CS 640 Introduction to Computer Networks Today's Lecture
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
David D. Clark
Designs for an Internet David D. Clark Dra Version 3.0 of Jan 1, 2017 David D. Clark Designs for an Internet Status is version of the book is a pre-release intended to get feedback and comments from members of the network research community and other interested readers. Readers should assume that the book will receive substantial revision. e chapters on economics, management and meeting the needs of society are preliminary, and comments are particularly solicited on these chapters. Suggestions as to how to improve the descriptions of the various architectures I have discussed are particularly solicited, as are suggestions about additional citations to relevant material. For those with a technical background, note that the appendix contains a further review of relevant architectural work, beyond what is in Chapter 5. I am particularly interesting in learning which parts of the book non-technical readers nd hard to follow. Revision history Version 1.1 rst pre-release May 9 2016. Version 2.0 October 2016. Addition of appendix with further review of related work. Addition of a ”Chapter zero”, which provides an introduction to the Internet for non-technical readers. Substantial revision to several chapters. Version 3.0 Jan 2017 Addition of discussion of Active Nets Still missing–discussion of SDN in management chapter. ii 178 David D. Clark Designs for an Internet A note on the cover e picture I used on the cover is not strictly “architecture”. It is a picture of the Memorial to the Mur- dered Jews of Europe, in Berlin, which I photographed in 2006. -
List of Internet Pioneers
List of Internet pioneers Instead of a single "inventor", the Internet was developed by many people over many years. The following are some Internet pioneers who contributed to its early development. These include early theoretical foundations, specifying original protocols, and expansion beyond a research tool to wide deployment. The pioneers Contents Claude Shannon The pioneers Claude Shannon Claude Shannon (1916–2001) called the "father of modern information Vannevar Bush theory", published "A Mathematical Theory of Communication" in J. C. R. Licklider 1948. His paper gave a formal way of studying communication channels. It established fundamental limits on the efficiency of Paul Baran communication over noisy channels, and presented the challenge of Donald Davies finding families of codes to achieve capacity.[1] Charles M. Herzfeld Bob Taylor Vannevar Bush Larry Roberts Leonard Kleinrock Vannevar Bush (1890–1974) helped to establish a partnership between Bob Kahn U.S. military, university research, and independent think tanks. He was Douglas Engelbart appointed Chairman of the National Defense Research Committee in Elizabeth Feinler 1940 by President Franklin D. Roosevelt, appointed Director of the Louis Pouzin Office of Scientific Research and Development in 1941, and from 1946 John Klensin to 1947, he served as chairman of the Joint Research and Development Vint Cerf Board. Out of this would come DARPA, which in turn would lead to the ARPANET Project.[2] His July 1945 Atlantic Monthly article "As We Yogen Dalal May Think" proposed Memex, a theoretical proto-hypertext computer Peter Kirstein system in which an individual compresses and stores all of their books, Steve Crocker records, and communications, which is then mechanized so that it may Jon Postel [3] be consulted with exceeding speed and flexibility. -
NSFNET: the Partnership That Changed the World
NSFNET: The Partnership that Changed the World Celebrating 20 Years of Internet Innovation and Progress November 29-30, 2007 Crystal Gateway Marriott, Arlington, Virginia Contents: Event Supporters 2 Program at a Glance 3 Detailed Agenda 4 - 8 Speaker Biographies 9 - 16 NSFNET: The Partnership that Changed the World 1 The organizers wish to thank the following organizations for supporting this event: Advanced Network & Services, Inc. www.advanced.org Cisco Systems, Inc. www.cisco.com IBM www.ibm.com Internet2 www.internet2.edu Juniper Networks www.juniper.net Merit Network, Inc. www.merit.edu National Science Foundation www.nsf.gov 2 Program at a Glance (see pages 4 - 8 for detailed program) Thursday, November 29, 2007 - General Program 7:30 - 8:30 a.m. Registration and Continental Breakfast 8:30 - 9:15 Welcome Speakers: Eric M. Aupperle and Jane Caviness The Internet History Archive Speaker: Doug Gale Introductory Comments Speaker: John H. Marburger, III Keynote - NSFNET: The Phenomenon Speaker: Douglas E. Van Houweling 9:20 - 10:35 Panel - NSFNET: The Beginnings Moderator: Lawrence Landweber 10:35 - 11:00 Break 11:00 - 11:55 Panel - NSFNET: The Solicitation & The Merit Partnership Moderator: Jane Caviness 11:55 - 12:45 Lunch 12:45 - 1:45 Panel - NSFNET: The T1—The Internet Comes of Age Moderator: Eric M. Aupperle 1:50 - 2:50 Panel - NSFNET: The T3 Backbone Service—The Internet Matures Moderator: Allan H. Weis 2:50 - 3:15 Break 3:15 - 4:35 Panel - NSFNET: The Community Moderator: Doug Gale 4:40 - 5:30 Panel - NSFNET: The Impact on Research and Science Moderator: George O. -
Computer Networking: a Top-Down Approach, 7Th Edition
Computer Networking A Top-Down Approach Seventh Edition James F. Kurose University of Massachusetts, Amherst Keith W. Ross NYU and NYU Shanghai Boston Columbus Indianapolis New York San Francisco Hoboken Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President, Editorial Director, ECS: Marcia Horton Acquisitions Editor: Matt Goldstein Editorial Assistant: Kristy Alaura Vice President of Marketing: Christy Lesko Director of Field Marketing: Tim Galligan Product Marketing Manager: Bram Van Kempen Field Marketing Manager: Demetrius Hall Marketing Assistant: Jon Bryant Director of Product Management: Erin Gregg Team Lead, Program and Project Management: Scott Disanno Program Manager: Joanne Manning and Carole Snyder Project Manager: Katrina Ostler, Ostler Editorial, Inc. Senior Specialist, Program Planning and Support: Maura Zaldivar-Garcia Cover Designer: Joyce Wells Manager, Rights and Permissions: Ben Ferrini Project Manager, Rights and Permissions: Jenny Hoffman, Aptara Corporation Inventory Manager: Ann Lam Cover Image: Marc Gutierrez/Getty Images Media Project Manager: Steve Wright Composition: Cenveo Publishing Services Printer/Binder: Edwards Brothers Malloy Cover and Insert Printer: Phoenix Color/ Hagerstown Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright © 2017, 2013, 2010 Pearson Education, Inc. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearsoned.com/permissions/. -
Computer Networking a Top-Down Approach 6Th Edition
COMPUTER SIXTH EDITION NETWORKING A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Art Director, Cover: Anthony Gemmellaro Marcia Horton Art Coordinator: Janet Theurer/ Editor in Chief: Michael Hirsch Theurer Briggs Design Editorial Assistant: Emma Snider Art Studio: Patrice Rossi Calkin/ Vice President Marketing: Patrice Jones Rossi Illustration and Design Marketing Manager: Yez Alayan Cover Designer: Liz Harasymcuk Marketing Coordinator: Kathryn Ferranti Text Designer: Joyce Cosentino Wells Vice President and Director of Production: Cover Image: ©Fancy/Alamy Vince O’Brien Media Editor: Dan Sandin Managing Editor: Jeff Holcomb Full-Service Vendor: PreMediaGlobal Senior Production Project Manager: Senior Project Manager: Andrea Stefanowicz Marilyn Lloyd Printer/Binder: Edwards Brothers Manufacturing Manager: Nick Sklitsis Cover Printer: Lehigh-Phoenix Color Operations Specialist: Lisa McDowell This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the pub- lisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or like- wise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290. -
Operating Systems and Networks Networks Part 1
Welcome! Operating Systems and Networks • Brief introduction of lecturer and TAs – Adrian Perrig, Professor in Department of Computer Science, Director of Network Security Group – Exercise sessions: David Barrera (PhD), Raphael Reischuk (PhD) – Labs / homeworks: Tae-Ho Lee, Chris Pappas Networks Part 1: Introduction – Network security group research area: design and implementation of secure future Internet architecture (SCION project http://www.scion-ar c hit e ct ur e .ne t ) Adrian Perrig Network Security Group ETH Zürich 2 Course Structure Lecture Style • Lectures • Student interaction is encouraged! • Homework – Please ask questions if something is unclear • Projects – Please point out any errors that you spot – • Exercise sessions Please focus on lecture instead of facebook, twitter, etc. • Quizzes • Please turn off cell phone and Wi F i during class 3 4 Minds open… … Laptops closed and cell phones / ipads off 6 Textbook and Slide Credit Problems with Being On-line During Class • Textbook: TANENBAUM, ANDREW S.; WETHERALL, DAVID J., COMPUTER NETWORKS, 5th Edition, 2011. • It takes the mind a few minutes to reach a state of deep • Slides adapted from slide deck by David Wetherall concentration • Lecture video at: – Reaching deep concentration needs to be trained, many people http://media.pearsoncmg.com/ph/streaming/esm/tanenbaum5e_videon have lost this ability due to constant / frequent interruptions otes/tanenbaum_videoNotes.html • Knowing that one cannot be interrupted increases concentration. Said another way: Expectation of interruption prevents deep concentration – Try to be off-line when studying networking! • Open laptop / iPad / cell phone used for surfing can also disrupt / interrupt people sitting behind you 7 Highly Recommended as Reference Also recommended • Larry L. -
The Value of Repeatable Experiments and Negative Results
The value of repeatable experiments and negative results Dave Täht Bufferbloat.net Sigcomm CCW th Aug 18 , 2014 Installing netperf-wrapper ● Linux (debian or ubuntu) – sudo apt-get install python-matplotlib python-qt4 fping subversion git-core – git clone https://github.com/tohojo/netperf-wrapper.git – cd netperf-wrapper; sudo python setup.py install – See the readme for other dependencies.(netperf needs to be compiled with –enable-demo) ● OSX – Requires macports or brew, roughly same sequence ● Data Set: http://snapon.lab.bufferbloat.net/~d/datasets/ ● This slide set: http://snapon.lab.bufferbloat.net/~d/sigcomm2014.pdf Bufferbloat.net Resources Reducing network delays since 2011... Bufferbloat.net: http://bufferbloat.net Email Lists: http://lists.bufferbloat.net (codel, bloat, cerowrt-devel, etc) IRC Channel: #bufferbloat on chat.freenode.net Codel: https://www.bufferbloat.net/projects/codel CeroWrt: http://www.bufferbloat.net/projects/cerowrt Other talks: http://mirrors.bufferbloat.net/Talks Jim Gettys Blog: http://gettys.wordpress.com Google for bloat-videos on youtube... Netperf-wrapper test suite: https://github.com/tohojo/netperf-wrapper “Reproducible” vs “Repeatable” Experiments ● Researcher MIGHT be ● Researcher MUST be easily able to repeat experiment repeat the experiment in in light of new data. light of new data. ● Reviewer SHOULD be able ● Reviewer typically lacks to re-run the experiment time to reproduce. and inspect the code. ● Reader MIGHT be able, ● Reader SHOULD be able from the descriptions in from the code and data the paper, reproduce the supplied by the research, result, by rewriting the repeat the experiment code from scratch. quickly and easily. What's wrong with reproducible? ● Coding errors are terribly ● You have 30 seconds to get common – code review is my attention. -
ACM SIGARCH Order # Is 415972. IEEE Computer Society Press Order # Is RS00160
ACM SIGARCH Order # is 415972. IEEE Computer Society Press Order # is RS00160. ISBN: 0-89791-985-8 Copies may be ordered from ACM Member Services: 1-800-342-6626 (U.S. and Canada) +1 212-626-0500 (Global) +1 212-944-1318 (Fax) Email: [email protected] Online: http://www.acm.org/catalog The SC97 Technical Program, presented Tuesday through Friday, November 18-21, includes both plenary and parallel sessions. The parallel sessions have been organized to ensure that topics of interest to a wide range of audiences are available during these times. The parallel tracks are divided into two components as follows: Presentations by authors of contributed papers. These represent the very best papers submitted to the conference. Each has been through a competitive peer review process and has been selected as an outstanding contribution. There will be a total of 57 technical papers presented at SC97. Topics of general interest in a wide variety of areas. Sessions will include invited talks on a variety of subjects, presented by an impressive array of experts, as well as panel discussions that are sure to engage attendees' interest. Tuesday, November 18 -- 10:30am-noon [Room B1] Communication in Clusters Session Chair: David Culler, University of California, Berkeley 1. The Effects of Communication Parameters on End Performance of Shared Virtual Memory Clusters Angelos Bilas, Jaswinder Pal Singh, Princeton University 2. FM-QoS: Real-time Communication Using Self-synchronizing Schedules Kay H. Connelly, Andrew A. Chien, University of Illinois at Urbana-Champaign 3. Multi-protocol Active Messages on a Cluster of SMPs Steven S. -
The Evolution of Internet Congestion
The Evolution of Internet Congestion Steven Bauer 1, David Clark 2, William Lehr 3 Massachusetts Institute of Technology Abstract This paper discusses the evolution of the congestion controls that govern all Internet traffic. In particular we chronicle and discuss the implications of the fact that the most significant "congestion signals" are increasingly coming from network operators, not the TCP stack. Providers now nudge users into different traffic patterns using a variety of new technical and non-technical means. These 'network-based congestion management' techniques include volume-based limits and active traffic management of best effort traffic. The goal and effect of these techniques differs from the historically coveted flow-rate fairness of TCP, provoking some in the technical and policy community to question the appropriateness of such deviations, and feeding debates over network management and network neutrality. To appropriately evaluate emerging trends in congestion control, it is useful to understand how congestion control has evolved in the Internet, both with respect to its intellectual history within the technical community and with respect to the changing traffic/industry environment in which the Internet operates. This is important because a sophisticated and nuanced view of congestion and its management is necessary for good public policy in this space. We conclude the paper with a discussion of the policy implications and questions raised by the continual evolution of congestion. 1. Introduction The phenomenal growth of the Internet in terms of the volume of economic activity and traffic it carries over the past fifty years represents a remarkable example of the scalability of the Internet architecture, which in spite of the growth, remains in many respects, fundamentally unchanged. -
Protocol Layering and Internet Policy
ARTICLE PROTOCOL LAYERING AND INTERNET POLICY CHRISTOPHER S. YOO† An architectural principle known as protocol layering is widely recognized as one of the foundations of the Internet’s success. In addition, some scholars and industry participants have urged using the layers model as a central organizing principle for regulatory policy. Despite its importance as a concept, a comprehensive analysis of protocol layering and its implications for Internet policy has yet to appear in the literature. This Article attempts to correct this omission. It begins with a detailed description of the way the five-layer model developed, introducing protocol layering’s central features, such as the division of functions across layers, infor- mation hiding, peer communication, and encapsulation. It then discusses the model’s implications for whether particular functions are performed at the edge or in the core of the network, contrasts the model with the way that layering has been depicted in the legal commentary, and analyzes attempts to use layering as a basis for competition policy. Next the Article identifies certain emerging features of the Internet that are placing pressure on the layered model, including WiFi routers, network-based security, modern routing protocols, and wireless broadband. These developments illustrate how every architecture inevitably limits functionality as well as the architecture’s ability to evolve over time in response to changes in the † John H. Chestnut Professor of Law, Communication, and Computer & Information Sci- ence and Founding Director of the Center for Technology, Innovation and Competition (CTIC), University of Pennsylvania. I would like to thank the Milton and Miriam Handler Foundation, the New York Bar Foundation, and CTIC for their financial support for this project.