COS 461: Computer Networks Spring 2011 Lectures: MW 10-10:50am in Bowen 222 Prof. Mike Freedman Precepts: F 10-10:50am, 11-11:50am Preceptors: Matvey Arye,

Slides:



Advertisements
Similar presentations
© De Montfort University, Protocols for multimedia transmission over the Internet Howell Istance Dept. of Computer Science De Montfort University.
Advertisements

Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Introduction to IPv6 Presented by: Minal Mishra. Agenda IP Network Addressing IP Network Addressing Classful IP addressing Classful IP addressing Techniques.
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 CS 640: Introduction to Computer Networks Aditya Akella Lecture 2 Layering, Protocol Stacks, and Standards.
CSE 486/586, Spring 2014 CSE 486/586 Distributed Systems The Internet in 2 Hours: The Second Hour Steve Ko Computer Sciences and Engineering University.
Spring 2003CS 4611 Introduction, Continued COS 461.
1 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
OSI Model.
1 Application TCPUDP IPICMPARPRARP Physical network Application TCP/IP Protocol Suite.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
COS 461: Computer Networks Jennifer Rexford Lectures: MW 10-10:50am in Architecture N101 Preceptors: Rob Kiefer, Xiaozhou Li, and Peng Sun Precepts: F.
CPSC 441: Intro, UDP1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 Notes.
COMPUTER NETWORKS CS610 Lecture-1 Hammad Khalid Khan.
5/12/05CS118/Spring051 A Day in the Life of an HTTP Query 1.HTTP Brower application Socket interface 3.TCP 4.IP 5.Ethernet 2.DNS query 6.IP router 7.Running.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
Computer Network Fundamentals CNT4007C
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 0 TCP/IP Overview.
Basic Network Services IMT 546 – Lab 4 December 4, 2004 Agueda Sánchez Shannon Layden Peyman Tajbakhsh.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Networks CEN 5501C Spring, 2008 Ye Xia (Pronounced as “Yeh Siah”)
COS 461: Computer Networks Mike Freedman Spring 2013 Lectures: MW 10-10:50am in Architecture N101 Preceptors: Aaron Blankstein, Scott Erickson, Naga Katta.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Introduction. 2 Goals for Today’s Class Course overview –Goals of the course –Structure of the course –Learning the material –Course grading –Academic.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 04_a Transport Protocols - UDP Instructor: Dr. Li-Chuan Chen Date: 09/22/2003 Based in part upon slides.
Fall 2004FSU CIS 5930 Internet Protocols1 Welcome to CIS 5930 Internet Protocols Time: 5:15PM-6:30PM, TTh Location: Love 301 Fall 2004, 3 credits.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
CS 241 Section Week #12 (04/30/09). Announcements TA Final review: -Either Tuesday May 12, Or Wednesday May 13, 2009 (2:00pm - 4:00pm) || (6:30pm.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Internet Protocol ECS 152B Ref: slides by J. Kurose and K. Ross.
1 CS 4396 Computer Networks Lab TCP/IP Networking An Example.
Computer Science, FSU1 CNT5505 DATA/COMUTER COMMUNICATIONS FALL 2008 Time: 3:35AM-4:50AM, MW Location: Love 103 Fall 2008, 3 credits.
EE3402- Data Communication Networks Lecture 1 Muhammad Qaisar Shafi.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
Computer Science, FSU1 CNT5505 DATA/COMUTER COMMUNICATIONS Fall 2010.
Cheng-Fu Chou, CMLAB, CSIE, NTU P. 1 Intro. to Computer Network Thu. 9:10am-12:10pm, CSIE 102 Instructor: Cheng-Fu Chou –Office.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Computer Networks CNT5106C
1 Network Architecture Section Network Architecture Challenge –Fill the gap between hardware capabilities and application expectations, and to.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems The Internet in 2 Hours: The First Hour Steve Ko Computer Sciences and Engineering University.
Introduction and Overview of Network and Telecommunications.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
Network Layer. application transport network link physical message segment packet frame signal Network Architecture.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
HOW THE INTERNET WORKS. Introduction : The internet has brought revolutionary changes Has become a medium for interaction and information Can access to.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Course Overview 1 MAT 279 Data Communication and the Internet Prof. Shamik Sengupta Office 4210 N
COS 461: Computer Networks Mike Freedman Spring 2014 Lectures: MW 10-10:50am in CS 104 Lead Preceptor: Dr. Sandra Batista Preceptors: Marcela Melara, Scott.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Computer Network Fundamentals CNT4007C
Block 5: An application layer protocol: HTTP
Welcome to CS 340 Introduction to Computer Networking
A quick intro to networking
Computer Networks CNT5106C
CS222 Web Programming Course Outline
Topic 5: Communication and the Internet
Internet Protocol (IP)
Computer Science 457 Networking and the Internet
Network Layer: Control/data plane, addressing, routers
Intro. to Computer Network
Intro. to Computer Network
Presentation transcript:

COS 461: Computer Networks Spring 2011 Lectures: MW 10-10:50am in Bowen 222 Prof. Mike Freedman Precepts: F 10-10:50am, 11-11:50am Preceptors: Matvey Arye, Jacopo Cesareo, Prem Gopalan

What You Learn in This Course Knowledge: how the Internet works – IP protocol suite – Internet architecture – Applications (Web, DNS, P2P, …) Insight: key concepts in networking – Protocols, layering, resource allocation, naming Skill: network programming – Many nodes are general-purpose computers And increasingly, even special-purpose switches are programmable! – You can program the nodes – Very easy to innovate and develop new uses of network – Contrast: Ma Bell owned the telecom network, no innovation 2

Learning the Material: People Lecture (Prof. Mike Freedman) – Slides available online at course Web site – Office hours: Immediately following lectures Teaching Assistants office hours TBD Main cos461-staff at lists.cs.princeton.edu – to individual TAs will not be answered Main Q&A form: – We will add all your addresses to the course – Graded on class participation: so ask *and* answer! 3

Learning the Material: Books Required textbook – Computer Networks: A Systems Approach (4th edition), by Peterson and Davie [Okay to use the 3 rd edition] Books on reserve – Networking text books Computer Networking: A Top-Down Approach Featuring the Internet (3rd edition), by Kurose and Ross Computer Networks (4th edition), by Tanenbaum – Network programming references TCP/IP Illustrated, Volume 1: The Protocols, by Stevens Unix Network Programming, Volume 1: The Sockets Networking API (3rd Edition), by Stevens, Fenner, & Rudolf 4

Grading and Schedule Four assignments (10% each) – 95% 3 hours, 70% 2 days late, 50% > 3 days late – One free late day during semester – Must complete all assignments to pass Two exams (50% total) – Midterm exam before spring break (25%) – Final exam during exam period (25%) Class participation (10%) – In lecture and precept – In the forums 5

Graduate Students: Two Choices Pick one of two options – Do the four programming assignments – Or, first two assignments, plus research project Research projects – Networking-related research problem – Must have a systems programming component – Talk to me 6

Policies: Write Your Own Code Programming in an individual creative process. While thinking about a problem, discussions with friends are encouraged. However, when the time comes to write code that solves the problem, the program must be your own work. If you have a question about how to use some feature of C, UNIX, etc., you can certainly ask your friends or the TA, but do not, under any circumstances, copy another person's program. Letting someone copy your program or using someone else's code in any form is a violation of academic regulations. 7

Networking is Relevant 8

9 Information wants to be free because it has become so cheap to distribute, copy, and recombine... It wants to be expensive because it can be immeasurably valuable to the recipient. (1985)

The monolithic view Client Browser Web server THE INTERNET !!!! THE INTERNET !!!!

Why “Internet” Network of networks Standardized format and protocols for speaking between HETEROGENOUS networks 15

Why “Internet” Network of networks Standardized format and protocols for speaking between HETEROGENOUS networks 16

The monolithic view Client Browser Web server THE INTERNET !!!! THE INTERNET !!!!

A network of “Autonomous Systems” Client Browser Web server How do you name? How do you find a name?

Announcing a traffic route Client Browser Web server “Egypt is in this direction”

“Routing” traffic to a destination Client Browser Web server 6 1 2

Withdrawing a traffic route Client Browser Web server “Egypt is not in this direction” ???

Key Concepts in Networking Protocols – Speaking the same language – Syntax and semantics Layering – Standing on the shoulders of giants – A key to managing complexity Resource allocation – Dividing scare resources among competing parties – Memory, link bandwidth, wireless spectrum, paths, Naming – What to call computers, services, protocols, … 24

Key Concepts in Networking Protocols – Speaking the same language – Syntax and semantics All speak IPv4 “Internet Protocol version 4”

Protocol design is about tradeoffs How should hosts and routers communicate? – Standard protocol – Fast: Machine readable in hardware at line rates Browsers, web servers, and proxies? – Can be slower: software readable – Human readable – Extensible and forward-compatible – Not everybody might be familiar with extensions 26

IPv4 Packet 27 4-bit Version 4-bit Header Length 8-bit Type of Service (TOS) 16-bit Total Length (Bytes) 16-bit Identification 3-bit Flags 13-bit Fragment Offset 8-bit Time to Live (TTL) 8-bit Protocol 16-bit Header Checksum 32-bit Source IP Address 32-bit Destination IP Address Options (if any) Payload 20-byteheader

Example: HyperText Transfer Protocol 28 GET /courses/archive/spr09/cos461/ HTTP/1.1 Host: User-Agent: Mozilla/4.03 CRLF HTTP/ OK Date: Mon, 2 Feb :09:03 GMT Server: Netscape-Enterprise/3.5.1 Last-Modified: Mon, 42 Feb :12:23 GMT Content-Length: 21 CRLF Site under construction Request Response

Key Concepts in Networking Protocols – Speaking the same language – Syntax and semantics Layering – Standing on the shoulders of giants – A key to managing complexity 29

Layering = Functional Abstraction Sub-divide the problem – Each layer relies on services from layer below – Each layer exports services to layer above Interface between layers defines interaction – Hides implementation details – Layers can change without disturbing other layers 30 Link hardware Host-to-host connectivity Application-to-application channels Application

The Internet Protocol Suite 31 UDPTCP Data Link Physical Applications The Hourglass Model Waist The waist facilitates interoperability FTPHTTPTFTPNV TCPUDP IP NET 1 NET 2 NET n …

Layer Encapsulation in HTTP 32 Get index.html Connection ID Source/Destination Link Address User AUser B Link hardware Host-to-host connectivity App-to-app channels Application

IP Suite: End Hosts vs. Routers 33 HTTP TCP IP Ethernet interface HTTP TCP IP Ethernet interface IP Ethernet interface Ethernet interface SONET interface SONET interface host router HTTP message TCP segment IP packet

Conclusions Internet is a network of networks – How hosts and networks name one another, find one another, and talk with one another Key concepts in networking – Protocols, layers, resource allocation, and naming Next lecture: – How does YouTube and Netflix serve you videos? – E.g., HTTP, DNS, and content distribution networks Next week: – Back to the 1960s 34