Seminar on Advanced Internet applications and Systems Hanoch Levy (hanoch at cs.tau.ac.il) Some slides adopted from Y.
Download
Report
Transcript Seminar on Advanced Internet applications and Systems Hanoch Levy (hanoch at cs.tau.ac.il) Some slides adopted from Y.
Seminar on Advanced
Internet applications and
Systems
Hanoch Levy
(hanoch at cs.tau.ac.il)
Some slides adopted from Y. Mansour, Y. Afek
06.11.2015
H. Levy Advanced Net Seminar
1
Course Information
Lectures:
Wed
10-12 Kaplun324
Web site: http://www.cs.tau.ac.il/~hanoch/
Resources: A list of articles (web site + class)
Supporting Books:
1. An Engineering Approach to Computer Networking / Keshav
2. Computer Networks / Tanenbaum
3. Data Networks / Bertsekas and Gallager
06.11.2015
H. Levy Advanced Net Seminar
2/60
Course Objective
1. Get exposed to the advanced material
in Computer Networks
2. Learn how to:
1. Read professional articles
2. Give Professional presentations
3. Exposition to what required of at
Master Thesis.
06.11.2015
H. Levy Advanced Net Seminar
3/60
Structure + Grades
Structure:
1) Every week one lecture by a student.
1) Lecturer is encouraged to encourage students to
participate.
2) Students are encouraged to participate.
Grade:
• Based on material understanding + quality of
presentation
• Bonus for active participation
06.11.2015
H. Levy Advanced Net Seminar
4/60
Motivation
Last 10-15 years: communications revolution
Internet + Computer communications
Is a key factor of the Information revolution
Implications
A drastic change of some aspects of life
Revolution is affected by life
Technology drives applications
Applications drive technology
06.11.2015
H. Levy Advanced Net Seminar
5/60
Motivation (cont)
Applications / technology / research
rapidly change over time
If want to stay in frontier:
=> Research material
=> Course material
06.11.2015
very dynamic
very dynamic
H. Levy Advanced Net Seminar
6/60
Objectives
Computer Networking course: Internet infra-structure
1 Introduction and Layering
2 Physical Layer, Data Link Layer, MAC Protocols
3 Hubs, Bridges, SwitchesData Link Layer
4 Switching UnitsSTP, Switching Fabric
5 Scheduling: Buffer Management Scheduling, WFQ example
6 Network Layer: RoutingRouting
7 Reliable Data TransferIP
8 End to End ProtocolsARQ
10 Flow Control, Congestion ControlTCP flow & congestion control
11 Network SecurityNetwork Sniffing (no slides)
12 DNS, HTTPTCP (state chart)
13 DDoS
ALL – operations of network of networks.
06.11.2015
H. Levy Advanced Net Seminar
7/60
Objectives (2)
Advanced Material – network development
following technology
Peer to Peer (P2P): Bittorent, Skype
Songs /movies / video-on-demand/video online
Wireless AdHoc + delay tolerant networks
Social networks
Security / DDoS
06.11.2015
H. Levy Advanced Net Seminar
8/60
Internet Physical Infrastructure
Residential access
Cable
Fiber
DSL
Wireless
ISP
Backbone ISP
ISP
The Internet is a network
Campus access,
e.g.,
Ethernet
Wireless
06.11.2015
of networks
Each individually
administrated network is
called an Autonomous
System
(AS)
H. Levy
Advanced Net
Seminar
9/60
9
Data Networks
Set of interconnected nodes exchange information
sharing of the transmission circuits= "switching".
many links allow more than one path between every
2 nodes.
network must select an appropriate path for each
required connection.
06.11.2015
H. Levy Advanced Net Seminar
10/60
Real Network
06.11.2015
H. Levy Advanced Net Seminar
11/60
Layers:
Person delivery of parcel
Post office counter handling
Ground transfer: loading on trucks
Peer entities
Airport transfer: loading on airplane
Airplane routing from source to
destination
each layer implements a service
via its own internal-layer actions
relying on servicesH. provided
by layer below
Levy Advanced Net Seminar
06.11.2015
12/60
The seven Layers
There are only 5 !!
Application
Presentation
Session
Application
Transport
Network
Data Link
Network
Data Link
Physical
Physical
End system
06.11.2015
Intermediate
system
H. Levy Advanced Net Seminar
Application
Presentation
Session
Transport
Network
Data Link
Physical
End system
14/60
The seven Layers - protocol stack
data
Application
Presentation
Session
AH
PH
Network
Data Link
Physical
Physical
Session
data
SH
Transport
Network
Data Link
TH
data
data
data
NH
data
DH+data+DT
bits
Application
Presentation
Session
Transport
Network
Data Link
Physical
and presentation layers are not so important, and are often ignored
15/60
06.11.2015
H. Levy Advanced Net Seminar
עיקרון השכבות
Source
Application
מתקבלת הודעהX בשכבה
Destination
זהה להודעה ששכבה
Application
מסרה בצד המקורX
Identical message
Transport
Transport
Identical message
Network
Identical message
Data-Link
Network
Data-Link
Network
06.11.2015
H. Levy Advanced Net Seminar
16/60
Internet protocol stack
application: supporting network applications
ftp, smtp, http
transport: host-host data transfer
tcp, udp
network: routing of datagrams from source
to destination
ip, routing protocols
link: data transfer between neighboring
network elements
ppp, ethernet
physical:
bits “on the H.wire”
06.11.2015
Levy Advanced Net Seminar
application
transport
network
link
physical
17/60
Protocol layering and data
M
Ht M
Hn Ht M
Hl Hn Ht M
source
destination
application
transport
network
Link
physical
application
transport
network
Link
physical
06.11.2015
M
message
Ht M
Hn Ht M
Hl Hn Ht M
segment
H. Levy Advanced Net Seminar
datagram
frame
18/60
Physical layer
Moves bits between physically connected
end-systems
Standard prescribes
L1
coding scheme to represent a bit
shapes and sizes of connectors
bit-level synchronization
Internet
technology to move bits on a wire, wireless link, satellite
channel etc.
06.11.2015
H. Levy Advanced Net Seminar
19/60
Datalink layer
L2
(Reliable) communication over a single link.
Introduces the notion of a frame
set of bits that belong together
Idle markers tell us that a link is not carrying a
Begin and end markers delimit a frame
Internet
frame
a variety of datalink layer protocols
most common is Ethernet
others are FDDI, SONET, HDLC
06.11.2015
H. Levy Advanced Net Seminar
20/60
Datalink layer (contd.)
Ethernet (broadcast link)
end-system must receive only bits meant for it
need datalink-layer address
also need to decide who gets to speak next
these functions are provided by Medium ACcess sublayer (MAC)
Datalink layer protocols are the first layer of software
Very dependent on underlying physical link properties
Usually bundle both physical and datalink in hardware.
06.11.2015
H. Levy Advanced Net Seminar
21/60
Network layer
L3
Carries data from source to destination.
Logically concatenates a set of links to form the
abstraction of an end-to-end link
Allows an end-system to communicate with any other
end-system by computing a route between them
Hides individual behavior of datalink layer
Provides unique network-wide addresses
Found both in end-systems and in intermediate systems
06.11.2015
H. Levy Advanced Net Seminar
22/60
Network layer (contd.)
Internet
network layer is provided by Internet Protocol (IP)
found in all end-systems and intermediate systems
provides abstraction of end-to-end link
segmentation and reassembly
packet-forwarding, routing, scheduling
unique IP addresses
can be layered over anything, but only best-effort
service
06.11.2015
H. Levy Advanced Net Seminar
23/60
Network layer (contd.)
At end-systems
primarily hides details of datalink layer
segments and reassemble
detects errors
At intermediate systems
participates in routing protocol to create routing
tables
responsible for forwarding packets
schedules the transmission order of packets
chooses which packets to drop
06.11.2015
H. Levy Advanced Net Seminar
24/60
Transport layer
L4
Reliable end-to-end communication.
creates the abstraction of an error-controlled,
flow-controlled and multiplexed end-to-end link
(Network layer provides only a ‘raw’ end-to-end service)
Some transport layers provide fewer services
e.g. simple error detection, no flow control, and no retransmission
Internet
TCP provides error control, flow control, multiplexing
UDP provides only multiplexing
06.11.2015
H. Levy Advanced Net Seminar
25/60
Transport layer (contd.)
Error control
Flow control
GOAL: message will reach destination despite packet loss,
corruption and duplication
ACTIONS: retransmit lost packets; detect, discard, and
retransmit corrupted packets; detect and discard duplicated
packets
match transmission rate to rate currently sustainable on the path
to destination, and at the destination itself
Multiplexes multiple applications to the same
end-to-end connection
adds an application-specific identifier (port number) so that
receiving end-system can hand in incoming packet to the correct
application
26/60
06.11.2015
H. Levy Advanced Net Seminar
Session layer
Not common
Provides full-duplex service, expedited data
delivery, and session synchronization
Internet
doesn’t have a standard session layer
06.11.2015
H. Levy Advanced Net Seminar
27/60
Session layer (cont.)
Duplex
Expedited data delivery
if transport layer is simplex, concatenates two transport
endpoints together
allows some messages to skip ahead in end-system queues,
by using a separate low-delay transport layer endpoint
Synchronization
allows users to place marks in data stream and to roll back
to a prespecified mark
06.11.2015
H. Levy Advanced Net Seminar
28/60
Presentation layer
Usually ad hoc
Touches the application data
(Unlike other layers which deal with headers)
Hides data representation differences between
applications
characters (ASCII, unicode, EBCDIC.)
Can also encrypt data
Internet
no standard presentation layer
only defines network byte order for 2- and 4-byte
integers
29/60
06.11.2015
H. Levy Advanced Net Seminar
Application layer
The set of applications that use the network
Doesn’t provide services to any other layer
06.11.2015
H. Levy Advanced Net Seminar
30/60
עיקרון השכבות
Destination
Source
3 אפליק
2 אפליק
UDP
1 אפליק
TCP
Transport
Network (IPv4)
Modem
Ethernet
Application
Network
WiFi
Data-Link
Network
06.11.2015
H. Levy Advanced Net Seminar
31/60
עיקרון השכבות
Destination
Source
3 אפליק
2 אפליק
UDP
1 אפליק
TCP
2 אפליק
UDP
Network (IPv4)
Modem Ethernet
3 אפליק
1
TCP
Network (IPv4)
WiFi
Modem
Ethernet
WiFi
Network
06.11.2015
H. Levy Advanced Net Seminar
32/60
Advanced Topics – this course
Peer to Peer systems (files, video on demand,
streaming)
Wireless Networks
Mobility
Delay tolerant networks
Social network
Denial of service (network security) – network
maliciousness ??
06.11.2015
H. Levy Advanced Net Seminar
33/60
Network Maliciousness – Denial
of service
Network fundamental design principle:
Today: Some users’ aim:
User is polite/obey rules
User aims at maximizing his/her own
performance
DEGRADE NETWORK PERFORMANCE
Many aspects of network design may collapse
Research subject:
How much damage: malicious user to innocent users
How vulnerable network mechanisms to malicious
behavior
06.11.2015
H. Levy Advanced Net Seminar
34/60
Network Maliciousness – Cont
Anything studied in: Data structures
/algorithms / Computer networks
If one user becomes malicious
How much damage can she pose
How should we pick our algorithms/design
Examples: Hash Table (open / closed)
Data structure course: Equivalent =
O(1) avg per insert/delete/member
Malicious analysis (our master student)
closed
open
Closed much more vulnerable
Attacker can hurt performance of innocent
much more
if you design a net pick open
06.11.2015
H. Levy Advanced Net Seminar
35/60
Peer to Peer
“Historical” Internet : send
data from A to K.
Client-server model:
06.11.2015
A = server = data source
K = client data consumer
If C wants too – get from
A (unicast or broadcast)
H. Levy Advanced Net Seminar
36/60
Peer to Peer
06.11.2015
A (source) sends to K.
K (client) may become
now a server.
K sends to C (another
client).
H. Levy Advanced Net Seminar
37/60
Peer to Peer – WHY??
Legal (this is how it started…)
Broadcast is not really
implemented
A is bottleneck
Resource Utilization: K is idle
X% (95?)of the day
Issues:
06.11.2015
Communications (costs!!)
CPU
BW cost? Free ride?
Files? Video on demand? Stream
(video Broadcast)
H. Levy Advanced Net Seminar
38/60
Wireless Networks
Cellular net: base stations tx to
mobiles
06.11.2015
H. Levy Advanced Net Seminar
39/60
Wireless Networks
Multihop wireless – use wireless
devices as forwarding
mechanisms
Difficulty: when node x
transmits the whole area must
be quiet (avoid colision).
How much spatial capacity the
network has?
06.11.2015
H. Levy Advanced Net Seminar
40/60
Wireless Networks
1
Questions:
Difficulty (1) : when node x
transmits the whole area must
be quiet (avoid collision).
How much spatial capacity the
network has?
X
Paper 2.1
Difficulty (2): How connected is
the network
Paper 2.2
06.11.2015
2
H. Levy Advanced Net Seminar
41/60
Wireless Networks
1
Questions:
How do you allocate resources
fairly + efficiently among
users?
Difficulty (3) : x can be noisy
on purpose, or can request
many resources denial of
service to others.
X
Paper 2.3
2
06.11.2015
H. Levy Advanced Net Seminar
42/60
Wireless – Mobility
Wireless devices move around.
Movement can determine:
Density/ Load on network
Connectivity
Ability to transfer data from place
to place
Need to understand the
mobility patterns
Papers (3)
06.11.2015
H. Levy Advanced Net Seminar
43/60
Delay tolerant networks
Network of wireless mobiles
Not necessarily connected all the
time
Application can afford DELAY
(not real time). E.g:
Non urgent email
Copy of a song
General news
handheld mobility assist in
transfering the info over the net.
Delay Tolerant Net
E.g: use the buss system over a
campus
Papers
(4)
06.11.2015
H. Levy Advanced Net Seminar
44/60
Social networks
The new (old?) hot thing on the
net.
Data generated by users – for
users == YouTube.
Understanding its properties =
5.1
Social contacts can be used to
transfer data
E.g – spread info in campus.
Understanding the social
interaction is needed.
Paper (5.2)
06.11.2015
H. Levy Advanced Net Seminar
Spreading info
in university?
In
conference?
45/60