1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
1 o Two issues in practice – Scale – Administrative autonomy o Autonomous system (AS) or region o Intra autonomous system routing protocol o Gateway routers.
CCNA – Network Fundamentals
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
Computer Network Architecture and Programming
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
CS 6401 IPv6 Outline Background Structure Deployment.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 Advanced Internetworking Computer Networks, 5th Edition.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Telecommunications Essentials Chapter 8 The Internet & IP Infrastructure.
Operating Systems Lesson 10. Networking Communications protocol is the set of standard rules for ◦ Data representation ◦ Signaling ◦ Authentication ◦
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Our Last Class!!  summary  what does the future look like?
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Page 1 Network Addressing CS.457 Network Design And Management.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 17 This presentation © 2004, MacAvon Media Productions Multimedia and Networks.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
1 Chapter 4: Internetworking (Internet Protocol) Dr. Rocky K. C. Chang 16 March 2004.
1 Lecture, November 20, 2002 Message Delivery to Processes Internet Addressing Address resolution protocol (ARP) Dynamic host reconfiguration protocol.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 3 TCP and IP by Zornitza Genova Prodanoff.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
Multimedia Communication Systems Techniques, Standards, and Networks Chapter 4 Distributed Multimedia Systems.
Introduction Chapter 1. TCP/IP Reference Model Why Another Model? Although the OSI reference model is universally recognized, the historical and technical.
Network Applications 9/14/ Outline  Recap r ISO/OSI Layering and Internet Layering r Application layer overview.
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Whirlwind Tour Of Lectures So Far
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
CPE 401 / 601 Computer Network Systems
A Course-End Conclusions
Working at a Small-to-Medium Business or ISP – Chapter 7
Multimedia and Networks
Review First mile problem Internet End Users Last mile
Computer Networks Protocols
Presentation transcript:

1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005

2 The internetworking problem  The internetworking problem Different data-link protocols Different MAC address spaces Different MTUs  An hour-glass model (end-to-end argument) IP as the glue IP addresses IP fragmentation and reassembly  IP over anything and everything

3 All boil down to the design goals  Best effort IP service Reliability requirement: trusting states to the end hosts Requirement for supporting a variety of TOS Requirement for accommodating a variety of networks  End-to-end argument Keep the network simple: IP packets go in and IP packets come out. Implement applications at the network edge.

4 The forwarding problem  Main issues of concerns Who knows what Speed (forwarding table size and lookup) Not responsible for the correctness of the routes  Hop-by-hop forwarding as a result of the best-effort approach. Source routing and tunnels Virtual circuit switching IP switching  From classful to classless routing

5 The routing problem  THE intelligence of the IP layer  Use a hop-by-hop protocol to deliver packets end-to-end.  Main issues of concerns Speed of convergence Prone to routing loops Efficiency  Two main approaches (in midst of many other differences and variations) Distance vector and link state

6 A tale of two routing problems  All routing protocols concern delivering packets from one point to another. An intradomain routing additionally concerns optimizing certain costs of a route. An interdomain routing additionally concerns satisfying certain policies of an AS.  Current Internet characteristics Asymmetric routes Packet reordering Packet losses Nonfriendly intermediaries

7 The end-to-end problems  TCP adds the following services to IP: Multiplexing (through the port number) Inordering (through the TCP SN) At-most-one-copy (through the TCP SN) Arbitrarily large application messages (through the wraparound TCP SN space) Flow control (through advertised window) End-to-end reliability (through the sliding window protocol and retransmission) Congestion control (through ACK clocking, congestion window, slow start, etc)

8 The congestion control problem  Congestion control and/or resource allocation hold one of the keys to the Internet stability.  A TCP sender interprets packet losses (without receiving ACKs) as a sign of congestion. Slow starting to trigger packet losses (reaching the network capacity) Next time, perform congestion avoidance when approaching to the congestion point.  Other approaches do not induce packet losses. TCP/Vegas, Explicit Congestion Notification

9 Two Internet applications  DNS provides a distributed database for domain names and protocols to obtain their resource records.  Web provides A global naming system to identify resources A text-based language to facilitate a navigation across various related resources, and A protocol for requesting and responding  Interaction between TCP and HTTP  Web proxies: not longer end-to-end

10 Coverage in terms of protocols

11 What’s next?  From IPv4 to IPv6  From insecure to secure TCP/IP  From unicast IP to multicast IP  From fixed IP to mobile IP  From data network to multimedia network

12 What’s next?  From IPv4 to IPv6 (deployment in 2005?) U. S. Army IPv6 Initiatives  Improvements: Plenty of IP addresses Overhauled packet structures Better support for real-time data and mobility Better configuration schemes  Co-existing with IPv4

13 Internet security: An after-thought?  Security mechanisms at each layer  IP packet security (IPSec) Encryption and authentication  TCP security Issues that we have talked about  Transport-level security SSL and TLS  Application-level security, e.g., DNS,  PKI and virtual private networks  Denial-of-service, worms and viruses

14 From IP unicast to IP multicast  Unicast: Send a packet to an IP address  Multicast: Send a packet to a group of IP addresses  Anycast: Send a packet to any IP address in a group of IP addresses.  Multicast routing Intra-domain and inter-domain Source-specific and core-specific distribution trees  Others: low control, congestion control, reliability, and security

15 From fixed IP to mobile IP  From stationary IP networks to mobile hosts and mobile routers  Evolving from mobile laptops to mobile IP phones  Support IP mobility in the current IPv4 and IPv6 infrastructures. Mobile IPv4 and Mobile IPv6 Mobile IP network security Authentication, Authorization and Accounting (AAA)

16 From data networking to multimedia networking  Timing requirement (synchronization)  Bandwidth and QoS requirements  Stored and live multimedia sessions  Support various audio and video encoding methods  Media scecurity  IP telephony Control and establishment of sessions (signaling).

17 Coverage in terms of protocols