Enactment of segmentation

Slides:



Advertisements
Similar presentations
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Application Layer – Lecture.
Advertisements

Application Layer-11 CSE401N: Computer Networks Lecture-4 Application Layer Overview HTTP.
2: Application Layer1 Chapter 2: Application Layer Our goals: r conceptual, implementation aspects of network application protocols m transport-layer service.
1 Application Layer. 2 Writing Networked Applications TCP UDP IP LL PL TCP UDP IP LL PL TCP UDP IP LL PL Web Browser Web Server Ftp Server Ftp Client.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Week 11: Application Layer1 Week 11: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
2: Application Layer1 Chapter 2: Application Layer Our goals: r conceptual, implementation aspects of network application protocols m transport-layer service.
1 An Overview of Applications Xin Liu ECS 152A Ref: slides by J. Kurose and K. Ross.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
Some slides are in courtesy of J. Kurose and K. Ross Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss.
Dr. Philip Cannata 1 Principles of Network Applications.
Introduction 1 Lecture 5 Application Layer slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note on the use.
Chapter 2, slide: 1 CS 372 – introduction to computer networks* Monday June 28 Announcements: r Lab 1 is due today r Lab 2 is posted today and is due next.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Throughput: Internet scenario
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
2: Application Layer1 Some network apps r r Web r Instant messaging r Remote login r P2P file sharing r Multi-user network games r Streaming stored.
19-1 Last time □ TCP ♦ Throughput ♦ Fairness ♦ Delay modeling □ TCP socket programming.
CHAPTER 2. Creating a network app write programs that – run on (different) end systems – communicate over network – e.g., web server software communicates.
1 Application Layer Lecture 4 Imran Ahmed University of Management & Technology.
CS 3830 Day 7 Introduction : Application Layer 2 Processes communicating Process: program running within a host. r within same host, two processes.
1 CS 455/555 Intro to Networks and Communications Client/Server Computing and Socket Programming (2.1, ) Michele Weigle Department of Computer Science.
2: Application Layer1 Internet apps: their protocols and transport protocols Application remote terminal access Web file transfer streaming multimedia.
© Janice Regan, CMPT 128, Jan 2007 CMPT 371 Data Communications and Networking Introducing the Application Layer 0.
1: Introduction1 Internet History r 1961: Kleinrock - queueing theory shows effectiveness of packet- switching r 1964: Baran - packet- switching in military.
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
Internet Engineering Course Application Layer Protocols.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Sockets process sends/receives messages to/from its socket
1 End-user Protocols, Services and QoS. 2 Layering: logical communication application transport network link physical application transport network link.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
2: Application Layer1 Chapter 2 Application Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
1 Chapter 2: Application Layer Part A Introduction r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP.
Ch 2. Application Layer Myungchul Kim
@Yuan Xue CS 283Computer Networks Spring 2011 Instructor: Yuan Xue.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Introduction to Networks
Introduction to Networks
Chapter 2: Application Layer
CS 3214 Computer Systems Networking.
CS 3214 Computer Systems Lecture 21 Godmar Back.
Lecture 2 Dr. Richard Spillman Fall 2009
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Internet transport protocols services
Chapter 2: Application layer
CS 3214 Computer Systems Networking.
Some bits on how it works
Protocols and networks in the TCP/IP model initially.
Chapter 7: Application layer
Chapter 2 Application Layer
Introduction to Networks
Introduction to Networks
Chapter 2 Introduction Application Requirements VS. Transport Services
Chapter 2: Application layer
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
لایه ی کاربرد مظفر بگ محمدی 2: Application Layer.
CSE 4213: Computer Networks II
Chapter 2: Application layer
When you connect with DHCP, you are assigned a
CSE 4213: Computer Networks II
Computer Networks Protocols
CS1652 September 4th, 2012 Jack Lange University of Pittsburgh
Presentation transcript:

Enactment of segmentation 2 volunteers to act as routers 10 volunteers to act as Kbits 10 Kbit message travels via store-forward, vs 2 Kbit segments travel via store-and-forward Gain due to pipelining!

Transport service reqs of apps Application file transfer e-mail Web documents real-time audio/video stored audio/video interactive games instant messaging Data loss no loss Bandwidth elastic Time Sensitive no

TCP or UDP Application Underlying layer protocol transport protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] proprietary (e.g. RealNetworks)‏ (e.g., Vonage,Dialpad)‏ Underlying transport protocol Application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony

Stateless protocols Where did we see this stateless idea before? What if keeping state is inevitable? (DNS)‏ Use soft-state, state that flushes itself periodically

How do cookies invade privacy? How can big vendors figure out the external sites you visit? Big vendors advertise to many web sites. When the advertisement is requested, your cookie information goes along side it to the vendors webserver.

Ftp is not firewall friendly. Why? Server initiates data connection to the client Data connections can be to arbitrary port numbers

S: What is your mail reader? elm/pine outlook netscape/mozilla thunderbird gmail/yahoo/hotmail UB's webmail portal

Why not SMTP directly to end host? This would require sender and receiver to be always on in anticipation of messages. Indirection helps in several other problems.

Why is SMTP not P2P? The mail servers act as peers don't they? Servers are almost always on, no peer join/leave.

Why not centralize DNS? single point of failure traffic volume distant centralized database maintenance doesn’t scale!

Difference between local DNS and authoritative DNS ? Local DNS is a cache at the client side Authoritative DNS is the authoritative source at the server side

Why the random selected upload peer in Bittorrent? To explore, and optimize, not to get fixed in a local minima.