DOC PREVIEW
SJSU CS 265 - Networking Intro

This preview shows page 1-2-3-4-30-31-32-33-34-61-62-63-64 out of 64 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 64 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Networking OverviewIntroductionWhat’s a protocol?The network edge:The Network CoreNetwork Core: Packet SwitchingInternet protocol stackLayering: physical communicationApplication LayerNetwork applications: some jargonApplications and application-layer protocolsClient-server paradigm (“usual” approach)Addressing processes:Internet transport protocols servicesHTTP overviewCookies: keeping “state”Cookies (continued)Mail access protocolsSample SMTP interactionDNS: Domain Name SystemDNS: Root name serversP2P file sharingP2P: centralized directoryP2P: decentralized directoryP2P: Query floodingTransport LayerInternet transport-layer protocolsTCP: Overview RFCs: 793, 1122, 1323, 2018, 2581TCP 3-way handshakeNetwork LayerNetwork layer functionsDatagram networks: the Internet modelHierarchical RoutingIntra-AS and Inter-AS routingThe Internet Network layerIP Addressing: introductionGetting a datagram from source to dest.Slide 38IP Fragmentation & ReassemblyIP Fragmentation and ReassemblyICMP: Internet Control Message ProtocolDHCP client-server scenarioNAT: Network Address TranslationIntra-AS RoutingInter-AS routing in the Internet: BGPWhy different Intra- and Inter-AS routing ?Link LayerLink Layer: IntroductionAdaptors CommunicatingMultiple Access protocolsMAC Protocols: a taxonomyRandom Access ProtocolsCSMACSMA collisionsCSMA/CD (Collision Detection)CSMA/CD collision detectionEthernet uses CSMA/CDLAN Addresses and ARPLAN Address (more)ARP: Address Resolution ProtocolARP protocolARP cache poisoningARP Poisoning (continued)Summary comparisonIntroduction 1-1Networking OverviewIntroduction 1-2IntroductionIntroduction 1-3What’s a protocol?a human protocol and a computer network protocol:Q: Other human protocols? HiHiGot thetime?2:00TCP connection reqTCP connectionresponseGet http://www.awl.com/kurose-ross<file>timeIntroduction 1-4The network edge:end systems (hosts):run application programse.g. Web, emailat “edge of network”client/server modelclient host requests, receives service from always-on servere.g. Web browser/server; email client/serverpeer-peer model: minimal (or no) use of dedicated serverse.g. Gnutella, KaZaAIntroduction 1-5The Network Coremesh of interconnected routersthe fundamental question: how is data transferred through net?circuit switching: dedicated circuit per call (telephone call)packet-switching: data sent thru net in discrete “chunks” (internet)Introduction 1-6Network Core: Packet Switchingeach end-end data stream divided into packetsuser A, B packets share network resources each packet uses full link bandwidth resources used as needed resource contention: aggregate resource demand can exceed amount availablecongestion: packets queue, wait for link usestore and forward: packets move one hop at a timetransmit over linkwait turn at next linkBandwidth division into “pieces”Dedicated allocationResource reservationIntroduction 1-7Internet protocol stackapplication: supporting network applicationsFTP, SMTP, HTTPtransport: host-host data transferTCP, UDPnetwork: routing of datagrams from source to destinationIP, routing protocolslink: data transfer between neighboring network elementsPPP, Ethernetphysical: bits “on the wire”applicationtransportnetworklinkphysicalIntroduction 1-8Layering: physical communication applicationtransportnetworklinkphysicalapplicationtransportnetworklinkphysicalapplicationtransportnetworklinkphysicalapplicationtransportnetworklinkphysicalnetworklinkphysicaldatadataIntroduction 1-9Application LayerIntroduction 1-10Network applications: some jargonProcess: program running within a host.within same host, two processes communicate using interprocess communication (defined by OS)processes running in different hosts communicate with an application-layer protocoluser agent: interfaces with user “above” and network “below”. implements user interface & application-level protocolWeb: browserE-mail: mail readerstreaming audio/video: media playerIntroduction 1-11Applications and application-layer protocolsApplication: communicating, distributed processese.g., e-mail, Web, P2P file sharing, instant messaging running in end systems (hosts) exchange messages to implement applicationApplication-layer protocolsone “piece” of an appdefine messages exchanged by apps and actions takenuse communication services provided by lower layer protocols (TCP, UDP)For example, SMTPapplicationtransportnetworkdata linkphysicalapplicationtransportnetworkdata linkphysicalapplicationtransportnetworkdata linkphysicalIntroduction 1-12Client-server paradigm (“usual” approach)Typical network app has two pieces: client and serverapplicationtransportnetworkdata linkphysicalapplicationtransportnetworkdata linkphysicalClient:initiates contact with server (“speaks first”)typically requests service from server, Web: client implemented in browser; e-mail: in mail readerrequestreplyServer:provides requested service to cliente.g., Web server sends requested Web page, mail server delivers e-mailHosts: both clients and serversIntroduction 1-13Addressing processes:For a process to receive messages, it must have an identifierEvery host has a unique 32-bit IP addressQ: does the IP address of the host on which the process runs suffice for identifying the process?A: No, many processes can be running on same hostIdentifier includes both the IP address and port numbers associated with the process on the host.“Well-known” port number examples:HTTP server: 80Mail server: 25More on this laterIntroduction 1-14Internet transport protocols servicesTCP service:connection-oriented: setup required between client and server processesreliable transport between sending and receiving processflow control: sender won’t overwhelm receiver congestion control: throttle sender when network overloadedfull duplex: simultaneous 2-way communicationdoes not provide: timing, minimum bandwidth guaranteesUDP service:unreliable data transfer between sending and receiving processdoes not provide: connection setup, reliability, flow control, congestion control, timing, or bandwidth guarantee Q: Why is there a UDP?Introduction 1-15HTTP overviewHTTP: HyperText Transfer ProtocolWeb’s application layer protocolclient/server modelclient: browser that requests, receives,


View Full Document

SJSU CS 265 - Networking Intro

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download Networking Intro
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Networking Intro and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Networking Intro 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?