DOC PREVIEW
Berkeley COMPSCI 268 - Lecture Notes

This preview shows page 1-2-3-21-22-23-43-44-45 out of 45 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 45 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS 268: Computer NetworkingDesign ConsiderationsOutlineGoals [Clark88]Connecting NetworksChallenge 1: Address FormatsChallenge 2: Different Packet SizesGateway AlternativesStandardizationIP HourglassIP Layering (Principle #8)Principle #7SurvivabilityPrinciple #2: Fate SharingPrinciple #3: Soft-statePrinciple #4: End-to-End ArgumentExample: Reliable File TransferE2E Example: File TransferDiscussionExamplesTypes of ServiceSlide 22Principle #6: DecentralizationIP Design WeaknessesChanges Over TimeNew Principles?Summary: Internet ArchitectureSummary: Minimalist ApproachSummarySlide 30FragmentationFragmentation is HarmfulPath MTU DiscoveryIP Address Problem (1991)IP Address Utilization (’98)IPv4 Routing ProblemsSolution #1 – CIDRClassless Inter-Domain RoutingSolution #2 - NATNAT IllustrationSolution #3 - IPv6IPv6 ChangesSlide 43Summary: IP DesignNext Lecture: Interdomain RoutingCS 268: Computer NetworkingL-2 Design Considerations2Design Considerations •How to determine split of functionality•Across protocol layers•Across network nodes•Assigned Reading•[SRC84] End-to-end Arguments in System Design•[Cla88] Design Philosophy of the DARPA Internet Protocols3Outline•Design principles in internetworks •IP design4Goals [Clark88]0. Connect existing networksinitially ARPANET and ARPA packet radio network1. Survivabilityensure communication service even in the presence of network and router failures 2. Support multiple types of services3. Must accommodate a variety of networks4. Allow distributed management5. Allow host attachment with a low level of effort6. Be cost effective7. Allow resource accountability5Connecting Networks•How to internetwork various network technologies•ARPANET, X.25 networks, LANs, satellite networks, packet networks, serial links…•Many differences between networks•Address formats•Performance – bandwidth/latency•Packet size•Loss rate/pattern/handling•Routing6Challenge 1: Address Formats•Map one address format to another?•Bad idea  many translations needed•Provide one common format•Map lower level addresses to common format7Challenge 2: Different Packet Sizes•Define a maximum packet size over all networks?•Either inefficient or high threshold to support•Implement fragmentation/re-assembly•Who is doing fragmentation?•Who is doing re-assembly?8Gateway Alternatives•Translation•Difficulty in dealing with different features supported by networks•Scales poorly with number of network types (N2 conversions)•Standardization•“IP over everything” (Design Principle #1)•Minimal assumptions about network•Hourglass designStandardization•Minimum set of assumptions for underlying net•Minimum packet size•Reasonable delivery odds, but not 100%•Some form of addressing unless point to point•Important non-assumptions:•Perfect reliability•Broadcast, multicast•Priority handling of traffic•Internal knowledge of delays, speeds, failures, etc.•Much engineering then only has to be done onceIP Hourglass•Need to interconnect many existing networks•Hide underlying technology from applications•Decisions:•Network provides minimal functionality•“Narrow waist”Tradeoff: No assumptions, no guarantees.TechnologyApplications email WWW phone...SMTP HTTP RTP...TCP UDP…IP ethernet PPP…CSMA async sonet... copper fiber radio...11IP Layering (Principle #8)•Relatively simple•Sometimes taken too farRouterRouterHostHostApplicationTransportNetworkLink12Principle #7•Be conservative in what you send and liberal in what you accept•Unwritten rule•Especially useful since many protocol specifications are ambiguous•E.g., TCP will accept and ignore bogus acknowledgementsSurvivability•If network disrupted and reconfigured•Communicating entities should not care!•No higher-level state reconfiguration•How to achieve such reliability?•Where can communication state be stored?13Network HostFailure handing Replication “Fate sharing”Net Engineering Tough SimpleSwitches Maintain state StatelessHost trust Less MorePrinciple #2: Fate Sharing•Lose state information for an entity if and only if the entity itself is lost.•Examples:•OK to lose TCP state if one endpoint crashes•NOT okay to lose if an intermediate router reboots•Is this still true in today’s network?•NATs and firewalls•Survivability compromise: Heterogeneous network  less information available to end hosts and Internet level recovery mechanismsConnection StateStateNo State1415Principle #3: Soft-state•Soft-state•Announce state•Refresh state•Timeout state•Penalty for timeout – poor performance•Robust way to identify communication flows•Possible mechanism to provide non-best effort service•Helps survivability16Principle #4: End-to-End Argument•Deals with where to place functionality•Inside the network (in switching elements)•At the edges•Argument•There are functions that can only be correctly implemented by the endpoints – do not try to completely implement these elsewhere•Guideline not a law17Example: Reliable File Transfer•Solution 1: make each step reliable, and then concatenate them•Solution 2: end-to-end check and retryOSAppl.OSAppl.Host A Host BOKE2E Example: File Transfer•Even if network guaranteed reliable delivery•Need to provide end-to-end checks•E.g., network card may malfunction•The receiver has to do the check anyway!•Full functionality can only be entirely implemented at application layer; no need for reliability from lower layers•Does FTP look like E2E file transfer?•TCP provides reliability between kernels not disks•Is there any need to implement reliability at lower layers?1819Discussion•Yes, but only to improve performance•If network is highly unreliable•Adding some level of reliability helps performance, not correctness•Don’t try to achieve perfect reliability!•Implementing a functionality at a lower level should have minimum performance impact on the applications that do not use the functionality20Examples•What should be done at the end points, and what by the network?•Reliable/sequenced delivery?•Addressing/routing?•Security?•What about Ethernet collision detection?•Multicast?•Real-time guarantees?Types of Service•Principle #5: network layer provides one simple service: best effort datagram (packet) delivery•All packets are treated the same•Relatively simple core network elements•Building block from


View Full Document

Berkeley COMPSCI 268 - Lecture Notes

Documents in this Course
Lecture 8

Lecture 8

33 pages

L-17 P2P

L-17 P2P

50 pages

Multicast

Multicast

54 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?