Computer Networks: BITS Pilani
Computer Networks: BITS Pilani
Computer Networks: BITS Pilani
Computer Networks
Lecture-6, January 23, 2013 Rahul Banerjee, PhD (CSE)
Professor, Department of Computer Science & Information Systems
E-mail: [email protected]
Interaction Points
How to discover what route your data is actually taking during its travel across the globe? Simple basics that go into programming for the network-based applications Briefly revisiting the TCP/IP Architecture Current State-of-the-art and Evolving Research Directions
From Clusters and Grids to Clouds Wearable Computing Ubiquitous or Pervasive Computing
How to Discover the Route Your Data Takes During Its Travel?
There do exist several techniques, commands and tools for discovering the actual route a unit of data (say a packet) has taken during its travel from your computer to the remote computer situated anywhere else in the world. A very common way to discover it at the user level is through the Traceroute command / utility. It may be known by slightly different names across operating systems like traceroute, tracert etc. Lets, now, see how does it work!
BITS Pilani, Deemed to be University under Section 3 of UGC Act, 1956
Interaction Points
How to discover what route your data is actually taking during its travel across the globe? Simple basics that go into programming for the network-based applications Briefly revisiting the TCP/IP Architecture Current State-of-the-art and Evolving Research Directions
From Clusters and Grids to Clouds Wearable Computing Ubiquitous or Pervasive Computing
Rahul Banerjee
References
Larry L. Peterson & Bruce S. Davie: Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011. <System design approach> S. Keshav: Computer Networking: An Engineering Approach, Pearson Education, New Delhi, 1997. A. S. Tanenbaum: Computer Networks, Fifth Edition, Pearson Education, New Delhi, 2012. <Conceptual Approach> Y. Zheng and S. Akhtar: Networks for Computer Scientists and Engineers, Oxford University Press, New York, 2002. <Structural approach> A. Leon Garcia and I. Widjaja: Communication Networks: Fundamental Concepts and Key Architectures, Second Edition, Tata McGraw-Hill, New Delhi, 2004. Mohammed G. Gouda: Elements of Network Protocol Design, Wiley Student Edition, John Wiley & Sons (Pte.) Ltd., Singapore, 2004. Thomas G. Robertazzi: Computer Networks and Systems: Queuing Theory and Performance Evaluation, Third Edition, Springer-Verlag, New York, 2000. <Analytical approach>
23/01/13
12
Summary
Intranet: Completely private network of networks
Wireline Wireless
Fixed Mobile
Hybrid
Hybrid
Concluding remarks
Networking
support
of
some
kind
is
already
inside
most
of
the
operaJng
systems
we
use
today
in
variety
of
forms
on
Notebooks,
Laptops,
WorkstaJons
and
Servers.
All
Smart- phones
and
several
set-top
boxes
support
it
too.
Subsequent
lectures
shall
introduce
you
to
the
following
topics:
Network
Architectures
Performance
Quality
of
Service
Reliability
Security
23/01/13
14
References
Larry L. Peterson & Bruce S. Davie: Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann / Elsevier, New Delhi, 2011. <System design approach> S. Keshav: Computer Networking: An Engineering Approach, Pearson Education, New Delhi, 1997. A. S. Tanenbaum: Computer Networks, Fifth Edition, Pearson Education, New Delhi, 2012. <Conceptual Approach> Y. Zheng and S. Akhtar: Networks for Computer Scientists and Engineers, Oxford University Press, New York, 2002. <Structural approach> A. Leon Garcia and I. Widjaja: Communication Networks: Fundamental Concepts and Key Architectures, Second Edition, Tata McGraw-Hill, New Delhi, 2004. Mohammed G. Gouda: Elements of Network Protocol Design, Wiley Student Edition, John Wiley & Sons (Pte.) Ltd., Singapore, 2004. Thomas G. Robertazzi: Computer Networks and Systems: Queuing Theory and Performance Evaluation, Third Edition, Springer-Verlag, New York, 2000. <Analytical approach>
23/01/13
(c) Dr. Rahul BRahul anerjee, BITS Pilani, INDIA Dr. Banerjee, BITS, Pilani (India)
15
17
Applica?on
Layer
Transport
Layer
Network
Layer
Data
Link
Layer
Physical
Layer
18
Layer-4
Layer-3
Layer-2 Layer-1
Application Layer
Upper
Layer-to-
Lower
Layer
Interface
Host-1
Host-2
19
23/01/13
20
Current Status:
It is loosely hierarchical. Has no single body that owns it or rigidly controls it. --Mostly run through volunteer efforts and by consensus. Runs several services, in a distributed manner, including the immensely popular World-Wide Web. Is helped by global cooperation including those from governments and corporates apart academia 23/01/13 (c)
Dr.
Rahul
Banerjee,
BITS
Pilani,
from INDIA
21
Currently, the TCP/IP stack is the dominant protocol stack over which the Internet runs. Keeping the needs of expansion and improvement, this protocol family has continually evolved over last 30+ years.
Current version of IP is IPv6, although IPv4 is still dominant in use.
(c)
Dr.
Rahul
Banerjee,
BITS
Pilani,
INDIA
23/01/13
22
The Internet Layer The Host-to-Network Interface Link-Layer as per OSI Reference Model LLC Sub-layer MAC Sub-layer Physical layer
24
SHARED BUS
N1
N2
N3
N4
25
The original Ethernet protocol proposed and implemented by Robert Metcafe was actually based on 1-p CSMA/CD protocol It did have a scheme that allowed greedy access to the channel by a station which led to lower efficiency Schemes like Random Back-off / Exponential Backoff were devised to improve the efficiency to a certain extent
23/01/13
26
An
Ethernet
LAN
Personal
Computer
WorkstaJon
Workstation WorkstaJon
27
C
C
28
C
C
29
NC22
NR
30
N4
S
N3
N2
Switch
C
31
32
Networks: A set of autonomous compute/communicaJon nodes interconnected for the purpose of meaningful resource sharing, require supporJng protocol stacks, not transparent to the users Clusters Homogeneous (pla_orm / OS), all involved nodes o`en belong to a single enJty and frequently designed for high-performance compuJng, may be limited to one or more racks within the same room (example: HPC clusters), easiest to deploy and manage Grids O`en heterogeneous (pla_orm / OS), Frequently spread over mulJple networks and network types, may involve single or mulJple organizaJons, require greater eort in deployment and administraJon Clouds May be public, private and hybrid, support mulJple levels of abstracJons / virtualizaJon, typically spread over wide areas, expected to be transparent to the user, oer the highest levels of redundancy / availability,
VirtualizaJon is the underlying common technology involved in all the three paradigms Networking is the key enabler ingredient in each of these cases Cost-eecJveness, robustness and scalability improve as we move from cluster to cloud but overheads and internal complexity add up
31
Identification 16-bit
Flags 3-bit
TTL 8-bit
41
Frames
can
take
dierent
formats
and
sizes
depending
upon
the
protocol
in
quesJon
Frames
do
include
elds
like
synchronizaJon,
addressing,
payload,
control-informaJon
etc.
Frame
Forwarding
The
process
of
moving
frames
from
one
port
to
another
in
a
bridge
or
switch.
43 (c) Dr. Rahul Banerjee, BITS, Pilani, India
45
hkp://www.javvin.com/pics/10GigE.gif&imgrefurl=hkp://www.javvin.com/protocol10GigE.html&usg=__VuNx4T-UphUAzm- _AEsDqMqvzLQ=&h=374&w=576&sz=34&hl=en&start=10&um=1&itbs=1&tbnid=JlvKsLiP2xuOfM:&tbnh=87&tbnw=134&prev=/images%3Fq%3Dgigabit%2Bethernet%26hl%3Den%26safe%3Do%26um%3D1
hkp://www.ovislinkcorp.co.uk/linkd.GIF
Summary
of
Dierences
Between
L-2
Switches,
Routers
(L-3)
and
L-3
Switches
Bridges
and
Layer-2
switches
divide
the
network
into
segments
or
micro-segments
(apart
from
helping
in
Layer-2
protocol
translaJon,
management,
security
etc.)
In
eect,
we
can
say
that
Layer-2
Switches
/
Bridges
separate
collision
domains
Layer-2
Switches
/
Bridges
can
carry
out
protocol
translaJons
23/01/13
(c)
Dr.
Rahul
Banerjee,
SDET
Unit,
BITS- Pilani,
INDIA
47
Summary
of
Dierences
Between
L-2
Switches,
Routers
(L-3)
and
L-3
Switches
Routers
are
Layer-3
devices
who
handle
Layer-3
packet
rouJng
within
and
outside
the
local
network
/
internetwork
and
therefore
eecJvely
separate
broadcast
domains
which
end
at
its
dierent
network
interfaces
each
of
which
carries
a
separate
Subnet-idenJer
/
Subnet-address
(apart
from
Layer-3
protocol
translaJon,
monitoring,
security
and
management)
Thus,
in
eect,
we
can
say
that:
Routers
Separate
broadcast
domains
(each
of
such
broadcast
domains
which
end
at
its
dierent
network
interfaces
each
of
which
carries
a
separate
Subnet-idenJer
/
Subnet-address
)
Routers
can
carry
out
interior
rouJng
and
/
or
exterior
rouJng,
depending
upon
their
locaJon
in
the
network
Routers
can
carry
out
protocol
translaJons
(in
terms
of
protocol-specic
packet
formats
as
well
as
in
terms
of
allowing
appropriately
formaked
selecJve
data
specic
to
rouJng
protocols
they
may
support).
23/01/13
(c)
Dr.
Rahul
Banerjee,
SDET
Unit,
BITS- Pilani,
INDIA
48
Summary
of
Dierences
Between
L-2
Switches,
Routers
(L-3)
and
L-3
Switches
Layer-3
switches
are
devices
which
can
handle
all
funcJonaliJes
of
Layer-2
Switches
as
well
as
fast
(o`en
based
on
header/tag/label
switching)
Layer-3
packet
rouJng
within
but
not
outside
the
local
network
/
internetwork;
and
therefore,
eecJvely
separate
broadcast
domains
which
end
at
its
dierent
LAN
interfaces
each
of
which
carries
a
separate
Subnet-idenJer
/
Subnet- address
(apart
from
opJonal
Layer-3
protocol
translaJon,
monitoring,
security
and
management)
Thus,
in
eect,
we
can
say
that:
L-3
Switches
Separate
broadcast
domains
(each
of
such
broadcast
domains
which
end
at
its
dierent
LAN
interfaces
each
of
which
carries
a
separate
Subnet- idenJer
/
Subnet-address
)
L-3
Switches
can
carry
out
fast
interior
rouJng
/
packet-switching
o`en
based
on
header/tag/label
switching
Layer-3
Switches,
opJonally,
can
carry
out
protocol
translaJons
(in
terms
of
protocol-specic
packet
formats).
23/01/13
(c)
Dr.
Rahul
Banerjee,
SDET
Unit,
BITS- Pilani,
INDIA
49
50
Fixed Lasers
1 2
Optical Electronic Receivers Switches Linecard 1 MxL Crossbar Linecard 2 Linecard L Group 1 2
1 2 3
LxM Crossbar
GxG MEMS
LxM Crossbar
3 M
GxG MEMS 3
1 2 3 M
GxG MEMS M