Our Last Class!!  summary  what does the future look like?

Slides:



Advertisements
Similar presentations
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students,
Advertisements

Introduction 2 1: Introduction.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Exam Review. Basic Concepts  Packet switching versus circuit switching  Their advantages and disadvantages  Layered network architecture  Various.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
CSIT435 Spring 2001 Final Examination Study Guide.
1 Course Summary What have we learned: a huge amount! m principles m practice ….. using Internet to motivate examples.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
1 Course Summary What have we learned: a huge amount! m principles m practice ….. using Internet to motivate examples.
CMPSCI 453/653 Department of Computer Science
Lecture 8 Modeling & Simulation of Communication Networks.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer data center.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
Chapter 5 Link Layer and LANs
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
TCP/IP Protocol Suite - examples
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
CS 381 Final Exam Study Guide Final Exam Date: Tuesday, May 12 th Time: 10:30am -12:30pm Room: SB 105 Exam aid: 8 ½ x 11 page of notes front and back.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 18 Omar Meqdadi Department of Computer Science and Software Engineering University.
A day in the life: scenario
Link Layer 5-1 Link layer, LAN s: outline 5.1 introduction, services 5.2 error detection, correction 5.3 multiple access protocols 5.4 LANs  addressing,
1 John Magee 11 July 2013 CS 101 Lecture 11: How do you “visit” a web page, revisted Slides adapted from Kurose and Ross, Computer Networking 5/e Source.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
ECE453 – Introduction to Computer Networks Lecture 17 – Top – Down Approach (A Review)
Link Layer5-1 Synthesis: a day in the life of a web request  journey down protocol stack complete!  application, transport, network, link  putting-it-all-together:
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
Data Communications and Networks
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
Link Layer5-1 Synthesis: a “day” in the life of a web request  journey down protocol stack!  application, transport, network, link  putting-it-all-together:
CMPSCI 653/453 Professor Don Towsley Department of Computer Science Department of Computer Science University of Massachusetts University of Massachusetts.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
1. Layered Architecture of Communication Networks: TCP/IP Model
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
5: DataLink Layer5-1 Virtualization of networks Virtualization of resources: powerful abstraction in systems engineering: r computing examples: virtual.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
Chapter 7 Application Layer 1 Some of the slides in this chapter are courtesy of Profs. Kurose/Ross and others.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Virtualization of networks
A Typical Connection Scenario
CS 280: Summary: A day in the life of a web request
Course Review 2015 Computer networks 赵振刚
Chapter 6 The Data Link layer
TCP/IP Networking An Example
Network Layer I have learned from life no matter how far you go
Chapters 1~5 Overview Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley Prof. Hong Liu for ECE369 Adapted from.
Synthesis A day in the life of a web request
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Our Last Class!!  summary  what does the future look like?

Summary: let's follow a packet

Application  user enters URL into WWW browser  URL may be text, audio, video with different requirements  browser determines host names, uses DNS to get server's IP address API  browser (client) creates stream socket, socket()  client calls connect(), server port 80  upon return from connect(), will call rcvfrom() to read returned data

Summary (cont.) Transport Layer  connect() call causes TCP connection to be established.  choose initial sequence number  generate SYN packet, server IP address, port 80  TCP forms packet, computes checksum  TCP calls IP (no congestion control on SYN), passing SYN packet and IP address info

Summary (cont.) Network Layer  adds IP source, destination address in IP packet  IP forwarding consults routing table  routing table computed by RIP, or OSPF intradomain protocol  routing table gives IP address of, and local interface to get to, next router (i.e., on its LAN), R, on route to destination  runs ARP to get physical address corresponding to R1's IP address  ARP will generate Ethernet broadcast packet on LAN, requesting R1 to reply with its phys address  R1 replies with physical address

Summary (cont.) Data Link Layer  TCP SYN packet (inside IP packet), as payload in Ethernet packet sent onto LAN using Ethernet protocol  transparent bridge may be involved (not shown) Physical Layer  Ethernet packet transmitted at 10, or 100 Mbps

Summary (cont.) At router R1  physical layer receives Ethernet packet, passes it up  data link layer computes OK checksum, removes IP packet, passes up  network layer consults routing table  routing table was computed using BGP interdomain routing  passes IP packet down to data link layer …

Summary (cont.) At Router R2  DLC packet arrives from "net", passed up to network layer  network layer determines outgoing interface to get to host B  RIP or OSPF intradomain routing protocol computed tables  DLC Ethernet packet sent (R2 knew/learned B's physical layer address)

Summary (cont.) At Host B  Ethernet packet arrives, checksum OK, pass up to IP  IP layer extracts TCP packet, demultiplexes up to TCP (note: not UDP packet)  TCP sees SYN packet  server must have previously opened socket and made accept(), else SYN dropped  TCP determines flow control window, chooses initial sequence #  sends SYNACK back

Summary (cont). At Host A  SYNACK eventually received  send transport-level ACK to B  move to established state  return from connect() system call Epilogue  host A can now perform sendto()  host B (after receiving ACK) will perform rcvfrom() and will eventually receive http command and send response  will use TCP  congestion and flow control  R1, R2 and A, B (network layer and below) act exactly same with data as with SYN packet

Gazing into the Crystal Ball General trends  ubiquity of communications  network-capable appliances (e.g., IP thermostat)  issues of scale important: billions of network-connected devices  mobility important : people move and need to communicate  multimedia important: it is how people communicate  increasing link rates, but bandwidth not free in near future  increased # "users"  increased access bandwidths  increased bandwidth requirements of enabled applications

 security critical concern  ubiquitous high bandwidth to home (ADSL, cable modems) a major driver for future  games, VR, education, information, entertainment  merger of networking and telephony  broadcast entertainment (TV), WWW, and ??  agents, other technologies for dealing with large amounts of distributed, changing data

The Very Last Note Page!  networking: will play a central role in all future computing systems  this course:  specific architectures, protocols, API's  fundamental issues: reliable data transfer, flow/congestion control, routing, multiple access, security  remember: you learned it HERE!

Final Exam  similar to midterm  5 problems  potpourri (all of course)  FSM for protocol  network layer  data link layer  security

Network Layer  virtual circuit vs. datagram  two approaches to calculating routes  link state (OSPF)  distance vector (RIP, BGP)  intradomain, interdomain, hierarchical routing  broadcast/multicast routing  reverse path forwarding  core based trees  salient features of IP (v4, v6), ATM

Data Link  functionality (framing, reliable communications, multiple access)  multiple access algorithms (Ethernet, ALOHA, slotted ALOHA, reservation, TDMA, token ring/bus,…)  advantages/disadvantages (low loads, high loads)  ARP  interconnected LANS, bridges

 security:  private/public key systems (DES, RSA)  authentication  digital signatures  key distribution  network management  functionality  SNMP, MIBs, …  QoS  issues  components