Q and A for Ch. 1, 2, 3 CS 332 Spring 2014. Structure of the class Q: Comer describes five aspects of networking around which he has structured his text.

Slides:



Advertisements
Similar presentations
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2014.
Advertisements

Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Chapter 17 Networking Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
1 The 7 layer OSI model Sending an . 2 The seven layers.
Network Layer and Transport Layer.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
PROTOCOLS AND ARCHITECTURE Lesson 2 NETS2150/2850.
1 Java Networking – Part I CS , Spring 2008/9.
Computer Network Architecture and Programming
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
CS-3013 & CS-502, Summer 2006 Network Input & Output1 CS-3013 & CS-502, Summer 2006.
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Introduction to networking (Yarnfield) IP addresses.
Ch. 1, 2, 3 Q and A IS 333 Spring “Low-level” details Q: What is meant by “low-level” details in the box on page 4? A: The author means that there.
TCP/IP protocols Communication over Internet is mostly TCP/IP (Transmission Control Protocol over Internet Protocol) TCP/IP "stack" is software which allows.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
1 Introduction and Internet Applications Chapter 1 Introduction and Overview.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Transport Layer and UDP Tahir Azim Ref:

TCP/IP Transport and Application (Topic 6)
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
NATs and UDP Victor Norman CS322 Spring NAPT Suppose we have a router doing NAT: half is the “public side”, IP address ; other half is.
Spring 2006Computer Networks1 Chapter 2 Network Models.
Chapter 22 Q and A Victor Norman CS 332 Spring 2014.
Transport Layer1 Ram Dantu (compiled from various text books)
Dr. John P. Abraham Professor University of Texas Pan American Internet Applications and Network Programming.
1 Networking Chapter Distributed Capabilities Communications architectures –Software that supports a group of networked computers Network operating.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Enabling Technologies (Chapter 1)  Understand the technology and importance of:  Virtualization  Cloud Computing  WAN Acceleration  Deep Packet Inspection.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
William Stallings Data and Computer Communications
Socket Programming Introduction. Socket Definition A network socket is one endpoint in a two-way communication flow between two programs running over.
BASIC NETWORK PROTOCOLS AND THEIR FUNCTIONS Created by: Ghadeer H. Abosaeed June 23,2012.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Internet Concept of protocols INTERNET Internet Service Provider (ISP) has connected to the Internet.
Ch. 1, 2, 3 Q and A CS 332 Spring 2016 Victor Norman.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Chapter 2 Network Models
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
SOCKET PROGRAMMING Presented By : Divya Sharma.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 2 Network Models
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Packet Sniffing.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
TRANSMISSION CONTROL PROTOCOL
CSCD 330 Network Programming
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Q and A for Ch. 1, 2, 3 CS 332 Spring 2014

Structure of the class Q: Comer describes five aspects of networking around which he has structured his text. How closely will this course’s content match that structure? A: We’ll follow it closely, but we’ll skip most of section 2.

TCP/IP stack vs. OSI stack Q: How do the stacks differ? Why use the TCP/IP stack? A: The Presentation and Session layers are theoretically good, but are not actually implemented in any TCP/IP protocol, AFAIK.

Network topology Q: What is a network topology? A: It is the configuration of a network – which machines are connected to which, etc. It is layer 1.

(De)multiplexing Q: What do multiplexing and demultiplexing mean? A: Multiplexing is the gathering of multiple “things” to share one resource; demultiplexing is the opposite: taking “things” that share a resource and splitting them out, according to some criteria.

Internet Usage

Public vs. Private Network Q: Comer defines private networks as networks which have their use restricted to a specific group of users. He gives ISP-driven networks (which are open to anyone paying a subscription fee) as an example of a public network. Wouldn’t those networks technically also be private networks, with the “specific group” being the subscribers? A: Not according to his definition…The way I see it, there is no need to encrypted data in a private network – it is all your data. But, not so in a public network.

Private network types Q: Comer lists the scale categories that vendors use to describe network sizes (Consumer, SOHO, SMB, Large Enterprise). How have these categories and definitions changed over the history of networking technology? A: I don’t know… I never worked for a company that did private network stuff…

Communication Protocols Q: Is it correct to say that communications protocols govern all five aspects of networking listed by Comer? A: Yes. If you want your computer to communicate with another computer, you have to define a protocol so each knows what the other is saying. This is true at all layers.

Physical Layer Headers Q: The text says that Physical layer headers are not in common use. Under what conditions would such a header be used? A: There must be some physical layers that prepend and append signals to a packet. These would be signals to do synchronization between endpoints, provide reliability, etc. I don’t know much about physical layer stuff…

Building packets in memory Q: In sending a message through the TCP/IP stack, how do the headers get prepended to the message in memory? Is space reserved for the headers before (or after) the message location, or is it some mess of pointers? Does the location of the headers not matter, and one of the layers ensures they get sent across the network in the correct order?

Building packets in memory A: In general, there is a pool of memory structures called “mbufs” that are used for building up packets. It has been a long time since I’ve used them and I don’t remember the details, but they are nasty… Space is not reserved at higher layers for lower layer headers. The location of headers totally matters. Lower layer modules only look at data in their layer, which must be on the front of the packet.

First packet switching technology Q: Was ARPANet the first technology to implement packet switching? A: I don’t know… Lots of places were building their own little networks with their own little protocols…

Networking history Q: How important to the study of current networking theory and practice is an in-depth understanding of previous technical implementations? A: Not that important, to me…

World Wide Web Q: What precisely is meant by the term “World Wide Web”? A: It is all computers that can communicate with each other, using the http protocol. E.g., some refrigerators, pop machines, TVs, etc.

Message lengths Q: Are the limits on message length in a message-based communication paradigm protocol-dependent? A: Yes. Some message lengths are limited by the protocol, but ultimately message lengths are limited by the physical layer, which gets its message lengths (min and max) from physical properties.

Stream-based paradigms Q: Why are stream-based paradigms not favored for multimedia? A: Because in a stream-based paradigm (TCP), data is not delivered to the application (layer 5) if *any* previous data is missing. It must be delivered in order. But, in streaming real-time multiple applications, old data is worthless data. Q: Are stream paradigms packet-based? A: Yes. The stream paradigm is built on top of the packet-based deliver in the TCP/IP Internet.

Server/client identification Q: Does the server need to identify the client in the same way the client identifies the server, with both an IP address and a port number? A: Yes. Both endpoints are identified by the pair.

Data during disconnects Q: What happens when there is a disconnect in the network when streaming a service, does the network continue to send packets after the client is back up, or does the client need to reopen the stream? A: Client and server need to reestablish their connection… We’ll find out all about this later…

Questions about sockets Q: Various questions about socket API definitions and rationale… A: I cannot nor will I attempt to defend decisions made by the authors of the sockets API. It is a mess. Nasty, nasty mess. Ask them your questions, and then beat them with a wet noodle. (There is lots of history and compromise involved with sockets…)

Stream vs. message vs. … Q: Are there other communication paradigms than “stream” and “message”? A: There are some paradigms that are sort of in between. Stream protocols provide reliability, but require setup. Message protocols don’t. Some have tried to make some protocols that provide reliability without setup…

Communication Speeds Q: Have communication speeds increased with Moore's law? Are they expected to continue to increase? A: I don’t know, for sure. But, communication speeds have certainly increased a lot during my lifetime, and are still increasing.