• 沒有找到結果。

Network Protocols: Design and Analysis-Introduction

N/A
N/A
Protected

Academic year: 2021

Share "Network Protocols: Design and Analysis-Introduction"

Copied!
74
0
0

加載中.... (立即查看全文)

全文

(1)

Network Protocols:

Design and Analysis

Polly Huang EE NTU

http://cc.ee.ntu.edu.tw/~phuang phuang@cc.ee.ntu.edu.tw

(2)

Introduction

[Hanson99a] [Jamin97b]

(3)

What you’re up against

• 40 papers

– about 3 per class (!)

– plus supplementary if you want :-)

• Written for experts

• Written for the time (not now)

• All having to show how cool they are

– as opposed to a completely objective overview

(4)

What’s on your side

• Some overview in lectures

• Discussion with peers

– Reading groups are good!

• Use context

– Related papers, reference textbook, own

background

(5)
(6)

Hints: In the Reading

• Skim first, then read in depth

– Abstract

– Introduction – Conclusion

• While going through the paper, takes notes

– Highlight key-words/phrases/sentences – Numerate points

(7)

Hints: After Reading

• Write a 1-2 paragraph summary

• Keep a database (bibilography) of all your papers

– Authors, paper title, publisher, date, location – List of keywords

– Your summary/assessment of the papers – Location of your on-line copy

• Good for a research-oriented career

– Will save lots of time when you write a paper

(8)
(9)

Telling Good from Bad

• New idea

– Really new? how do you know?

– Related work & context

• The problem

– Clearly stated?

• Evaluation

– Do their experiments back up their claims?

– Are their experiments statistically sound?

(10)

On the Review Forms

• Novelty

– New idea

• Clarity

– The problem

• Reality (practicality)

– Evaluation

• Importance, significance, relevance

(11)

OK for Beginners

• Clarity

– Easiest

– Judging the writing

• Evaluation

– Easy

(12)

Challenging for the Advanced

• Novelty

– Hard

– Need to follow/read enough papers in the area

• Importance

– Hardest

(13)
(14)

Kinds of Papers

• Idea papers

– Better have good insight into something! implementabl e?

• Systems papers

– Is their system really new? solid? insight? lessons? alt ernatives?

• Analysis papers

– Are their models clean? relevant?

(15)

Context

• SOSP is a top OS conference

– SIGCOMM, SIGMETRICS, MOBILCOM

• Give guidance to writers about

systems

papers

(16)

Trying to Address 2 Questions

• What makes a paper important?

• What makes a paper clear?

– This should not over-shadow the technical

merit

– It, however, may influence (sometimes

critically) the reviewer’s impression on the

paper

(17)

About Importance

• Novelty

– Idea new and original

• Practicality

– Applicable, implementable, deployable

– For system papers, yes

(18)

And Impact Factor

• Lessons learned

• New problems identified

• Previous results contradicted

• Things changed

– For a lot of people

(19)

About Clarity

• Clearly states

lessons learned

– Reasoning (why, not just what)

• Puts results in

context

– Related work, premise

• Avoids extra baggage

– Irrelevant technical details

(20)

The Communication Interface

• Clear presentation

– Organization, good abstract

• Good writing

(21)

If you are writing…

• Think the criteria

– Novelty, reality, impact, and clarity

• My advise to this class

– Start from Clarity

– English is the bottleneck for most of you – Practice makes perfect

– Without this, the organization, sometimes even the work could well be effort in vain

– When this is done reasonably well, your advisor will be able to help you with the rest

(22)

Theory vs. Implementation

• Theory is incredibly important

– Can predict general results – Help understand systems

• Implementation is incredibly important

– Explore real-world constraints (sometimes abstracted away in theory)

(23)

Embrace Them Both

• Best papers tend to have

both

• Neither

is sufficient

– (some) assumptions in the theory are not all that realistic

– Ex. Ethernet cannot reach more than 36% utilization [but it fails to consider higher levels]

– (some) systems work is just trees, no forest

– Ex. distributed.net broke the RC5-64 challenge in 1757 [but what does that say about security in general]

(24)

This’s Why Teamwork is Good

• Some are

– good at grasp symbols, abstract notations

– keen in detecting patterns in random

phenomena

– experienced in implementations

(25)

Science vs. Engineering

• The roles of science and engineering in networking

and systems

• Huge amount of engineering (“construction”)

– What can we really build?

– Ex. Napster or WWW were engineering triumphs

• Really important science (“discovery”)

– The Internet is a complex system with many interactions we don’t understand

(26)
(27)
(28)

The Internet

(29)
(30)

A 1999 Internet ISP Map

[data courtesy of Ramesh Govindan a

(31)

The Internet, Posterized, Circa 2000

[data courtesy of U CSD’s caida]

(32)

Internet Development Mantra

“We reject kings, presidents and voting. We

believe in rough consensus and running

code.”

- Dave Clark

(33)

Glimpses of the Future?

http://www.picoweb.net/ (an 8-bit web server with Et

hernet) a sensor network

(tracking the truck)

cell-phones: millions of IP-enabled handsets today UCB mote: an 8-bit sensor node

with non-IP based networking home entertainment: Onkyo’s network-enabled stereo receiver USC Robo-Mote

[Rahimi, Sukhatme, et al., 2002]

(34)

Some Definitions

• Host: computer, desktop, PDA, light switch, etc.

(also a node)

• Link: path followed by bits.

– Wire or wireless

– Broadcast, point-to-point, and in-between

• Switch: moves bits between alternate links

– Packet switching: stateless, store and forward – Circuit switching: stateful, cut through

(35)

Networks

Point-to-Point Multiple Access

wired or wireless

(36)

Internetworks

– Two or more nodes connected by a link, or

– Two or more networks connected by two or more nodes

(37)

The Global Network

• Structure

– Getting started – What and where? – Getting data there

(38)

Getting started: A Host

• Host configuration needs:

– a physical network cable (Ethernet, etc.) – an IP address

– a network mask – a gateway

– a DNS server (and other servers) – 2003: a mail server

(39)

Getting started: A Network

• Network configuration needs:

– a wire (from the phone or cable company) – a router

– a firewall, a IP sharing or NAT machine? – an ISP to connect you to the Internet

– network addresses (192.168.1.xxx)—a subnet

– plus whatever servers you want (DHCP, DNS, Email)

(40)

Getting started: An ISP

• ISP needs:

– a big block of addresses

– connections to one or more other ISPs, peerings

– multiple routers, probably at exchange point (a POP or MAE)

– servers for your users: mail, web, etc. – servers for you: monitoring, etc.

(41)

Idealized Network Structure

Backbones

Regionals

(42)

The Global Network

• Structure

– Getting started

– What and where? – Getting data there

(43)

How Do Computers Find Each Other?

Internet

(44)

Different Kinds of Addresses

• Will talk about names, addresses, binding in

[Saltzer81a]

• For now, what are names and addresses in t

he Internet?

– URL/URNs: http://www.isi.edu

– Domain names www.isi.edu

(45)

Finding IP Address:

Domain Naming System (DNS)

Local DNS server

What’s the IP address for www.usc.edu?

Computer 1

It is 128.125.19.146

How does computer 1 know its address? either hard-coded, or gets it at boot time w/DHCP

How does the server know

computer 1’s address? usually hard-coded, or via DNS

(46)

Finding Ether Address:

Address Resolution (ARP)

Ethernet

Broadcast: who knows the

Ethernet address for 128.125.51.41?

(47)

Finding Things:

The USER’s Perspective

• http://cc.ee.ntu.edu.tw/~phuang/teach/net-protocol-fal

l-03/

– http a protocol

– cc.ee.ntu.edu.twa web server name

– ~phuang/…fall-03/ a path on that server

• Beware:

– names vs. addresses at multiple layers

• Alternatively, using a search engine

(48)

The Global Network

• Structure

– Getting started – What and where? – Getting data there

(49)

Packet Traveling Through the Internet

R R R R R H H H H R R H R

Routers send packet to next closest hop

H: Hosts R: Routers

(50)

How do the routers know

where to send data?

• Forwarding tables

at each router populated

by

routing protocols

.

– Routing tables optimize distance

– Subject also to policies

(51)

Why do the packets get there?

(Internet Economics 101)

Backbones

Regionals

Campus LANs When you get IP connectivity,

you pay someone, who pays someone, who… a

client-provider relationship

At higher levels, ISPs establish

peering relationships with each

other. They occasionally do

(52)

The Global Network

• Structure

– Getting started – What and where? – Getting data there

(53)

Network Metrics

• Bandwidth

– Transmission capacity

– A.k.a. How many bits can fit in a section of a link?

• Delay

– Queuing delay

– Propagation delay (limited by the c)

• Delay-bandwidth product

(54)
(55)

The Considerations

For designing or engineering

the Internet

(56)
(57)
(58)

But

scale

in what sense?

• Numbers of hosts • Amount bandwidth to each host • Number of concurrent users • Kinds of applications • Numbers of links • Number of independent • Globally routable • Geographic distance • Versions of hw, sw • App needs (QoS, etc.)

• Levels of trust/admin bou ndaries

• Hardware price-points • … etc.

(59)
(60)

Application

Considerations

• Application input to network: traffic…

– data rate

– pattern (bursty or constant bit rate)

– destination (multipoint or single destination, mobile or fixed)

• Network service delivered to application

– delay, jitter sensitivity – loss sensitivity

(61)

Reliable File Transfer

• Loss sensitive

• Not delay sensitive relative to round trip

times

• Point-to-point or multipoint

• Bursty

(62)

Remote Login

• Loss sensitive

• Delay sensitive

– Subject to interactive constraints

– Can tolerate up to several hundreds of

milliseconds

(63)

Network Audio

• Relatively low bandwidth

– Digitized samples, packetized

• Delay variance sensitive

• Loss tolerant

• Possibly multipoint, long duration sessions

– Natural limit to number of simultaneous sender

s

(64)

Network Video

• High bandwidth

• Compressed video, bursty

• Loss tolerance function of compression

• Delay tolerance a function of interactivity

• Possibly multipoint

(65)

Web

• Transactional traffic

– Short requests, possibly large responses

• Loss (bug?) tolerant

• Delay sensitive

– Human interactivity

(66)

Robustness

• Becoming a critical issue

– cf. the microsoft memo about “trusted computin

g” (security robustness)

– phone networks promise “5 nines” of reliability

: 99.999% uptime

• (= 5 minutes of outage per year

(67)

Network Failures

• Packet loss

– queue overflows (due to congestion)

– transmission noise

• Node or link failures

• Routing transients or failures

• Application-level service failures

• Some failure (ex. congestive loss) is

(68)

(Lack of) Security in the

Network

• Many things are too easy:

– eavesdropping: credit card numbers, or passwords in pa ckets

– using other people’s resources: worms, DDoS

– breaking into machines: software bugs, poor configurati on, Trojan horses

– other things? physical security, social engineering

• But strong security is possible

(69)

Engineering Trade-offs

Network can be engineered to provide:

• Reliability

• Low delay / high bandwidth

• Low cost

(70)

Some Backsliding About Robustness

• NAT boxes

• Application-level gateways

• Layer-3 caches

• User tweaking

• All violate the end-to-end principle, and can

(71)

How does

technology

affect the net?

• Technology drives much of the Internet

• Although marketing and politics also have

influence

(72)

Examples

• Telecom-considering voice-over-IP

• Video-on-demand (tech OK, market demand not)

• Getting Internet to “grandma” pushed DHCP and autoconfig • New protocols (web, Napster) change usage patterns (and ult

imately industries)

• New devices (handsets) enables SMS messaging

• Wireless/802.11 enables new modes of operation (wireless “ hot spots”)

• Streaming music => the Internet in your stereo

(73)

Conclusion

• The terminology

• The global network

– Entities

– Connectivity – Transportation

• The design considerations

– Scale

– Application – Robustness – Technology

(74)

參考文獻

相關文件

化學風化作用(Chemical Weathering) :係岩石被溶解、氧化及

The original curriculum design for the Department of Construction Engineering of CYUT was to expose students to a broad knowledge in engineering and applied science rather than

In these lessons, students will evaluate the impacts of genetic engineering on our daily life, and analyze the moral issues raised in its development, especially those related

Teacher / HR Data Payroll School email system Exam papers Exam Grades /.

Classifying sensitive data (personal data, mailbox, exam papers etc.) Managing file storage, backup and cloud services, IT Assets (keys) Security in IT Procurement and

The roles of school management and technical support staff on implementing information and network security measures... Security

 “More Joel on Software : Further Thoughts on Diverse and Occasionally Related Matters That Will Prove of Interest to Software Developers, Designers, and Managers, and to Those

Skype provide better security than most VoIP system and PSTN. – Just because most VoIP system and PSTN do not provide any