COS 461: Computer Networks Mike Freedman Spring 2014 Lectures: MW 10-10:50am in CS 104 Lead Preceptor: Dr. Sandra Batista Preceptors: Marcela Melara, Scott.

Slides:



Advertisements
Similar presentations
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Advertisements

COS 461: Computer Networks Spring 2011 Lectures: MW 10-10:50am in Bowen 222 Prof. Mike Freedman Precepts: F 10-10:50am, 11-11:50am Preceptors: Matvey Arye,
COS 461 Fall 1997 Networks and Protocols u networks and protocols –definitions –motivation –history u protocol hierarchy –reasons for layering –quick tour.
1 CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards.
Intro (continued) and Design Principles Nick Feamster CS 3251: Computer Networking I Spring 2013.
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems The Internet in 2 Hours: The Second Hour Steve Ko Computer Sciences and Engineering University.
Spring 2003CS 4611 Introduction, Continued COS 461.
1 Computer Networks and Communications [Δίκτυα Υπολογιστών και Επικοινωνίες] Lectures 8&9: Internet Protocols in Detail – TCP/IP Univ. of the Aegean Financial.
1 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak
Spring 2004 EE4272 EE4272: Computer Networks Instructor: Dr. Tricia Chigan Dept.: Elec. & Comp. Eng.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Fall 2011.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
Socket Programming.
Computer Network Architecture and Programming
1 CPE 400 / 600 Computer Communication Networks Dr. Mehmet Gunes slides are modified from S.K. Kasera and J. Kurose & K. Ross.
1 COS 461: Computer Networks Spring 2008 (MW 1:30-2:50 in CS 105) Jennifer Rexford Teaching Assistants: Sunghwan Ihm and Yaping Zhu
COS 461: Computer Networks Jennifer Rexford Lectures: MW 10-10:50am in Architecture N101 Preceptors: Rob Kiefer, Xiaozhou Li, and Peng Sun Precepts: F.
COS 461: Computer Networks Spring 2009 (MW 1:30-2:50 in CS 105) Mike Freedman Teaching Assistants: Wyatt Lloyd and Jeff Terrace
91.413: Data Communications I Fall 2007
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 0 TCP/IP Overview.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Network Technologies (TCP/IP Suite) Tahir Azim
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
COS 461: Computer Networks Mike Freedman Spring 2013 Lectures: MW 10-10:50am in Architecture N101 Preceptors: Aaron Blankstein, Scott Erickson, Naga Katta.
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
Introduction and Overview Chapter 1. Why Study TCP/IP? Forms global Internet base technology Has accommodated explosive growth well Protocols work over.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Introduction. 2 Goals for Today’s Class Course overview –Goals of the course –Structure of the course –Learning the material –Course grading –Academic.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
Computer Networking. 2 Outline 3 Objectives Understand the state-of-the-art in network protocols, architectures and applications Understand how networking.
Computer Networks Chapter 2: Applications and Layered Architectures.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
4061 Session 25 (4/17). Today Briefly: Select and Poll Layered Protocols and the Internets Intro to Network Programming.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
EE3402- Data Communication Networks Lecture 1 Muhammad Qaisar Shafi.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
1 Pertemuan 5 Networking Models. Discussion Topics Using layers to analyze problems in a flow of materials Using layers to describe data communication.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Net 221D:Computer Networks Fundamentals
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Computer Science, FSU1 CNT5505 DATA/COMUTER COMMUNICATIONS Fall 2010.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
1 Network Architecture Section Network Architecture Challenge –Fill the gap between hardware capabilities and application expectations, and to.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
1 Welcome to COE 431: Computer Networks Instructor: Wissam F. Fawaz Office 103, Bassil Bldg. Required.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Introduction and Overview of Network and Telecommunications.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
1 CSCD 433/533 Advanced Networks Lecture 2 Network Review Spring 2016 Reading: Chapter 1.
NT1210 Introduction to Networking
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Networking Mehdi Einali Advanced Programming in Java 1.
Welcome to CS 340 Introduction to Computer Networking
A quick intro to networking
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Network Architecture Introductory material
Review of Important Networking Concepts
CSCD 433/533 Advanced Computer Networks
CSCD 433/533 Advanced Computer Networks
CNT 4704 Analysis of Computer Communication Networks
CSCD 433/533 Advanced Computer Networks
Intro. to Computer Network
Presentation transcript:

COS 461: Computer Networks Mike Freedman Spring 2014 Lectures: MW 10-10:50am in CS 104 Lead Preceptor: Dr. Sandra Batista Preceptors: Marcela Melara, Scott Erickson

The Internet is an Exciting Place 2

Internet growth World RegionsInternet Users (Dec 31, 2000) Internet Users (June 30, 2012) Asia114 M1077 M Europe105 M519 M North America108 M274 M Latin America / Caribbean18 M255 M Africa5 M167 M Middle East3 M90 M Oceania / Australia8 M24 M World Total361 M2406 M 3

How does the design of the Internet support growth and foster innovation? 4

The Internet is a Tense Place 5

Cyber Attacks 6

Internet Traffic to/from Egypt (2011)

Stop Online Piracy Act (SOPA) 8

Network Neutrality 9 FCC Rules Against Comcast P2P Throttling The U.S. Federal Communications Commission has ordered Comcast to stop interfering with peer-to-peer traffic on its broadband network…

10 NSA Revelations

How does the design of the Internet create or exacerbate these tensions? 11

What is the Internet? 12

I Can Haz Wikipedia The Internet is the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services.

“Best-Effort Packet Delivery Service” 14 THE INTERNET THE INTERNET packets

Power at the Edge End-to-End Principle Whenever possible, communications protocol operations should be defined to occur at the end-points of a communications system. Programmability With programmable end hosts, new network services can be added at any time, by anyone. And end hosts became powerful and ubiquitous….

“A Network of Networks” Client Browser Web server How do you name? How do you find a name? THE INTERNET THE INTERNET

Announcing a Route Client Browser Web server “Egypt is in this direction”

Forwarding Traffic Client Browser Web server 6 1 2

Withdrawing a traffic route Client Browser Web server “Egypt is not in this direction” ???

Central concepts in networking 21

Abstraction through Protocol Layering Modularity – Each layer relies on services from layer below – Each layer exports services to layer above Interfaces – Hides implementation details – Layers can change without disturbing other layers 22 Link hardware Host-to-host connectivity Application-to-application channels Application

The Internet Protocol Suite 23 UDPTCP Data Link Physical Applications The Hourglass Model Waist The “narrow waist” facilitates interoperability FTPHTTPTFTPNV TCPUDP IP NET 1 NET 2 NET n …

Example: HyperText Transfer Protocol 24 GET /courses/archive/spr13/cos461/ HTTP/1.1 Host: User-Agent: Mozilla/4.03 CRLF HTTP/ OK Date: Mon, 4 Feb :09:03 GMT Server: Netscape-Enterprise/3.5.1 Last-Modified: Mon, 2 Feb :12:23 GMT Content-Length: 21 CRLF Site under construction Request Response

Layer Encapsulation in HTTP 25 Get index.html Connection ID Source/Destination Link Address User AUser B Link hardware Host-to-host connectivity App-to-app channels Application

End Hosts vs. Routers 26 HTTP TCP IP Ethernet interface HTTP TCP IP Ethernet interface IP Ethernet interface Ethernet interface SONET interface SONET interface host router HTTP message TCP segment IP packet

Key Concepts in Networking Naming – What to call computers, services, protocols, … Layering – Abstraction is the key to managing complexity Protocols – Speaking the same language – Syntax and semantics Resource allocation – Dividing scare resources among competing parties – Memory, link bandwidth, wireless spectrum, paths 27

Course Organization 28

What You Learn in This Course Knowledge: how the Internet works, and why – Protocol stack: link, network, transport, application – Resource allocation: congestion control, routing – Applications: Web, P2P, VoIP, … – Networks: enterprise, cloud, backbone, wireless, … Insight: key concepts in networking – Naming, layering, protocols, resource allocation, … Skill: network programming (in precept!) – Many nodes are general-purpose computers – Can innovate and develop new uses of networks 29

meClickers: Quick Surveys Growth/innovation vs. create/exacerbate tensions Does Internet design prevent misuse? A.Individual endpoints can only use addresses given to them when connect to the network B.Individual end-points can “spoof” any IP address 30

meClickers: Quick Surveys Growth/innovation vs. create/exacerbate tensions Does Internet design prevent misuse? Networks are assigned unique IP address blocks from a central authority (“IANA”): Princeton has * A.Network can only announce assigned addresses B.Networks can spoof any address 31

meClickers: Quick Surveys Growth/innovation vs. create/exacerbate tensions Does “Internet” provide reliable packet delivery? A.Yes, that’s necessary for protocols like HTTP that require in-order streams B.No, packets may be arbitrary dropped or reordered 32

Learning the Material: People Lecture: Mike Freedman – Slides available online at course Web site Precepts – Sandra Batista (Lead), Marcela Melara, Scott Erickson Main Q&A forum: – Graded on class participation: so ask and answer! – No anonymous posts or questions – Can send private messages to instructors 33

Learning the Material: Books Required textbook – Computer Networks: A Systems Approach (5th edition), by Peterson and Davie – Okay to use the 4th edition Books on reserve – Networking textbooks Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross Computer Networks, by Tanenbaum – Network programming references TCP/IP Illustrated, Volume 1: The Protocols, by Stevens Unix Network Programming, Volume 1: The Sockets Networking API, by Stevens, Fenner, & Rudolf 34

Grading Four assignments (12% each) – 95% 3 hours, 80% 2 days late, 25% >7 days late – One free late day (we’ll figure which one is best) – Only failing grades I’ve given are for students who don’t / try to do assignments Two exams (45% total) – Midterm exam before spring break (20%) – Final exam during exam period (25%) Class participation (7%) – In lecture, precept, and Piazza 35

Policies: Write Your Own Code Programming is an individual creative process. At first, discussions with friends is fine. When writing code, however, the program must be your own work. Do not copy another person’s programs, comments, README description, or any part of submitted assignment. This includes character-by-character transliteration but also derivative works. Cannot use another’s code, etc. even while “citing” them. Writing code for use by another or using another’s code is academic fraud. 36

0 th Assignment Learning how to use network sockets – Part of class participation grade only – On website, navigate -> Assignments -> Assignment 0 – Due February 13 Perform assignments inside Virtual Machine – Can then have similar environment on laptop, fishbowl machines, for our testing – Requires you have VirtualBox installed – We will be sending instructions for getting VM shortly 37

Conclusions Internet – Diverse, ever-changing applications – … communicating over a network of networks – … using multiple layers of protocols Wednesday lecture – Links: how do two computers communicate? Friday precept – Sockets: how do two applications communicate? 38