ECE 550D Fundamentals of Computer Systems and Engineering Fall 2016 - - PowerPoint PPT Presentation

ece 550d
SMART_READER_LITE
LIVE PREVIEW

ECE 550D Fundamentals of Computer Systems and Engineering Fall 2016 - - PowerPoint PPT Presentation

ECE 550D Fundamentals of Computer Systems and Engineering Fall 2016 Networking Basics Tyler Bletsch Duke University Slides are derived from work by Andrew Hilton (Duke) Networking How do computers communicate? Two computers connected


slide-1
SLIDE 1

ECE 550D

Fundamentals of Computer Systems and Engineering

Fall 2016

Networking Basics

Tyler Bletsch Duke University Slides are derived from work by Andrew Hilton (Duke)

slide-2
SLIDE 2

2

Networking

  • How do computers communicate?
  • Two computers connected by a direct wire?
  • Relatively straight forward: move bits across wire
  • Internet?
  • Many computers
  • All around the world
  • With other communications going on…
  • And un-reliable links
  • And tons of different systems, media, protocols…
  • Pretty complicated, so how could we possibly manage it?

Abstraction

(oh right, the answer to like…everything)

slide-3
SLIDE 3

3

7-layer OSI model

  • 7 layer networking stack
  • (Theoretically) can change out any layer at a time

1 Physical Layer 2 Data-link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application Layer

slide-4
SLIDE 4

4

Layer 1: Physical Layer

  • Defines physical how physical media work
  • Pin layout
  • Voltages
  • Timing Requirements
  • Examples:
  • Cat 5 Cable (“Ethernet Cable”)
  • Wireless radio signal specifications
  • Not much interesting to say here
slide-5
SLIDE 5

5

Layer 2: Data-link Layer

  • How to move bits across the wires in a meaningful way
  • Communication between two computers on same physical network
  • May include some error checking
  • Example: Ethernet
  • Data transmitted in frames
  • Frame has:
  • Pre-amble: used to detect collisions
  • Header: source and destination MAC address
  • Payload: actual data
  • CRC check: detect corrupt data
  • Carrier Sense, Multiple Access, Collision Detect (CSMACD)
  • Carrier Sense: listen for if anyone else transmitting
  • Multiple Access: can wire up many computers to it
  • Collision Detect: two transmissions at once? Detect and retry
slide-6
SLIDE 6

6

CSMACD

  • Ethernet uses CSMACD for multiple systems on a network
  • Other options, but we won’t go into them
  • Detection of collisions?
  • Pre-amble is fixed pattern
  • Network card senses medium while transmitting
  • Mismatch with expected? Collision
  • Collision happens?
  • Exponential backoff
  • Pick random number of time units
  • Retry
  • Fail again? Pick random number from 2x as big a range
  • Analogy: crowded dinner party
  • Try to talk. Someone else talking? Wait. Try again. Fail again? Wait

longer

slide-7
SLIDE 7

7

Abstraction: Joys and Limitations

  • Joys of abstraction:
  • Can build an Ethernet card without any info about higher layers
  • Will work with all of them
  • Limitations:
  • 7-layer model’s abstraction not perfect
  • Ethernet protocol imposes max limit on cable length
  • E.g., layer 2 constrains layer 1
  • This arises from the need to detect collisions before finishing

sending

slide-8
SLIDE 8

8

7-layer OSI model

  • Reminder where we are so far

Cat 5 Cable Ethernet 1 Physical Layer 2 Data-link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application Layer

slide-9
SLIDE 9

9

Our messages so far

  • Header says what network layer protocol the pay load is

Preamble Header Payload CRC

slide-10
SLIDE 10

10

Layer 3: The Network Layer

  • Layer 2 let’s computers on same network talk
  • Layer 3 let’s computers talk across networks
  • Addressing
  • How do we specify what computer to talk to?
  • Routing
  • How do we get from here to there?
  • Example: IP protocol
  • IPv4 and IPv6: pretty similar in most core regards
  • Best effort delivery
  • Addressing (IP addresses)
  • Routing
  • Analogy: Mailing a letter
slide-11
SLIDE 11

11

IP addresses

  • IPv4 addresses: 32-bit numbers
  • Could write as decimal or hex...but that’s not how it’s done
  • Instead write as four separate bytes (each expressed in decimal),

separated by dots: dotted decimal notation

  • IPv4 address:

152.3.34.5

  • As four hex bytes:

98, 03, 22, 05

  • As a 32-bit hex value: 98032205
  • 32-bit binary value:

10011000000000110010001000000101

  • IPv6: 128-bit addresses
  • More bits needed to address more separate things on the internet
  • Been around for a long time, seeing very slow adoption
  • Addresses represented as eight two-byte groups in hex separated by

colons, for example 3001:0db3:0000:0032:0000:3a2e:0330:7384

  • We’ll use IPv4 to explain for now
slide-12
SLIDE 12

12

IP

  • Computer 1 wants to send data to Computer 2
  • For now, assume it knows IP address (we’ll see DNS later)
  • Has direct connection to its ISP… but then what?
  • The internet is a big place after all..

Computer 1 66.220.152.32 Computer2 74.125.130.105 The Internet ISP 2 74.125.130.1 ISP 1 66.220.152.1

slide-13
SLIDE 13

13

Let’s zoom in on ISP 1

  • ISP has connections to a handful of other places
  • Generally very high bandwidth connections
  • Will send your data (packet) to one of these, but which one?

Computer 1 66.220.152.32 ISP 1 66.220.152.1 Other Cust A 66.220.152.33 Other Cust B 66.220.152.34 ISP 4 98.139.183.1 ISP 5 ISP 6 129.42.60.1

slide-14
SLIDE 14

14

IP Routing

  • IP addresses are hierarchical
  • May not know how to find 74.125.130.105…
  • But know which way to go to get to 74.______
  • Move one step closer
  • Within 74 network, know how to find 74.125
  • Then 74.125.130
  • Then find 74.125.130.105
  • Analogy:
  • How do I get to 2200 Mission College Blvd, Santa Clara, CA?
slide-15
SLIDE 15

15

IP Routing

  • Analogy:
  • How do I get to 2200 Mission College Blvd, Santa Clara, CA?
  • I have no idea, but I can get you to I-40 West
  • Then you can ask someone else when you get to CA
  • Once in CA, you ask someone else:
  • “I only know its north of here, so take the 5 North and ask

someone else”

  • Etc..
  • This works because our physical addresses are hierarchical:

Country, State, City, Street, Number

slide-16
SLIDE 16

16

Routing Basics

  • Routing is done with tables
  • CIDR notation: 40.1.0.0/16
  • Match first 16 bits of 40.1.0.0, ignore remaining 16 bits
  • Find match, entry tells what link to send out on
  • Example
  • 40.0.0.0/8 => Link 0
  • 50.1.0.0/16 => Link 1
  • 50.3.27.0/24 => Link 3
  • 50.2.0.0/16 => Link 2
  • 50.3.42.0/24 => Link 1
slide-17
SLIDE 17

17

Routing: More Complex

  • Approach one: Static Routing
  • Enter all routes
  • Let system run
  • Hope nothing goes down
  • Works fine for small networks
  • Reality:
  • Network links/systems go down
  • Often multiple paths to same place
  • Changing traffic patterns = changing fastest route
slide-18
SLIDE 18

18

Distance Vector Protocols

  • Routers
  • Know distances to immediate neighbors
  • Compute distance vector
  • How far to any destination from all known info
  • Transmit distance vectors to neighbors
  • Discover better (shorter) route? Update table
  • Now know more info, so repeat process
slide-19
SLIDE 19

19

Distance Vector Routing

A C D z Dest Cost Rt A

— B

— C

— D

— v Dest Cost Rt A

2

A B

— C

2

C D

— x Dest Cost Rt A

— B

2

B C

— D

— w Dest Cost Rt A

— B

— C

— D

— 1 B t Dest Cost Rt A

— B

1

B C

— D

3

D 2 3 3 2 4 3 2 1 2 2

slide-20
SLIDE 20

20

Distance Vector Routing

A C D z Dest Cost Rt A

— B

— C

— D

— v Dest Cost Rt A

2

A B

— C

2

C D

— x Dest Cost Rt A

— B

2

B C

— D

— w Dest Cost Rt A

— B

— C

— D

— 1 B t Dest Cost Rt A

— B

1

B C

— D

3

D 2 3 3 2 4 3 2 1 2 2 2+1 via v 2+3 via x 2+1 via v

slide-21
SLIDE 21

21

Distance Vector Routing

A C D z Dest Cost Rt A

— B

— C

— D

— v Dest Cost Rt A

2

A B

— C

2

C D

— x Dest Cost Rt A

— B

2

B C

— D

— w Dest Cost Rt A

— B

— C

— D

— 1 B t Dest Cost Rt A

— B

1

B C

— D

3

D 2 3 3 2 4 3 2 1 2 2 no improvements

slide-22
SLIDE 22

22

Distance Vector Routing

A C D z Dest Cost Rt A

4

v B

3

t C

4

v D

5

t v Dest Cost Rt A

2

A B

— C

2

C D

— x Dest Cost Rt A

— B

2

B C

— D

6

t w Dest Cost Rt A

3

v B

5

x C

3

v D

— 1 B t Dest Cost Rt A

— B

1

B C

— D

3

D 2 3 3 2 4 3 2 1 2 2

slide-23
SLIDE 23

23

Distance Vector Routing

A C D z Dest Cost Rt A

4

v B

3

t C

4

vw D

5

t v Dest Cost Rt A

2

A B

5

z C

2

C D

7

z x Dest Cost Rt A

6

w B

2

B C

6

w D

6

t w Dest Cost Rt A

3

v B

5

x C

3

v D

9

x 1 B t Dest Cost Rt A

6

z B

1

B C

6

z D

3

D 2 3 3 2 4 3 2 1 2 2

slide-24
SLIDE 24

24

Distance Vector Routing

A C D z Dest Cost Rt A

4

v B

3

t C

4

vw D

5

t v Dest Cost Rt A

2

A B

5

z C

2

C D

7

z x Dest Cost Rt A

6

w B

2

B C

6

w D

6

t w Dest Cost Rt A

3

v B

5

x C

3

v D

8

v 1 B t Dest Cost Rt A

6

z B

1

B C

6

z D

3

D 2 3 3 2 4 3 2 1 2 2

slide-25
SLIDE 25

37

Link State Protocols

  • Another option: link state protocols
  • Send info about direct connections to all routers
  • All routers build global pictures of network
  • Run graph algorithms to find shortest paths
  • E.g., Dijkstra’s shortest path algorithm
  • Global information is nice, but…
  • Complex for very large systems
  • How many routers on the internet?
  • Do they all exchange all their info and run Dijkstra’s?
  • Of course not..
  • So… what do we do?

37

Use Abstraction… (and hierarchy)

slide-26
SLIDE 26

38

  • Divide internet up into Autonomous Systems (ASes)
  • Each AS can advertise routes to other ASes
  • Routing internal to AS is hidden from outside world
  • Can be Link State, Distance Vector, other…
  • We won’t go into too many details

38

Border Gateway Protocol

AS 1 AS 4 AS 2 AS 3

slide-27
SLIDE 27

39

7-layer OSI model

  • IP: hierarchical addresses + best effort delivery

Cat 5 Cable Ethernet 1 Physical Layer 2 Data-link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application Layer IP

slide-28
SLIDE 28

40

Our messages so far

  • IP Header has
  • Src IP
  • Dest IP
  • Payload type (what protocol)
  • Other info
  • Side note: IP does fragmentation to fit within frame size
  • We aren’t covering that

Preamble Header Header CRC

Payload

slide-29
SLIDE 29

41

Layer 4: Transport Layer

  • Reliability (if used)
  • Acknowledgements of data receipt
  • Retries of failed data
  • Flow Control
  • Restrict rate of data sending
  • Multiplexing/De-multiplexing data
  • E.g., Ports: identify which program some data is for
  • Keep data streams separate
slide-30
SLIDE 30

42

Layer 5: Session Layer

  • Concept of “a connection”
  • Establish/terminate
  • (OSI includes a variety of obscure features not often used)
  • TCP: combines these two layers together
  • Sets up/terminates sessions
  • Has sequence numbering for packets
  • Acknowledges (ACKs) packets that are received
  • Establishes flow control (responds to congestion by throttling sending)
slide-31
SLIDE 31

43

TCP

  • We’ll draw diagram with computers on each side
  • Time goes down
  • Three messages above (TCP’s “3 way handshake”)

9987: SYN, ACK(1045) 1045: SYN 1046: ACK(9987)

slide-32
SLIDE 32

44

TCP

  • To open a new connection:
  • 1 computer sends SYN (“Hi, lets talk”)
  • All messages have sequence numbers including SYN
  • First sequence number of a new connection is random
  • TCP sequence numbers by byte

9987: SYN, ACK(1045) 1045: SYN 1046: ACK(9987)

slide-33
SLIDE 33

45

TCP

  • Other computer
  • ACKs (Acknowledges) the message (says what sequence # it ACKs)
  • Also sends SYN “Hey sure, lets talk”

9987: SYN, ACK(1045) 1045: SYN 1046: ACK(9987)

slide-34
SLIDE 34

46

TCP

  • First computer then ACKs this SYN
  • And probably sends data along with the ACK
  • TCP control info (SYN, ACK, FIN): bits in TCP header
  • Packets can have multiple control bits on + carry data

9987: SYN, ACK(1045) 1045: SYN 1046: ACK(9987)

slide-35
SLIDE 35

47

TCP: Normal operation

  • Data going right in blue
  • ACKS coming left in green
  • note: ACK #ed by expected next data
  • Sliding window (flow control)
  • Limit amount of un-ACKed data at a time

2000 2500 3000 3500 4000 4500 ACK(2500) ACK(3000) ACK(3500)

slide-36
SLIDE 36

48

TCP: Re-ordered Data

  • Data may get re-ordered in network
  • One packet takes one route, another takes another
  • TCP: no problem
  • Sender re-orders data properly
  • Sends ACK for as much data as it has

5000 ACK(6000) 5500

slide-37
SLIDE 37

49

TCP: Lost data

  • Data may also get lost in the network
  • E.g., router is backlogged, can’t handle it has to drop from queue
  • TCP will re-send un-ACKed data after a timeout

6000 ACK(6500) 6000

slide-38
SLIDE 38

50

TCP: Duplicate Data

  • Receiver may get duplicate data
  • 7000-7499 gets lost
  • But 7500-7599 arrives
  • Then sender re-sends both: no ACK for either (why not?)
  • No problem: receiver drops duplicate (can tell: sequence #s)

7000 ACK(8000) 7500 7000 7500

slide-39
SLIDE 39

51

TCP: Closing connection

  • Connection closed with FIN message
  • Receiver ACKs
  • Other side may close (with FIN) [typical]
  • Or remain open: can still send data
  • Side that closed cannot send, but should receive/ACK
  • FIN/ACK may be one message

9000 FIN ACK(9016) 101090 FIN ACK(101106)

slide-40
SLIDE 40

52

TCP: Closing connection

  • What if ACK for FIN gets lost?
  • FIN gets retried… but other side expects connection is closed?
  • TCP has a state to handle this
  • Connection expected to be closed, but resources/state still held
  • Times out if no activity (assumes ACK got through if no retry)

9000 FIN ACK(9016) 101090 FIN ACK(101106) 101090 FIN ACK(101106)

slide-41
SLIDE 41

53

Flow control: Sliding Window

  • Problem:
  • Congestion -> dropped packets
  • Dropped packets -> Retries
  • Retries = duplicates of data -> More congestion
  • Vicious cycle…
  • TCP implements flow control with a sliding window
  • Limitation of amount of un-ACKed data out at a time
  • Retry required? Shrink window
  • Assumes congestion, tries to avoid it
  • No retries in a while? Grow window back
  • Maybe it cleared up?
slide-42
SLIDE 42

54

7-layer OSI model

  • TCP: It’s the coolest thing since memory got sliced into pages!

Cat 5 Cable Ethernet 1 Physical Layer 2 Data-link Layer 3 Network Layer 4 Transport Layer 5 Session Layer 6 Presentation Layer 7 Application Layer IP TCP (TCP)

slide-43
SLIDE 43

55

Our messages so far

  • TCP header has
  • Source/Dest port
  • Sequence numbers
  • Control bits (SYN/ACK/FIN)
  • Check sum over data
  • Other stuff

Preamble Header Header CRC Header

Payload

slide-44
SLIDE 44

56

Layer 6: Presentation Layer

  • Responsible for data formats
  • Examples
  • Character encoding schemes
  • Serialization of objects
  • We’re not really going to talk about it much
slide-45
SLIDE 45

57

Layer 7: Application Layer

  • Protocol specific to how applications want to communicate
  • Examples:
  • HTTP(S)
  • (S)FTP
  • SSH
  • SMTP
  • IMAP
  • Again, not going into this much…
slide-46
SLIDE 46

58

7-layer OSI model

  • Flexibility Example: Wired vs Wireless
  • Change out two layers, rest stay the same

Cat 5 Cable Ethernet IP TCP (TCP)

  • HTTP

Wireless Radio 802.11 IP TCP (TCP)

  • HTTP
slide-47
SLIDE 47

59

7-layer OSI model

  • Flexibility Example: A different application on top of both

Cat 5 Cable Ethernet IP TCP (TCP)

  • SMTP

Wireless Radio 802.11 IP TCP (TCP)

  • SMTP
slide-48
SLIDE 48

60

How to find out IP addresses?

  • I don’t know about you, but whenever I want to visit Google, I

just type “172.217.2.206” into my browser

  • Not really
  • People don’t memorize IP addresses – need convenient way to

translate human-readable names to IP addresses

  • This is the domain name system (DNS)
  • Hierarchical servers with hierarchical database:

Root DNS Servers com DNS servers

  • rg DNS servers

edu DNS servers poly.edu DNS servers umass.edu DNS servers yahoo.com DNS servers amazon.com DNS servers pbs.org DNS servers

Figure from DNS – Domain Name System, CS234, UC Irvine.

slide-49
SLIDE 49

61

requesting host

cis.poly.edu gaia.cs.umass.edu

root DNS server local DNS server

dns.poly.edu

1 2 4 5 6

authoritative DNS server dns.cs.umass.edu

7 8 TLD DNS server 3

DNS name resolution example

Recursive query:

  • Resolves any query by

consulting servers that are authoritative for the query

  • To do so, servers may

recursively query other servers higher up in the hierarchy

Adapted from DNS – Domain Name System, CS234, UC Irvine.

slide-50
SLIDE 50

62

Additional DNS facts

  • DNS contains multiple kinds of records:
  • Name -> IP translations (“A” records)
  • IP -> Name translations (“PTR” records)
  • Name -> Name translations (“CNAME” records)
  • more
  • DNS clients and servers can cache results
  • The local Duke DNS server definitely has “google.com” cached
  • Second-level domains (“duke.edu”, “google.com”, etc.) are

registered, usually by paying a fee, with a registrar (e.g. “easydns.com”) who interacts with the top-level domain authority (Verisign for .com, Educause for .edu, etc.)

  • Sub-domains can be created administratively by the owner of

a domain (e.g. “whatever.duke.edu” can be made by the “duke.edu” admin).

slide-51
SLIDE 51

63

Wireshark demo

slide-52
SLIDE 52

64

Network programming

  • Coding networking code in…
  • Java: Look in java.net, start with Socket
  • C:
  • socket()
  • connect()
  • accept()
  • bind()
  • listen()
slide-53
SLIDE 53

65

Example C sockets client

Does a simple HTTP request of google.com

// adapted from simple-client.c by Sean Walton and Macmillan Publishers // adapted by Tyler Bletsch for Duke University // This program will request http://google.com/ and print the first 1024 bytes of the response // Note: for simplicity, the google IP address is hard coded #include <stdlib.h> #include <stdio.h> #include <unistd.h> // needed for close #include <string.h> // needed for bzero #include <sys/socket.h> // needed for socket calls #include <resolv.h> // needed for socket type #include <arpa/inet.h> // needed for inet_aton #define PORT 80 #define SERVER_ADDR "172.217.1.14" // ^ this is google.com #define MAXBUF 1024 char request[] = "GET / HTTP/1.0\r\n\r\n"; int request_len = sizeof(request)-1; #define die(s) { perror(s); exit(1); } int main() { int sockfd; struct sockaddr_in dest; char buffer[MAXBUF]; /*---Open socket for streaming---*/ if ( (sockfd = socket(AF_INET, SOCK_STREAM, 0)) < 0 ) die("socket"); /*---Initialize server address/port struct---*/ bzero(&dest, sizeof(dest)); dest.sin_family = AF_INET; dest.sin_port = htons(PORT); if ( inet_aton(SERVER_ADDR, &dest.sin_addr) == 0 ) die(SERVER_ADDR); /*---Connect to server---*/ if (connect(sockfd, (struct sockaddr*)&dest, sizeof(dest)) != 0) die("connect"); /*---Send request---*/ send(sockfd, request, request_len, 0); /*---Get and print response---*/ bzero(buffer, MAXBUF); recv(sockfd, buffer, sizeof(buffer), 0); printf("%s", buffer); /*---Clean up---*/ close(sockfd); return 0; }

slide-54
SLIDE 54

66

Test run

slide-55
SLIDE 55

67

Summary

  • Networking Overview
  • 7-layer model
  • Emphasis on IP (Layer 3) and TCP (Layers 4 and 5)
  • Not comprehensive, but…
  • You are now at least conversant enough to discuss the OSI stack at

parties