comm basics 2on1a

Upload: sridhar-gopal

Post on 08-Apr-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 Comm Basics 2on1a

    1/23

    Communication Systems Basics of communication and Internet 1.1 04/05 www.tm.uka.de

    Outline Communication trends and scalability

    Basics of data communication

    How the Internet works

    Design Principles and threats for the Internet architecture

    Basics of Communication

    and the InternetCircle Lecture Communication Systems

    Winter Term 2004/2005

    Prof. Dr. M. ZitterbartInstitute of TelematicsDr.-Ing. Roland Bless

    Communication Systems Basics of communication and Internet 1.2 04/05 www.tm.uka.de

    Communication Trends

    Mobile Communications

    Paradigm: anybody, anytime, anywhere

    Expected: more mobile phone subscribers than POTS subscribers(Germany: already 48 Mio. at the end of 2000)

    Technical Communications Today: communication between users

    Tomorrow: communication between machines, e.g.

    Production infrastructure: tele-metrics, tele-diagnosis, tele-operations

    Communications between vehicles:

    Home networks: sensors, security, appliances

    IP-based Communications

    Internet Protocol IP as media independent access Voice-Over-IP technology is rolling out

    All-IP networks: Telcos will switch to IP for voice calls

  • 8/7/2019 Comm Basics 2on1a

    2/23

    Communication Systems Basics of communication and Internet 1.3 04/05 www.tm.uka.de

    Everything goes IP

    IP

    IP

    IP

    Communication Systems Basics of communication and Internet 1.4 04/05 www.tm.uka.de

    Internet Growth

    #Hosts worldwide (Mio.)

    0

    50

    100

    150

    200

    250

    300

    91 92 93 94 95 96 97 98 99 00 01 02 03 04

    Year

    Survey based on #hosts registered in DNS

  • 8/7/2019 Comm Basics 2on1a

    3/23

    Communication Systems Basics of communication and Internet 1.5 04/05 www.tm.uka.de

    Constant change is presumably the only constant in the Internet

    Internet survived the tremendous growth: it still works!

    One says: it is scalable

    What means scalability?

    ScalabilityA scalable system works even when there is tremendous growth (e.g., byseveral orders of magnitude, i.e., over several scales) of certain systemparameters

    Why important? Technological development shows often leaps in order of amagnitude (c.f. Moores Law, CPU, bandwidth, memory)

    Example for no or bad scalability:

    Performance of a non-scalable system decreases (strongly) as certainparameter values increase, possibly until the whole system fails

    Growth and Scalability

    t

    X(t)

    X(t)

    Systemperformance

    Communication Systems Basics of communication and Internet 1.6 04/05 www.tm.uka.de

    Evolving Internet important aspects

    Past

    Data communication between research institutions

    Common goals

    Trust relationships between users

    Technically skilled users

    Consistent and coherent architecturePresence

    Global infrastructure of the information society

    New interest groups and commercialization (ISPs, service providers)

    Loss of trust relationships

    Average consumers, technically unskilled

    Out of own interests, technologies and extensions are realized, which

    are used for short-time fulfillment of demand

    are largely done without architectural thinking

    are not consistent with the Internet architecture

    endanger the coherence of the internet

  • 8/7/2019 Comm Basics 2on1a

    4/23

    Communication Systems Basics of communication and Internet 1.7 04/05 www.tm.uka.de

    Data Communications

    Communication (original meaning):

    Exchange of data between human communication partners.

    Every concrete communication is data communication

    N.B.: Information is extracted from data by the process of interpretation

    Data communication(more narrow definition in literature and habitual language use):

    Transmission of digital data between telecommunication devices

    Communication (Usage of the term in this lecture):

    immaterial media:

    Energy flows, usually electric currents, electromagnetic waves

    Opposite: material data transport (e.g. letters, shipping of disks)

    Data (tele)communication is the generic term for each dataexchange using immaterial media and greater distances

    between men and/or machines(abbreviated: Data communication = communication).

    Data (tele)communication is the generic term for each dataexchange using immaterial media and greater distancesbetween men and/or machines

    (abbreviated: Data communication = communication).

    Communication Systems Basics of communication and Internet 1.8 04/05 www.tm.uka.de

    Basic model of telecommunication

    Participants act as senders or receivers

    The service usage by participants occurs at a special service interface, using

    a service access point Different service primitive types: Request, Indication, Response, Confirmation

    The Medium bridges the spatial distance

    medium

    sender receiver

    messagemessage

    spatial distance

    service interfaceservice

    access point

  • 8/7/2019 Comm Basics 2on1a

    5/23

    Communication Systems Basics of communication and Internet 1.9 04/05 www.tm.uka.de

    What is a protocol?A communication protocol describes a set of rules, according to which thecommunication between two or more parties must be performed.

    TCP/IP protocols

    e.g. file transfer, electronic mail

    Computer communication protocols

    Communication protocols

    e.g. discussion, conversation

    Ethernet WLAN

    IPX DECnet

    ISO/OSI protocols

    AppleTalk

    Communication Systems Basics of communication and Internet 1.10 04/05 www.tm.uka.de

    Service and Protocol

    Service User 1 Service User 2

    ServiceProvider 1

    ServiceProvider 2

    Service

    Service

    Protocol

  • 8/7/2019 Comm Basics 2on1a

    6/23

    Communication Systems Basics of communication and Internet 1.11 04/05 www.tm.uka.de

    A Model for Telecommunication Systems

    Sender Receiver

    Physical medium

    telecommunication system

    ...

    ...

    layer n

    layer n-1

    layer 1entity 1entity 1

    entity n-1entity n-1

    entity nentity n

    entity 1entity 1

    entity n-1entity n-1

    entity nentity n

    A layer offers a service to its upper layer

    The service is provided by the cooperation of the layer entitiesaccording to a specified protocol

    Communication Systems Basics of communication and Internet 1.12 04/05 www.tm.uka.de

    ISO/OSI and Internet Model

    ISO/OSI too complex, but OK as logical model

    Too restrictive (no cross-layer information exchange)

    Redundant functionality in different layers

    Too heavy-weight for simple network devices like printers, etc.

    Internet model similar, but simplified (esp. Application layer)

    Media Access

    Internet

    Transport

    Application

    Physical

    Data Link

    Network

    Transport

    Session

    Application

    Presentation

    ISO/OSI BasicReference Model

    InternetReference Model

    7

    6

    5

    4

    3

    2

    1

  • 8/7/2019 Comm Basics 2on1a

    7/23

    Communication Systems Basics of communication and Internet 1.13 04/05 www.tm.uka.de

    Physical Layer

    Tasks

    Accesses the physical medium directly (e.g. cable)

    Unsecured connection between systems

    Transport of unstructured bit sequences via a physical medium

    Comprises (among other things) physical link, conversion data signals

    Signal Transmission Modes

    Baseband Transmission

    Native and fully digital:discrete signal levels, periodic and discrete transition intervals

    Maximum data rate for channel with bandwidth B according to

    Nyquist: rmax [bit/s] =2 B log2 n, (n=number of discrete levels, noise-less channel)

    Shannon: rmax [bit/s] = B log2 (1 + S/N) (noisy channel, S/N=Signal-to-noise ratio)

    Broadband Transmission

    Modulation (amplitude, frequency, phase or combination thereof)

    Modem (modulator/demodulator) required

    t

    S(t)

    t

    S(t)

    Communication Systems Basics of communication and Internet 1.14 04/05 www.tm.uka.de

    Medium-Access/Data Link Layer

    Tasks

    Structuring the data stream

    Synchronization, Framing, Code Transparency

    Protection against errors and loss

    Use of checksum to detect bit errors (e.g., CRC: Cyclic Redundancy Check)

    Reliable link layers use sequence numbers, timers and acknowledgments todetect loss of data packets and to recover by automatic retransmission

    Flow control

    Media access control in case of shared media

    Network Access

    Local Area Networks, e.g., Ethernet, Token-Ring, Token-Bus, WirelessLANs, ....

    Ethernet-Frame

    Metropolitan Area and Wide-Area Networks: Modems, Fiber, DSL, ...

    Preambel56 bit

    Preambel

    56 bit StartDel(8 bit)

    StartDel

    (8 bit) DestAddr(16/48 bit)

    DestAddr

    (16/48 bit) SrcAddr(16/48 bit)

    SrcAddr

    (16/48 bit) Length(16 bit)

    Length

    (16 bit) Data(12.000 bit)

    Data

    (12.000 bit) PAD(0-368 bit)

    PAD

    (0-368 bit) FCS(32 bit)

    FCS

    (32 bit)

  • 8/7/2019 Comm Basics 2on1a

    8/23

    Communication Systems Basics of communication and Internet 1.15 04/05 www.tm.uka.de

    Network Layer

    Tasks

    Concatenation of point-to-pointconnections to end-system connections

    Uniform addressing of nodes

    Address mapping todata link layer addresses

    Transmission quality possiblyselectable

    Routing

    Flow control, congestion control

    Switching concepts

    Circuit Switching (Classical telephony, e.g. ISDN)

    Packet Switching (Internet)

    Virtual Connections (ATM: Asynchronous Transfer Mode)

    Message Relaying

    Physical Medium

    Media Access

    NetworkLayer

    TransportLayer

    Application-orientedLayers

    End-system A End-system B

    IEEE 802.3IEEE 802.3

    IPIPIP

    TCPTCPTCP

    IEEE 802.3IEEE 802.3

    IPIPIP

    IEEE 802.5IEEE 802.5 IEEE 802.5IEEE 802.5

    IPIPIP

    TCPTCPTCPIntermediate System

    Physical Medium

    Communication Systems Basics of communication and Internet 1.16 04/05 www.tm.uka.de

    Network Layer: Internet Protocol

    E-Mail, WWW, Telephony ....

    SMTP, HTTP, RTP, BEEP, ...

    UDP, TCP,

    SCTP, ...

    IP

    Ethernet,PPP, ...

    CSMA, CDMA, Asynch., SDH, ...

    Copper, Glass Fibre, Radio, ...

    IP layer enables

    Bigger network

    Global addressing

    Hide network details and changesfrom end-to-end protocols

    A single protocol (Hourglass Model)

    maximizes interoperability

    minimizes the number of service interfaces

    Lean protocol

    Requires minimal common network functionality

    in order to maximize the numberof usable networks

    End-to-End principle

    Robustness by stateless operation

    See also:

    http://www.iab.org/Documents/hourglass-london-ietf.pdf

  • 8/7/2019 Comm Basics 2on1a

    9/23

    Communication Systems Basics of communication and Internet 1.17 04/05 www.tm.uka.de

    Routing in the Internet

    Problem

    How are data packets forwarded in the Internet?

    Method

    Routing table gives information about the next hop

    The protocol IP(Internet Protocol) conducts theforwarding of data

    Datagram protocol

    connectionless

    unreliable

    segmentation andreassembly

    Uses Internet addressing Uses further protocols like

    ICMP (Internet Control Message Protocol)

    ARP (Address Resolution Protocol)

    IGMP (Internet Group Management Protocol)

    Transport layer: UDP, TCP

    Data link layer

    Physical layer

    Routing protocols RIP, OSPF, BGP

    Routing protocols RIP, OSPF, BGP

    Protocol IP Addressing Datagram formatPacket handling

    Protocol IP Addressing Datagram formatPacket handling

    Protocol ICMP error reports Signalling betweenrouters

    Protocol ICMP error reports Signalling betweenrouters

    Routingtable

    Address resolution ARP, RARP

    Address resolution ARP, RARP

    Communication Systems Basics of communication and Internet 1.18 04/05 www.tm.uka.de

    Format of an IPv4 data unit

    Type of Service (8)

    Total Length (16)

    Identifier (16)

    Time to Live (8)

    Protocol (8)

    Header Checksum (16)

    Source Address (32)

    Destination Address (32)

    Options and Padding (variable)

    Data (variable)

    Header Length (4)Version (4)

    Flags (3) Fragment Offset (13)

    P P P D T R 0 0

    reservedPrecedence111 Network Control110 Internetwork Control

    101 CRITIC/ECP100 Flash Override011 Flash010 Immediate001 Priority000 Routine

    According toRFC 791(obsolete)

    Delay: 0 normal1 low

    Throughput: 0 normal1 high

    Reliability: 0 normal1 highNEW:

    0 1 2 3 4 5 6 7

    R

    6 7543210

    DS FieldDifferentiated Services

    ECNExplicitCongestionNotification

  • 8/7/2019 Comm Basics 2on1a

    10/23

    Communication Systems Basics of communication and Internet 1.19 04/05 www.tm.uka.de

    Structure of IPv4 addresses

    Subnet masks mark the area of the IP address describing the network and the sub-network. This area is marked as ones (1) in the binary form of the subnet mask.

    Example

    IP address: 129. 13. 3. 64

    Subnet mask: 255. 255. 255. 0 =1111 1111 1111 1111 1111 1111 0000 0000

    Network written in prefix notation: 129.13.3.0/24

    Globally visible network is only 129.13.0.0/16 (formerly Class B network)

    Network: 129. 13.

    Subnet: 3.

    End system: 64

    If the subnet mask only covers the network part, there is no subnet part(e.g. subnet mask 255.255.0.0 in case of class B)

    Note: Systems attached to several networks (e.g. routers), have several, network-specificIP addresses!

    IP addresses

    network partnetwork part

    network partnetwork part subnet partsubnet part end systemend system

    local partlocal part

    Communication Systems Basics of communication and Internet 1.20 04/05 www.tm.uka.de

    Mapping of IP and MAC addresses If (Destination IP address AND Subnet mask)

    = (Own IP address AND Subnet mask) Receiver is in the same IP subnet! So I can use a link layer connection...

    Problem:Which MAC address does the next system on the route to the target have?

    Scheme

    Application

    08002B90102456

    Application

    ????????????????

    TCP

    IP

    MAC

    TCP

    IP

    MAC

    12 . 0 . 0 . 34

    TCPConnect with

    12 . 0 . 0 . 21

    12 . 0 . 0 . 21

    Internet

  • 8/7/2019 Comm Basics 2on1a

    11/23

    Communication Systems Basics of communication and Internet 1.21 04/05 www.tm.uka.de

    Forwarding in an IP router

    Routing table (Routing Information Base) Constructed by routing protocols: contains several alternative routes to the destination

    Forwarding table (Forwarding Information Base) Only selected/active routes: IP address of next hop and identification of the interface used

    Address resolution table Built by ARP: MAC address of the next system for the IP address of the end system

    Example Destination: end system B; Source: end system A

    Data packet on the way from router 1 to router 2:

    MAC addresses: MAC address IP-Router 2 (dest) and MAC address IP-Router 1(source)

    IP addresses: end system B (destination), end system A (source)

    End system A

    129.13.3.108

    End system B

    145.5.9.27

    MAC-BMAC-A

    IP-Router 1

    IP-Router 2

    129.13.3.60

    132.2.2.3

    132.2.2.7

    145.5.9.19

    Communication Systems Basics of communication and Internet 1.22 04/05 www.tm.uka.de

    Forwarding in an IP router

    Router functions

    Determine the IP address of the subsequent system (Next Hop)

    Simple routers have often only a routing table for their subnets and a default route for allother destinations

    Mapping of this IP address to the connection point address (MAC address)

    Sending the IP data unit to the next hop on the corresponding interface via layer 2

    IP addresses (Source/Destination) in the IP packet remain unchanged!

    Router 1

    129.13.3.108145.5.9.27

    MAC-AMAC-B

    Router 2

    129.13.3.60132.2.2.3

    132.2.2.7145.5.9.19

    MAC-R2-A

    MAC-R1-B

    ...145.5.9.27

    129.13.3.108

    145.5.9.27

    ...

    Network scenario with router

    IP addresses MAC addresses

    End system AEnd system B

    If A If B If A If B

  • 8/7/2019 Comm Basics 2on1a

    12/23

    Communication Systems Basics of communication and Internet 1.23 04/05 www.tm.uka.de

    Network layer protocols

    IP (Internet Protocol)

    ARP (Address Resolution Protocol)

    RARP (Reverse ARP)

    ICMP (Internet Control Message Protocol)

    IGMP (Internet Group ManagementProtocol)

    SNAP (Subnetwork Access Protocol)

    Routing protocols

    RIP (Routing Information Protocol)

    BGP (Border Gateway Protocol)

    EGP (External Gateway Protocol)

    OSPF (Open Shortest Path First)

    Network management

    SNMP (Systems Network ManagementProtocol)

    Transport protocols:

    UDP (Universal Datagram Protocol)

    TCP (Transmission Control Protocol)

    ARP RARP

    ICMP IGMP

    SNAP

    LLC-1

    Internet Protokoll

    BGP RIP SNMP

    EGP /IGP

    OSPFTCP UDP

    Routing in the Internet

    Protocols in an IP router

    Communication Systems Basics of communication and Internet 1.24 04/05 www.tm.uka.de

    Splitting networks into Autonomous Systems (AS) Otherwise entries in routing tables and amount of exchanged routing

    information not scalable

    Routers within AS have usually only detailed routing information about own AS

    There is at least one designated router that acts as interface to other ASes

    Advantages

    Scalability Internal routing table size depends on size of AS

    Changes within AS are usually only propagated within the AS if external connectivity is notaffected

    Autonomy Internet = Network of networks

    Routing is controlled by own organization

    Unique routing strategy within own system

    Internal routing protocols can vary between ASes

    Routing Hierarchy: View from 10,000m

    AS 110

    AS 111AS 100

    AS 101 AS 113

    AS 112

    AS 114

    AS 120

    AS 121

    AS 122

  • 8/7/2019 Comm Basics 2on1a

    13/23

  • 8/7/2019 Comm Basics 2on1a

    14/23

    Communication Systems Basics of communication and Internet 1.27 04/05 www.tm.uka.de

    Why Intra- and Inter-AS routing protocols?

    Policy

    Political question: which transit traffic is allowed to traverse the AS?

    Inter-AS: policies are selected by the provider

    Intra-AS: one organization, few policies necessary

    Scalability

    Inter-AS: further abstraction level;Size of routing tables and number of updates can be reduced, as failures withinone AS can mostly remain hidden

    Intra-AS: higher stability

    Performance

    Inter-AS: Policies are necessary and more important than performance metrics Intra-AS: Concentration on performance metrics

    Communication Systems Basics of communication and Internet 1.28 04/05 www.tm.uka.de

    Vertex=Node(router/

    subnet)

    Intra-AS Routing

    Well-known protocols for Intra-AS routing are

    RIP (Routing Information Protocol) Distance Vector Protocol

    OSPF (Open Shortest Path First) Link State Protocol

    IS-IS (Intra-Domain Intermediate System to Intermediate System RoutingProtocol) Link State Protocol

    originally ISO/OSI routing protocol

    used for IP by big providers

    EIGRP (Enhanced Interior Gateway Routing Protocol)

    CISCO proprietary

    Intra-AS routing protocols are often called Interior Gateway Protocols (IGP)

    OSPF:

    Connectivity and link states are flooded through the network

    Every router has the same view of the network

    Network is mapped to Graph (V,E) Calculates shortest paths

    with Dijkstras algorithmEdge=Link

  • 8/7/2019 Comm Basics 2on1a

    15/23

    Communication Systems Basics of communication and Internet 1.29 04/05 www.tm.uka.de

    OSPF hierarchy in an Autonomous System

    virtual

    connection

    interior Router

    border router

    N: Network

    R: Router

    ABR: Area Border Router

    ASBR: AS Boundary Router

    BBR: Backbone Router

    Routing Area(OSPF Area)

    R4(ABR)

    R3

    (ABR)

    R2

    R1

    R6

    R13(ASBR)

    R12(BBR)

    ASBR/ABR

    R8

    ASBR/ABR

    R5

    Autonomous System

    N1

    N2

    N3

    N4

    R9

    R11

    R10

    R7(ABR)

    ASBR/ABR

    Communication Systems Basics of communication and Internet 1.30 04/05 www.tm.uka.de

    Inter-AS Routing: Exterior BGP (EBGP)

    Exterior BGP is used between the BGP routers (also called BGPspeakers) connecting two ASes

    Path Vector protocol (AS path)

    Learn all destination prefixes that can be reached through the other AS

    An AS can prevent to receive traffic for certain destination by not

    announcing any route to it (i.e., policy by route filtering) These BGP routers should be directly connected

    Internal information will NEVER be forwarded directly to other BGPspeakers

    AS 1 AS 2

    BGP Speaker

  • 8/7/2019 Comm Basics 2on1a

    16/23

    Communication Systems Basics of communication and Internet 1.31 04/05 www.tm.uka.de

    Example for BGP topology

    110.0.0.0/8

    111.0.0.0/8

    100.0.0.0/8

    101.0.0.0/8 113.0.0.0/8

    112.0.0.0/8

    114.0.0.0/8

    120.0.0.0/8

    121.0.0.0/8

    122.0.0.0/8

    I want to send data to AS122!Which route should I use?

    Routing table AS100Network Next Hop Metric LocPrf Weight Path*> 121.0.0.0 10.1.1.110 0 110 114 121 i*> 122.0.0.0 10.1.1.110 0 110 114 122 iRouting table AS110

    Network Next Hop Metric LocPrf Weight Path* 121.0.0.0 10.1.1.111 0 111 112 114 121 i* 10.1.1.113 0 113 114 121 i*> 10.1.1.114 0 114 121 i*> 122.0.0.0 10.1.1.114 0 114 122 i* 10.1.1.111 0 111 112 114 122 i* 10.1.1.113 0 113 114 122 i

    AS 100

    AS 101

    AS 110AS 113

    AS 111

    AS 112

    AS 114

    AS 122

    AS 121

    AS 120

    Routing table AS114Network Next Hop Metric LocPrf Weight Path*> 112.0.0.0 10.1.1.112 0 0 112 i* 10.1.1.110 0 110 111 112 i*> 122.0.0.0 10.1.1.122 0 0 122 i

    Communication Systems Basics of communication and Internet 1.32 04/05 www.tm.uka.de

    Routing in "Default-Free-Zones"

    Two modes of operation of BGP (same protocol,but different rules) for the distributionof routing information

    Between two AS: with EBGP (External BGP)

    Within one AS: with IBGP (Internal BGP)

    Internal full mesh ofTCP connections necessary

    No distribution of routes learnt withIBGP to IBGP neighbors

    AS X

    IBGP

    EBGP

    EBGP

    IBGP

    EBGP

    AS Y

    EBGP

    IBGP

    Full mesh unsuitable for big AS,

    possible solution lies in the implementation ofRoute reflectors (dedicated routers aspeering points)Confederations (private sub-AS)

    EBGP

    EBGP

  • 8/7/2019 Comm Basics 2on1a

    17/23

    Communication Systems Basics of communication and Internet 1.33 04/05 www.tm.uka.de

    Interior BGP (IBGP)

    BGP routers within one AS are connected with IBGP

    IBGP routers have to be fully meshed

    To learn routes for all external prefixes

    They inform about new networks (e.g. LANs)

    They do not propagate internal prefixes outwards

    No direct physical connections (but logical connections) between routersnecessary

    Each IBGP router must be able to communicate with each other IBGProuter

    IBGP messages are never forwarded to other BGP routers (to preventloops)

    Communication Systems Basics of communication and Internet 1.34 04/05 www.tm.uka.de

    Transport Layer

    Tasks

    End-to-end service

    application-based addressing (Ports)

    reliable/unreliable

    Reliable protocol

    Error and loss detection Retransmission

    Segmentation/Reassembly

    Flow control

    Congestion control

    Examples

    TCP (Transmission Control Protocol)

    UDP (User Datagram Protocol) SCTP (Stream Control Transmission Protocol)

    DCCP (Datagram Congestion Control Protocol)

  • 8/7/2019 Comm Basics 2on1a

    18/23

    Communication Systems Basics of communication and Internet 1.35 04/05 www.tm.uka.de

    Application Layer

    Protocols depend on the particular application

    This is also end-to-end

    Examples of protocols above the transport layer:

    telnet (Remote Login)

    SSH (Secure Shell, secure replacement for telnet)

    FTP (File Transfer Protocol)

    HTTP (Hypertext Transfer Protocol, HTML/Web Content Transport,Server/Client)

    BEEP (Blocks Extensible Exchange Protocol, Peer-to-Peer, many features)

    SSL/TLS (Transport Layer Security)

    SMTP (Mail Transport)

    DNS (Domain Name System) RTP (Streaming)

    Routing Protocols (OSPF, BGP, ...)

    ...many more...

    Communication Systems Basics of communication and Internet 1.36 04/05 www.tm.uka.de

    Internet architecture: Design goals

    Paper by D. Clark The Design Philosophy of the DARPA Internet Protocols

    (SIGCOMM '88) names:

    Fundamental goal: Internetworking (Connection of existing networks)

    Further goals (ordered by their importance):

    Robustness: sustain internet communication despite failure of networks and

    routers Support of multiple types of communication services

    Heterogeneity: Accommodation of a variety of networks

    Distributed resource management

    Cost effectiveness

    Host attachment with a low level of effort

    Resources used must be accountable

    Robustness against failures

    Fate-Sharing: acceptable to loose the state information associated with an

    entity if, at the same time, the entity itself is lost

    Do not store state in the network, but in the end systems instead

    Datagram concept as a consequence

  • 8/7/2019 Comm Basics 2on1a

    19/23

    Communication Systems Basics of communication and Internet 1.37 04/05 www.tm.uka.de

    Design principles: End-to-End Argument

    Decisions necessary in system design

    Which functionality is needed?

    Where should certain functions be placed?

    In the end systems or applications?

    In the network?

    Important design principle

    (explicitly expressed as recently as 1981 by Saltzer, Reed and Clark)

    The End-to-End-Argument (E2E argument):The function in question can completely and correctly be

    implemented only with the knowledge and help of the application standingat the end points of the communication system. Therefore, providing thatquestioned function as a feature of the communication system itself is not

    possible. (Sometimes an incomplete version of the function provided by thecommunication system may be useful as a performance enhancement.)

    Communication Systems Basics of communication and Internet 1.38 04/05 www.tm.uka.de

    Discussion End-to-End-Argument

    This means especially:specific functionality of the application layer usually can and shouldpreferably not be placed in the network itself

    Minimality principle:

    Avoid integrating more than the essential and necessary functionality into thenetwork

    Keep unnecessary functionality out of the network Keep it simple

    Not a strict law, rather a guideline

    Further goals and consequences of the E2E argument:

    Protection of innovation

    Simple to add new services

    Hard to change the infrastructure (see introduction of Multicast, IPv6, ECN, etc.)

    Reliability and robustness against failure and malfunction of end systems and network components

    If network components have to store state, the probability of connection failuresgrows with increasing network size

  • 8/7/2019 Comm Basics 2on1a

    20/23

    Communication Systems Basics of communication and Internet 1.39 04/05 www.tm.uka.de

    Consequences End-to-End-Argument

    Examples:

    Reliable file transfer

    Possible sources of error:

    Read errors in the end system

    Software errors during copying or buffering of data by the file system or file

    transfer program

    Hardware errors during these processes in CPU, memory, bus, etc.

    Loss, bit errors or duplicates in the communication system

    Crash/Failure of end systems (sender or receiver) during or after transfer

    Reliability of the communication system does not eliminate all errors

    Division of TCP/IP into TCP and IP in the late 70s

    End-to-End security Suppression of duplicates (e.g. caused by the application itself)

    Communication Systems Basics of communication and Internet 1.40 04/05 www.tm.uka.de

    Internet Architecture: Principles

    RFC 1958: Architectural Principles of the Internet

    Independence of the Internet Protocol of the medium and of hardware

    addressing

    If states have to be stored (e.g. routes, QoS-guarantees, Header

    Compression, ...), they should be self-healing

    Adaptive procedures and protocols for deriving and maintaining states

    Soft-State concept: State is periodically renewed (refreshed)

    Reduction of state information to a minimum

    Manually configured states should be reduced to an absolute minimum

  • 8/7/2019 Comm Basics 2on1a

    21/23

    Communication Systems Basics of communication and Internet 1.41 04/05 www.tm.uka.de

    Further design aspects

    RFC 3426 General Architectural and Policy Considerations(Internet Architecture Board)

    basic issues concerning protocol and system design

    no guidelines, no checklist

    Discussion and explanation on the basis of numerouscase studies (e.g. ECN)

    RFC 1122 Requirements for Internet Hosts -- Communication Layers

    Good documentation and discussion of design decisions

    Robustness principle (Jon Postel, see also http://www.postel.org):

    Be liberal in what you accept, and conservative in what you send

    Software should be able to react appropriately to every error even if itis highly unlikely

    Incoming packet can contain any combination of faults and attributes

    Assumption of intended/malicious generation of such packets

    Communication Systems Basics of communication and Internet 1.42 04/05 www.tm.uka.de

    Many aspects have changed since the outset of the internet

    Threats to the End-to-End-Argument? [RFC 3724]

    Loss of trust between end systems Introduction of security technologies

    Middleboxes (Proxies/NATs/Firewalls/Caches/...)

    Break of the End-to-End Principle (esp. security mechanisms) New service models: Quality of service becomes part of the service

    (Streaming A/V) Servers are distributed and placed closer to the user(e.g. Akamai, Realnetworks...)

    New parties involved: Internet Service Provider, Administrators of companynetworks, governments Restriction of services, interest of interposing (e.g. as a Trusted ThirdParty or for eavesdropping/taxation/censorship...)

    Technically uninterested users Context and configuration information is placed in the network in order todisburden the user

    Trends opposed to the E2E principle (1)

    Middlebox

  • 8/7/2019 Comm Basics 2on1a

    22/23

    Communication Systems Basics of communication and Internet 1.43 04/05 www.tm.uka.de

    Trends opposed to the E2E principle (2)

    Example: negative effects by security technologies

    Elimination of PATH-MTU-Discovery mechanisms by rigorous filteringof ICMP packets

    Filtering of packets with their ToS-Bits set prevents the usage of Explicit

    Congestion Notification Limitation of accessibility and available services by private addressing

    in Intranets

    Possible procedure for future mechanisms which seem to infringe upon theEnd-to-End principle:Split E2E-Argument into the components

    Protection of innovation

    Introduction of new mechanisms is easier in end systems

    Reliability/Robustness and trust

    add security, where necessary

    Communication Systems Basics of communication and Internet 1.44 04/05 www.tm.uka.de

    Loss of internet transparency

    Internet Transparency [RFC 2775]:

    original concept of a single universal logical addressing scheme

    Mechanisms which allow packets to flow essentially unchanged fromsource to destination

    Loss of transparency by:

    Intranets (Security, Restriction of applications and address transparency,network administrator has control) Dynamic addresses (SLIP/PPP, DHCP) Firewalls (Restriction of services and accessibility) SOCKS/Application Level Gateways Private addresses (not unique, restriction of accessibility and global

    communication) Network Address Translators (NATs) Application Level Gateways, Proxies, Caches Voluntary isolation (e.g. WAP-Proxies) and partner networks Split-DNS Tricks for load balancing

  • 8/7/2019 Comm Basics 2on1a

    23/23

    Communication Systems Basics of communication and Internet 1.45 04/05 www.tm.uka.de

    Conclusions

    Today we have networks everywhere, and, they are a critical part of the ITinfrastructure

    Most network systems and architectures use Internet protocols

    The Internet is a very scalable system

    Accommodated the tremendous growth in the past

    Thanks to the wise design decisions and architectural principles

    But for how long will its success continue?

    Requirements for more connectivity, machine-to-machine communicationetc. lead to the use of IPv6

    Current Inter-Domain routing scheme will probably fail to cope with growthof the next two decades...

    Tussle and conflicts in the Internet caused by parties with different interests