Lowering the Barriers to Innovation Jennifer Rexford Computer Science Department Princeton University

Slides:



Advertisements
Similar presentations
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Advertisements

Transport Layer3-1 Transport Overview and UDP. Transport Layer3-2 Goals r Understand transport services m Multiplexing and Demultiplexing m Reliable data.
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Chapter 3: Transport Layer
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 14.
How the Internet Works Jennifer Rexford Computer Science Department
How the Internet Works Jennifer Rexford Computer Science Department
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
Transport Layer3-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer.
1 An Introduction to Computer Networks Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Department of Information Engineering 1 Objectives A basic understanding of the following –What is Internet? –What is client-server computing? –What is.
Network Architectures Week 3 – OSI and The Internet.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
1 Computer Networks Transport Layer Protocols. 2 Application-layer Protocols Application-layer protocols –one “piece” of an app –define messages exchanged.
8-1 Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable data transfer m flow.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Data Communications and Networking
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
1 CS 640: Introduction to Computer Networks Aditya Akella Lecture 1 Introduction
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
CS448 Computer Networking Chapter 1 Introduction to Computer Networks Instructor: Li Ma Office: NBC 126 Phone: (713)
Presentation on Osi & TCP/IP MODEL
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.
Network Layer4-1 Chapter 4: Network Layer Chapter goals: r understand principles behind network layer services: m network layer service models m forwarding.
Some Basic Networking Concepts: LANs, WANs, Switching, and Multiplexing Carey Williamson Department of Computer Science University of Calgary.
Data Communications and Computer Networks Chapter 3 CS 3830 Lecture 12 Omar Meqdadi Department of Computer Science and Software Engineering University.
Introduction 1-1 EKT355/4 ADVANCED COMPUTER NETWORK MISS HASNAH AHMAD School of Computer & Communication Engineering.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Network Layer introduction.
Network Applications and Layered Architectures Protocols OSI Reference Model.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Part.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Transport Layer1 Ram Dantu (compiled from various text books)
Ch 1. Computer Networks and the Internet Myungchul Kim
Welcome to Networking and Security! Brett Tjaden 216 ISAT/CS Building Department of Computer Science James Madison University Harrisonburg, VA
Chapter 1 Communication Networks and Services Network Architecture and Services.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Managing Telecommunications Chapter 6 Emily Gehm Jessica Paul Melanie Wall.
MULTIPLEXING/DEMULTIPLEXING, CONNECTIONLESS TRANSPORT.
IT 210: Web-based IT Fall 2012 Lecture: Network Basics, OSI, & Internet Architecture.
WAN Transmission Media
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Transport Layer3-1 Chapter 3: Transport Layer Our goals: r understand principles behind transport layer services: m multiplexing/demultipl exing m reliable.
Introduction and Overview of Network and Telecommunications.
Introduction 1-1 source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical.
2: Transport Layer 11 Transport Layer 1. 2: Transport Layer 12 Part 2: Transport Layer Chapter goals: r understand principles behind transport layer services:
CSEN 404 Transport Layer I Amr El Mougy Lamia Al Badrawy.
UDP: User Datagram Protocol. What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host – treats a computer as an.
Creating Technology to Change the World Jennifer Rexford Chair of Computer Science Princeton University.
INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723
Computer Communications
Introduction to Networks
OSI Protocol Stack Given the post man exemple.
CS4470 Computer Networking Protocols
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Introduction to Networks
Network Architecture for Cyberspace
Fixing the Internet: Think Locally, Impact Globally
Internet Resilience: Global Network, Global Risks
Presentation transcript:

Lowering the Barriers to Innovation Jennifer Rexford Computer Science Department Princeton University

Flash Back to 1984

Fast Forward to Today How computers work –Electrical engineering degree at Princeton Making multiple computers work together –Parallel computing research at U. Michigan Interconnecting computers via the Internet –Research at AT&T Labs Designing the future Internet –Research and teaching with undergraduate and graduate students at Princeton

How the Internet Enables Innovation

Innovative Applications Shawn Fanning Northeastern freshman Napster Tim Berners-Lee CERN Researcher World Wide Web Meg Whitman E-Bay iPhone apps

Innovative Communication Media Ethernet Fiber optics Cable DSL WiFi Cellular Satellite Bluetooth

Telephone Network Smart Network Dumb Terminals

Plain Old Telephone Service (POTS) Dumb phones –Dial a number –Speak and listen Smart switches –Set up and tear down a circuit –Forward audio along the path Limited services –Audio –Later, fax, caller-id, … A monopoly for a long time

Internet Dumb Network Smart Terminals

Power at the Edge End-to-End Principle Whenever possible, communications operations should occur at the end-points of a system. Programmability With programmable end hosts, new network services can be added at any time, by anyone. And then computers became powerful and ubiquitous….

What Does the “Dumb” Network Do? Best-Effort Packet Delivery

Internet Protocol (IP) Packet Switching Much like the postal system –Divide information into letters –Stick them in envelopes –Deliver them independently –And sometimes they get there What’s in an IP packet? –The data you want to send –A header with the “from” and “to” addresses

Why Packets? Data traffic is bursty –Logging in to remote machines –Exchanging messages Don’t waste bandwidth –No traffic exchanged during idle periods Better to allow sharing of resources –Different transfers share access to same links

Why Best Effort? Best-effort delivery –Packets may be lost, corrupted, delayed, or delivered out-of order Keeps the network simple –No retransmission, error correction, or guarantees of packet delivery, … source destination IP network

Supporting Diverse Link Technologies Best-effort packet delivery over most anything –Serial link, fiber optic link, coaxial cable, wireless Even birds –IP Datagrams over Avian Carriers IP over Avian Carriers was actually implemented, sending 9 packets over a distance of approximately 3 miles, each carried by an individual pigeon, and they received 4 responses, with a packet loss ratio of 55%, and a response time ranging from 3000 seconds to over 6000 seconds.

Power to the User’s Computer Operating System packets Overcome network limitations –Retransmit lost or corrupted packets –Put the received data back in order –Slow down under congestion Run neat applications!

The Result: Tremendous Innovation Internet Protocol

So, What’s the Problem? (And where do I come in?)

Misplaced Trust in the End Host Security vulnerabilities –No strict notions of identity –Powerful computers Many attacks –Denial of service –Spam –Phishing –Identity theft How do we protect the Internet?

Nobody is In Charge Client Web server Around 50,000 independent networks How to manage a global federated network?

Hard to Change the Inside of the Internet Internet infrastructure –Scalability –Stability –Reliability –Performance –Energy-efficiency –Security Internet Protocol Can we make the inside programmable? –To unleash a wave of innovation

My Research Challenge A future Internet worthy of our trust –More secure, scalable, stable, reliable, efficient, … –More flexible and evolvable over time Despite all the challenges –Greedy and malicious users –Networks driven by economics and politics Without losing all the good stuff –Innovative applications –Innovative communication media I think this will keep me busy for awhile!

What I Love About My Job Learn new stuff all the time Pick the research problems I work on Pick the people I want to work with Have real impact on the world today And (hopefully) bigger impact in the future While wearing jeans to work every day!

Thanks! (Any Questions?)