* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 3rd Edition: Chapter 2
Dynamic Host Configuration Protocol wikipedia , lookup
Distributed firewall wikipedia , lookup
TCP congestion control wikipedia , lookup
Airborne Networking wikipedia , lookup
Deep packet inspection wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Real-Time Messaging Protocol wikipedia , lookup
Hypertext Transfer Protocol wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
CS 372 – introduction to computer networks* Monday June 28 Announcements:  Lab 1 is due today  Lab 2 is posted today and is due next Tuesday  Assignment 1 is due tomorrow  Quiz 1 is tomorrow and it covers chapter 1 * Based in part on slides by Bechir Hamdaoui and Paul D. Paulson. Acknowledgement: slides drawn heavily from Kurose & Ross Chapter 2, slide: 1 Chapter 1: recap By now, you should know:  the Internet and its components  circuit-switching networks vs. packet-switching networks  different network access technologies  the three Tiers 1, 2, and 3  layered architecture of networks  types of delays Chapter 2, slide: 2 Chapter 2: Application Layer Our goals:  conceptual and implementation aspects of network application protocols  transport-layer service models  client-server paradigm  peer-to-peer paradigm  learn about protocols by examining popular application-level protocols  HTTP, FTP, P2P  programming network applications  socket API Chapter 2, slide: 3 Some network apps  e-mail  voice over IP  web  real-time video  instant messaging  remote login conferencing  grid computing  P2P file sharing  multi-user network games  streaming stored video clips Chapter 2, slide: 4 Creating a network app write programs that    run on (different) end systems communicate over network e.g., web server software communicates with browser software little software written for devices in network core  application transport network data link physical network core devices do not run user applications application transport network data link physical application transport network data link physical Chapter 2, slide: 5 Chapter 2: Application layer  Principles of network applications  Web and HTTP  File transfer: FTP  P2P file sharing  Socket programming with TCP Chapter 2, slide: 6 Application architectures There are 3 types of architectures:  Client-server  Peer-to-peer (P2P)  Hybrid of client-server and P2P Chapter 2, slide: 7 Client-server architecture server:    always-on fixed/known IP address serves many clients at same time clients:   client/server   communicate with server only may be intermittently connected may have dynamic IP addresses do not communicate directly with each other E.g., of client-server archit.:  Google, Amazon, MySpace, YouTube, Chapter 2, slide: 8 Pure P2P architecture  no always-on server  arbitrary end systems directly communicate  peers are intermittently connected and change IP addresses  example: BitTorrent peer-peer Pros and cons:  scalable and distributive  difficult to manage  not secure Chapter 2, slide: 9 Hybrid of client-server and P2P Skype  voice-over-IP P2P application  centralized server: finding address of remote party  client-client connection: direct (not through server) Instant messaging  chatting between two users is P2P  centralized service: client presence location • user registers its IP address with central server when it comes online • user contacts central server to find IP addresses of buddies Chapter 2, slide: 10 Processes communicating Process: is program running within a host.  processes in same host communicate using inter-process communication (managed by OS).  processes in different hosts communicate by exchanging messages Client process: process that initiates communication Server process: process that waits to be contacted  Note: applications with P2P architectures have client processes & server processes Chapter 2, slide: 11 Sockets  process sends/receives messages to/from its socket  socket analogous to door   sending process shoves message out door sending process relies on transport infrastructure on other side of door which brings message to socket at receiving process host or server host or server controlled by app developer process process socket socket TCP with buffers, variables Internet TCP with buffers, variables controlled by OS  App.Prog.Interf (API): (1) choice of transport protocol; (2) ability to fix a few parameters Chapter 2, slide: 12 Addressing processes  to receive messages, process must have identifier  host device has unique 32-bit IP address  Q: does IP address of host on which process runs suffice to identify the process?  A: No, many processes can be running on same host  identifier consists of:  IP address (host)  port numbers (process)  Example port numbers:  HTTP server: 80  Mail server: 25  to send HTTP message to gaia.cs.umass.edu web server:   IP address: 128.119.245.12 Port number: 80  more shortly… Chapter 2, slide: 13 App-layer protocol defines Question: why do we need an “App-layer protocol” ?  Types of messages exchanged,  e.g., request, response  Message syntax:  what fields in messages & how fields are delineated  Message semantics  meaning of information in fields Public-domain protocols:  defined in RFCs  allows for interoperability  e.g., HTTP, SMTP Proprietary protocols:  e.g., Skype  Rules for when and how processes send & respond to messages Chapter 2, slide: 14 What transport service does an app need? Data loss/reliability  some apps (e.g., audio) can tolerate some loss  other apps (e.g., file transfer, telnet) require 100% reliable data transfer Timing  some apps (e.g., Internet telephony, interactive games) require low delay to be “effective” Bandwidth  Bandwidth sensitive apps: some apps (e.g., multimedia) require minimum amount of bandwidth to be “effective”  other apps (“elastic apps”) make use of whatever bandwidth they get Security  Data encryption/ Decryption  Data Integrity  End-point authentication Chapter 2, slide: 15 Transport service requirements of common apps Data loss Bandwidth Time Sensitive file transfer e-mail Web documents real-time audio/video no loss no loss no loss loss-tolerant no no no yes, 100’s msec stored audio/video interactive games instant messaging loss-tolerant loss-tolerant no loss elastic elastic elastic audio: 5kbps-1Mbps video:10kbps-5Mbps same as above few kbps up elastic Application yes, few secs yes, 100’s msec yes and no Chapter 2, slide: 16 What services do Internet transport protocols provide? TCP service:  connection-oriented: setup     required between client and server processes reliable transport between sending and receiving process flow control: sender won’t overwhelm receiver congestion control: throttle sender when network overloaded does not provide: timing, minimum bandwidth guarantees UDP service:  unreliable data transfer between sending and receiving process  does not provide: connection setup, reliability, flow control, congestion control, timing, or bandwidth guarantee Q: why bother? Why is there a UDP? Chapter 2, slide: 17 Internet apps: application, transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony Application layer protocol Underlying transport protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] proprietary (e.g. Youtube) proprietary (e.g., Skype) TCP TCP TCP TCP TCP or UDP typically UDP Chapter 2, slide: 18 Principles of network applications: Review Questions Question 1: In P2P architecture, which process is the client and which one is the server? Question 2: What information is used by a process to identify another process to communicate with? Question 3: List 2 types of services an application may need from a transport protocol. Indicate whether TCP, UDP, neither, or both provide such a service Answer 1: Client: who requests Server: who responds Answer 2:   IP address of host Port number of process Answer 3:    Reliability: TCP Timing: none Bandwidth: none Chapter 2, slide: 19
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            