Thursday, March 7, 2019

Internetworking End-to-End Requirements Essay

Hence such characteristics as performance, reliableness, scalability, mobility, and QoS of DS ar impacted by the underlying ne iirk technical schoolnology and the OS ? Principles of discipline processing remains networking Every network has ? An architecture or tiers of communications communications protocols ? megabucks whiping for parley ? Route selection and selective information streaming ? Comm Sub agreements (network technologies rest on) contagious disease media wires, cables, fiber, wireless (sat, IR, RF, mwave) Hardw ar devices avenuers, switches, bridges, hubs, repeaters, network interfaces/card/transceivers. Softw be comp championnts protocol stacks, comm handlers/drivers, OS primitives, network-focus genus Apis ? Hosts The calculating machines and demise-devices that social occasion the comm subsystem Subnet A single cluster or collection of nodes, which knock everyplace each opposite on the same physical medium and adequate to(p) of routing ou tgoing and incoming messages The profit is a collection of several subnets (or intranets) ? neting issues for distri yeted systems initial requirements for DS applications ftp, rlogin, e spot, saucysgroup Subsequent coevals of DS applics. on-line sh bed imaginations. incumbent requirements performance, reliability, scalability, mobility, security, QoS, multicasting ? Performance Key time to yield unit(s) of messages surrounded by a equate of link uped information processing systems/devices point-to-point latency (delay) from posting out of outgoing- buffer storage and receiving into incoming-buffer. Usually collectable to parcel package everyplaceheads, traffic load, and path selection Data transfer/bit position speed of info transfer betwixt 2 computers (bps). Usually collectible to physical properties of the medium. ? Message trans time = latency + length/bit-rate ? Bandwidth vs. bit-rate. The total system bandwidth (volume of data direct and received in a unit time, e. g. , per sec. ) is a measure of its by dint of with(predicate)put Bit rate or transfer rate is cut back to the mediums ability to propagate individual bits/signals in a unit time In most LANs, e. g. , Ethernets, when full transmittal cognitive content is devoted to messaging (with little or no latency), and so bandwidth and bit-rate atomic number 18 same in measure Local memory vs network resources ? Applications assenting to shargond out resources on same network normally under msec ? Applications ingress to local anaesthetic anesthetic memory normally under msec (century0x faster)?However, for tall speed network weathervane- boniface, with caches, the entrance time is much faster (than local disk approach due to hard disk latency) ? Scalability ( earnings and DSs) Future harvest-tide of computing nodes of network (hosts, switches) in 109s (100s of 106 hosts alone) Requires substantial changes to routing and apportioning schemes (more subseq uently ) Current traffic (load) on Internet approx. measured by the latencies ( imagine www. mids. org), which seem to give counselling reduced (with advances in medium and protocol fibres). Future fruit and sustainability depend on economies of occasion, charge rate, locality/placement of sh bed resource?Reliability Failures atomic number 18 typically, non due to the physical medium, but at the end-end (at host aims) softwargon (application-level), t here(predicate)fore, error detection/ ameliorateion is at the level Suggesting that the dialogue subsystem ask not be error-free (made transp atomic number 18nt/hidden to user) because reliability is any(prenominal)what guaranteed at the delegate/receiver ends (where errors whitethorn be ca employ by, e. g. , buffer all everywheref pathetic, clock drifts ca apply premature timeouts) ? Security most intranets ar protected from external (Internet-wide) DSs by firewall. A firewall protects all the resources of an org anized from unlawful/ poisonous access by external users, and control/monitoring of use of resources after-school(prenominal) the firewall A firewall (bundle of security softw be and network hardw ar) prevails on a opening the entry/exit point of the corporate intranet A firewall is usually assembled ground on corporate security policy, and filters incoming and outgoing messages. To go beyond firewalls, and grant access to world- or Internet-wide resources, end-to-end authentication, privacy, and security (Standards) argon needed to allow DSs to die hard E. g., techniques are Cryptographic and Authentication usually implemented at a level above the communication subsystem virtual(prenominal)(prenominal) Private Network (VPN) security concept allows intranet-level protection of such features/devices as local routers and secure links to mobile devices ?Mobility Need wireless to fight back portable computers and hand-held devices Wireless links are susceptible to, e. g . , eavesdropping, distortions in medium, out-of-sight/range transmitters/receivers Current addressing and routing schemes are based on wired technologies, which cave in been adapted and, therefore, not perfect and need extensions?QoS (Quality of Service) Meeting deadlines and user requirements in transmitting/processing streams of real-time multimedia system data E. g. , QoS requirements guaranteed bandwidth, timely economy or bounded latencies, or dynamic select stillments to requirements ? Multicasting Most transmissions are point-to-point, but several involve one-to- more (either one-to-all broadcast or selective broadcast multicast) plainly sending the same message from one node to several destinations is uneffective Multicasting technique allows single transmission to multiple destination (simultaneously) by development special addressing scheme 3. Multimedia Transmission and Internetworking Heterogeneous Systems ? Types of Networks LANs (confined to little, ty pically, 2. 5km diameter spread) ? high speed, single medium for inter alliance (twisted pair, sweet- blither, opt), no routing within segments all point-to-point (from hub), inter-segment nexuss via switches/hubs, low latency, low error rate ? E. g. , Ethernet, token ring, slotted ring protocols, wired.(1) Ethernet 1970 with bandwidth of 10Mbps, with extended versions of 100/1000Mbps, lacking latency and bandwidth QoS for DSs (2) ATM using frame cells and optical fills the shot but expensive for LAN, newer high-speed Ethernets offer improvement and cost-effective MANs (confined to extended, regional area, typically, up to 50km spread) ? Based on high-bandwidth copper and fiber optics for multimedia (audio/ moving-picture show/voice), ? E. g. , technologies ATM, high-speed Ethernet (IEEE 802. 6 protocols for MANs), digital subscriber line (digital subscriber line) using ATM switches to switch digitized voice over twisted pair 0.25-6Mbps within 1. 5km, cable modem uses coax 1. 5Mpbs using analog signaling on TV networks and longer distances than DSL WANs (worldwide, lower speeds over sets of varying types of circuits with routers) ? High latency (due to switching and route searching) between 0. 1-0. 5s, signaling speed around 3x105km/s (bounds latency) plus extension delay (round-trip) of about 0. 2s if using satellite/geostationary dishes generally drawn-out at 10-100kbps or best 1-2Mbps Wireless (connecting portable, wearable devices using access points) ? Common protocol IEEE 802.11 (a, b, and now g) (WaveLAN) 2-11Mbps (11gs bandwidth near 54Mbps) over 150m creating a WLANs, some mobiles connected to fixed devices printers, bonifaces, palmtops to make a WPANs (wireless witness(prenominal) area networks) using IR links or low-powered Bluetooth radio receiver network tech 1-2Mbps over 10m. ? Most mobile cell phones use Bluetooth tech. e. g. , European GSM standard and US, mostly, analog-based AMP cellular radio network, atop by CDPD cellu lar digital sheaf data communication system, operating over wider areas at lower speed 9. 6-19. 2kbps.?Tiny screens of mobiles and wearables require a new WAP protocol Internetworks ? Building open, extendible system for DSs, supporting network heterogeneity, multi-protocol system involving LANs, MANs, WLANs, connected by routers and gateways with molds of software for data and protocol conversions creating a virtual network using underlying physical networks ? E. g. , the Internet using transmission control protocol/IP (over several other physical protocols) Comparisons ? Range of performance characteristics ? oftenness and types of failures, when used for DS applics?Packet delivery/loss, duplicates (masked at TCP level to guarantee some reliability and transparency to DSs but may use UDP faster but less reliable and DS applics responsibleness to guarantee reliability) plat 3. 2 Network Principles Packet Transmission Packet transmission superseded telephone/telegraph swit ched network Messages are software packageized and packets are queued, buffered (in local storage), and transmitted when lines are available using asynchronous transmission protocol Data Streaming Multimedia data tailt be packetized due to unpredicted delays.AV data are streamed at higher(prenominal) frequency and bandwidth at continuous flow rate Delivery of multimedia data to its destination is time-critical / low latency requiring end-to-end predefined route E. g. networks ATM, IPv6 ( adjacent generation leave alone separate steamed IP packets at network layer and use RSVP (resource reserv. protocol) resource/bandwidth prealloc and RTP play-time/time-reqs (real-time transp protocol) at layers 3 & 1, respectively) to work ? Switching Schemes 4 Kinds of switching methods typically used. Broadcast no switching logic, all nodes see signals on circuits/cells (e.g. , Ethernet, wireless networks) Circuit Switching Interconnected segments of circuits via switches/ transmut e boxes, e. g. , POTS (Plain grey Telephone System) Packet Switching Developed as computing tech advanced with central processors and storage spaces using store-and-forward algorithms and computers as switches. Packets are not sent instantaneously, routed on different links, reordered, may be lost, high latency (few msec msecs).Extension to switch audio/video data brought integration of digitized data for computer comm. , telephone swear outs, TV, and radio broadcasting, teleconferencing. Frame Relay PS (not instantaneous, just an illusion ), but FR, which integrates CS and PS techniques, streams smaller packets (53 byte-cells called frames) as bits at processing nodes. E. g. , ATM protocols Protocols implemented as pairs of software modules in send/receive nodes, Specify the sequence of messages for transmission Specify the format of the data in the messages Protocols Layers layered architecture, following the OSI suite packets are communicated as peer-to-peer tran smission but effected vertically across layers by encapsulation method over a physical mediumProtocols Suites The 7-layered architecture of the ISO-OSI each layer pull up stakess service of process to the layer above it and extends the service provided by the layer below it A complete set of protocol layers constitute a suite or stack Layering simplifies and generalizes the software interface definitions, but costly overhead due to encapsulations and protocol conversions Diagram 3. 3 4. Service Provider direction On the Internet, a wariness service provider (MSP) is a company that manages information technology go for other companies.For example, a company could hire an MSP to configure and administer its business computers and connect systems on a continuing basis, bringing the company. An MSP is a service provider that offers system and network management official documents and expertise. An MSP typically has its own data center that eats advanced network management s oftware such as HP OpenView or Tivoli. It uses these tools to actively monitor and provide reports on aspects of its nodes networks, including communication links, network bandwidth, emcees, and so on. The MSP may host the customers net master of ceremoniess and application servers at its own site.The function provided by MSPs have been called blade telemetry services. The MSP Association defines MSPs as follows caution Service Providers deliver information technology (IT) infrastructure management services to multiple customers over a network on a subscription basis. same Application Service Providers (ASPs), Management Service Providers deliver services via networks that are billed to their clients on a recurring fee basis. Unlike ASPs, which deliver business applications to end users, MSPs deliver system management services to IT departments and other customers who manage their own technology assets.Tri restless is an example of an MSP. It provides management and monitori ng of PCs, servers, networks, and Web sites from its own NOC (network trading operations center), which is hosted by Exodus Communications. Exodus finds that the NOC has fully otiose power, network connectivity, routing, and switching to ensure maximum reliability and integrity. A microagent interacts with customer systems to provide system management. The agent is lightweight and designed for use over the Internet. It acts as a universal agent invoking and managing other agents and programs as necessitate for specific actions.The service is delivered via the Web through a secure Internet portal that lets customers view management information, based on their role in the organization. For example, CIOs rear end view overall management information while military service desk technicians female genitals check call queues, escalations, and open ticket status. Systems analysts can behavior asset inventories and view virus reporting. Objective Systems Integrators is another(prenom inal) management service provider that provides software solutions for unified network, service application, and process management.OSI was recently acquired by Agilent Technologies. A list of other MSPs may be rear at the MSP Association Web site. Web application and infrastructure monitoring and management have suddenly become critical, yet the tools to do them are lacking. Management service providers (MSP), the latest addition to the current slew of service providers, study to offer products and services that will oversee your Web operations. Companies staking claims as earliest MSPs include Candle Corp. in Santa Monica, Calif. InteQ Corp. in Burlington, Mass. and Nuclio Corp. in Skokie, Ill.What makes MSPs distinctive is that their products and services are provided over the Internet on a subscription basis. That connotes MSPs can achieve economies of scale that companies who license software cannot, distinguishs Christopher Booth, head of technical operations at Freight Wise Inc. , a Forth Worth, Texas-based online transportation exchange. Though he declined to introduce how much his company is paying to use Nuclios MSP, Booth did say that the service has been very advantageous. The cost savings that MSPs can pass on may help them catch on with corporate customers.Gartner Group Inc. in Stamford, Conn., estimates that the $90 million MSP market will balloon to more than $3. 25 billion by 2005. 5. Programmable/Cognitive Networks A key strength of the Internet has been to reduce the intelligence within the network to that required placed at strategic places within the network such as at administrative boundaries, or at locations where there is a large mismatch between bandwidth, or where the certain location specific services can be used. otherwises believe that the entire architecture should be rethought as a computational environment, in which everything can be programmed, and the entire network becomes active.The research in this area is aimed at discovering how viable it is to open up such elements of the communication theory architecture as the routing table. A fundamental question raised by both the active service and the active network bettermentes is how to ensure that the shared resource of the network remains safe and is protected from misbehaving programs. Programs can detestation the network by generating packet explosions and can abuse the shared processor by using all the memory and the processor cycles. Worse, they may inflict the working of correct programs so that they too spread.If network programmability is going to be available to the application designers, we need to ensure that they do not break things by accident, let alone by intention. Traditional systems approaches to protection are based upon what a program should be able to do, then using runtime checks to ensure that the program doesnt exceed these bounds. This leads to the sandbox model of protection, as used in Java and enhanced to provide p rotection for Active Networks. However, there are major problems with this approach. First, each runtime check reduces the performance of the system, increase the overhead of each use of system resources.Second, it is very difficult to ensure that the protection mechanisms are correct, and cannot be subverted in any way. An alternative approach is to use compile time checks upon what the program is doing. This uses the type system to encounter predicates about program functionality and if a program is well-typed, then it proves the program to succeed the policies implemented in the type system. This approach has been used to allow users to run programs within the kernel as in Spin, and in protecting access to router functionality in the Switchware project. To provide a network programming language based on Internet best effort communication. To provide scaleable high-level communication based on remote spawn from which other communication can be built. To make use of types as safe properties, to ensure that the safety and security policies of the network are maintained. To rapidly prototype tools such as compilers and simulators in order to drive the development of the language by examples. Best-effort distributed programming In the Internet, an application transmits a packet, which is sent to the next router on the way to the destination.At this router, the arrival of the packet causes code to run, which calls other code symbiotic upon the fields in the header of the packet. This code may access and vary local state stored in the router and then copy or create one or more packets to be sent out from the router. These packets are then routed on output links depending upon the destination for each packet, and so on until the packets reach their destination, or are destroyed within the network for whatever reason. In our programming model, we have attempted to replicate this basic structure of packet transmission.In the Internet, the arrival of a packe t initiates some draw and quarter of control which uses the data within the packet to decide upon the angle of inclination of the packet. In our model, a packet becomes a thread of control, carrying the code to be run and the alludes or values of any data referenced within that code. When a thread arrives at a Safetynet-aware router or end system, the thread code is instantiated within the runtime and runs within a de_ned scheduling class. The thread of control may call other code to be run on its behalf.The other code is encapsulated within classes, which are either mystify in the router, or are dynamically loaded from elsewhere. Threads can spawn other threads, either locally or on the next hop to some destination. 6. Design of an Internetwork We will discuss about the networking in particular the internetworking. In this case we will need to discuss some topics related with the Internet Infrastructure, Internet routing, ambit name and address resolution, internet protocol and the applications. Internet Infrastructure The Internet common sense is made up of many large networks which interconnect with each other.These large networks are known as Network Service Providers or Naps. Some of the large Naps are UUNet, Cerf Net, IBM, BBN Planet, hyphen Net, PSINet, as well as others. These networks peer with each other to exchange packet traffic. Each NSP is required to connect to three Network coming Points or NAPs. At the NAPs, packet traffic may jump from one NSPs backbone to another NSPs backbone. NSPs similarly interconnect at Metropolitan Area Exchanges or MAEs. MAEs serve the same purpose as the NAPs but are privately owned. NAPs were the original Internet interconnects points. Both NAPs and MAEs are referred to as Internet Exchange Points or IXs.NSPs also sell bandwidth to smaller networks, such as ISPs and smaller bandwidth providers. Below is a picture display this hierarchical infrastructure. Diagram 4 This is not a true mold of an actual pi ece of the Internet. Diagram 4 is just now meant to demonstrate how the NSPs could interconnect with each other and smaller ISPs. None of the physical network components are shown in Diagram 4 as they are in Diagram 3. This is because a single NSPs backbone infrastructure is a Byzantine drawing by itself. Most NSPs publish typifys of their network infrastructure on their tissue sites and can be found easily.To draw an actual map of the Internet would be nearly impossible due to its size, complexity, and ever-changing structure. The Internet Routing Working It is general phenomenon that No computer knows where any of the other computers are, and packets do not set big bucks sent to every computer. The information used to describe packets to their destinations is contained in routing tables kept by each router connected to the Internet. The Routers are called the packet switches. A router is usually connected between networks to route packets between them. Each router knows abo ut its sub-networks and which IP addresses they use.The router usually doesnt know what IP addresses are above it. Examine Diagram 5 below. The black boxes connecting the backbones are routers. The bigger NSP backbones at the top are connected at a NAP. at a lower place them are several sub-networks, and under them, more sub-networks. At the bottom are two local area networks with computers attached. Diagram 5 When a packet arrives at a router, the router examines the IP address put there by the IP protocol layer on the originating computer. The router checks its routing table. If the network containing the IP address is found, the packet is sent to that network.If the network containing the IP address is not found, then the router sends the packet on a slackness route, usually up the backbone hierarchy to the next router. Hopefully the next router will know where to send the packet. If it does not, again the packet is routed upwards until it reaches a NSP backbone. The routers c onnected to the NSP backbones hold the largest routing tables and here the packet will be routed to the correct backbone, where it will begin its move downward through smaller and smaller networks until it finds its destination. Domain Names and cover up Resolution.But what if you dont know the IP address of the computer you want to connect to? What if the you need to access a meshing server referred to as www. anothercomputer. com? How does your network network browser know where on the Internet this computer lives? The answer to all these questions is the Domain Name Service or DNS. The DNS is a distributed database which keeps track of computers names and their cor doing IP addresses on the Internet. Many computers connected to the Internet host part of the DNS database and the software that allows others to access it. These computers are known as DNS servers.No DNS server contains the entire database they only contain a subset of it. If a DNS server does not contain the scop e name requested by another computer, the DNS server re-directs the requesting computer to another DNS server. Diagram 6 The Domain Name Service is structured as a hierarchy similar to the IP routing hierarchy. The computer requesting a name resolution will be re-directed up the hierarchy until a DNS server is found that can resolve the study name in the request. frame 6 illustrates a portion of the hierarchy. At the top of the tree are the domain roots.Some of the older, more common domains are seen near the top. What is not shown are the multitude of DNS servers around the world which form the rest of the hierarchy? When an Internet alliance is setup (e. g. for a LAN or Dial-Up Networking in Windows), one primary and one or more secondary DNS servers are usually specified as part of the installation. This way, any Internet applications that need domain name resolution will be able to function correctly. For example, when you enter a weave address into your web browser, the brow ser for the first time connects to your primary DNS server.After obtaining the IP address for the domain name you entered, the browser then connects to the tar lose computer and requests the web scalawag you wanted. The Disable DNS in Windows If youre using Windows 95/NT and access the Internet, you may view your DNS server(s) and point disable them. If you use Dial-Up Networking Open your Dial-Up Networking window (which can be found in Windows Explorer under your CD-ROM drive and above Network Neighborhood). Right click on your Internet connection and click Properties. tightly fitting the bottom of the connection properties window press the TCP/IP Settings button.If you have a permanent connection to the Internet Right click on Network Neighborhood and click Properties. Click TCP/IP Properties. contain the DNS Configuration tab at the top. You should now be looking at your DNS servers IP addresses. Here you may disable DNS or set your DNS servers to 0. 0. 0. 0. (Write down yo ur DNS servers IP addresses first. You will probably have to restart Windows as well. ) instantly enter an address into your web browser. The browser wont be able to resolve the domain name and you will probably get a nasty dialog box explaining that a DNS server couldnt be found.However, if you enter the corresponding IP address instead of the domain name, the browser will be able to retrieve the desired web page. (Use ping to get the IP address prior to disabling DNS. ) Other Microsoft operating systems are similar. Internet protocols As hinted to earlier in the branch about protocol stacks, one may surmise that there are many protocols that are used on the Internet. This is true there are many communication protocols required for the Internet to function. These include the TCP and IP protocols, routing protocols, medium access control protocols, application level protocols, etc.The following sections describe some of the more important and commonly used protocols on the Interne t. Higher-level protocols are discussed first, followed by lower level protocols. Application Protocols HTTP and the World full Web One of the most commonly used services on the Internet is the World Wide Web (WWW). The application protocol that makes the web work is Hypertext Transfer Protocol or HTTP. Do not thrust this with the Hypertext Markup Language (HTML). HTML is the language used to write web pages. HTTP is the protocol that web browsers and web servers use to communicate with each other over the Internet.It is an application level protocol because it sits on top of the TCP layer in the protocol stack and is used by specific applications to talk to one another. In this case the applications are web browsers and web servers. HTTP is a connectionless text based protocol. Clients (web browsers) send requests to web servers for web elements such as web pages and images. After the request is serviced by a server, the connection between client and server across the Internet is disconnected. A new connection moldiness be made for each request. Most protocols are connection oriented.This means that the two computers communicating with each other keep the connection open over the Internet. HTTP does not however. Before an HTTP request can be made by a client, a new connection must be made to the server. When you type a universal resource locator into a web browser, this is what happens If the URL contains a domain name, the browser first connects to a domain name server and retrieves the corresponding IP address for the web server. The web browser connects to the web server and sends an HTTP request (via the protocol stack) for the desired web page. The web server receives the request and checks for the desired page.If the page exists, the web server sends it. If the server cannot find the requested page, it will send an HTTP 404 error message. (404 mean Page Not Found as anyone who has surfed the web probably knows. ) The web browser receives the page back and the connection is closed. The browser then parses through the page and looks for other page elements it needs to complete the web page. These usually include images, applets, etc. For each element needed, the browser makes additional connections and HTTP requests to the server for each element.When the browser has finished loading all images, applets, etc.the page will be completely loaded in the browser window. Retrieving a Web Page Using HTTP Telnet is a remote terminal service used on the Internet. Its use has declined lately, but it is a very useful tool to study the Internet. In Windows find the default telnet program. It may be set(p) in the Windows directory named telnet. exe.When opened, pull down the Terminal menu and select Preferences. In the preferences window, check Local Echo. (This is so you can see your HTTP request when you type it. ) Now pull down the Connection menu and select removed System. Enter www. google. com for the Host Name and 80 for the Port.(Web servers usually listen on port 80 by default. ) Press Connect. Now type pass / HTTP/1. 0 And press Enter twice. This is a simple HTTP request to a web server for its root page. You should see a web page flash by and then a dialog box should come on up to tell you the connection was lost. If youd like to save the retrieved page, flip on logging in the Telnet program. You may then browse through the web page and see the HTML that was used to write it. Most Internet protocols are specified by Internet documents known as a Request for Comments or RFCs. RFCs may be found at several locations on the Internet.See the Resources section below for allow for URLs. HTTP version 1. 0 is specified by RFC 1945. Application Protocols SMTP and Electronic escape Another commonly used Internet service is electronic mail. email uses an application level protocol called Simple Mail Transfer Protocol or SMTP.SMTP is also a text-based protocol, but unlike HTTP, SMTP is connection oriented. SMTP is a lso more complicated than HTTP. There are many more commands and considerations in SMTP than there are in HTTP. When you open your mail client to read your e-mail, this is what typically happens The mail client (Netscape Mail, Lotus Notes, Microsoft Outlook, etc.) opens a connection to its default mail server.The mail servers IP address or domain name is typically setup when the mail client is installed. The mail server will always transmit the first message to list itself. The client will send an SMTP HELO command to which the server will respond with a 250 OK message. Depending on whether the client is checking mail, sending mail, etc. the appropriate SMTP commands will be sent to the server, which will respond accordingly. This request/ reply transaction will continue until the client sends an SMTP QUIT command. The server will then say goodbye and the connection will be closed.Transmission Control Protocol Under the application layer in the protocol stack is the TCP layer. When applications open a connection to another computer on the Internet, the messages they send (using a specific application layer protocol) get passed down the stack to the TCP layer. TCP is responsible for routing application protocols to the correct application on the destination computer. To accomplish this, port numbers are used. Ports can be thought of as separate channels on each computer. For example, you can surf the web while reading e-mail. This is because these two applications (the web browser and the mail clien.

No comments:

Post a Comment