CZ3006 Net Centric Computing Notes
CZ3006 Net Centric Computing Notes
Benefits of Layers:
Simplicity – Easy to design once layers and their interactions are defined clearly
Flexibility – Easy to modify and develop networks by separate layers & modifications
Incremental Changes – Easy to add new layers, add new functions to a layer
Services:
o Indirect and virtual communication between peer processes
o Layer n+1 transfer information by invoking the services provided by layer n
o Services are available at Service Access Points (SAP)
o Each layer passes data & control to the layer below it until the physical layer
is reached and transfer occurs
1
o Data passed to the layer below is called Service Data Unit (SDU)
o SDU are encapsulated in Protocol Data Unit (PDU)
TCP/IP Model
5 Layers:
o Application: support network application
o Transport: host data transfer
o Network: routing of datagrams from source to destination
o Link: data transfer between neighbouring network elements (e.g. PPP, Ethernet)
o Physical: bits on the wire
Each layer takes data from above
o Adds header information to create new data unit
o Passes new data unit to layer below
Network Reliability
Mean Time Between Failures (MTBF) = Mean Time to Failure (MTTF) + Mean Time to
Repair (MTTR)
Link Failure Probability: percentage of the time during which the link is dysfunctional
Link Availability: percentage of time during which the link is functional
2
Lecture 3 – Data Link Layer (DLL): Flow Control
o Bit Oriented (HDLC): Flag used to frame the bits sent; Header used to
describe the content of a frame; Used by all modern protocols (Ethernet,
PPP, HDLC)
Link Configuration/Access:
o Determine who gets to transmit at when on a link
o Topology: physical arrangement of stations
Point-to-Point: pairs of hosts are directly connected (send out
multiple times to different stations)
Broadcast: all stations share a single channel (sent out once, all
stations receive -> highly unreliable)
o Duplexity:
Half Duplex: Only one party may transmit at a time
Full Duplex: Allows simultaneous transmission and reception between
two parties’
Flow Control: Ensures that a transmitting station does not overwhelm a receiving
station with data & No frame error
o Stop and Wait:
A packs binary information into a frame
A sends the frame to B
A wait for an ACK
When B has received the frame, B sends an ACK
When A has received the ACK, A repeats
3
o Throughput (U) = time that link carries useful information / total time = T frame /
Tcycle
4
- Sender maintains a window
containing frame numbers that
can be transmitted
- Sender window shrinks from
trailing edge (left side) as frames
are sent
- Frames are buffered at the
sender until acknowledged
- Receiver maintains a window as
well, its window shrinks from the
trailing edge as frames are
received
- Receiver’s window expands
from the leading edge (right side)
as ACKs are sent
- Sender’s window expands from
the leading edge as ACK are
received
- Receiver can acknowledge
frames without permitting
further transmission (by sending
a Receive Not Ready (RNR)
frame) Receiver must send a
normal acknowledgement to
resume
- ACK can be piggybacked on the
data frames in the reverse
direction
5
Lecture 4 – Data Link Layer (DLL): Error Control
Error Detection
Parity Check (Odd/Even Parity): A single bit is appended to the original message
(usually 7 bit) to describe the message characteritics
Forward Error Correction (FEC): Send more redundant bits in the message
Automatic Repeat Request (ARQ):
o Retransmission after timeout: The source retransmits a frame when an
expected ACK fails to return within a predetermined time duration
o Retransmission when requested: The destination replies a negative ACK to
inform the source about an error. The source then retransmits the corrupted
frames accordingly
6
Stop-and-Wait ARQ - Sender: transmits a single frame and
waits for ACK
- Receiver: If frame received correctly,
send an ACK; If not, just discard the
frame or send a NAK
- Sender:
If ACK is received properly,
transmit next frame.
If NAK received, retransmit
the same frame.
Performance:
If no ACK is received within
timeout, transmitter timeouts,
and retransmits the same
frame.
If ACK is damaged, transmitter
will not recognize it,
transmitter will timeout and
retransmit the same frame.
Receiver gets two copies of
the same frame, discard one.
7
Selective Reject ARQ - Only rejected frames are
retransmitted and those that time
out
- Receiver informs transmitter of
rejected frame n by sending ‘NAK n’
- After receiving an erroneous frame,
subsequent frames are accepted by
the receiver and buffered
- After receiving the valid copy of the
error frame, frames are put in proper
order and passed to the higher layer.
- Minimizes retransmission, and thus
Performance: more efficient than Go-back-N
- Receiver requires more complex
buffer management
8
Lecture 5 – Local Area Network (LAN): Introduction
9
where it is removed
Star - Each station connected directly to central
node (using a bi – directional) link
- Central node can broadcast
Physical star, but logically like bus
since broadcast
Only one station can transmit at a
time; Otherwise, collision occurs
- Central node act as frame switch
Retransmits only to destination
Assembly of data into frame with address and error detection fields
Static Channel Allocation
o TDM:
Each user is statically allocated one time slot
If a particular user does not have anything to send, that period is
wasted
User may not utilize the whole channel for a time slot
o FDM:
Channel is divided to carry different signals at different frequencies
Efficient if there is a constant (one for each slot) number of users with
continuous traffic
Dynamic Channel Allocation
o Round Robin:
Each station has a turn to transmit (Declines or transmits up to a
certain data limit; overhead of passing the turn in either case)
Performs well if many stations have data to transmit for most of the
time (Otherwise passing the turn would cause inefficiency)
o Reservation:
Used for stream traffic where time on the medium is divided into
slots (like TDM)
Reservation can be made in centralized or distributed fashion
o Contention:
All stations contend to transmit
No control to determine whose turn is it
Stations send data by taking risk of collision
Used in Aloha, CSMA
Good for busy traffic
Efficient under light or moderate load
Performance is bad under heavy load
10
Lecture 6 – Medium Access Control (MAC) Protocols
Assumptions:
o All frames of the same size
o Time is divided into equal size slots, time to transmit 1 frame
o Nodes are synchronized
o Nodes start to transmit frames only at beginning of slots
o If 2 or more nodes transmit in slot, ALL nodes detect collision
11
Efficiency:
- Result of a slot:
Successful (S): only 1 node
transmits
Collision (C): >2 nodes
transmit
Empty (E): no transmission
- If there are N nodes in each slot,
each node transmits with probability
p:
If a node I transmits, the
probability that the
transmission is successful is
Pr(Si) = p(1 – p)
Probability that a slot is
successful is Pr(S) = N p(1-p)(N-
1)
12
- Frames are transmitted at arbitrary
times
- Although it is simpler as no
synchronization is needed, collision
probability increases:
Frame sent at t0 collides with
other frames sent in [t0 – 1, t0
+ 1]
13
Step 2: If medium is busy,
wait a random amount of
time and repeat step 1
- Non-persistent stations are
Performance: respectful to other stations
- Random delays reduces probability of collisions
between two stations with data to be transmitted
would wait for different amount of times
- Bandwidth is wasted if waiting time(backoff) is
large because medium will remain idle, following
end of transmission even if one or more have
frames to send
1-Persistent CSMA - To avoid idle channel time, station
wishing to transmit listen to the
medium:
Step 1: If medium is idle, it
will transmit immediately
Step 2: If medium is busy, it
Performance:
will continuously listen until
- If two or more stations becomes ready at the
medium becomes idle, then
same time, collision guaranteed
transmit immediately with
probability 1
P-Persistent CSMA - Time is divided into slots where
each time slot = maximum
propagation delay
- Station wishing to transmit listens
to medium:
Performance: Step 1: If medium is idle,
- Reduces the possibility of collisions like non- transmit with probability p OR
persistent wait one time unit (slot) with
Reduce channel idle time like 1-persistent probability (1-p) then repeat
step 1
Step 2: If medium is busy,
continuously listen until idle
then repeat Step 1
14
CSMA with Collision Detection (CD)
CSMA has channel wastage: If a collision has occurred, colliding packets are still to
be fully transmitted
CSMA with Collision Detection (CD) overcomes this:
o While transmitting, the sender is listening to medium for collisions
o Sender stops transmission if collision has occurred, reducing channel
wastage
o Widely used for bus topology LANs
Collision detection:
o Transceiver: A node monitors the media while transmitting. If the observed
power is higher than the transmitted power of its own signal, it means
collision occurred
15
Lecture 7 – Wired LAN: Ethernet
Ethernet Frame Format
Ethernet uses CSMA with Collision Detection (CD): listens to line before/during
sending
If line is idle, send packet immediately
If line is busy, wait until idle and transmit packet immediately (1-persistent sending)
If collision detected, stop sending and jam signal
Ethernet Minimum Frame Size
To ensure that there are no other transmissions on the medium before it ends its
transmission, frame transmission >= 2* Propagation time (t)
Ethernet Jam Signals
B’s transmission cannot be too brief, otherwise A might not see the collision
To avoid this, a station is required to transmit a jam sequence (32-48 bits) after it has
detected a collision to make the collision more obvious
16
Ethernet Problems:
Based on the Binary Exponential Backoff (BEB), when a collision is detected by the
station, it can discard the packet and let the upper layer protocols do the
retransmission
Delay time:
o 1st time: choose K from {0,1} then delay K * 51.2us
o 2nd time: choose K from {0,1,2,3} then delay = K*51.2us
o Nth time: Delay = K* 51.2us for K = 0...2n – 1 (max value is 1023)
o Give up after several tries (usually 16) & Report error to host
If delay were not random, then there is a chance that sources would retransmit in
lock step
Choose from small set for K (works for small number of hosts; large number of nodes
would result in more collisions)
Collision Domain
17
Shared – Hub Switch
18
Advantages of Wireless LANs:
o Flexible deployment
o Minimal wiring difficulties
o More robust against disasters
o Historic buildings, conferences, trade shows
Disadvantages of Wireless LANs:
o Low bandwidth compared to wired networks (1 – 10 Mbit/s)
o Proprietary solutions
o Need to follow wireless spectrum
Wireless Link Characteristics:
o Decreased signal strength: radio signal attenuates as it propagates through
mater
o Interference from other sources
o Multipath propagation
Extended Service Set
o Basic Service Set (BSS): Stations and the AP within the same radio coverage
o Extended Service Set (ESS): Several BSSs connected through Aps form an ESS
19
Passive Scanning: Hosts listen for beacon frames from Aps and probe responses;
Hosts only scans once per second
Active Scanning: Hosts transmits a probe request and listens for a probe response
from an AP
802.11 MAC
Sublayer:
Access Control:
20
Reliable Data Delivery
Sender first transmits a small request-to-send (RTS) packet to receiver using CSMA
o RTSs may still collide with each other, or an RTS may collide with an ongoing
data frame (short)
Receiver broadcasts clear-to-send9CTS) in response to RTS
CTS heard by all nodes
o Sender transmits data frame
o Other stations defer transmissions
21
Exposed Terminal Problem
Two-Phase Protocol:
o Phase 1: Reservation
o Phase 2: Data Transmission
22
23
Lecture 9 – Mobile Access Networks: From 1G to 5G
Characteristics of Selected Wireless Link Standards
24
Home network: permanent “home” of a mobile
Home agent: entity that will perform mobility functions on behalf of mobile, when
mobile is remote
Permanent address: address in home network can always be used to reach mobile
Care-of-address: address in visited network
Visited network: network in which mobile currently resides
Foreign agent: entity in visited network that performs mobility functions on behalf of
mobile
Approaches to mobility:
o Routing: routers advertise permanent address of mobile-nodes-in-residence
via usual routing table exchange (not scalable to millions of mobile)
Routing tables indicate where each mobile is located; no changes to
end-systems
o End-Systems:
Indirect routing: communication from correspondent to mobile goes
through home agent, then forwarded to remote
Direct routing: correspondent gets foreign address of mobile, sends
directly to mobile
Mobility: Registration
o Step 1: Mobile contacts foreign agent on entering visited network
o Step 2: Foreign agent contacts home agent: “this mobile is resident in my
network”
o End result: Foreign agent knows about mobile, home agent knows location of
mobile
Mobility via Indirect Routing
o Step 1: correspondent addresses packets using home address
o Step 2: Home agent intercepts packets, forwards to foreign agents
o Step 3: Foreign agent receives packets, forwards to mobile
o Step 4: Mobile replies directly to correspondent
Mobile uses two addresses: Permanent address (used by
correspondent -> mobile location is transparent to correspondent) &
Care of address: used by home agent to forward datagrams to mobile
Triangle routing: correspondent-home network-mobile (inefficient
when correspondent & mobile are in the same network)
Mobile via Direct Routing:
o Step 1: Correspondent requests, receives foreign of mobile
o Step 2: Correspondent forwards to foreign agent
o Step 3: Foreign agent receives the packets, forwards to mobile
o Step 4: Mobile replies directly to correspondent
Overcome triangle routing problem
Non-transparent to correspondent: correspondent must get care-of-
address
25
Accommodating Mobility with Direct Routing (in situation where mobile changes
visited network)
o Anchor foreign agent: Foreign Agent in first visited network
o Data always routed first to anchor Foreign Agent
o When mobile moves, new foreign agent arranges to have data forwarded
from old FA (chaining) -> contacts previous foreign agent
Handling Mobility in Cellular network
Home network: network of cellular provider you subscribe to (e.g. SingTel, M1)
o Home Location Register (HLR): database in home network containing
permanent cell phone #, profile information (services, preferences, billing),
information about current location (could be in another network)
Visited network: network in which mobile currently resides
o Visitor location register (VLR): database with entry for each user in network
o Could be home network
26
Lecture 10 – Network Paradigms
Network Design:
Approach 1: Smart intermediate nodes & dumb end systems e.g. Telecommunication
networks
o Achieve very complex traffic management but difficult to upgrade
Approach 2: Dumb intermediate nodes & smart end systems e.g. Internet
o Attract innovation at application but difficult to manage traffic
27
Packet Switching:
28
Virtual Circuit - A pre-planned route is established before any
packets are sent, then all packets follow the same
route
- Each packet contains a virtual circuit identifier
instead of destination address, and each node on
the pre-established route knows where to forward
such packets
The node need not make a routing decision
for each packet
29
Lecture 11 – Network Layer: Internet Protocol
Internet Protocol (IP) is implemented at both hosts and routers
Characteristics:
Identification: For reassembly purpose, all fragments of a datagram contain the same
identification value
Don’t Fragment (DF): If the flag is set, the datagram is not fragmented
More Fragments (MF): The flag is set to 1 for all fragments except the last one
Fragment Offset: Tells where in the current datagram this fragment belongs. All
fragments except the last one must be a multiple of 8 bytes, the basic fragment unit
30
Classful Addressing:
Network and/or Host id – all ‘0’s: can only be used as source address; e.g. during
start up to get own IP in DHCP
o 0.0.0.0: host is on this network
o 0.0.0.10: host 10 on this network
Network and/or Host id – all ‘1’s: can only be used as destination address
o 255.255.255.255: limited broadcast within this network (ARP)
o 155.69.255.255: directed broadcast on 155.69.x.x network
Loopback Address (127.x.y.z)
o Internal loopback to same host. Useful for self-testing of network software
Subnetting:
To indicate the length of extended network prefix, use a subnet mask w.x.y.z (bits
corresponding to extended network prefix are set to ‘1’s and ‘0’s otherwise)
‘slash’ notation: a.b.c.d/x where x indicates # bits for extended network prefix
(convert the subnet mask into binary then count the number of ‘1’s)
31
Maximum number of hosts in each subnet = 211 – 2 = 2046 because (11 bits of host
ID)
o Host ID = all ‘0’s indicates network/subnet ID number
o Host ID = all ‘1’s indicates broadcast address
32
Router to router link
By using a NAT-enabled router, only 1 IP address is required from ISP to support the
whole private network to connect to internet
Controversial:
o Routers should only process up to layer-3 (NAT-enabled routers process up to
transport layer to change port number)
o Violates host-to-host concept of layer-3
33
IP fragmentation & Reassembly
IP Routing: A host will not know how to send packets to destination outside its own
network. Hence, it is configured with a default gateway (router) to assist in the forwarding
Routing Process:
o Network address: Destination Network address
o Cost: Arbitrary cost, number of hops
o Next hop: Who to past to next
34
At source host, IP encapsulates upper layer data into packet. Then determine route
and MTU and fragment if needed
At each router, IP determines next route and Maximum Transfer Unit (MTU) and
further fragment packets if necessary. If Data Fragment (DF) flag is set, then it is
simply discarded
Finally, at the destination host, IP reassembles packets (if fragmented) before
returning data to upper layer
Address Resolution Protocol (ARP): communication protocol used for discovering the link
layer (MAC) address associated with a given Internet layer address (IP address)
Internet Control Message Control: created for routers/hosts to report errors to the source.
It is the responsibility of the source to handle the reported problems
ICMP packet is sent over IP packet, which in turn is sent over data link layer protocol
e.g. Ethernet (layer-3 protocol)
Two types of ICMP messages: Error/ query
ICMP echo request message is sent by a source host to query a router or destination
host, which will respond with an ICMP echo reply message
35
Ping Network Tool: test the reachability of a host/router. It operates by sending/receiving
ICMP echo messages
ICMP error message is sent by a router or destination host to inform source host that
its datagram has been received in error and discarded
The data section of ICMP error message will contain part of the original IP datagram
in error – the complete IP header and first 8 bytes of the payload
Time to live: counter used to limit the IP datagram lifetime, number of hops. The
counter is initialized with an integer value up to 255, and when it reaches zero, the IP
datagram is discarded
Tracert network tool: tracing a path from source to destination host
Send a sequence of ICMP echo request over IP with TTL set to 1, 2, .. until the
destination is reached
Implemented using UDP (layer-4) with unused port number (e.g. 33534) over IP
36
Lecture 12 – IP Routing Protocols
Router – device used to interconnect networks, and to forward packets by examining the
destination address in the IP header of each packet
37
o Inter-AS Routing:
Routing between AS
Protocols for Inter-AS routing are called Exterior Gateway Protocols
(EGPs)
All AS must run the same standard protocol
Different admin wants control over how its traffic are forwarded, who
routes through its network
Policy may dominate over performance
Link State Routing:
Discover neighbours by multicasting Hello
Construct Link State Advertisement Packet (LSA/LSP)
Flood LSA/LSP to ALL Routers (during initial start-up/ when
there is a change in topology)
Construct link state database
Compute shortest-path routes
Border Gateway Protocol:
Configure border router to know its neighbours
Exchange path vectors (routing information) with neighbours
Select path based on policy
o Transit AS: Connected to other AS to carry transit traffic for its customers;
mainly the providers, i.e. ISPs
o Stub AS: Connected to only one other AS; typically, customer connected to its
provider. In fact, its not necessary to stub AS to run BGP since it has only 1
path to its ISP
o External peers (between different AS) are normally adjacent to each other
and share a subnet
o Internal peers may be in any subnet within the same AS
o Customer – Provider relationship: Customer pays the provider to send and
receive traffic
o Peer – Peer relationship: Two AS agree to transit each other traffic
o Path selection (policy-based):
Import policy: may or may not select path offered (e.g. cost, business
relationships)
Export policy: can filter routes you don’t want to tell neighbours
BGP Path Attributes
38
Aggregator: Contains the AS and IP address of the BGP speaker that performs route
aggregation
BGP route propagation:
Check all incoming filters defined by BGP session. Ignore routes that are not allowed
Insert route in the BGP table
Compare the new routes with other routes in the BGP table with the same
destination prefix, and execute AS path selection
If the new route is best. Set as preferred route
Propagate the new best route to BGP neighbours
Uses Shortest Path – AS Hop Count
39
Lecture 13 – Transport Layer (UDP and TCP)
Transport Layer: provides end-to-end service for transferring data between processes
(process-to-process communication); only implemented at end hosts
A single transport layer is used to support multiple application processes through the
use of ports
Multiplexing: gathering data from multiple processes and passing it to a single
network layer
De-multiplexing: delivering of data from single network layer to different processes
correctly
UDP (Datagram Service): Application layer is aware that UDP sends each message as
a datagram ->useful for broadcasting messages to users
TCP (Byte Stream Service): Application layer views TCP as a channel for sending
stream of bytes, and is NOT aware that bytes are sent in blocks called segments
o Connection Management: A connection must be setup before data exchange
can be performed
o Flow Control: Sender will not overwhelm receiver
o Error Control: Receiver detects error, sender retransmits error packets
o Congestion Control: During transmission, sender detects network usage
(congestion) and adjust transmission rate
40
Port Addresses
Sequence Number (SN): Each TCP connection will start with a different SN called
Initial Sequence Number (ISN)
o The position of each data byte in the byte stream is labelled from ISN + 1, and
cycle back to 0 once reaching 232 – 1; i.e. 1st byte = (ISN + 1) mod 232, 2nd byte
= (ISN + 2) mod 232
o SN indicates the position of the 1st byte in each segment
o Increment ISN by 1 every 4-micro sec
Acknowledgment Number (AN):
o SN of the next data byte expected from sender
o Also imply all bytes up to AN-1 have been received correctly
Window Size (W):
o Indicate the number of bytes (also called credits) counting from AN that the
receiver is ready to accept
TCP Connection Management:
41
TCP: Connection Establishment
Scenario 1: Scenario 2:
42
o Avoid silly window syndrome at sender: Wasteful for receiver to keep ACK
with small window when sender can send more
Solution: Receiver ACK W=0 instead of small window size until free
buffer gets large; e.g. buffer half empty (Clark’s Solution)
Solution: Send the 1st small segment, buffer the rest and send them
together when ACK is returned (Nagle’s Algorithm) -> creates another
problem: Delayed transmission of segments is unfriendly to real-time
traffic e.g. interactive internet games
Both solutions are required to solve silly window syndrome
TCP Error Control: To guarantee reliable service to application layer when IP is unreliable
Error types:
o Segments arrived out-of-order
Detected based on SN in TCP header: re-order and ACK
o Segments duplicated
Detected based on SN; discard and ACK
o Segments corrupted
Detected based on checksum in TCP header
Discard and wait for timeout retransmission
o Segments loss:
Wait for timeout retransmission
Retransmission Timer:
Measure Round Trip Time (RTT) and compute smoothed RTT (SRTT). The
Retransmission Time Out (RTO) is then derived from SRTT
Jacobson’s Algorithm:
43
Karn’s Algorithm:
o Each TCP connection measures the RTT from sending a segment to receiving
its corresponding ACK
o Typically, there is only one measure ongoing at any time
o If a segment is retransmitted due to timeout, ignore its measured RTT
because it is ambiguous weather the ACK is for 1st or re-transmission
o When retransmission occurs, set RTO = 2 * RTO
Congestion Control: To prevent senders from sending too much traffic to the network such
that it becomes overly congested and useless; informally, to be a “considerate user” of the
network
44
45
Tahoe Algorithm: Reno Algo: Implement Fast Recovery
Bandwidth-delay (BD): number of bytes that is required to fill the pipe in both directions
High BD means that a lot of bytes are required to fill the pipe thus require larger
window
High BD could be caused by the transmission bandwidth
46
Lecture 14 – Application Layer: DHCP, DNS and HTTP
Dynamic Host Configuration Protocol (DHCP): to automatically configure with IP address,
default gateway, DNS, etc
Based on received DHCP message broadcast flag, DHCP servers send DHCP via:
o IP unicast using offered IP as destination address (possible since client’s
physical address is known)
o IP broadcast to destination address 255.255.255.255
Reason why client is not using ephemeral part:
o Could confuse other hosts which happened to be using the same UDP
ephemeral port as the DHCP client if IP broadcast is used
47
DHCP Request –
Client selects one offer and sends DHCP request which includes the selected server
identifier
DHCP Request is sent to destination address 255.255.255.255 (IP broadcast) so that
other DHCP servers will also receive it and know that their offers are being declined
Client still uses source IP 0.0.0.0 since the offer is not confirmed yet
DHCP Acknowledge –
Similar as DHCP Offer, DHCP Ack is sent via IP unicast or broadcast based on the
DHCP message broadcast flag.
Once DHCP ACK is received, the client can start using the offered IP address within
the duration of the lease time, typically 1 day.
DHCP Release –
48
DHCP Relay Agent: To enable DHCP server to support multiple subnets, relay agents are
required since IP broadcast 255.255.255.255 is only limited within a subnet
To save the trouble of having dedicated relay agent in every subnet, some routers
have the added functionality to act as relay agent
Domain Name System (DNS): Given only the domain name of a server, how does a client
know the IP address to send to destination
49
Name servers may be configured to support recursive or iterative queries:
o DNS client contacts the local name server
o Local name server will assist client to perform further queries if it does not
know the answer
o Root and TLD name servers (usually iterative) will only send a referral if they
do not know the answer
DNS Query/Response Message Format
World Wide Web (WWW): network application which allows a client to access a file
from a server
HyperText Transfer Protocol (HTTP): application layer protocol used by WWW. It is
designed to run over TCP with server listening at well-known port 80 – consists of
request/response messages
o Non-persistent HTTP: individual TCP connection/termination for each pair of
request/response to access one file – inefficient
o Multiple request/response messages within one TCP connection – efficient
for accessing multiple files in the same server
50
HTTP Request Message Format
Web Proxy (Cache): Improve performance by caching, reduce traffic load on costly access
link, monitor/filter contents
* Can be implemented without the knowledge of users/servers: The organization/ISP
configures its routers to intercept all web traffic and re-direct (mis-direct) them to its Web
proxy, which masquerades as the destination server
Steps:
o Client request to proxy
o If content is not available, proxy requests to origin server
o Origin server responds to proxy
o Proxy responds to client
If performance is import, an option for content provider is use the service of Content
Delivery/ Distribution Network (CDN)
o With CDN, a web request will be transparently re-directed, commonly
implemented using DNS re-direction with CNAME RRs
51