Internet and Intranet Protocols Why Study “Internet and Intranet
Internet and Intranet Protocols and Applications - New York University
Transcript of Internet and Intranet Protocols and Applications - New York University
![Page 1: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/1.jpg)
Internet and Intranet Protocols and Applications
Lecture 1: Introduction, the Internet and Internet
Protocols and ApplicationsJanuary 20, 2004
Arthur GoldbergComputer Science Department
New York [email protected]
![Page 2: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/2.jpg)
1/19/04 2
Why Study “Internet and Intranet Protocols and Applications”?
– Same systems used in the two major types of networks, the public Internet and internal (corporate) Intranets
– Accessible for study, because protocol standards are published and their design is publicly debated
![Page 3: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/3.jpg)
1/19/04 3
Growth of the Internet
Source: Internet Software Consortium ; available at http://www.isc.org/ds/hosts.htmlSurvey data obtained: 87-97: walking the DNS Tree(s). See RFC1296 for details97-present: checking which IP addresses are valid; see http://www.isc.org/ds/new-survey.html
![Page 4: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/4.jpg)
1/19/04 4
Log Growth of the Internet
Source: Internet Software Consortium ; available at http://www.isc.org/ds/hosts.htmlNote exponential growth; recent slowing.
100
1,000
10,000
100,000
1,000,000
10,000,000
100,000,000
1,000,000,000
1980 1985 1990 1995 2000 2005
host table
DNS/domain survey
Adjusted
IP active domain survey
![Page 5: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/5.jpg)
1/19/04 5
Systems to study• Protocols
– Web (HTTP, SSL)– Email (SMTP, POP3, IMAP)
– File Transfer (FTP)
– Reliable Multicast (PGM)
• Client and server software (and intermediate systems, like caching proxies, gateways and firewalls)
• Object formats for documents and programs (embedded in protocols)
![Page 6: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/6.jpg)
1/19/04 6
Challenges
• Heterogeneity• Client and server system architecture• Performance (in protocols and
applications)• Interoperability (with existing protocols
and applications)• End-user application design
![Page 7: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/7.jpg)
1/19/04 7
Highly Heterogeneous Computing Environment
Issue Smallest Largest log10 (L/S)
CPU speed 50 MIPS 5000 3
RAM 10 MB 10 GB 3
BW 103 bps 109 6
Num CPUs 2 2 x 107 7
Latency 1 micro sec 1 sec 6
![Page 8: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/8.jpg)
1/19/04 8
Other Heterogeneous Dimensions
• OS– Palm Pilot … DOS … MVS … WAP phone
• Architecture– x86 … CRAY
• Spoken language• Legal entity
![Page 9: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/9.jpg)
Let’s begin ....
What is:
The Internet?A protocol?
![Page 10: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/10.jpg)
1/19/04 10
What’s the Internet: A Nuts and Bolts View
• Millions of connected computing devices: hosts, end-systems– PCs, workstations, servers– PDAs, phones, toastersrunning network apps
• Communication links– fiber, copper, radio, satellite
• Routers: forward packets (chunks) of data thru network
local ISP
companynetwork
regional ISP
router workstationserver
mobile
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 11: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/11.jpg)
1/19/04 11
What’s the Internet: A Nuts and Bolts View
• Protocols: control sending & receiving of messages– e.g., TCP, IP, HTTP, FTP, PPP
• Internet: “network of networks”– loosely hierarchical– public Internet versus private
intranet• Internet standards
– RFC: Request for comments– IETF: Internet Engineering Task
Force
local ISP
companynetwork
regional ISP
router workstationserver
mobile
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 12: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/12.jpg)
1/19/04 12
What’s the Internet: A Service View• Communication infrastructure
enables distributed applications:– WWW, email, games, e-
commerce, database., voting – more?
• Communication services provided:– connectionless– connection-oriented
• Cyberspace [Gibson]:“a consensual hallucination
experienced daily by billions of operators, in every nation, ...."
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 13: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/13.jpg)
1/19/04 13
Internet structure: network of networks
• roughly hierarchical• national/international backbone
providers (NBPs)– e.g. Genuity/Level 3, Sprint,
AT&T, IBM, UUNet, MCI– interconnect (peer) with each
other privately, or at public Network Access Point (NAPs)
• regional ISPs– connect into NBPs
• local ISP, company– connect into regional ISPs
NBP A
NBP B
NAP NAP
regional ISP
regional ISP
localISP
localISP
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 14: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/14.jpg)
1/19/04 14
What’s a protocol?Human protocols:• “what’s the time?”• “I have a question”• introductions
… specific msgs sent… specific actions taken when
msgs received, or other events
Network protocols:• machines rather than humans• all communication activity in
Internet governed by protocols
protocols define format, order of messages sent and received among network entities, and actions taken
on messages receipt
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 15: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/15.jpg)
1/19/04 15
What’s a protocol?A human protocol and a computer network protocol:
Hi
HiGot thetime?2:00
TCP connectionrequest
TCP connectionreply.
Get http://www.cs.nyu.edu/index.htm
<file>time
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 16: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/16.jpg)
1/19/04 16
In Summary, a protocol is ....
• An agreement about communication between two or more entities
• It specifies– Format of messages– Meaning of messages– Rules for exchange– Procedures for handling problems
![Page 17: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/17.jpg)
1/19/04 17
Protocol Specification
• As designers, we typically specify a protocol in a document, such as an Internet RFC
• Many formal and semi-formal representations can describe protocols– Space-Time Diagrams– Finite State Machines (FSM)
![Page 18: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/18.jpg)
1/19/04 18
Space-Time Diagrams
• Describes causal ordering• Defines indication/request/response actions•This diagram shows ‘send and wait’ protocol
![Page 19: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/19.jpg)
1/19/04 19
Finite State Machine Transition Diagram for TCP
– Defines– States– Input (the event that causes
transition)– Transitions (to new states)
![Page 20: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/20.jpg)
1/19/04 20
Networking ReviewLayered protocol model of computer networks
– Reduce complexity by “layering” protocols– Solve at most a few challenges in each layer– E.g.
• Lower layer (link) eliminates all physical noise errors
• Upper layer (transport in TCP) resends lost messages
– Each layer offers services to the layer above– Enable improvements to PART of the network
![Page 21: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/21.jpg)
1/19/04 21
Layers And Protocol Software
• Protocol software follows layering model• One software module per layer• Modules cooperate• Incoming or outgoing data passes from one module to
another• Entire set of modules known as stack
![Page 22: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/22.jpg)
1/19/04 22
Internet protocol stack• application: supporting network applications
– ftp, SMTP, HTTP• transport: host-host data transfer
– TCP, UDP• network: routing of datagrams from source to
destination– IP, routing protocols
• link: data transfer between neighboring network elements– PPP, ethernet
• physical: bits “on the wire, in the fiber, or as electromagnetic waves”
application
transport
network
link
physical
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 23: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/23.jpg)
1/19/04 23
Protocol layering and data
Each layer takes data from above• adds header information to create new data unit• passes new data unit to layer below
applicationtransportnetwork
linkphysical
applicationtransportnetwork
linkphysical
source destinationMMMM
Ht
HtHn
HtHnHl
MMMM
Ht
HtHn
HtHnHl
messagesegmentdatagramframe
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 24: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/24.jpg)
1/19/04 24
Internet Protocol (IP)
• Only data transmission protocol at Layer 3• Defines
– Internet addressing– Internet packet format– Internet routing
![Page 25: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/25.jpg)
1/19/04 25
IP Address Details
• 32 Bits - divided into two parts– Prefix identifies network– Suffix identifies host
• Global authority assigns unique prefix to network (IANA)
• Local administrator assigns unique suffix to host
![Page 26: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/26.jpg)
1/19/04 26
IP Addresses
0network host
10 network host
110 network host
1110 multicast address
A
B
C
D
class1.0.0.0 to127.255.255.255
128.0.0.0 to191.255.255.255
192.0.0.0 to223.255.255.255
224.0.0.0 to239.255.255.255
32 bits
given notion of “network”, let’s examine IP addresses:
“class-full” addressing:
![Page 27: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/27.jpg)
1/19/04 27
Classes And Network Sizes
• Maximum network size determined by class of address– Class A large– Class B medium– Class C small
![Page 28: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/28.jpg)
1/19/04 28
IP Addressing Example
![Page 29: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/29.jpg)
1/19/04 29
IP addressing: CIDR• classful addressing:
– inefficient use of address space, address space exhaustion– e.g., class B net allocated enough addresses for 65K hosts, even if
only 2K hosts in that network• CIDR: Classless InterDomain Routing
– network portion of address of arbitrary length– address format: a.b.c.d/x, where x is # bits in network portion of
address
11001000 00010111 0001000 000000000
networkpart
hostpart
200.23.16.0/23
![Page 30: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/30.jpg)
1/19/04 30
Internet Packets• Contains sender and destination addresses• Size depends on data being carried• Called IP datagram• Two Parts Of An IP Datagram
• Header– Contains source and destination address– Fixed-size fields
• Data Area (Payload)– Variable size up to 64K– No minimum size
![Page 31: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/31.jpg)
1/19/04 31
IP V4 Datagram format
ver length
32 bits
data (variable length,typically a TCP
or UDP segment)
16-bit identifierInternetchecksum
time tolive
32 bit source IP address
IP protocol versionnumber
header length(bytes)
max numberremaining hops
(decremented at each router)
forfragmentation/reassembly
total datagramlength (bytes)
upper layer protocolto deliver payload to
head.len
type ofservice
“type” of data flgs fragmentoffset
upperlayer
32 bit destination IP address
Options (if any) E.g. timestamp,record routetaken, specifylist of routers to visit.
From Computer Networking: A Top-Down Approach Featuring the Internet by Kurose & Ross
![Page 32: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/32.jpg)
1/19/04 32
IP Semantics
• IP is connectionless– Datagram contains identity of destination– Each datagram sent/handled independently
• Routes can change at any time
![Page 33: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/33.jpg)
1/19/04 33
IP Semantics (continued)
• IP allows datagrams to be– Delayed– Duplicated– Delivered out-of-order– Lost
• Called best effort delivery• Motivation: accommodate all possible networks
![Page 34: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/34.jpg)
1/19/04 34
Requests For Comment (RFC)
• Describe formally (and sometimes not so formally) everything about the Internet.
• Actually, RFCs are really a form of Memo.• For amusement, try RFC 968 (“‘Twas the Night Before
Startup”)• All are available on-line: www.ietf.org/rfc.html• We use RFCs to learn about SMTP (2821), HTTP (2616) ,
for example.
![Page 35: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/35.jpg)
1/19/04 35
RFC Characteristics
• RFC Statuses (2026)– Standard track
• PS - proposed standard• DS - draft standard• S - standard
– Non-standards track• E - experimental• I - information only• H - Historic• BC - Best current practices
![Page 36: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/36.jpg)
1/19/04 36
ExampleNetwork Working Group D. Waitzman Request for Comments: 1149 BBN STC 1 April 1990 A Standard for the Transmission of IP Datagrams on Avian Carriers Status of this Memo
This memo describes an experimental method for the encapsulation of IP datagrams in avian carriers. This specification is primarily useful in Metropolitan Area Networks. This is an experimental, not recommended standard. …
Overview and Rational Avian carriers can provide high delay, low throughput, and low altitude service. The connection topology is limited to a single point-to-point path for each carrier, used with standard carriers, but many carriers can be used without significant interference with each other, outside of early spring. This is because of the 3D ether space available to the carriers, in contrast to the 1D ether used by IEEE802.3. The carriers have an intrinsic collision avoidance system, which increases Frame Format The IP datagram is printed, on a small scroll of paper, in hexadecimal, with each octet separated by whitestuff and blackstuff. The scroll of paper is wrapped around one leg of the avian carrier. A band of duct tape is used to secure the datagram's edges. The bandwidth is limited to the leg length.
![Page 37: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/37.jpg)
1/19/04 37
RFC citations
• RFC citations appear in this format: – #### Title of RFC. Author 1, Author 2, Author
3. Issue date. (Format: ASCII) (Obsoletes xxx) (Obsoleted by xxx) (Updates xxx) (Updated byxxx) (Also FYI ####) (Status: ssssss)
• Good searchable index– http://www.rfc-editor.org/rfcsearch.html
![Page 38: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/38.jpg)
1/19/04 38
Internet Engineering task ForceIETF
• Open organization - anyone may join• Primarily dedicated to development of the Internet
protocols. • Ideas are presented as RFCs and go through a review
process• RFC standards described in RFC 1602
– Proposed– Draft– Standard
![Page 39: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/39.jpg)
1/19/04 39
More Alphabet Soup
• IAB - Internet Architecture Board• IANA - Internet Assigned Numbers Authority• IESG - Internet Engineering Standards Group
![Page 40: Internet and Intranet Protocols and Applications - New York University](https://reader035.fdocuments.in/reader035/viewer/2022071523/613d00270c37c14a830cf18e/html5/thumbnails/40.jpg)
1/19/04 40
Conclusions
– Layering a key concept in computer network design
• Determines design and modularity of network software
– Major design decision in building a network architecture
• Connection-oriented vs. connectionless• Both popular
– This course focuses on Application layer software