review
play

Review CS 3516 Computer CS 3516 Computer Networks Protocol Home - PDF document

Protocol What does a network protocol do? Review CS 3516 Computer CS 3516 Computer Networks Protocol Home Access Networks What does a network protocol do? What are some of the main differences between DSL and Cable for home


  1. Protocol • What does a network protocol do? Review CS 3516 – Computer CS 3516 Computer Networks Protocol Home Access Networks • What does a network protocol do? • What are some of the main differences between DSL and Cable for home network • 1) define format access? • 2) order of msgs sent and received among network entities • 3) actions taken on msg transmission, receipt Home Access Networks Traversing the Core • What are some of the main differences • What are two fundamentally different between DSL and Cable for home network ways of getting packets across the access? network core? • DSL DSL – Uses existing telephone infrastructure – 1 Mbps up, 8 Mbps down – dedicated physical line • Cable – Uses existing cable infrastructure – 2 Mbps up, 30 down – Shared access to headend 1

  2. Traversing the Core Delay • What are two fundamentally different • What are the four sources of delay in a ways of getting packets across the network node? network core? • Circuit switching – Call setup, dedicated resources, no sharing • Packet switching – No setup, resources used as needed and available, sharing Delay Layering • What are the four sources of delay in a • Why are networks composed of layers? • What are the layers in the Internet network node? Protocol stack? = + + + d d d d d nodal proc queue trans prop • d proc = processing delay • d queue = queuing delay • d trans = transmission delay • d prop = propagation delay Layering Security • Why are networks composed of layers? • What are sources of malware over a • What are the layers in the Internet network? Protocol stack? • Helps deal with complexity; modularization • Application, transport, network, data-link, physical 2

  3. Security Architectures • What are sources of malware over a • What is a hybrid architecture (in the network? context of this class)? Provide an example. • T • Trojan horse j h – Hidden part of some otherwise useful software • Virus – infection by actively receiving object (e.g., e-mail attachment); self-replicating • Worm – infection by passively receiving, self replicating Architectures Process • What is a hybrid architecture (in the • What is a process? Do pure P2P context of this class)? Provide an example. applications have server processes ? • C • Combines Client-Server (i.e. centralized bi Cli t S (i t li d server for some functionality) and P2P (for exchange of information/data) • Example: IM – server for login, help peers find each other, P2P for exchange of messages Transport Services to Application Process Layer • What is a process? Do pure P2P • What are the possible services that a applications have server processes ? Transport Layer provides? • A process is a program running on a host • A i i h t • Yes, P2P architectures still have server processes – Client process: process that initiates communication – Server process: process that waits to be contacted 3

  4. Transport Services to Application Persistent versus Non-Persistent Layer HTTP • What are the possible services that a • What is the difference between a Transport Layer provides? persistent versus a non-persistent HTTP connection? • D t l • Data loss • Timing • Throughput • Security Persistent versus Non-Persistent Cookies HTTP • What is the difference between a • What is an HTTP cookie? What is it used persistent versus a non-persistent HTTP for? connection? Nonpersistent HTTP Persistent HTTP • At most one object is • Multiple objects can sent over a TCP be sent over single connection. TCP connection between client and server. Cookies Web Cache • What is an HTTP cookie? What is it used • Why use a Web Cache? for? • A header line in an HTTP request or response message that can be stored on a response message that can be stored on a client browser • Used to identify a client session at a browser since HTTP is effectively stateless 4

  5. Web Cache DNS Hierarchy • Why use a Web Cache? • What is the DNS hierarchy? Why is DNS organized in a hierarchy instead of being • Reduce response time for client request centralized? • Reduce traffic on an institution’s access link DNS Hierarchy P2P • What is the DNS hierarchy? Why is DNS • Broadly, when can P2P file distribution be organized in a hierarchy instead of being faster than Client-Server file distribution? centralized? Root DNS Servers org DNS servers edu DNS servers com DNS servers poly.edu umass.edu pbs.org yahoo.com amazon.com DNS servers DNS servers DNS servers DNS servers DNS servers • Reasons – single point of failure, traffic volume, maintenance � doesn’t scale! P2P BitTorrent • Broadly, when is P2P file distribution • What is a tracker ? What is a torrent ? efficient compared to Client-Server file distribution? • When: – There are numerous clients – Server uplink capacity is the bottleneck – Clients have sufficient uplink capacity to participate in distribution 5

  6. What Messages are Exchanged by BitTorrent TCP During a Connection Setup ? • What is a tracker ? What is a torrent ? tracker: tracks peers p participating in torrent torrent: group of peers exchanging chunks of a file What Messages are Exchanged by What is Congestion in the TCP During a Connection Setup ? Internet? What is Congestion in the What is Congestion in the Internet? What Happens? Internet? What Happens? • Informally: “too many sources sending too much data too fast for network to handle” • Different from flow control! – – (sender won’t overflow receiver’s buffer by transmitting too (sender won t overflow receiver s buffer by transmitting too much, too fast) • Manifestations: – Lost packets (buffer overflow at routers) – Long delays (queueing in router buffers) 6

  7. How Does TCP Determine Rate and How Does TCP Determine Rate and Infer Congestion? Infer Congestion? • D ecentralized: each TCP sender sets its own rate, based on implicit feedback: - ACK: segment received (a good thing!), network not congested, so increase sending rate g , g - lost segment: assume loss due to congested network, so decrease sending rate What is “Additive Increase, What is “Additive Increase, Multiplicative Decrease” in Relation Multiplicative Decrease” in Relation to TCP Congestion Control? to TCP Congestion Control? • Linear Increase - For each “cwnd’s worth” of packets successfully sent, increase cwnd by 1 packet • Multiplicate Decrease - When loss, halve cwnd Is TCP Slow Start Really Slow? Is TCP Slow Start Really Slow? • Every time an ACK arrives, cwnd is incremented � cwnd is effectively doubled per RTT “epoch” epoch . 7

  8. What is the Difference between What is the Difference between Forwarding and Routing Forwarding and Routing • forwarding: move packets from router’s input to appropriate router output • routing: determine route taken by packets g y p from source to destination What is an MTU? Why Does it What is an MTU? Why Does it Matter for the Network Layer? Matter for the Network Layer? • MTU = Maximum Transmission Unit – largest possible link-level frame link-level frame • IP datagrams larger than MTU reassembly are fragmented What is DHCP? What is DHCP? • DHCP: Dynamic Host Configuration Protocol • Allows hosts to dynamically obtain its IP address from network server when it joins network network – Plus first hop router – Plus name server 8

  9. Why NAT? Why NAT? • Motivation: local network uses just one IP address as far as outside world is concerned: – Range of addresses not needed from ISP: just one IP address for all devices – Can change addresses of devices in local network Can change addresses of devices in local network without notifying outside world – Can change ISP without changing addresses of devices in local network – Devices inside local net not explicitly addressable, visible by outside world (a security plus) In Forwarding IP Datagrams, What In Forwarding IP Datagrams, What Layer Does NAT Violate and How? Layer Does NAT Violate and How? • Violates upper layer (Transport) boundary • Modifies Port number What are “Global” Routing What are “Global” Routing Algorithms Called? What are Algorithms Called? What are “Decentralized” Routing Algorithms “Decentralized” Routing Algorithms Called? Called? Global: • All routers have complete topology, link cost info p p gy, • “link state” algorithms Decentralized: • Router knows physically-connected neighbors, link costs to neighbors • Iterative process of computation, exchange of info with neighbors • “distance vector” algorithms 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend