1 / 20

Lecture 2

Lecture 2. Networking Primer. millions of connected computing devices: hosts, end-systems pc’s workstations, servers PDA’s phones, toasters running network apps communication links fiber, copper, radio, satellite routers: forward packets (chunks) of data thru network.

nitesh
Download Presentation

Lecture 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 2 Networking Primer

  2. millions of connected computing devices: hosts, end-systems pc’s workstations, servers PDA’s phones, toasters running network apps communication links fiber, copper, radio, satellite routers: forward packets (chunks) of data thru network Visualizing the Internet router workstation server mobile local ISP regional ISP company network

  3. roughly hierarchical national/international backbone providers (NBPs) e.g. BBN/GTE, Sprint, AT&T, IBM, UUNet interconnect (peer) with each other privately, or at public Network Access Point (NAPs) regional ISPs connect into NBPs local ISP, company connect into regional ISPs local ISP local ISP NAP NAP Internet structure: network of networks regional ISP NBP B NBP A regional ISP

  4. National Backbone Provider e.g. Sprint US backbone network

  5. Links between computers • Point to point link -- a direct cable or wire that is dedicated for use between the computers. • Multiple access link -- shared between many nodes -- example a bus, wireless medium etc.

  6. Why structure ? • Direct connectivity does not scale -- all computers cannot be directly connected to each other. • Need organization • End hosts -- clients and servers -- usually house information • Routers and switches -- nodes that are primarily used for relaying information -- sending information where it needs to go.

  7. The definition of a behavior --set of rules Here: the format of a communication exchange: Sequence of actions, format of information, predefined interpretation connection reply. Get http://gaia.cs.umass.edu/index.htm Got the time? 2:00 <file> time What’s a protocol? Hi connection req. Hi

  8. Packets • Packets are similar to postal letters -basic units of information • From, to, content • Postman handles all packets similarly • Addressing is hierarchical. • The protocol that defines how packets are to be “routed” is the Internet Protocol or IP. • Hierarchical addresses like in the postal world.

  9. ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Organization of air travel • a series of steps

  10. ticket (complain) baggage (claim) gates (unload) runway landing airplane routing ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing Organization of air travel: a different view Layers: each layer implements a service • via its own internal-layer actions • relying on services provided by layer below

  11. application: supporting network applications ftp, smtp, http transport: host-host data transfer tcp, udp network: routing of datagrams from source to destination ip, routing protocols link: data transfer between neighboring network elements ppp, ethernet, wireless link physical: bits “on the wire or wireless” -- representation, signal modulation. application transport network link physical Internet protocol stack

  12. Why layering? Dealing with complex systems: • modularization eases maintenance, updating of system • change of implementation of layer’s service transparent to rest of system • e.g., change in gate procedure doesn’t affect rest of system • Isolating “functions” and interactions components • layered reference model for discussion

  13. Each layer: distributed “entities” implement layer functions at each node entities perform actions, exchange messages with peers network link physical application transport network link physical application transport network link physical application transport network link physical application transport network link physical Layering: logical communication

  14. E.g.: transport take data from app add addressing, reliability check info to form “datagram” send datagram to peer wait for peer to ack receipt analogy: post office network link physical application transport network link physical application transport network link physical application transport network link physical application transport network link physical data data data ack Layering: logical communication transport transport

  15. network link physical application transport network link physical application transport network link physical application transport network link physical application transport network link physical data data Layering: physical communication

  16. Message flow through stack • At each layer, headers added. • A protocol defines maximum packet size -- might require higher layer packet to be fragmented. M M1 H M2 H M2 H H M1 H H

  17. M M H H H H H H H H H H H H n t t l t t l n n n t t M M M M application transport network application transport network M M Protocol layering and data Each layer takes data from above • adds header information to create new data unit • passes new data unit to layer below source destination message segment datagram frame link physical link physical

  18. end systems (hosts): run application programs e.g., WWW, email at “edge of network” client/server model client host requests, receives service from server e.g., WWW client (browser)/ server; email client/server peer-peer model: host interaction symmetric e.g.: Gnutella, KaZaA The network edge:

  19. Goal: data transfer between end sys. handshaking: setup (prepare for) data transfer ahead of time Hello, hello back human protocol set up “state” in two communicating hosts TCP - Transmission Control Protocol Internet’s connection-oriented service TCP service[RFC 793] reliable, in-order byte-stream data transfer loss: acknowledgements and retransmissions flow control: sender won’t overwhelm receiver congestion control: senders “slow down sending rate” when network congested Network edge: connection-oriented service

  20. Goal: data transfer between end systems same as before! UDP - User Datagram Protocol [RFC 768]: Internet’s connectionless service unreliable data transfer no flow control no congestion control Network edge: connectionless service

More Related