cse 30264 computer networks
DESCRIPTION
CSE 30264 Computer Networks. Prof. Aaron Striegel Department of Computer Science & Engineering University of Notre Dame Lecture 2 – January 14, 2010. Bits. www.penny-arcade.com. Homework 1. Login to one of the CRC computers netscale01.cse.nd.edu netscale02.cse.nd.edu, … 1-4, 9-16 - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/1.jpg)
CSE 30264
Computer Networks
Prof. Aaron StriegelDepartment of Computer Science & Engineering
University of Notre Dame
Lecture 2 – January 14, 2010
![Page 2: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/2.jpg)
CSE 30264 2
Bits
Spring 2010
www.penny-arcade.com
![Page 3: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/3.jpg)
CSE 30264 3
Homework 1
• Login to one of the CRC computers– netscale01.cse.nd.edu– netscale02.cse.nd.edu, …– 1-4, 9-16
• Use SSH– First floor Fitzpatrick computer lab
• ssh [email protected]– Download F-Secure SSH from OIT
• oit.nd.edu
Spring 2010
![Page 4: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/4.jpg)
Spring 2010 CSE 30264 4
More Introduction
OutlineComputer Networks OverviewStatistical MultiplexingInter-Process CommunicationNetwork ArchitecturePerformance MetricsImplementation Issues
![Page 5: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/5.jpg)
CSE 30264 5
Building Blocks
• Nodes– Send / receive communications– Examples
• Host– Computer, smart phone
• Router– Speaks IP
• Switch– Speaks Layer 2– Ethernet, Wireless (802.11)
Spring 2010
Abstract representation
![Page 6: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/6.jpg)
6
Building Blocks
• Links– Connect the nodes– Hosts can have multiple interfaces– Types
• Point-to-point– Host to host– Fiber
• Multiple access– Multiple hosts share
Spring 2010 CSE 30264
![Page 7: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/7.jpg)
CSE 30264 7
Network
• Two or more nodes connected by a link
Spring 2010
Point-to-point
Multiple access
Point-to-point
![Page 8: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/8.jpg)
CSE 30264 8
Network of Networks
Spring 2010
![Page 9: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/9.jpg)
CSE 30264 9
Network of Networks
Spring 2010
![Page 10: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/10.jpg)
Spring 2010 CSE 30264 10
Strategies
• Circuit switching: carry bit streams– Original telephone network– PSTN – Public Switched Telephone Network
• Packet switching: store-and-forward messages– Ethernet LAN (Local Area Network)– Internet
![Page 11: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/11.jpg)
Spring 2010 CSE 30264 11
Addressing
• Address – Byte string that identifies a node– Usually unique but not always– Examples
• Ethernet address -> 00:FE:AB:23:12:34• IP address -> 129.74.250.100
– Most protocols involve two addresses• Source• Destination
![Page 12: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/12.jpg)
CSE 30264 12Spring 2010
![Page 13: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/13.jpg)
CSE 30264 13
Routing• Routing
– Process of forwarding messages to the destination node based on its address
– Involve multiple nodes, multiple links• Address Types
– Unicast: node-specific• Go to cnn.com
– Broadcast: all nodes on the network• TV signal
– Multicast: subset of nodes• Contact all students in CSE 30264
Spring 2010
![Page 14: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/14.jpg)
CSE 30264 14
Multiplexing
• What happens when we don’t need a dedicated link?– Multiplex or aggregate multiple users together
• When do I get the link?– Fixed or dynamic
Spring 2010
vs.
![Page 15: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/15.jpg)
Spring 2010 CSE 30264 15
Multiplexing• Time-Division Multiplexing (TDM)• Frequency-Division Multiplexing (FDM)• Wavelength Division Multiplexing (WDM)
![Page 16: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/16.jpg)
Spring 2010 CSE 30264 16
Statistical Multiplexing
• On-demand time-division• Schedule link on a per-packet basis• Packets from different sources interleaved on link• Buffer packets that are contending for the link• Buffer (queue) overflow is called congestion
■ ■ ■ FIFO
FCFS
![Page 17: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/17.jpg)
Spring 2010 CSE 30264 17
Inter-Process Communication
• Do useful stuff– Move my data
• Fill gap between what applications expect and what the underlying technology provides.
![Page 18: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/18.jpg)
Spring 2010 CSE 30264 18
IPC Abstractions
• Request/Reply– distributed file systems– digital libraries (web)
• Stream-Based– video: sequence of frames
• 1/4 NTSC = 352x240 pixels• (352 x 240 x 24)/8=247.5KB• 30 fps = 7500KBps = 60Mbps
– video applications• on-demand video• video conferencing
![Page 19: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/19.jpg)
Spring 2009 CSE 30264 19
Layering• Use abstractions to hide complexity• Abstraction naturally lead to layering• Alternative abstractions at each layer
![Page 20: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/20.jpg)
Spring 2010 CSE 30264 20
Protocols
• Rules of a network architecture• Each protocol has two different interfaces
– Service: Operations on this protocol• I need a socket with a timeout
– Peer-to-peer: Messages exchanged with peer(s) • Send this message to the other host
• Term “protocol” is overloaded– Specification of peer-to-peer interface– Module that implements this interface
![Page 21: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/21.jpg)
Spring 2010 CSE 30264 21
Interfaces
Change settingsof the protocol
Send / receive data to / from the other side
Socket
TCP / IP
![Page 22: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/22.jpg)
CSE 30264 22
Protocols
• Two primary types– RRP – Request / Reply Protocol
• Discrete• Telegram / Datagram• Very aware of packetized
nature of network– MSP – Message Stream Protocol
• On-going connection• Pushing data back / forth
Spring 2010
![Page 23: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/23.jpg)
Protocols vs. Layers• Layering Model
– Wrap, pass down – Stack -> network stack
• To achieve efficiency– Use pointers (C)– Network stack -> kernel level
• What does layering mean?– Downward awareness– Ignore context from above
• Block of data vs. HTTP GET request– Higher layers
• Looser structure, more complex– Lower layers
• Rigid structure, KISS, Gig E -> 12 microsec / packet (full size)
Spring 2010 CSE 30264 23
![Page 24: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/24.jpg)
Protocol Content• Header
– Pre-pend as it goes down the stack– Information added by a particular protocol– Address, type, length, options
• Processing Instructions– Identifier of upper layer type
• Ethernet -> Type / Len field (0x0800 = IP)• IP -> Protocol field (6 = TCP, 17 = UDP)
• Integrity– Did the message arrive correctly?– Checksum, hash
Spring 2010 CSE 30264 24
![Page 25: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/25.jpg)
Spring 2010 25
Machinery• Encapsulation (header/body)
– Wrap and pass down
Host Host
Applicationprogram
Applicationprogram
RRP
Data Data
HHP
RRP
HHP
Applicationprogram
Applicationprogram
RRP Data RRP Data
HHP RRP Data
CSE 30264
Q: Cheezeburger?
Q: Cheezeburger?TCP
Q: Cheezeburger?TCPIP
Q: Cheezeburger?TCPIP802.3
HHP – Host to Host Protocol
![Page 26: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/26.jpg)
Spring 2010 CSE 30264 26
OSI Architecture
![Page 27: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/27.jpg)
Spring 2010 CSE 30264 27
Internet Architecture• Defined by Internet Engineering Task Force (IETF)• Hourglass Design• Application vs Application Protocol (FTP, HTTP)
■ ■ ■
FTP
TCP UDP
IP
NET 1 NET2 NET n
HTTP NV TFTP
![Page 28: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/28.jpg)
CSE 30264
IETF RFC
Spring 2010
28
![Page 29: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/29.jpg)
Spring 2010 CSE 30264 29
What Goes Wrong in the Network?
• Bit-level errors (electrical interference)• Packet-level errors (congestion)• Link and node failures
• Packets are delayed• Packets are delivered out-of-order• Third parties eavesdrop
![Page 30: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/30.jpg)
Spring 2010 CSE 30264 30
Performance Metrics• Bandwidth (throughput)
– Data transmitted per time unit– Link, end-to-end– Notation
• KB = 210 bytes• Mbps = 106 bits per second
• Latency (delay)– Time to send message from point A to point B– One-way, round-trip time (RTT)– Components
Latency = Propagation + Transmit + QueuePropagation = Distance / cTransmit = Size / Bandwidth
• Relative importance– Timeliness requirements – elastic vs. inelastic– Size of data– Jitter
![Page 31: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/31.jpg)
Spring 2010 CSE 30264 31
Delay x Bandwidth Product (DBP)
• Amount of data “in flight” or “in the pipe”• Usually relative to RTT• Example: 100ms x 45Mbps = 560KB
![Page 32: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/32.jpg)
CSE 30264 32
Client-Server Paradigm
OutlineClient-Server ParadigmTypes of Server Implementations
Spring 2010
![Page 33: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/33.jpg)
What is a Server?
• Provides specific kind of service• Examples:
– Web– Email– Database– Printer– Ftp– File– Name– …
Spring 2010 CSE 30264 33
Server
Clients
request
response
![Page 34: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/34.jpg)
Client-Server Model
• Two computers– One provides a service (server)– One issues service requests (client)
• Specific form of interaction known:– a server starts first and awaits contact– a client starts second and initiates the connection
Spring 2010 CSE 30264 34
![Page 35: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/35.jpg)
Client Characteristics
• Most instances of client-server interaction have the same general characteristics
• A client software:– is an arbitrary application program that becomes a client
temporarily when remote access is needed, but also performs other computation
– is invoked directly by a user, and executes only for one session– runs locally on a user's personal computer– actively initiates contact with a server– can access multiple services as needed, but usually contacts one
remote server at a time– does not require especially powerful computer hardware
Spring 2010 CSE 30264 35
![Page 36: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/36.jpg)
Server Characteristics
• A server software:– is a special-purpose, privileged program – is dedicated to providing one service that can handle multiple
remote clients at the same time– is invoked automatically when a system boots, and continues to
execute through many sessions– runs on a large, powerful computer– waits passively for contact from arbitrary remote clients– accepts contact from arbitrary clients, but offers a single service– may require powerful hardware and a sophisticated operating
system (OS)
Spring 2010 CSE 30264 36
![Page 37: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/37.jpg)
Client-Server Model
Spring 2010 CSE 30264 37
![Page 38: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/38.jpg)
Terminology• Term server refers to a program that waits passively for communication
– Not to the computer on which it executes• However, when a computer is dedicated to running one or more server
programs, the computer itself is sometimes called a server• Hardware vendors contribute to the confusion
– because they classify computers that have fast CPUs, large memories, and powerful operating systems as server machines
Spring 2009 CSE 30264 38
![Page 39: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/39.jpg)
Requests and Responses
• Once contact has been established, two-way communication is possible (i.e., data can flow from a client to a server or from a server to a client)
• In some cases, a client sends a series of requests and the server issues a series of responses (e.g., a database client might allow a user to look up more than one item at a time)
Spring 2010 CSE 30264 39
![Page 40: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/40.jpg)
Multiple Servers
• Allowing a given computer to operate multiple servers is useful because– the hardware can be shared– a single computer has lower system administration overhead than
multiple computer systems– experience has shown that the demand for a server is often
sporadic• a server can remain idle for long periods of time• an idle server does not use the CPU while waiting for a request
to arrive• If demand for services is low, consolidating servers on a
single computer can dramatically reduce cost – without significantly reducing performance
Spring 2010 CSE 30264 40
![Page 41: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/41.jpg)
Multiple Clients
• A computer can run:– a single client– multiple copies of a client that contact a given server– multiple clients that each contact a particular server
• Allowing a computer to operate multiple clients is useful – because services can be accessed simultaneously
• For example, a user can have three 3 windows open simultaneously running three 3 applications: – one that retrieves and displays email– another that connects to a chat service– and a third running a web browser
Spring 2010 CSE 30264 41
![Page 42: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/42.jpg)
Server Identification
• The Internet protocols divide identification into two pieces:– an identifier for the computer on which a server runs– an identifier for a service on the computer
• Identifying a computer?– Unique 32-bit identifier known as an Internet Protocol address (IP
address)– Client must specify the server’s IP address– Each computer is also assigned a name, and the Domain Name
System (DNS) is used to translate names into addresses– Thus, a user specifies a name such as www.cisco.com rather than
an integer address
Spring 2010 CSE 30264 42
![Page 43: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/43.jpg)
Identification
• Identifying a service?– Assigned a unique 16-bit identifier known as a protocol port
number (or port number) • Email port number 25, and the Web port number 80
– When a server begins execution• it registers with its local OS by specifying the port number for
its service– When a client contacts a remote server to request service
• the request contains a port number– When a request arrives at a server
• software on the server uses the port number in the request to determine which application on the server computer should handle the request (demultiplexing)
Spring 2010 CSE 30264 43
![Page 44: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/44.jpg)
Summary
Spring 2010 CSE 30264 44
![Page 45: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/45.jpg)
Concurrent Servers
• Although a serial approach works in a few trivial cases, most servers are concurrent– that is, a server uses more than one thread of control
• Concurrent execution depends on the OS being used• Concurrent server code is divided into two pieces
– a main program (thread) – a handler
• The main thread accepts contact from a client and creates a thread of control for the client
• Each thread of control interacts with a single client and runs the handler code
Spring 2010 CSE 30264 45
![Page 46: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/46.jpg)
Concurrent Servers
• After handling one client the thread terminates• The main thread keeps the server alive after
creating a thread to handle a request– the main thread waits for another request to arrive
• If N clients are simultaneously using a concurrent server, N+1 threads will be running: – the main thread (1) is waiting for additional requests– and N threads are each interacting with a single client
Spring 2010 CSE 30264 46
![Page 47: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/47.jpg)
Pitfall: Circular Dependencies• In practice, the distinction blurs because a server for one service can act as a
client for another– for example, before it can fill in a web page, a web server may need to become a
client of a database– a server may also become the client of a security service (e.g., to verify that a client
is allowed to access the service).• Programmers must be careful to avoid circular dependencies among servers
– for example, consider what can happen if a server for service X becomes a client of service Y, which becomes a client of service Z, which becomes a client of X
– the chain of requests can continue indefinitely until all three servers exhaust resources
• The potential for circularity is especially high when services are designed independently – because no single programmer controls all servers
Spring 2010 CSE 30264 47
![Page 48: CSE 30264 Computer Networks](https://reader036.vdocument.in/reader036/viewer/2022062520/56816371550346895dd44dc3/html5/thumbnails/48.jpg)
CSE 30264 48
Wrap Up
• Review– Nodes, links– Protocol vs. layers– Client / server– Performance metrics– Concurrency
Spring 2010