ebene 4-7: Software (Verteilte) Anwendungen 7. Application Layer 6. Presentation Layer 5. Session Layer 4. Transport Layer 3. Network Layer 2. Link Layer 1. Physical Layer Kommunikationsnetzwerk Anwendungsorientierung Netzwerkorientierung 1

Ebene 4: Transport Layer Ende- zu- Ende- Protokoll Angabe der empfangenden Anwendung Meist zwei Protokolle: Verbindungslos (Datagramm) Verbindung (Reliable Stream) Aufgaben Quittungsbetrieb Sequenznummern Eliminierung von Duplikaten Flußkontrolle Ausnutzung der Speicher- kapazität des Mediums... Speicherfähigkeit des Mediums Abstand zur Erde (April 2013): 18481 Millionen Kilometer Roundtrip- Zeit: 34h, 13min, 48s Raumsonde Voyager 2 Annahme 100 Mbit pro Sekunde: 1.4 Tbyte Speicherkapazität 2

Ebene 5: Session Layer Kommunikationssitzungen Sicherungspunkte Recovery Wachsende Bedeutung Ebene 6: Presentation Layer Umwandlung von Datenformaten Offene Systeme Heterogenität Beispiele XDR (SUN- RPC), ASN.1, SOAP Verschlüsselung 3

Ebene 7: Application Layer Spezifische Anwendungsprotokolle Beispiele FTP - File Transfer Protocol rlogin - Remote Login NFS - Network File System NIS - Network Information System SMTP - Simple Mail Transfer Protocol X.400, POP.3,... - Ebenfalls Mail- Protokolle HTTP - Hypertext Transfer Protocol... Transport Layer 4

Motivation UDP and TCP are the transport layer protocols UDP is connection- less, notification TCP is connection- oriented, reliable stream IP is network- layer protocol Host to host protocol Addressing, routing, and other network- centric functionality Well suited to form networks of networks Overview in Relation to OSI Model Application-Layer Protocols FTP, TELNET, SMTP, DNS, NSP, NTP, HTTP,... Layer 4-7 RPC Protocols PVM, MPI, Corba, DCE,... UDP TCP Layer 3 IP / ICMP / ARP / RARP / Routing Layer 1-2 IEEE 802.X X.25 5

IP Address (IPv4) Class A: 2 7-2 networks with at most 2 24-2 computers 0 netid(7) hostid(24) Class B: 2 14-2 networks with at most 2 16-2 computers 1 0 netid(14) hostid(16) Class C: 2 21-2 networks with at most 2 8-2 computers 1 1 0 netid(21) hostid(8) Bit 32 24 16 8 Bit 1 IPv6 128 Bit addresses Unicast and Multicast Anycast Any member of a given group receives message Usually the closest one Accelerators (Akamai), Proxies, DNS,... 6

UDP UDP = User Datagram Protocol End to End version of IP Introduces port number to identify sending and receiving process Best effort Loss of messages possible Message may be received out of order No flow control 8 byte header Maximum size of UDP packet = 64 kbyte including header UDP supports multicast Ping Pong Using UDP and TCP in applications Runtime libraries for all common languages available Java and.net provide easy to use abstractions Lots of details needed in case of C/C++ 7

Details Two C# program are sending a virtual ball back and forth using UdpClient First player creates an UdpClient and lets the operating system decide on the port number Then it prints hostname and port number to allow the second to connect Second connects and sends a ball Both player send ball back and forth for a given number of turns Solution UdpClient covers most functionality Must derive from UdpClient to access protected Client property required to derive port number First Player: p = new UdpClient(0); Print p.hostname and p.portnumber while (turns-- > 0) { ball = p.receive(ref peer); Sleep for some time; p.send(ball,peer); } Second Player: p = new UdpClient(hostname,port); p.send(ball,player1); while (turns-- > 0) { ball = p.receive(ref peer); Sleep for some time; p.send(ball,peer); } 8

Playing Ping Pong TCP TCP = Transmission Control Protocol Reliable Stream Connection- oriented Establish a connection before being able to send Full- Duplex Both communication partners can send and receive Send and receive granularity may differ TCP endpoint looks like a handle to read from and write to file 9

Connection Establishment Asymmetric solution One partner is awaiting connection requests (passive) This is called the server The other partner is initiating the connection (active) This one is typically called client Client Client Server Server Server has a dedicated end point just to receive connect requests Client 2 Each time a connection is accepted, a new end point just for communication with this one client is created Client Server Connection to Client Compute A Sum Remotely 4, 3, 22, 13 Client Server 42.NET based solution in C# 10

Server Client 11

Example in plain C Example from http://cs.baylor.edu/~donahoo/practical/csockets/code/tcpechoserver.c D.E. Comer, D.L. Stevens Internetworking with TCP/IP, Volume I- III Prentice- Hall, 1993 W. Stevens TCP/IP Illustrated, Volume 1: The Protocols (1994) TCP/IP Illustrated, Volume 3: T/TCP, HTTP,... (1996) Addison- Wesley G. Wright, W. Stevens TCP/IP Illustrated, Volume 2: The Implementation Addison- Wesley, 1995 A. Jones, J. Ohlund, L. Olson Network Programming for the Microsoft.NET Framework Microsoft Press, 2003 Charles M. Kozierok The TCP/IP Guide No Starch Press, 2005 References 12