DOC PREVIEW
Berkeley COMPSCI 268 - Lecture Notes

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS 268: Computer NetworkingGoals and ObjectivesLecture TopicsWhat is the Objective of Networking?Packet SwitchingExtensions to the NetworkExtensions to the Network ArchitectureSlide 8Enterprise/Datacenter NetworksProtocolsLayering CharacteristicsApplication-Oriented NetworkingEnergy ConsiderationsNetwork SecurityQuo Vadis Networking?What Next?CS 268: Computer NetworkingL-24 Course Wrap-up2Goals and Objectives•Understand state-of-the-art in network protocols, architectures, and applications•Process of networking research•Constraints and thought processes for networking research•Problem Formulation—Approach—Analysis—Results3Lecture TopicsTraditional•Layering•Internet architecture•Routing (IP)•Transport (TCP)•Queue management (FQ, RED)•Naming (DNS)Recent Topics•Botnets•Datacenter Networking•Multicast•Mobility/Wireless•Network Energy•Network Debugging•Overlay Networks•P2P applicationsModified from F08 based on feedback from last year’s class:QoS, SensorNets, “Future Network” Architecture eliminated4What is the Objective of Networking?•Communication between applications on different computers•What the application needs/demands•Traditional view: traffic data rate, pattern (bursty or constant bit rate), target (multipoint or single destination, mobile or fixed)•New application-orientation•Overlays/DHTs/Indirection•Policy Awareness•“Programmable” Networks5Packet Switching•Interleave packets from different sources•Statistical multiplexing to use resources on demand•Supports multiple applications types•Accommodates bursty traffic via queues•Store and forward•Packets are self contained units•Can use alternate paths – reordering•Effects of contention: congestion and delay•Semester readings on Fair Queuing, Router Congestion ControlExtensions to the Network•New kinds of networks within the Internet•Local Area: Enterprise, Datacenter•Mobile•Wireless/Broadcast•Names vs. Addresses/Content Distribution•BotNets•Semester readings on Enterprise/Datacenter networks, Roofnet/Broadcast, Ad hoc routing, CDNs, DHTs/I3, etc.6Extensions to the Network Architecture•Naming•DNS as an Overlay Network•Problems with Host-to-IP Address bindings•Problems with Service-to-Host bindings•Solutions based on the idea of an extra level of indirection: flat identifiers plus resolution based on DHT lookup•Semester readings on DNS, DHTs/i3, etc.7Extensions to the Network Architecture•Forwarding•Problems with Internet routing•Beyond point-to-point routing: broadcast, multicast, mobility, etc.•Indirection schemes and intermediaries (e.g., “policy aware switching”) to implement new forms of forwarding•Semester readings on Internet topology, multicast, wireless, i3, policy-aware switching, network measurement 8Enterprise/Datacenter Networks•Large number of nodes within a single administrative •New approaches for name-to-address mapping and network management, e.g., floodless•New challenges for local-area transport, e.g., incast•New routing algorithms, e.g., parallel paths between nodes•Course readings: Floodless, VL2, Portland, In-cast, etc.910Protocols•Module in layered structure•Set of rules governing communication between network elements (applications, hosts, routers)•Protocols define:•Interface to higher layers (API) •Interface to peer •Format and order of messages•Actions taken on receipt of a message11Layering Characteristics•Each layer relies on services from layer below and exports services to layer above•Interface defines interaction•Hides implementation - layers can change without disturbing other layers (black box)Application-Oriented Networking•All kinds of new application-specific routing and transport layers•Name-to-address mapping as routing, e.g., DHTs, I3•Content distribution•Overlay networks •Active/programmable networks•Layering and E2E assumptions questioned and revised12Energy Considerations•Energy proportionality applied to compute and switch nodes•Protocol implications for allowing nodes to sleep—protocol proxies•Low power switch ports•Service placement based on energy price arbitrage•Course readings: Electricity Bill, Art of Idleness13Network Security•Many challenges remain•Authenticated sender and receiver•Trust management•E2E secure payloads•Manage malicious behaviors, e.g., botnets•Course readings: botnet detection14Quo Vadis Networking?•New architecture for the Next Generation•New naming and forwarding as foundation•Security and authenticity from first principles•Application-oriented networking•Refocus from wide-area to local-area•Unified telephony and data, wired/wireless•Datacenters for web and batch parallel apps•O(10,000) node DC and enterprise networks•New addressing, transport opportunities15What Next?•Today•Course evaluations next•Research Project Poster Session – 3-4 PM in 465 Soda•Thursday, 10 December: Quiz #2•405 Soda, 2-3:30 PM•Monday, 15 December: 5 PM Project Reports•Specification on the web, 5-15


View Full Document

Berkeley COMPSCI 268 - Lecture Notes

Documents in this Course
Lecture 8

Lecture 8

33 pages

L-17 P2P

L-17 P2P

50 pages

Multicast

Multicast

54 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?