Tunneling at The Transport and Application Levels Prof. Chuan-Ming - - PowerPoint PPT Presentation

tunneling at the transport and application levels
SMART_READER_LITE
LIVE PREVIEW

Tunneling at The Transport and Application Levels Prof. Chuan-Ming - - PowerPoint PPT Presentation

Mobile Computing & Software Engineering Lab Tunneling at The Transport and Application Levels Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN NTUT, TAIWAN 1


slide-1
SLIDE 1

NTUT, TAIWAN 1

Mobile Computing & Software Engineering Lab

Tunneling at The Transport and Application Levels

  • Prof. Chuan-Ming Liu

Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN

slide-2
SLIDE 2

NTUT, TAIWAN 2

Mobile Computing & Software Engineering Lab

Introduction

Exploring the techniques system managers and programmers use to exploit alternative topologies

slide-3
SLIDE 3

NTUT, TAIWAN 3

Mobile Computing & Software Engineering Lab

Multitprotocol Environments

Not all machines provide complete TCP/IP support Not all organizations use TCP/IP to interconnect computers Actually, most large organizations have several groups of machines and each group has its own protocol suite Disadvantages

Duplication of effort Limitations on interoperability

slide-4
SLIDE 4

NTUT, TAIWAN 4

Mobile Computing & Software Engineering Lab

Example

Two Ethernet sites (LAN) and one WAN using X.25 interconnects hosts at the two sites Ethernet 1

Using TCP/IP

Ethernet 2

Using TCP/IP

WAN using X.25

host using x.25 host using x.25

slide-5
SLIDE 5

NTUT, TAIWAN 5

Mobile Computing & Software Engineering Lab

Mixing Network

Network may run an alternative protocol Transport-level service delivers packets from one point to another as easily as packet-switching hardware It is possible to substitute any transport-level switching service for a single physical link in a packet switching system Many internets have been built that use transport-level switching services instead of physical networks

slide-6
SLIDE 6

NTUT, TAIWAN 6

Mobile Computing & Software Engineering Lab

Example

Ethernet 1

Using TCP/IP

Ethernet 2

Using TCP/IP

WAN using X.25

host using x.25 host using x.25 router router Internet Virtual circuit

slide-7
SLIDE 7

NTUT, TAIWAN 7

Mobile Computing & Software Engineering Lab

Example

When the routers boots, they use X.25 to form a conventional, transport-level virtual circuit to one another across the X.25 WAN The X.25 service does not know that the data being sent across the virtual circuit consists of IP datagram

slide-8
SLIDE 8

NTUT, TAIWAN 8

Mobile Computing & Software Engineering Lab

Example

With the two routers, a user on any host can invoke standard TCP/IP client software that contact a server on any other host Neither the user nor the client-server applications need to know that datagrams pass across an X.25 network when they travel from the Ethernet at one site to the Ethernet at the other

slide-9
SLIDE 9

NTUT, TAIWAN 9

Mobile Computing & Software Engineering Lab

Limit on Circuit Allocation

From the example, it seems ok to add additional sites (routers) to extend the topology X.25 network limits the number of circuits that a single computer can allocate simultaneously – typically 16 or 32 virtual circuit An organization with N sites needs (N*(N- 1))/2 circuits to interconnect all of them

slide-10
SLIDE 10

NTUT, TAIWAN 10

Mobile Computing & Software Engineering Lab

Dynamic Circuit Allocation

How to overcome the limitation for circuit allocation? Allocate circuit on demand and close circuit that are not being used Next-hub address – the address of the next router to which the datagram should be sent The router consults the table of active X.25 virtual circuits to decide

slide-11
SLIDE 11

NTUT, TAIWAN 11

Mobile Computing & Software Engineering Lab

Problem for Dynamic Allocation

When the router decide to add a virtual circuit and the table of active circuits is full?

Select the circuit which is the least recently used to close

After sending the datagram, the circuit remains open to minimize the delay and cost.

slide-12
SLIDE 12

NTUT, TAIWAN 12

Mobile Computing & Software Engineering Lab

Encapsulation v.s. Tunneling

Encapsulation: the process of placing an IP datagram inside a network packet or frame so that it can be sent across an underlying network Tunneling: the use of a high-level transport network service to sent datagrams from one point to another The difference lies in if IP transmits datagrams in hardware packets or uses a high-level transport service to deliver them

slide-13
SLIDE 13

NTUT, TAIWAN 13

Mobile Computing & Software Engineering Lab

Application-level Tunneling

Provides a communication path between a client and a server Not all OS support TCP/IP protocol and transport-level tunneling To implement application-level tunneling

Building socket simulation library

slide-14
SLIDE 14

NTUT, TAIWAN 14

Mobile Computing & Software Engineering Lab

WAN using X.25

Client application Socket simulation library OS with X.25 Server application Socket simulation library OS with X.25

slide-15
SLIDE 15

NTUT, TAIWAN 15

Mobile Computing & Software Engineering Lab

Dialup Phone Lines

Modems allows two computers to communication across the dialup telephone system SLIP: Serial Line IP PPP: Point-to-Point Protocol The use of dialup is analogous to the notion of tunneling The dialup telephone system should be viewed as a connection-oriented physical network. SLIP and PPP define a form of encapsulation