You are on page 1of 50

CSE 514

Computer Networks
Spring 2016
Mark P. Mahon
342E Information Sciences & Technology Building
Class: T,R 9:45 11:00 371 Willard Bldg
Office Hours: Thursday, 1:30-3:30

Course Outline
Overview of Computer Networks
Data Communication Protocols (Internet used as a case study)

Topics In Networking

Course Style
Lectures

Homeworks
Papers

Grading
Mid Term: 40% of grade
Final: 55% of grade
Attendance: 5% of grade

Syllabus (tentative)
DATE
Tu, 1/12

TOPIC

ASSIGNMENT*

READING

Introduction (Chapt. 1)

Chapt. 1: 3, 18, 23

Link Layer (2.1, 2.3, 2.5,


2.6, 2.8

Chapt. 2: 24, 42, 43

Switching (3.1, 3.2, 3.3,


3.4)

Chapt. 3: 15, 18, 36, 38,


46, 48, 57, 68, 72

3-5

Th, 1/14
Tu, 1/19
Th, 1/21
Tu, 1/26
Th, 1/28
Tu, 2/2

Academic integrity policy: If


you copy any portion of an
exam from another student, or
use any non-approved
materials during the exams,
your grade for that exam is a 0

Th, 2/4

Routing (4.1 4.3, 4.4)

Tu, 2/9

Class canceled

Th, 2/11

Routing (4.1- 4.3, 4.4)

6-8
6-8

Tu, 2/16
Th, 2/18
Tu, 2/23
Th, 2/25
Tu, 3/1

Transport and sockets


(5.1 5.2)

Chapt. 5: 9, 20, 25

Congestion Control (6.1


6.4, 6.5)

Chapt. 6: 10, 27, 31, 34

10 - 14

Th, 3/3
Tu, 3/8

Spring Break

Th, 3/10

Spring Break

Tu, 3/15

Mid-Terms

Th, 3/17

Mid-Terms

Tu, 3/22

Security (8.1, 8.2, 8.3,


8.4)

Th, 3/24
Tu, 3/29

Chapt. 8: 8, 12

Telecom Networks and


SS7

15

Th, 3/31
Tu, 4/5

Formal Methods

21

Net Coding

18-20

Network Utility
Maximization

16-17

Th, 4/7
Tu, 4/12
Th, 4/14
Tu, 4/19
Th, 4/21
Tu, 4/26
Th, 4/28

Chapter 1

Problems

How to build a scalable network that will support different


applications?
What is a computer network?
How is a computer network different from other types of networks?

Generality General purpose HW. No specific data types & range of apps

What is a computer network architecture?

Identifies available HW & SW components and maps how they are


arranged

Specialized Networks
Terminal
Telecom
Cable
6

Chapter 1

Chapter Outline
Applications
Requirements
Network Architecture
Performance

Chapter 1

Chapter Goal
Exploring the requirements that different applications and different
communities place on the computer network
Introducing the idea of network architecture
Define key metrics that will be used to evaluate the performance
of computer network (QoS)

Chapter 1

Applications
Most people know about the Internet (a computer network)
through applications

World Wide Web


Email
Online Social Network
Streaming Audio Video
File Sharing
Instant Messaging

URL (most common form of URI)

Hyper Text Transfer Protocol

TCP

Uniform resource locater


http://www.cs.princeton.edu/~llp/index.html

HTTP

Chapter 1

Application Protocol

Transmission Control Protocol

17 messages for one URL request

6 to find the IP (Internet Protocol) address


3 for connection establishment of TCP
4 for HTTP request and acknowledgement

Request: I got your request and I will send the data


Reply: Here is the data you requested; I got the data

4 messages for tearing down TCP connection

10

Chapter 1

Requirements

Application Programmer

Network Designer

List the services that his application needs: guaranteed delivery, delay
bounded delivery, mobility, etc.
Design a cost-effective network with sharable resources: efficient
utilization of resources, fairness, performance, etc.

Network Provider

List the characteristics of a system that is easy to manage and administer,


ease of upgrading (example is cellular nets transition to LTE)

11

Chapter 1

Connectivity

Need to understand the


following terminologies

Scale
Link
Nodes
Point-to-point
Multiple access
Switched Network

(a)
(b)

Devices are too far apart


Large set of devices
would need impractical
number of connections

Circuit Switched dedicated


path first, then Tx
Packet Switched - efficient

Packet, message
Store-and-forward

Point-to-point
Multiple access
12

switch (S&F)

Terminologies (contd.)

(a)

net1

Router/GW

Chapter 1

Connectivity
Cloud
Hosts
Switches
internetwork
Router/gateway
Host-to-host connectivity
Address
Routing
Unicast/broadcast/multicast

net2

(b)

(a)
(b)

A switched network
Interconnection of networks
13

Circuit Switching
Dedicated communications path established for the duration of the conversation
Requires out-of-band control to establish a connection before communication
Service characteristics

Typically used for voice

Packet Switching
Small chunks (packets) of data at a time
Packets passed from node to node between source and destination
Service Characteristics

Typically used for data


communications

Asynchronous Transfer Mode (ATM)


Fixed packet (called cell) length
High speed
Service characteristics

Resource: links and


nodes
How to share a link?

Multiplexing
De-multiplexing
Synchronous Time-division
Multiplexing

Multiplexing multiple logical flows


over a single physical link

Chapter 1

Cost-Effective Resource Sharing

Time slots/data
transmitted in
predetermined slots

17

FDM: Frequency Division


Multiplexing
Statistical Multiplexing

A switch multiplexing packets from


multiple sources onto one shared
link

Chapter 1

Cost-Effective Resource Sharing

Data is transmitted based


on demand of each flow.
What is a flow?
Packets vs. Messages
FIFO, Round-Robin,
Priorities (Quality-ofService (QoS))
Congested?

LAN, MAN, WAN


SAN (System Area
Networks

18

Network Classifications
By Geography

By Transmission Media
By Switching Technology

Personal Area Networks


Short range
Low to moderate data rates
Examples

Local Area Networks


Small scope

Token Ring

Usually owned by the same entity as the attached devices


High data rates
Usually broadcast systems
Examples
Bus

Metropolitan Area Networks


Covers a city or significant portion of a large city
Example

Wide Area Networks


Large geographical area
Crossing public rights of way
Rely in part on common carrier circuits
Alternative technologies

Wireless vs. Wireline Networks


Wireline networks
Wireless networks
Thuraya, Iridium, Inmarsat
Wireless access to a wired backbone network
LTE, UMTS, CDMA2000, GSM
Wireless access to a wired backbone network
802.11
Wireless access to a wired data network

Chapter 1

Support for Common Services


Logical Channels

Application-to-Application communication path or a


pipe

Process communicating over an


abstract channel

25

Chapter 1

Common Communication Patterns


Client/Server
Two types of communication channel

Request/Reply Channels
Message Stream Channels

26

Network should hide the errors


Bits are lost

Chapter 1

Reliability

Bit errors (1 to a 0, and vice versa)


Burst errors several consecutive errors

Packets are lost (Congestion)


Links and Node failures
Messages are delayed
Messages are delivered out-of-order
Third parties eavesdrop

27

Chapter 1

Network Architecture

Example of a layered network system

28

Chapter 1

Network Architecture

Layered system with alternative abstractions available at a given layer

29

Chapter 1

Protocols

Protocol defines the interfaces between the layers in the same


system and with the layers of peer system
Building blocks of a network architecture
Each protocol object has two different interfaces

service interface: operations on this protocol

peer-to-peer interface: messages exchanged with peer

Term protocol is overloaded

specification of peer-to-peer interface


module that implements this interface

Rules for comm


Arranged hierarchies
Key elements
Syntax
Data formats
Signal levels
Semantics
Control info
Error handl
Timing
Speed matching
Sequencing

30

Chapter 1

Interfaces

Service and Peer Interfaces

31

Chapter 1

Protocols
Protocol Specification: prose, pseudo-code, state transition
diagram
Interoperable: when two or more protocols that implement the
specification accurately
IETF: Internet Engineering Task Force

32

Chapter 1

Protocol Graph

Example of a protocol graph


nodes are the protocols and links the depends-on relation

33

Chapter 1

Encapsulation

High-level messages are encapsulated


inside of low-level messages

Addition of control information to data

Address information

Error-detecting code

Protocol control

34

Chapter 1

OSI Architecture
Layer 7

Layer 7

Layer 6

Layer 6

Layer 5

Layer 5

Layer 4

Layer 4

Layer 3

Layer 3

Layer 3

Layer 3

Layer 2

Layer 2

Layer 2

Layer 2

Layer 1

Layer 1

Layer 1

Layer 1

The OSI 7-layer Model


OSI Open Systems Interconnection

35

Physical Layer

Handles the transmission of raw bits over a communication link

Data Link Layer

Chapter 1

Description of Layers

Collects a stream of bits into a larger aggregate called a frame


Network adaptor along with device driver in OS implement the protocol in this layer
Frames are actually delivered to hosts

Network Layer

Handles routing among nodes within a packet-switched network


Unit of data exchanged between nodes in this layer is called a packet

The lower three layers are implemented on all network nodes

36

Transport Layer

Provides a name space that is used to tie together the potentially different transport
streams that are part of a single application

Presentation Layer

Implements a process-to-process channel


Unit of data exchanges in this layer is called a message

Session Layer

Chapter 1

Description of Layers

Concerned about the format of data exchanged between peers

Application Layer

Standardize common type of exchanges

The transport layer and the higher layers typically run only on end-hosts and not on the
intermediate switches and routers
37

Chapter 1

Internet Architecture

Internet Protocol Graph

Alternative view of the


Internet architecture. The
Network layer shown here
is sometimes referred to as
the sub-network or link
layer.
38

Chapter 1

Internet Architecture
Defined by IETF
Three main features

Does not imply strict layering. The application is free to bypass the defined transport
layers and to directly use IP or other underlying networks
An hour-glass shape wide at the top, narrow in the middle and wide at the bottom. IP
serves as the focal point for the architecture
In order for a new protocol to be officially included in the architecture, there needs to be
both a protocol specification and at least one (and preferably two) representative
implementations of the specification

39

Chapter 1

Application Programming Interface


Interface exported by the network
Since most network protocols are implemented (those in the high protocol
stack) in software and nearly all computer systems implement their network
protocols as part of the operating system, when we refer to the interface
exported by the network, we are generally referring to the interface that the
OS provides to its networking subsystem
The interface is called the network Application Programming Interface (API)

40

Socket Interface was originally provided by the Berkeley


distribution of Unix
- Now supported in virtually all operating systems

Each protocol provides a certain set of services, and the API


provides a syntax by which those services can be invoked in this
particular OS

Chapter 1

Application Programming Interface (Sockets)

41

What is a socket?

Chapter 1

Socket
The point where a local application process attaches to the network
An interface between an application and the network
An application creates the socket

The interface defines operations for

Creating a socket
Attaching a socket to the network
Sending and receiving messages through the socket
Closing the socket

42

Bandwidth

Chapter 1

Performance
Width of the frequency band
Number of bits per second that can be transmitted over a communication link

1 Mbps: 1 x 106 bits/second = 1x220 bits/sec


1 x 10-6 seconds to transmit each bit or imagine that a timeline, now each bit
occupies 1 micro second space.
On a 2 Mbps link the width is 0.5 micro second.
Smaller the width more will be transmission per unit time.

43

Chapter 1

Bandwidth

Bits transmitted at a particular bandwidth can be regarded as


having some width:
(a) bits transmitted at 1Mbps (each bit 1 s wide);
(b) bits transmitted at 2Mbps (each bit 0.5 s wide).

44

Chapter 1

Performance
Latency = Propagation + transmit + queue
Propagation = distance/speed of light
Transmit = size/bandwidth
One bit transmission => propagation is important
Large bytes transmission => bandwidth is important

45

Chapter 1

Delay X Bandwidth
We think the channel between a pair of processes as a hollow pipe
Latency (delay) length of the pipe and bandwidth the width of the pipe
Delay of 50 ms and bandwidth of 45 Mbps
50 x 10-3 seconds x 45 x 106 bits/second
2.25 x 106 bits = 280 KB data.

Network as a pipe

46

Chapter 1

Delay X Bandwidth
Relative importance of bandwidth and latency depends on
application

For large file transfer, bandwidth is critical


For small messages (HTTP, NFS, etc.), latency is critical
Variance in latency (jitter) can also affect some applications (e.g.,
audio/video conferencing)

47

Chapter 1

Delay X Bandwidth
How many bits the sender must transmit before the first bit
arrives at the receiver if the sender keeps the pipe full
Takes another one-way latency to receive a response from the
receiver
If the sender does not fill the pipesend a whole delay
bandwidth products worth of data before it stops to wait for a
signalthe sender will not fully utilize the network

48

Infinite bandwidth

Chapter 1

Delay X Bandwidth
RTT dominates
Throughput = TransferSize / TransferTime
TransferTime = RTT + 1/Bandwidth x TransferSize

Its all relative

1-MB file to 1-Gbps link looks like a 1-KB packet to 1-Mbps link

49

Chapter 1

Relationship between bandwidth and latency

A 1-MB file would fill the 1-Mbps link 80 times,


but only fill the 1-Gbps link 1/12 of one time

50

You might also like