Download ppt

Document related concepts

Network tap wikipedia , lookup

Dynamic Host Configuration Protocol wikipedia , lookup

Distributed firewall wikipedia , lookup

AppleTalk wikipedia , lookup

Airborne Networking wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

I²C wikipedia , lookup

Deep packet inspection wikipedia , lookup

IEEE 1355 wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

TCP congestion control wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Internet protocol suite wikipedia , lookup

Transcript
CMPE 151: Network
Administration
Lecture 2
Winter 2005
Review?


Network protocols.
TCP/IP.
Winter 2005
Outline



Network protocols.
IP
TCP
Winter 2005
What are protocols?



Set of rules governing communication
between network elements (applications,
hosts, routers).
Protocols define:
 Format and order of messages.
 Actions taken on receipt of a message.
Protocols are hard to design

We need design guidelines!
Winter 2005
Protocol stack
User A
Teleconferencing
User B
Peers
Application
Transport
Network
Link
Host
Host
Layering: technique to simplify complex systems
Winter 2005
Layering Characteristics



Each layer relies on services from layer
below and exports services to layer
above.
Interface defines interaction,
Hides implementation - layers can
change without disturbing other layers
(black box).
Winter 2005
Encapsulation
Winter 2005
OSI Model: 7 Protocol Layers







Physical: how to transmit bits
Data link: how to transmit frames
Network: how to route packets hop2hop
Transport: how to send packets end2end
Session: how to tie flows together
Presentation: byte ordering, security
Application: everything else!
Winter 2005
Layering Functionality






Reliability
Flow control
Fragmentation
Multiplexing
Connection setup (handshaking)
Addressing/naming (locating peers)
Winter 2005
Example: Transport layer



First end-to-end layer.
End-to-end state.
May provide reliability, flow and
congestion control.
Winter 2005
Example: Network Layer



Point-to-point communication.
Network and host addressing.
Routing.
Winter 2005
Internetworking
Winter 2005
Internetworking

Interconnection of 2 or more networks
forming an internetwork, or internet.


LANs, MANs, and WANs.
Different networks mean different
protocols.

TCP/IP, IBM’s SNA, DEC’s DECnet, ATM,
Novell and AppleTalk.
Winter 2005
Internetworks (cont’d)
Winter 2005
TCP/IP
• TCP/IP is the most widely used
internetworking protocol suite
– Initially funded through ARPA.
– Picked up by NSF.
– Used in the Internet.
• Other internetworking protocols exist but are
less used
– Example: AppleTalk, X.25, etc.
Winter 2005
IP
Winter 2005
The Internet Protocol: IP



Glues Internet together.
Common network-layer protocol spoken
by all Internet participating networks.
Best effort datagram service:


No reliability guarantees.
No ordering guarantees.
Winter 2005
IP (cont’d)
• IP is responsible for datagram routing.
• Important: each datagram is routed
independently!
– Two different datagrams from same source to same
destination can take different routes!
– Why?
– Implications?
Winter 2005
IP (cont’d)
• IP provides a best effort delivery mechanism
– Does not guarantee to prevent duplicate
datagrams, delayed and out-of-order delivery,
corruption of data or datagram loss
• Reliable delivery is provided by the transport
layer, not the network layer (IP)
• Network layer (IP) can detect and report errors
without actually fixing them
Winter 2005
The Internet Protocol
Host
Host
Application
Transport
IP
Router
Router
IP
IP
Network
IP
Network
Winter 2005
Datagrams


Transport layer breaks data streams into
datagrams which are transmitted over
Internet, possibly being fragmented.
When all datagram fragments arrive at
destination, reassembled by network
layer and delivered to transport layer at
destination host.
Winter 2005
IP Datagram Format


IP datagram consists of header and
data (or payload).
Header:


20-byte fixed (mandatory) part.
Variable length optional part.
Winter 2005
IP Versions

IPv4: IP version 4.



Current, predominant version.
32-bit long addresses.
IPv6: IP version 6.


Evolution of IPv4.
Longer addresses (16-byte long).
Winter 2005
Payload
Header
IP(v4) Header Format
Winter 2005
Encapsulation
• Each datagram is encapsulated within a data link
layer frame
– The whole datagram is placed in the data area of
the frame.
– The data link layer addresses for source and
destination included in the frame header.
Winter 2005
Encapsulation - Example
Winter 2005
Encapsulation Across
Multiple Hops
• Each router in the path from source to
destination:
– Decapsulates datagram from incoming frame.
– Forwards datagram - determines next hop.
– Encapsulate datagram in outgoing frame.
Winter 2005
Encapsulation Across
Multiple Hops - Example
Winter 2005
Maximum Transfer Unit
• Each data link layer technology specifies the
maximum size of a frame.
– Called the Maximum Transfer Unit (MTU).
• Ethernet: 1,500 bytes.
• Token Ring: 2048 or 4096 bytes.
• What happens when large packet wants to travel
through network with smaller MTU?
• Maximum payloads (data portion of datagram)
range from 48 bytes (ATM cells) to 64Kbytes (IP
packets).
Winter 2005
Fragmentation
• Another solution (used by IP): fragmentation.
• Gateways break packets into fragments to fit the
network’s MTU; each sent as separate datagram.
• Gateway on the other side have to reassemble
fragments into original datagram.
Winter 2005
Keeping Track of Fragments




Fragments must be numbered so that
original data stream can be reconstructed.
Define elementary fragment size that can pass
through every network.
When packet fragmented, all pieces equal to
elementary fragment size, except last one (may
be smaller).
Datagram may contain several fragments.
Winter 2005
Fragmentation - Example
Winter 2005
Addressing
Winter 2005
Universal Addressing
• One key aspect of internetworks is unique
addresses.
• Sending host puts destination internetworking
address in the packet.
• Destination addresses can be interpreted by
any intermediate router/gateway.
• Router/gateway examines address and
forwards packet on to the destination.
Winter 2005
IP Addresses
• Each machine on the Internet has a unique IP address.
• The IP address is different from the “physical” /“MAC”
address.
– The “physical address” is the address of a computer
(actually, of a NIC) in the LAN.
• It is only know within the LAN.
– The IP address is a universal address.
– When a packet arrives in a LAN, there needs to be a
conversion from IP to MAC address (local “address
resolution”).
Winter 2005
IP Addresses (cont’d)
• An IP address is represented by a binary
number with 32 bits (in IPv4).
– Meaning that there are around 4 billion
addresses.
– Often IP addresses are represented in “dotted
decimal”, such as 128.114.144.4.
• Each group of numbers can go from 0 to 255.
Winter 2005
IP Address Organization
• Each IP address is divided into a prefix and a
suffix
– Prefix identifies network to which computers
are attached.
– Suffix identifies computers within that
network.
Winter 2005
Network and Host Numbers
• Every network in a TCP/IP internet is assigned a
unique network number.
• Each host on a specific network is assigned a host
address that is unique within that network.
• Host’s IP address is the combination of the network
number (prefix) and host address (suffix).
• Assignment of network numbers must be coordinated
globally; assignment of host addresses can be
managed locally.
Winter 2005
IP Address Format
• IP address are 32 bits long.
• There are different classes of addresses,
corresponding to different subdivisions of the 32
bits into prefix and suffix.
– Some address classes have large prefix, small
suffix.
• Many such networks, few hosts per network.
– Other address classes have small prefix, large
suffix.
• Few such networks, many hosts per network.
Winter 2005
IP Address Format (cont’d)
• How can we recognize to which class an IP
address belongs to?
– Look at the first 4 bits!
Winter 2005
IP Address Format (cont’d)
• Class A, B and C are primary classes.
– Used for ordinary addressing.
• Class D is used for multicast, which is a
limited form of broadcast.
– Internet hosts join a multicast group.
– Packets are delivered to all members of the
group.
– Routers manage delivery of single packets
from source to all members of multicast group.
• Class E is reserved.
Winter 2005
IP Addresses (cont’d)
• Another way to determine the address class
is by looking at the first group of numbers in
the dotted decimal notation
Winter 2005
Networks and Hosts
in Each Class
Winter 2005
Understanding IP Addresses
• Examples:
– 10.0.0.37 (class A)
– 128.10.0.1 (class B)
– 192.5.48.3 (class C)
Winter 2005
IP addresses: how to get one?
• ICANN (Internet Corporation for Assigned Names
and Numbers) coordinate IP address
assignment.
• How does host get its IP address in the network?
2 possibilities:
– 1: Hard-coded by system administrator in a file
inside the host.
– 2: DHCP: “Dynamic Host Configuration Protocol”
• Dynamically get address: “plug-and-play”.
Winter 2005
DHCP
• DHCP allows a computer to join a new network
and automatically obtain an IP address The
network administrator establishes a pool of
addresses for DHCP to assign.
• When a computer boots, it broadcasts a DHCP
request to which a server sends a DHCP reply.
Winter 2005
DHCP (Cont’d)
• DHCP allows non-mobile computers that run
server software to be assigned a
permanent address (won’t change when the
computer reboots).
– The permanent address actually needs to be
re-negotiated after a certain period of time.
Winter 2005
The Internet Transport
Protocols: TCP and UDP

UDP: user datagram protocol (RFC
768).


Connection-less protocol.
TCP: transmission control protocol
(RFCs 793, 1122, 1323).

Connection-oriented protocol.
Winter 2005
UDP

Provides connection-less, unreliable service.




Low overhead.


No delivery guarantees.
No ordering guarantees.
No duplicate detection.
No connection establishment/teardown.
Suitable for short-lived connections.

Example: client-server applications.
Winter 2005
TCP


Reliable end-to-end communication.
TCP transport entity:



Runs on machine that supports TCP.
Interfaces to the IP layer.
Manages TCP streams.


Accepts user data, breaks it down and sends it
as separate IP datagrams.
At receiver, reconstructs original byte stream
from IP datagrams.
Winter 2005
TCP Reliability

Reliable delivery.



ACKs.
Timeouts and retransmissions.
Ordered delivery.
Winter 2005
TCP Service Model 1

Obtained by creating TCP end points.





Example: UNIX sockets.
Socket number or address: IP address + 16-bit
port number (TSAP).
Multiple connections can terminate at same
socket.
Connections identified by socket ids at both ends.
Port numbers below 1024: well-known ports
reserved for standard services.

List of well-known ports in RFC 1700.
Winter 2005
TCP Service Model 2


TCP connections are full-duplex and
point-to-point.
Byte stream (not message stream).

A
Message boundaries are not preserved
e2e.
B
C
4 512-byte segments sent as
separate IP datagrams
D
ABCD
2048 bytes of data delivered
to application in single READ
Winter 2005
TCP Byte Stream


When application passes data to TCP, it may
send it immediately or buffer it.
Sometimes application wants to send data
immediately.




Example: interactive applications.
Use PUSH flag to force transmission.
TCP could still bundle PUSH data together (e.g., if it
cannot transmit it right away).
URGENT flag.

Also forces TCP to transmit at once.
Winter 2005
TCP Protocol Overview 1

TCP’s TPDU: segment.



20-byte header + options.
Data.
TCP entity decides the size of segment.


2 limits: 64KByte IP payload and MTU.
Segments that are too large are
fragmented.

More overhead by addition of IP header.
Winter 2005
TCP Protocol Overview 2

Sequence numbers.



Reliability, ordering, and flow control.
Assigned to every byte.
32-bit sequence numbers.
Winter 2005
TCP Connection Setup

3-way handshake.
Host 1
SYN (SEQ=x)
SYN(SEQ=y,ACK=x+1)
(SEQ=x+1, ACK=y+1)
Winter 2005
Host 2
TCP Connection Release 1

Abrupt release:


Send RESET.
May cause data loss.
Winter 2005
TCP Connection Release 2

Graceful release:

Each side of the connection released
independently.




Either side send TCP segment with FIN=1.
When FIN acknowledged, that direction is shut down for
data.
Connection released when both sides shut down.
4 segments: 1 FIN and 1 ACK for each
direction; 1st. ACK+2nd. FIN combined.
Winter 2005
TCP Connection Release 3

Timers to avoid 2-army problem.


If response to FIN not received within
2*MSL (maximum segment lifetime), FIN
sender releases connection.
After connection released, TCP waits for
2*MSL (e.g., 120 sec) to ensure all old
segments have aged.
Winter 2005
TCP Transmission




Sender process initiates connection.
Once connection established, TCP can
start sending data.
Sender writes bytes to TCP stream.
TCP sender breaks byte stream into
segments.


Each byte assigned sequence number.
Segment sent and timer started.
Winter 2005
TCP Transmission (cont’d)

If timer expires, retransmit segment.



After retransmitting segment for maximum
number of times, assumes connection is dead
and closes it.
If user aborts connection, sending TCP
flushes its buffers and sends RESET
segment.
Receiving TCP decides when to pass
received data to upper layer.
Winter 2005
TCP Flow Control

Sliding window.

Receiver’s advertised window.


Size of advertised window related to receiver’s
buffer space.
Sender can send data up to receiver’s
advertised window.
Winter 2005
TCP Flow Control: Example
App. writes
2K of data
App. does
3K write
Sender
blocked
Sender
may send up
to 2K
4K
2K;SEQ=0
2K
ACK=2048; WIN=2048
2K; SEQ=2048
0
App. reads
2K of data
ACK=4096; WIN=0
ACK=4096; WIN=2048
1K; SEQ=4096
2K
1K
Winter 2005
TCP Flow Control:
Observations

TCP sender not required to transmit
data as soon as it comes in from
application.


Example: when first 2KB of data comes in,
could wait for more data since window is
4KB.
Receiver not required to send ACKs as
soon as possible.

Wait for data so ACK is piggybacked.
Winter 2005
Congestion Control

Why do it at the transport layer?


Use law of “conservation of packets”.



Real fix to congestion is to slow down sender.
Keep number of packets in the network constant.
Don’t inject new packet until old one leaves.
Congestion indicator: packet loss.
Winter 2005
TCP Congestion Control

Like, flow control, also window based.



Sender keeps congestion window (cwin).
Each sender keeps 2 windows: receiver’s
advertised window and congestion window.
Number of bytes that may be sent is
min(advertised window, cwin).
Winter 2005
TCP Congestion Control
(cont’d)

Slow start [Jacobson 1988]:




Connection’s congestion window starts at 1
segment.
If segment ACKed before time out,
cwin=cwin+1.
As ACKs come in, current cwin is increased
by 1.
Exponential increase.
Winter 2005
TCP Congestion Control
(cont’d)

Congestion Avoidance:





Third parameter: threshold.
Initially set to 64KB.
If timeout, threshold=cwin/2 and cwin=1.
Re-enters slow-start until cwin=threshold.
Then, cwin grows linearly until it reaches
receiver’s advertised window.
Winter 2005
cwin
TCP Congestion Control:
Example
timeout
threshold
threshold
time
Winter 2005
TCP Retransmission Timer

When segment sent, retransmission
timer starts.


If segment ACKed, timer stops.
If time out, segment retransmitted and
timer starts again.
Winter 2005
How to set timer?



Based on round-trip time: time between
a segment is sent and ACK comes back.
If timer is too short, unnecessary
retransmissions.
If timer is too long, long retransmission
delay.
Winter 2005
Jacobson’s Algorithm 1

Determining the round-trip time:





TCP keeps RTT variable.
When segment sent, TCP measures how
long it takes to get ACK back (M).
RTT = alpha*RTT + (1-alpha)M.
alpha: smoothing factor; determines
weight given to previous estimate.
Typically, alpha=7/8.
Winter 2005
Jacobson’s Algorithm 2

Determining timeout value:




Measure RTT variation, or |RTT-M|.
Keeps smoothed value of cumulative
variation D=alpha*D+(1-alpha)|RTT-M|.
Alpha may or may not be the same as
value used to smooth RTT.
Timeout = RTT+4*D.
Winter 2005
Client-Server Model
Client File Server
Kernel
Kernel
Winter 2005
Printer Server
Kernel
File Transfer



Sharing remote files: “on-line” access
versus “file transfer”.
“On-line” access transparent access to
shared files, e.g., distributed file
system.
Sharing through file transfer: user
copies file then operates on it.
Winter 2005
The Web and HTTP
Winter 2005
The Web

WWW, or the world-wide web is a
resource discovery service.



Resource space is organized hierarchically,
and resources are linked to one another
according to some relation.
Hypertext organization: link “granularity”;
allows links within documents.
Graphical user interface.
Winter 2005
The Client Side

Users perceive the Web as a vast collection
of information.




Page is the Web’s information transfer unit.
Each page may contain links to other pages.
Users follow links by clicking on them which takes
them to the corresponding page.
This process can go on indefinetly, traversing
several pages located in different places.
Winter 2005
The Browser

Program running on client that retrieves and
displays pages.




Interacts with server of page.
Interprets commands and displays page.
Examples: Mosaic, Netscape’s Navigator and
Communicator, Microsoft Internet Explorer.
Other features: back, forward, bookmark,
caching, handle multimedia objects.
Winter 2005
Domain Name System (DNS)


Basic function: translation of names
(ASCII strings) to network (IP)
addresses and vice-versa.
Example:

zephyr.isi.edu <-> 128.9.160.160
Winter 2005
DNS



Hierarchical name space.
Distributed database.
RFCs 1034 and 1035.
Winter 2005
How is it used?

Client-server model.




Client DNS (running on client hosts), or
resolver.
Application calls resolver with name.
Resolver contacts local DNS server (using
UDP) passing the name.
Server returns corresponding IP address.
Winter 2005
Name Resolution 1


Application wants to resolve name.
Resolver sends query to local name server.



Resolver configured with list of local name servers.
Select servers in round-robin fashion.
If name is local, local name server returns
matching authoritative RRs.


Authoritative RR comes from authority managing the
RR and is always correct.
Cached RRs may be out of date.
Winter 2005
Name Resolution 2

If information not available locally (not
even cached), local NS will have to ask
someone else.

It asks the server of the top-level domain
of the name requested.
Winter 2005
Electronic Mail

Non-interactive.


Deferred mail (e.g., destination temporarily
unavailable).
Spooling:


Message delivery as background activity.
Mail spool: temporary storage area for
outgoing mail.
Winter 2005
Mail system
User
sends mail
User
interface
User
reads mail
Outgoing
mail
spool
Mailboxes
incoming
mail
Winter 2005
Client
(send)
TCP
connection
(outgoing)
Server TCP
(receive) connection
(incoming)
Observations




When user sends mail, message stored
is system spool area.
Client transfer runs on background.
Initiates transfer to remote machine.
If transfer succeeds, local copy of
message removed; otherwise, tries
again later (30 min) for a maximum
interval (3 days).
Winter 2005
Remote access
Winter 2005
Telnet
User’s
machine
Telnet
client
Telnet
server
OS
OS
TCP connection
over Internet
Winter 2005
Telnet basic operation




When user invokes telnet, telnet client on
user machine establishes TCP connection to
specified server.
TCP connection established; user’s keystrokes
sent to remote machine.
Telnet server sends back response, echoed on
user’s terminal.
Telnet server can accept multiple concurrent
connections.
Winter 2005