Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.

Slides:



Advertisements
Similar presentations
End-to-End Arguments in System Design
Advertisements

Layering and the network layer CS168, Fall 2014 Sylvia Ratnasamy
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
End-to-End Arguments in System Design J.H. Saltzer, D.P. Reed and D.D Clark M.I.T. Laboratory for Computer Science Presented by Jimmy Pierce.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Ryan Huebsch CS294-4 P2P Systems – 9/29/03.
EE 122: Layering and the Internet Architecture Kevin Lai September 4, 2002.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Gursharan Singh Tatla Transport Layer 16-May
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Rhys McBreen (How the internet works) X. Contents The Layers and what they do IP Addressing X.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
J.H.Saltzer, D.P.Reed, C.C.Clark End-to-End Arguments in System Design Reading Group 19/11/03 Torsten Ackemann.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Layering Chapter 10. Looked at: Architectural foundations of internetworking Architectural foundations of internetworking Forwarding of datagrams.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lect1..ppt - 01/06/05 CDA 6505 Network Architecture and Client/Server Computing Lecture 2 Protocols and the TCP/IP Suite by Zornitza Genova Prodanoff.
Mukesh N. Tekwani Elphinstone College Mumbai
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP/IP Transport and Application (Topic 6)
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
End-To-End Arguments in System Design J.H. Saltzer, D.P. Reed, and D. Clark Presented by: Amit Mondal.
END-TO-END ARGUMENTS IN SYSTEM DESIGN J.H. Salter, D.P. Reed and D.D. Clark Presented by Sui-Yu Wang.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
End-to-End Principle Brad Karp UCL Computer Science CS 6007/GC15/GA07 25 th February, 2009.
Protocol Layering Chapter 11.
CS551: End to End Argument Saltzer88 Christos Papadopoulos (
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
END-TO-END Arguments in System Design END-TO-END Arguments in System Design J. SaltzerD. Reed D. Clark M.I.T. Laboratory, 1981 Presented By Mohammad Malli.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
End-to-End Arguments in System Design CSCI 634, Fall 2010.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
CS533 - Concepts of Operating Systems End-to-End Arguments in System Design Presentation by David Florey.
K. Salah1 Security Protocols in the Internet IPSec.
Process-to-Process Delivery:
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Introduction to: The Architecture of the Internet
Chapter 11 User Datagram Protocol
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presented by Muhammad Abu Saqer
Network Architecture Introductory material
Packet Sniffing.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Review of Important Networking Concepts
Introduction to: The Architecture of the Internet
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Introduction to: The Architecture of the Internet
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Request for comment (RFC) (started in 1969)
Introduction to: The Architecture of the Internet
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
CSE 542: Operating Systems
CSE 542: Operating Systems
Announcements You need to register separately for the class mailing list and online paper review system. Do it now so that we can work out any “bugs”.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing2 Outline End-to-End Arguments in System Design – J. H. Saltzer, D. P. Reed and D. D. Clark – MIT (1980) –Jerome Saltzer – Multics (a precursor to UNIX) –David Reed – Visicalc, Lotus 1-2-3, TCP/IP –David Clark – Multics, Internet KISS principle (Keep It Simple, Stupid)

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing3 Modular vs End-to-End Modular: –Design, well designed modules, each of which performs a task completely –E.g. networking 7 layer OSI model End-to-end: –Some tasks a better left to higher layers –Keep the lower layers simple, perform error checking and other operations at lower layers if it is simple. Higher layers will duplicate this functionality anyway –E.g. Internet (only supports IP datagrams)

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing4 Example 1: Careful file transfer At host A, the file system reads the file and gives to file transfer program File transfer program asks network to send file in packets Network moves packets from A to B Network takes packets from network and gives it to file receive program File receive program puts data inthe file system Host AHost B

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing5 Modular Approach Make sure that each of these steps mask failures –Read from disk, perform check sums to verify data integrity –Make sure the communication network delivers data reliably etc End-to-end approach –Transfer the file, perform a checksum of the complete file, if it matches then data was correct –Optimization: Perform checksums after parts of the file are received

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing6 Example 2: Faulty router With a modular design, proper check sums verified before putting packets in input buffer. Packets got corrupted inside the router before it copies data to the output buffer. Went undetected Input BufferOutput Buffer

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing7 Performance aspects Modular implementations do help similar applications Frees end user from complexities The tradeoff is that the lower levels should provide some functionality, which is easy to implement and leave complicated schemes to higher level mechanisms

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing8 Example 3: Delivery guarantees Lower level delivery guarantee mechanism can tell when a message was delivered to a computer. What users really care is if a message was delivered to the user –E.g. Return-Receipt-To: header will trigger mail servers to send a receipt when is delivered. What you really want is when users read the . After message is delivered to the system, the disk can crash, access can be turned off so that lower level acknowledgement is useless You can force the end system to guarantee delivery to application but simpler at the application level Two phase commit

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing9 Example 4: Secure transmission of data Data transmission system performs encryption and decryption –Trust lower levels with key management –Data will be in clear text in the operating system –Authenticity of message must still be checked Leave end-to-end authorization to higher layers. Lower level can perform basic encryption –E.g. data between wireless access point and the wireless card is encrypted. Can be broken but it stops casual hackers and is not too hard to implement

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing10 Example 5: Duplicate message suppression Applications sometime know if a message is a duplicate and drop the second update

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing11 How does it matter? Internet: –When ARPANET (->DARPANET->INTERNET) was being designed, there was a tension between adding intelligence in the network. Ultimately they chose IP data gram as the transport mechanism. That has enabled the technology to be useful for such a long time. People built TCP (reliable), UDP (unreliable), RTSP (streaming), IP-SEC (secure IP) etc on top of IP.

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing12 Threats to end-to-end paradigm Quality of Service (QoS) – Routers treat packets differently based on the source, $$$ etc. Internet2 provides heavy support for QoS. Voice-over-IP –Megaco – Simple phones, complexity in the server –SIP – Complexity in the phones, simple network What about wire-tapping? Firewalls, Caches, NAT –Prevents end-to-end interaction

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing13 Failures of E2E model Multicast –Can perform at application layers, but the lower levels can implement it easier

Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing14 Discussion