com s 519: computer networks introduction and overview jeanna matthews spring 2002
DESCRIPTION
How much do you know already ? zHow much do you know about what happens when you use networking applications? zWhat do you hope to learn in this class?TRANSCRIPT
![Page 1: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/1.jpg)
COM S 519:Computer Networks
Introduction and OverviewJeanna MatthewsSpring 2002
![Page 2: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/2.jpg)
Why study computer networks?They are engineering marvels!
Scalability, layered protocols, lots of subtleties- worthy of study
They are all around us! Understanding the nuts and bolts behind
a technology you use every day is excitingThey are changing the world!
Profound societal changes taking place in our lifetime
![Page 3: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/3.jpg)
How much do you know already ?
How much do you know about what happens when you use networking applications?
What do you hope to learn in this class?
![Page 4: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/4.jpg)
Internet: Example Click -> get page page from local
or remote computer link:
http://www.cnn.com
specifies - protocol (http) - location (www.cnn.com)
![Page 5: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/5.jpg)
Internet: Locating Resource www.cnn.com is the
name of a computer (and, implicitly, of a file in that computer)
To find the address, the application uses a hierarchical directory service called theDomain Name System to translate human readable names to IP addresses
loca l
com
host
cnn.com ?
cnn.com ?IP = a .b.c .d
IP = a .b .c.d
![Page 6: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/6.jpg)
Internet: ConnectionThe protocol (http) sets up a connection
(another protocol, tcp) between the host and cnn.com to transfer the page
The connection transfers the page as a byte stream, without errors: flow control + error control
Host cnn .com
![Page 7: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/7.jpg)
Internet: End-to-end The byte stream flows
from end to end across many links and switches: routing (+ addressing)
That stream is regulated and controlled by both ends: retransmission of erroneous or missing bytes; flow control
H O ST
CN N .C O M
end-to -end pacing anderror con tro l
routing
![Page 8: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/8.jpg)
Internet: Packets The network transports
bytes grouped into packets
The packets are “self-contained” and routers handle them one by one
The end hosts worry about errors and pacing:Destination sends ACKsSource checks losses
C
H O S T: B
C N N .C O M : AA | B | # , C R C | bytes
B : toC
![Page 9: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/9.jpg)
Internet: Port NumbersWhen a packet arrives at its
destination, the operating system uses the destination port number to identify which application should receive it.
This is called demultiplexing.
![Page 10: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/10.jpg)
Internet: Bits Equipment in each node sends the packets as a string of
bits That equipment is not aware of the meaning of the bits
01011...011...110
Transm itter P hysica l M ed ium Rece ive r
01011...011...110
O ptica lC opperW ire less
![Page 11: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/11.jpg)
Internet: Points to remember
Separation of tasks send bits on a link: transmitter/receiver [clock,
modulation,…] send packet on each hop [framing, error detection,…] send packet end to end [addressing, routing] pace transmissions [detect congestion] retransmit erroneous or missing packets [acks, timeout] find destination address from name [DNS]
Scalability routers don’t know full path names and addresses are hierarchical
![Page 12: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/12.jpg)
Internet :how does it do:
Addressing ?Routing ?Reliable transmission ?Interoperability ?Resource management ?Quality of service ?
![Page 13: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/13.jpg)
Concepts at the heart of the InternetProtocolLayered ArchitecturePacket SwitchingDistributed ControlOpen System
![Page 14: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/14.jpg)
ProtocolIf two entities are going to
communicate, they must agree on the expected order and meaning of messages they exchange.
Asking for the time protocol
![Page 15: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/15.jpg)
Protocol
A protocol defines the format and the order of messages exchanged between communicating entities as well as the actions taken on the receipt or the transmission of a message.
![Page 16: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/16.jpg)
Layered ArchitecturesHuman beings are able to handle lots of
complexity in their protocol processing. Ambiguously defined protocols Many protocols all at once
How do computers manage complex protocol processing? Specify well defined protocols to enact. Decompose complicated jobs into layers that
each have a well defined task
![Page 17: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/17.jpg)
Layered Architectures
Break-up design problem intro smaller, more manageable problems.
Modular design: easy to extend/modify.Difficult to implement (careful with
interaction of layers for efficiency).
![Page 18: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/18.jpg)
Layered Architecture
Applications
Middleware
Routing
Physical Links
usersnetwork
Web, e-mail, file transfer, ...
Reliable/ordered transmission, QOS,security, compression, ...
End-to-end transmission,resource allocation, routing, ...
Point-to-point links,LANs, radios, ...
![Page 19: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/19.jpg)
Internet protocol stack
Application
Transport
Network
Physical
usersnetwork
HTTP, SMTP, FTP, TELNET, DNS, …
TCP, UDP.
IP
Point-to-point links,LANs, radios, ...
![Page 20: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/20.jpg)
Air travel
Ticket (purchase)
Baggage (check)
Gates (load)
Runway (take off)
Passenger Origin
Ticket (complain)
Baggage (claim)
Gates (unload)
Runway (landing)
Passenger Destination
Airplane routing
![Page 21: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/21.jpg)
Protocol stack
e-mail client
TCP server
IP server
ethernetdriver/card
user X
SMTP
TCP
IP
e-mail server
TCP server
IP server
ethernetdriver/card
user Y
IEEE 802.3 standard
electric signals
English
![Page 22: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/22.jpg)
Protocol encapsulation
e-mail client
TCP server
IP server
ethernetdriver/card
user X
e-mail server
TCP server
IP server
ethernetdriver/card
user Y“Hello”
“Hello”
“Hello”
“Hello”
“Hello”
![Page 23: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/23.jpg)
Protocol interfaces
e-mail client
TCP server
IP server
ethernetdriver/card
user X
e-mail server
TCP server
IP server
ethernetdriver/card
user Y
s = open_socket();socket_write(s, buffer);…
![Page 24: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/24.jpg)
Packet SwitchingPackets indicate their destination No predetermined path for a packet
to takeEach intermediate note routes the
packet closer to its destination
![Page 25: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/25.jpg)
A small Internet
A
V
R
B
W
r1,e1r2,e2
r3
a,e3
w,e5 b,e4Scenario:A wants to send datato B.
![Page 26: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/26.jpg)
Protocol stack:packet forwarding
HTTP
TCP
IP
ethernet
Host A
IP
ethernet
Router R
link
HTTP
TCP
IP
ethernet
Router WHost B
IP
ethernetlink
![Page 27: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/27.jpg)
Distributed ControlWhere ever possible decompose the
problem Examples:
No one central name to IP address data base - Domain Name System
No one global routing table - Heirarchical network of networks – handle routing within small autonomous systems
Essential to Scalability
![Page 28: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/28.jpg)
Open SystemBasic Internet protocols are
published as open standardsStandards freely and readily
available Ideal candidate for study
![Page 29: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/29.jpg)
Internet Standards ProcessInternet Draft - anyoneRFC - at discretion of RFC EditorInternet Standard Maturity Levels
Proposed - IESG Draft - 2 independent, implementations Standard
![Page 30: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/30.jpg)
How is Internet “governed”?“We reject kings, presidents, and voting.
We believe in rough consensus and running code”
Internet Engineering Task Force (IETF)Working groupsInternet Engineering Steering Group (IESG)Internet Assigned Numbers Authority
(IANA)
![Page 31: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/31.jpg)
Backbones, NAPs and ISPsWould have had time to add this
here
![Page 32: COM S 519: Computer Networks Introduction and Overview Jeanna Matthews Spring 2002](https://reader035.vdocuments.us/reader035/viewer/2022062600/5a4d1b297f8b9ab059998624/html5/thumbnails/32.jpg)
Online ResourcesISOCACMCAIDAInternet HistoryW3C