1 / 22

CPSC156a: The Internet Co-Evolution of Technology and Society

Explore the layered architecture of the Internet and the role of the IP layer in routing messages. Learn about protocols like HTTP, DNS, Telnet, TCP, and UDP, and understand how routers and IP packets work. Discover the benefits and challenges of packet delivery, error detection, and retransmission. Dive into the concepts of TCP connections, closing connections, and handling lost or corrupted packets. Gain insights into the growth of UDP traffic and the future of routing in connecting networks.

Download Presentation

CPSC156a: The Internet Co-Evolution of Technology and Society

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 4: September 16, 2003 Internet Layers and “the Web”

  2. Layering in theIP Protocols Simple NetworkManagement HTTP (Web) Domain Name Service Telnet Transmission Control Protocol User Datagram Protocol Internet Protocol Ethernet SONET ATM

  3. The Role of the IP Layer 3. Routers look at destination, decide where to send it next. 1. Message is put in IP packet. • Internet Protocol (IP): gives a standard way to “package” messages across different hardware types. 4. Packet gets to destination network. 2. Dial-up hardware gets packet to router (however it wants, but intact). 5. Original message extracted from packet. router router server … … PPP modem FDDI router 100BaseTEthernet 10BaseTEthernet access point hub

  4. IP Connectionless Paradigm • No error detection or correction forpacket data • Higher-level protocol can provide error checking • Successive packets may not follow the same path • Not a problem as long as packets reach the destination • Packets can be delivered out-of-order • Receiver can put packets back in order (if necessary) • Packets may be lost or arbitrarily delayed • Sender can send the packets again (if desired) • No network congestion control (beyond “drop”) • Send can slow down in response to loss or delay

  5. IP Packet Structure 4-bit Header Length 8-bit Type of Service (TOS) 16-bitTotal Length (Bytes) 4-bit Version 3-bit Flags 16-bit Identification 13-bit Fragment Offset 20-byte Header 8-bit Time to Live (TTL) 8-bitProtocol 16-bit Header Checksum 32-bit Source IP Address 32-bit Destination IP Address Options (if any) Payload

  6. Main IP Header Fields • Version number (e.g., version 4, version 6) • Header length (number of 4-byte words) • Header checksum (error check on header) • Source and destination IP addresses • Upper-level protocol (e.g., TCP, UDP) • Length in bytes (up to 65,535 bytes) • IP options (security, routing, timestamping, etc.) • TTL (prevents messages from looping around forever; packets “die” if they “get lost”)

  7. Adding Some Functionality • More guarantees, e.g., that packets go in order, require more work at both ends. • Solution: add another layer (e.g., TCP) Source Destination Encapsulation original msg original msg msg TCP hdr TCP TCP msg (or without TCP) (or without TCP) IP hdr IP IP TCP hdr msg hardware

  8. Transmission Control Protocol (TCP) • Byte-stream socket abstractionfor applications • Retransmission of lost or corrupted packets • Flow-control to respond to network congestion • Simultaneous transmission in both directions • Multiplexing of multiple logical connections TCP connection source network destination

  9. TCP Header 16-bit destination port number 16-bit source port number 32-bit sequence number 20-byte Header 32-bit acknowledgement number U R G A C K P S H R S T S Y N F I N 4-bit header length 16-bit window size 16-bit urgent pointer 16-bit TCP checksum Options (if any) Payload

  10. Establishing a TCP Connection B ACK FINACK FIN SYNACK SYN ACK Data A time • Three-way handshake to establish connection • Host A sends a SYN (open) to the host B • Host B returns a SYN acknowledgment (ACK) • Host A sends an ACK to acknowledge the SYNACK • Closing the connection • Finish (FIN) to close and receive remaining bytes(and other host sends a FINACK to acknowledge) • Reset (RST) to close and not receive remaining bytes

  11. Lost and Corrupted Packets • Detecting corrupted and lost packets • Error detection via checksum on header and data • Sender sends packet, sets timeout, and waits for ACK • Receiver sends ACKs for received packets • Retransmission from sender • Sender retransmits lost/corrupted packets • Receiver reassembles and reorders packets • Receiver discards corrupted and duplicated packets Packet loss rates are high (e.g., 10%),causing significant delay (especially forshort Web transfers)!

  12. User Datagram Protocol (UDP) • Some applications do not want or need TCP • Don’t need recovery from lost or corrupted packets • Don’t want flow control to respond to loss/congestion • Fraction of UDP packets is rapidly increasing • Commonly used for multimedia applications • UDP traffic interferes with TCP performance • But, many firewalls do not accept UDP packets • Dealing with the growth in UDP traffic • Pressure for applications to apply flow control • Future routers may enforce “TCP-like” behavior • Need better mathematical models of TCP behavior

  13. Connecting Networks Autonomous System (AS) Autonomous System (AS) EarthLink AOL WorldNet Autonomous System: A collection of IP subnets and routers under the same administrative authority. Interior Routing Protocol (e.g., Open Shortest Path First) Exterior Routing Protocol (e.g., Border Gateway Protocol)

  14. Where to Go Next • Routers contain a forwarding table that pairs destination with next hop (on what physical wire to send msg.). • The table gets populated with information learned internally (e.g., OSPF) and externally (e.g., BGP). • OSPF and BGP are protocols that communicate knowledge about destinations between routers.

  15. Getting from A to B: Summary • Need IP addresses for: • Self (to use as source address) • DNS Server (to map names to addresses) • Default router to reach other hosts(e.g., gateway) • Use DNS to get destination address • Pass message through TCP/IP handler • Send it off! Routers will do the work: • Physically connecting different networks • Deciding where to next send packets

  16. HTTP(Hypertext Transfer Protocol) • Standard protocol for web transfer • “Request-response” interaction between clients and servers • Request methods: GET, HEAD, PUT, POST, DELETE,… • Response: Status line + additional info (e.g., a web page) Example, from HW1, of a request line: <form action=“http://lab.zoo.cs.yale.edu/cs156/cgi-bin/sendform.cgi” method=“post”>

  17. HTML (Hypertext Markup Language) • Language in which web pages are written • Contains formatting commands • Tells browser what to display and how to display • <TITLE> Welcome to Yale </TITLE> • - The title of this page is “Welcome to Yale” • <B> Great News! </B> • - Set “Great News!” in boldface • <A HREF=”http://www.cs.yale.edu/index.html”>Yale Computer Science Department </A> • A link pointing to the web page http://www.cs.yale.edu/index.html with the text“Yale Computer Science Department” displayed.

  18. What does “http://www.cs.yale.edu/index.html” mean? Protocol Host, Domain Name Local File http www.cs.yale.edu index.html

  19. Simple HTML Commands in HW1 Lastname: <input type=“text” name=“lastname”><br> Firstname: <input type=“text” name=“firstname” id=“firstname”><br> Lastname: Firstname: <input type=“submit” value=“submit form”><br> Submit form

  20. Discussion Point • Packets, decentralized control, “intelligence at the endpoints” • Now we’ve built a “byte-stream socket abstraction,” pairs of which look like a “conversation.” Have we gained anything?

  21. Yes: The WWW Revolution! • Late 1990: WWW, HTTP, HTML, “Browser” invented by Tim Berners-Lee at CERN. • Mid-1994: Mosaic Communications founded (later renamed to Netscape Communications). • 1995: “Browsing” has become a universal pastime. IE ships with Windows 95. • New businesses (e.g., portal companies) enabled. • Old businesses (e.g., book selling) revolutionized. • Triumph of Internet architecture and ethos: layering, “stupid network,” open standards.

  22. Reading Assignment for this Week Chapter 1 of Information Rules, by Shapiro and Varian. (Available in paper form only; distributed in class.)

More Related