CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 4: September 16, 2003 Internet Layers and “the Web”

Slides:



Advertisements
Similar presentations
Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
Advertisements

CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Transmission Control Protocol (TCP)
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
10. UDP/TCP WWW page: Text book: Mastering Networks (Chapter 10) Network IP protocol is routes the data.
CP476 Internet Computing TCP/IP 1 Lecture 3. TCP / IP Objective: A in-step look at TCP/IP Purposes and operations Header specifications Implementations.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Chapter 7 – Transport Layer Protocols
CS155b: E-Commerce Lecture 4: Jan 18, 2001 How Does the Internet Work? (continued) Acknowledgement: J. Rexford and Lessons Learned From Netscape.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Chapter 3: Transport Layer
CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 3: September 11, 2003 Internet Basics, continued Acknowledgments: R. Wang and J.
Lecture 8 Chapter 3 Transport Layer
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Networking and Internetworking: Standards and Protocols i206 Fall 2010 John Chuang Some slides adapted from Coulouris, Dollimore and Kindberg.
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 2: January 18, 2007 Internet Basics, continued Acknowledgments: R. Wang and J. Rexford.
Transport Layer TCP and UDP IS250 Spring 2010
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
CS155b: E-Commerce Lecture 3: Jan. 21, 2003 How Does the Internet Work? (continued) Acknowledgements: J. Rexford and V. Ramachandran.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Gursharan Singh Tatla Transport Layer 16-May
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
1 Transport Layer Computer Networks. 2 Where are we?
Review: –What is AS? –What is the routing algorithm in BGP? –How does it work? –Where is “policy” reflected in BGP (policy based routing)? –Give examples.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Chapter 5 Transport layer With special emphasis on Transmission Control Protocol (TCP)
CPSC156: The Internet Co-Evolution of Technology and Society Lecture 3: January 23, 2007 More about Internet Layers and “the Web”
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Network Architecture Models: Layered Communications School of Business Eastern Illinois University © Abdou Illia, Fall 2015 (September 14, 2015 ) Encapsulation.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chapter 3 Transport Layer
Transmission Control Protocol
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
1 CS 4396 Computer Networks Lab TCP/IP Networking An Example.
Internet 1) Internet basic concepts 2) The IP protocol stack 3) The IP datagram header (IPv4 and IPv6) 4) Addressing and routing 5) Example: downloading.
Transport Layer 3-1 Chapter 3 Outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP.
Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
Networking Basics CCNA 1 Chapter 11.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
Transport Protocols.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
1 Transmission Control Protocol (TCP) RFC: Introduction The TCP is intended to provide a reliable process-to-process communication service in a.
Process-to-Process Delivery:
Two Transport Protocols Available Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Provides unreliable transfer Requires minimal – Overhead.
Chapter 5 Network and Transport Layers
Introduction to TCP/IP networking
Instructor Materials Chapter 9: Transport Layer
Process-to-Process Delivery:
Network Architecture Models: Layered Communications
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

CPSC156a: The Internet Co-Evolution of Technology and Society Lecture 4: September 16, 2003 Internet Layers and “the Web”

Layering in the IP Protocols Internet Protocol Transmission Control Protocol User Datagram Protocol Telnet HTTP (Web) SONETATM Ethernet Simple Network Management Domain Name Service

Internet Protocol (IP): gives a standard way to “package” messages across different hardware types. The Role of the IP Layer modem access point PPP hub server 10BaseT Ethernet … … FDDI 100BaseT Ethernet router 1. Message is put in IP packet. 2. Dial-up hardware gets packet to router (however it wants, but intact). 3. Routers look at destination, decide where to send it next. 4. Packet gets to destination network. 5. Original message extracted from packet.

IP Connectionless Paradigm No error detection or correction for packet data –Higher-level protocol can provide error checking Successive packets may not follow the same path –Not a problem as long as packets reach the destination Packets can be delivered out-of-order –Receiver can put packets back in order (if necessary) Packets may be lost or arbitrarily delayed –Sender can send the packets again (if desired) No network congestion control (beyond “drop”) –Send can slow down in response to loss or delay

IP Packet Structure 4-bit Version 4-bit Header Length 8-bit Type of Service (TOS) 16-bit Total Length (Bytes) 16-bit Identification 3-bit Flags 13-bit Fragment Offset 8-bit Time to Live (TTL) 8-bit Protocol 16-bit Header Checksum 32-bit Source IP Address 32-bit Destination IP Address Options (if any) Payload 20-byte Header

Main IP Header Fields Version number (e.g., version 4, version 6) Header length (number of 4-byte words) Header checksum (error check on header) Source and destination IP addresses Upper-level protocol (e.g., TCP, UDP) Length in bytes (up to 65,535 bytes) IP options (security, routing, timestamping, etc.) TTL (prevents messages from looping around forever; packets “die” if they “get lost”)

Adding Some Functionality More guarantees, e.g., that packets go in order, require more work at both ends. Solution: add another layer (e.g., TCP) original msg TCP Source IP original msg TCP Destination IP hardware Encapsulation msg TCP hdr msg TCP hdr IP hdr (or without TCP)

Transmission Control Protocol (TCP) Byte-stream socket abstraction for applications Retransmission of lost or corrupted packets Flow-control to respond to network congestion Simultaneous transmission in both directions Multiplexing of multiple logical connections sourcenetworkdestination TCP connection

TCP Header 16-bit destination port number 32-bit sequence number 32-bit acknowledgement number 16-bit TCP checksum Options (if any) Payload 20-byte Header 16-bit source port number 16-bit window size 4-bit header length FINFIN SYNSYN RSTRST PSHPSH ACKACK URGURG 16-bit urgent pointer

Establishing a TCP Connection Three-way handshake to establish connection –Host A sends a SYN (open) to the host B –Host B returns a SYN acknowledgment (ACK) –Host A sends an ACK to acknowledge the SYN ACK Closing the connection –Finish (FIN) to close and receive remaining bytes (and other host sends a FIN ACK to acknowledge) –Reset (RST) to close and not receive remaining bytes SYN SYN ACK ACK Data FIN FIN ACK ACK time A B

Lost and Corrupted Packets Detecting corrupted and lost packets –Error detection via checksum on header and data –Sender sends packet, sets timeout, and waits for ACK –Receiver sends ACKs for received packets Retransmission from sender –Sender retransmits lost/corrupted packets –Receiver reassembles and reorders packets –Receiver discards corrupted and duplicated packets Packet loss rates are high (e.g., 10%), causing significant delay (especially for short Web transfers)!

User Datagram Protocol (UDP) Some applications do not want or need TCP –Don’t need recovery from lost or corrupted packets –Don’t want flow control to respond to loss/congestion Fraction of UDP packets is rapidly increasing –Commonly used for multimedia applications –UDP traffic interferes with TCP performance –But, many firewalls do not accept UDP packets Dealing with the growth in UDP traffic –Pressure for applications to apply flow control –Future routers may enforce “TCP-like” behavior –Need better mathematical models of TCP behavior

Connecting Networks AOL Autonomous System (AS) EarthLink Autonomous System (AS) WorldNet Autonomous System:A collection of IP subnets and routers under the same administrative authority. Interior Routing Protocol (e.g., Open Shortest Path First) Exterior Routing Protocol (e.g., Border Gateway Protocol)

Where to Go Next Routers contain a forwarding table that pairs destination with next hop (on what physical wire to send msg.). The table gets populated with information learned internally (e.g., OSPF) and externally (e.g., BGP). OSPF and BGP are protocols that communicate knowledge about destinations between routers.

Getting from A to B: Summary Need IP addresses for: Self (to use as source address) DNS Server (to map names to addresses) Default router to reach other hosts (e.g., gateway) Use DNS to get destination address Pass message through TCP/IP handler Send it off! Routers will do the work: Physically connecting different networks Deciding where to next send packets

HTTP (Hypertext Transfer Protocol) Standard protocol for web transfer “Request-response” interaction between clients and servers Request methods: GET, HEAD, PUT, POST, DELETE,… Response: Status line + additional info (e.g., a web page) Example, from HW1, of a request line:

Language in which web pages are written Contains formatting commands Tells browser what to display and how to display Welcome to Yale - The title of this page is “Welcome to Yale” Great News! - Set “Great News!” in boldface Yale Computer Science Department - A link pointing to the web page with the text “Yale Computer Science Department” displayed. HTML (Hypertext Markup Language)

httpwww.cs.yale.eduindex.html ProtocolHost, Domain Name What does “ mean? Local File

Simple HTML Commands in HW1 Lastname: Firstname: <input type=“text” name=“firstname” id=“firstname”> Lastname: Firstname: Submit form

Discussion Point Packets, decentralized control, “intelligence at the endpoints” Now we’ve built a “byte-stream socket abstraction,” pairs of which look like a “conversation.” Have we gained anything?

Yes: The WWW Revolution! Late 1990: WWW, HTTP, HTML, “Browser” invented by Tim Berners-Lee at CERN. Mid-1994: Mosaic Communications founded (later renamed to Netscape Communications). 1995: “Browsing” has become a universal pastime. IE ships with Windows 95. New businesses (e.g., portal companies) enabled. Old businesses (e.g., book selling) revolutionized. Triumph of Internet architecture and ethos: layering, “stupid network,” open standards.

Reading Assignment for this Week Chapter 1 of Information Rules, by Shapiro and Varian. (Available in paper form only; distributed in class.)