DOC PREVIEW
UT Dallas CS 6390 - 4. Internet-Design-Papers

This preview shows page 1-2-23-24 out of 24 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 24 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Internet Design PapersEnd-to-End Argument in System DesignIntroductionSlide 4Example: Careful File TransferHow to provide reliabilitySlide 7Slide 8The Design Philosophy of the DARPA Internet ProtocolsSlide 10Fundamental GoalSecond level goalsSurvivability in the face of failuresHow to protect state info from lossSlide 15Types of ServiceVarieties of networksOther goalsOther goals – cont’dArchitecture and ImplementationDatagramsTCPConclusionsSome thoughts on the face of end-to-end argument…Internet Design PapersEnd-to-End Argument in System DesignSaltzer, Reed, ClarkACM Transactions on Computer Systems1984IntroductionEnd-to-end argumentfunctions placed at low levels of a system may be redundant or of little value when compared with the cost of providing them at that low levelIn a layered system, move a function upward closer to the application that uses itExamplesReliable data transmissionBit-error recoverySecurity using encryptionDuplicate message suppressionRecovery from system crashesDelivery acknowledgementIntroductionWhen designing a network, need to decide where to implement a list of functions to be supportedIn the networkAt the edge by clientsAs a joint ventureRedundantly at both placesThe function in question can completely and correctly be implemented only with the knowledge and help of the application standing at the endpoints of the network. Therefore, providing that questioned function as a feature of the communication system itself is not possible. (Sometimes an incomplete version of the function provided by the network may be useful as a performance improvement.)Example: Careful File TransferMove a file from disk of computer A to disk of computer BRead from disk at APass to file xfer program at ATransfer from A to BPass pkts to file xfer program at BPass file to OS to write on disk at BProblems that may occur1- Hardware faults may cause problems2- File xfer program may cause problems3- Transient errors at processor/memory4- Packets may be dropped/corrupted/duplicated in transit5- Hosts may crash in the middle of the transactionHow to provide reliabilityReinforce each step along the way using Duplicate copies, timeout and retry, redundancy for error detection, crash recovery, etcGoal is to reduce the prob. of each threat to an acceptable levelHow about the overhead; what if the probability of all threats occurring is low…Alternative: end-to-end check and retryUse a checksum for each file stored in the diskTransfer file to B using simple procedureAt B, at the end of the xfer, compute checksum and send it back to AIf A finds out a mismatch between checksums, it will re-xferGood if failures are fairly rareHow to provide reliabilityIf we use the first approach for the communication system, threat (4) may be eliminated but still need end-to-end checksum of the fileReliable xmission reduces the frequency of retries (performance improvement) but has no effect on correctness of the outcomecorrect file xmission is ensured by the end-to-end checksum and retryFor the network to go out of its way to be extraordinarily reliable does not reduce the burden on the application program to ensure reliabilityHow to provide reliabilityPerformance aspectsWhat if the frequency of network errors is largeExponential increase in retries with the increasing file lengthSome effort at lower levels to improve network reliability can have a significant effect on appl performance but it should not strive for providing perfect reliabilityThe trade-off is based on performance, not correctnessIf network is too unreliable, file xfer appl will suffer moreIf network is made very reliable, these measures have a performance cost (bw cost, delay cost, processing cost, etc)What is the proper trade-off then?Depends on the characteristics of the network and requirements of the applications to run on top of itThe Design Philosophy of the DARPA Internet ProtocolsDavid D. ClarkMITSIGCOMM 88IntroductionInternet architectureWas first developed in 1970sUnder the Internet Research Program of Defense Advanced Research Project Agency (DARPA) of the US Department of DefenseThe design philosophy has evolved during time and still evolvingThis paper catalogs one view of the original objectives of the Internet architecture, and discusses the relation between these goals and the important features of the protocolsFundamental GoalTo develop an effective technique for multiplexed utilization of then existing networksTo provide some larger service architectureAllow users on networks to access services in other networksIntegrate a number of separately administrated entities into a common utilityTechnique selected for multiplexing: packet switchingAn alternative such as circuit switching could have been considered, but the applications being supported, such as remote login were served by packet switching paradigm. Also the networks that were to be integrated together were packet switching networks.The fundamental structure of the Interneta packet switched network in which a number of networks are connected together using gateways which implement a store and forward packet forwarding algorithmSecond level goalsMust continue despite loss of network or gatewaysMust support multiple types of communication servicesMust accommodate a variety of networksMust permit distributed management of its resourcesMust be cost effectiveMust permit host attachment with a low level of effortResources used must be accountableNote that the ordering of the above items is important and entirely different network architecture would result if changed !Survivability in the face of failuresOne important goal is that the Internet should continue to support communication service even though networks and gateways are failingThe assumption wassynchronization between communication ends would never be lost unless there was no physical path over which any sort of communication could be achievedTo achieve this goalthe state information which describes the on-going conversation must be protected from lossNumber of packet transmitted and/or acknowledgedNumber of outstanding flow control permissions, etcHow to protect state info from lossReplicationStore the state info in the switching nodes of the networkDue to its distributed nature,


View Full Document

UT Dallas CS 6390 - 4. Internet-Design-Papers

Documents in this Course
VoIP

VoIP

44 pages

TE-MPLS

TE-MPLS

38 pages

TCP

TCP

28 pages

QoS

QoS

27 pages

P2P

P2P

50 pages

IPv6

IPv6

81 pages

IPv6

IPv6

64 pages

AODV-v2

AODV-v2

19 pages

aodv

aodv

32 pages

19. P2P

19. P2P

50 pages

18. VoIP

18. VoIP

44 pages

17. QoS

17. QoS

27 pages

13. TCP

13. TCP

28 pages

6. IPv6

6. IPv6

81 pages

19. P2P

19. P2P

50 pages

18. VoIP

18. VoIP

44 pages

17. QoS

17. QoS

27 pages

6. IPv6

6. IPv6

81 pages

6. IPv6

6. IPv6

81 pages

19. P2P

19. P2P

50 pages

18. VoIP

18. VoIP

44 pages

17. QoS

17. QoS

27 pages

13. TCP

13. TCP

28 pages

CC

CC

74 pages

19. P2P

19. P2P

50 pages

18. VoIP

18. VoIP

44 pages

17. QoS

17. QoS

27 pages

13. TCP

13. TCP

28 pages

6. IPv6

6. IPv6

81 pages

CC

CC

74 pages

Load more
Download 4. Internet-Design-Papers
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view 4. Internet-Design-Papers and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view 4. Internet-Design-Papers 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?