DOC PREVIEW
Princeton COS 116 - lecture 15

This preview shows page 1-2-20-21 out of 21 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

What computers talk about and how. (Networking & the Internet.)Brief historyModern InternetToday: A Peek Underneath the ‘NetCaveat: Internet ≠ W W WTheme 1:The (shaky) foundation of the Internet: TCP/IP ProtocolHopping along“Best effort transmission”DiscussionSome mechanismsTheme 2:Political and Military Setup in Medieval Europe (?)PowerPoint PresentationFirst example of decentralization: Physical networkThe Second Decentralization: Domain Name SystemWhat happens when you type a URL?Theme 3.CongestionHow does a good netizen respond to congestion?What’s in the future?What computers talk about and how.(Networking & the Internet.)COS 116: 4/3/2008Sanjeev AroraBrief historyLocal area networks & university networksMilitary communication networksARPANET [’68] (a.k.a. DARPANET), etc.Early 1980s: US government decides on new way to connect various networks: the “Internet”  1989: World Wide Web; html, browsers1998: Responsibility for Internet naming system handed over to private non-profit corporation ICANN.Rest of InternetRest of InternetModern InternetCollection of computers (including devices, servers, etc.) connected by wires, optical cables, wireless, etc.To join, need:Device capable of “speaking the right protocol” (TCP/IP)IP “address” given by an Internet providerConnection to provider’s servers (via modem, DSL, wireless, etc.)Your PCIP Address: 128.156.16.201Today: A Peek Underneath the ‘NetDominant technological artifact of second half of 20th centuryInteresting example of design of a large, heterogeneous system (decentralized, yet fairly robust).Why?Caveat: Internet ≠ W W WInternet: network connecting computers, devices, etc.WWW: hyperlinked content (webpages) stored on servers; requested and served using http protocolBuilt on top of the internetInternetInternetTheme 1:Building reliability on top of unreliable protocolsThe (shaky) foundation of the Internet: TCP/IP ProtocolAll transmissions broken up into packetsDestination address Book-keeping info Data32 bitsOften about 1500 bytes(but can vary)A Packet:Hopping alongInternet is actually a bunch of connected computers called routersPackets hop from router to router until they reach destinationInternetInternetSee, for example: http://network-tools.com“Best effort transmission”Packet not guaranteed to arrive in a timely fashion (or ever!)If many packets sent, may arrive out of orderInternetInternetSenderReceiverDiscussionIs there some unreliable communications device you use everyday?How do you cope with the cellphone’s unreliability?Some mechanismsRetransmission (“Could you say that again?”)Timeout (“Let me hang up and try redialing?”)Acknowledgements (“Finally understood you. Go on.”)(In TCP/IP: if sequence of packets, number them and sort at receiver end.)Theme 2:Decentralized controlWhat is a suitable postal system for this “army”?Political and Military Setup in Medieval Europe (?)KingDukeDukeKnightKnightPeasantsCountCountHow should a peasant in one town send mail to a peasant in another town?Discussion Time• What happens if a knight leaves the army?First example of decentralization: Physical network12 major providersMany local providersPrinceton SchoolsMcCarterUSLECPrinceton homes &businessesThe Second Decentralization: Domain Name System.com.edu.net.uk.in.princeton.edu.cs.princeton.edu .econ.princeton.eduWhat happens when you type a URL?Address translated by asking appropriate DNS server up/down the DNS hierarchywww.nytimes.com  query to .com server 199.239.136.200Physical routing of packets up/down the physical network hierarchy based upon addressOther stuffTheme 3.Dependence upon the kindness of strangersCongestionQueue full  packets are droppedRouter 1Router 2QueueHow does a good netizen respond to congestion?Packets getting dropped?  Halve the transmission rateAll packets getting through?  Increase transmission rate a little.Done in all TCP/IP software But, no enforcement mechanism! (Allows “cheating”, as well as VoIP Telephony, Streaming media, etc.)What’s in the future?128-bit instead of 32-bit addresses. Can send email to your toaster. (Especially if it lives in Asia)Mechanisms for pricing, security, quality of service, etc.NSF’s GENI


View Full Document

Princeton COS 116 - lecture 15

Documents in this Course
Lecture 5

Lecture 5

15 pages

lecture 7

lecture 7

22 pages

Lecture

Lecture

32 pages

Lecture

Lecture

16 pages

Midterm

Midterm

2 pages

Lecture

Lecture

23 pages

Lecture

Lecture

21 pages

Lecture

Lecture

24 pages

Lecture

Lecture

22 pages

Lecture

Lecture

28 pages

Lecture

Lecture

21 pages

Lecture

Lecture

50 pages

Lecture

Lecture

19 pages

Lecture

Lecture

28 pages

Lecture

Lecture

32 pages

Lecture

Lecture

23 pages

Lecture

Lecture

21 pages

Lecture

Lecture

19 pages

Lecture

Lecture

22 pages

Lecture

Lecture

21 pages

Logic

Logic

20 pages

Lab 7

Lab 7

9 pages

Lecture

Lecture

25 pages

Lecture 2

Lecture 2

25 pages

lecture 8

lecture 8

19 pages

Midterm

Midterm

5 pages

Lecture

Lecture

26 pages

Lecture

Lecture

29 pages

Lecture

Lecture

40 pages

Lecture 3

Lecture 3

37 pages

lecture 3

lecture 3

23 pages

lecture 3

lecture 3

20 pages

Lecture

Lecture

21 pages

Lecture

Lecture

24 pages

Lecture

Lecture

19 pages

Load more
Download lecture 15
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view lecture 15 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view lecture 15 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?