<<

CS 280 Lecture 4: Application Layer, , DNS, P2P

John Magee 21 September 2016

Most slides adapted from Kurose and Ross, Networking 7/e Source material copyright 1996-2016 1 J.F Kurose and K.W. Ross Chapter 2: outline

Last Class: 2.1 principles of network Next Class: applications 2.6 video streaming and 2.2 Web and HTTP content distribution networks Today: 2.7 socket programming with UDP and TCP 2.3 electronic • SMTP, POP3, IMAP 2.4 DNS 2.5 P2P applications Application Layer 2-2 outgoing Electronic mail message queue user Three major components: . user agents . mail servers mail user . simple mail transfer agent protocol: SMTP SMTP mail user server agent User Agent SMTP . a.k.a. “mail reader” SMTP user agent . composing, editing, reading mail server mail messages user . e.g., Outlook, Thunderbird, agent iPhone mail user . outgoing, incoming agent messages stored on server Application Layer 2-3 Electronic mail: mail servers

mail servers: user agent . mailbox contains incoming messages for user mail user server . message queue of outgoing agent (to be sent) mail messages SMTP mail user . SMTP protocol between server agent mail servers to send email SMTP messages SMTP user agent • client: sending mail mail server server • “server”: receiving mail user server agent user agent

Application Layer 2-4 Electronic Mail: SMTP [RFC 2821]

. uses TCP to reliably transfer email message from client to server, port 25 . direct transfer: sending server to receiving server . three phases of transfer • handshaking (greeting) • transfer of messages • closure . command/response interaction (like HTTP) • commands: ASCII text • response: status code and phrase . messages must be in 7-bit ASCI

Application Layer 2-5 Scenario: Alice sends message to Bob

1) Alice uses UA to compose 4) SMTP client sends Alice’s message “to” message over the TCP [email protected] connection 2) Alice’s UA sends message 5) Bob’s mail server places the to her mail server; message message in Bob’s mailbox placed in message queue 6) Bob invokes his user agent 3) client side of SMTP opens to read message TCP connection with Bob’s mail server

1 user mail user mail agent agent server server 2 3 4 6 5 ’ Alice s mail server Bob’s mail server Application Layer 2-6 Sample SMTP interaction

S: 220 hamburger.edu C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 [email protected]... Sender ok C: RCPT TO: S: 250 [email protected] ... Recipient ok C: DATA S: 354 Enter mail, end with "." on a line by itself C: Do you like ketchup? C: How about pickles? C: . S: 250 Message accepted for delivery C: QUIT S: 221 hamburger.edu closing connection

Application Layer 2-7 Try SMTP interaction for yourself:

. servername 25 . see 220 reply from server . enter HELO, MAIL FROM, RCPT TO, DATA, QUIT commands

above lets you send email without using email client (reader)

HOWEVER: Most mail servers now require authentication. WHY?

Application Layer 2-8 SMTP: final words

. SMTP uses persistent comparison with HTTP: connections . HTTP: pull . SMTP requires message (header & body) to be in . SMTP: push 7-bit ASCII . both have ASCII . SMTP server uses command/response CRLF.CRLF to interaction, status codes determine end of message . HTTP: each object encapsulated in its own response message . SMTP: multiple objects sent in multipart message

Application Layer 2-9 Mail message format

SMTP: protocol for exchanging email messages header blank RFC 822: standard for text line message format: . header lines, e.g., • To: body • From: • Subject: different from SMTP MAIL FROM, RCPT TO: commands! . Body: the “message” • ASCII characters only

Application Layer 2-10 Mail access protocols

mail access user SMTP SMTP user agent protocol agent (e.g., POP, IMAP)

sender’s mail receiver’s mail server server . SMTP: delivery/storage to receiver’s server . mail access protocol: retrieval from server • POP: [RFC 1939]: authorization, download • IMAP: Internet Mail Access Protocol [RFC 1730]: more features, including manipulation of stored messages on server • HTTP: , Hotmail, Yahoo! Mail, etc.

Application Layer 2-11 POP3 protocol S: +OK POP3 server ready C: user bob authorization phase S: +OK . client commands: C: pass hungry S: +OK user successfully logged on • user: declare username • pass: password C: list . server responses S: 1 498 • S: 2 912 +OK S: . • -ERR C: retr 1 transaction phase, client: S: . list message numbers S: . list: C: dele 1 . retr: retrieve message by number C: retr 2 S: . dele: delete S: . . quit C: dele 2 C: quit S: +OK POP3 server signing off

Application Layer 2-12 POP3 (more) and IMAP

more about POP3 IMAP . previous example uses . keeps all messages in one POP3 “download and place: at server delete” mode . allows user to organize • Bob cannot re-read e- messages in folders mail if he changes . keeps user state across client sessions: “ . POP3 download-and- • names of folders and keep”: copies of messages mappings between on different clients message IDs and folder . POP3 is stateless across name sessions

Application Layer 2-13 Chapter 2: outline

2.1 principles of network 2.5 P2P applications applications 2.6 video streaming and 2.2 Web and HTTP content distribution 2.3 electronic mail networks • SMTP, POP3, IMAP 2.7 socket programming 2.4 DNS with UDP and TCP

Application Layer 2-14 DNS: people: many identifiers: Domain Name System: • SSN, name, passport # . distributed database Internet hosts, routers: implemented in hierarchy of • IP address (32 bit) - many name servers used for addressing . application-layer protocol: hosts, datagrams name servers communicate to • “name”, e.g., resolve names (address/name www.yahoo.com - translation) used by humans • note: core Internet function, Q: how to map between IP implemented as application- address and name, and layer protocol vice versa ? • complexity at network’s “edge”

Application Layer 2-15 DNS: services, structure DNS services why not centralize DNS? . hostname to IP address . single point of failure translation . traffic volume . host aliasing . distant centralized database • canonical, alias names . maintenance . mail server aliasing . load distribution A: doesn‘t scale! • replicated Web servers: many IP addresses correspond to one name

Application Layer 2-16 DNS: a distributed, hierarchical database

Root DNS Servers

… …

com DNS servers org DNS servers edu DNS servers

clarku.edu holycross.edu yahoo.com pbs.org amazon.com DNS serversDNS servers DNS servers DNS servers DNS servers

client wants IP for www.amazon.com; 1st approximation: . client queries root server to find com DNS server . client queries .com DNS server to get amazon.com DNS server . client queries amazon.com DNS server to get IP address for www.amazon.com

Application Layer 2-17 DNS: root name servers

. contacted by local name server that can not resolve name . root name server: • contacts authoritative name server if name mapping not known • gets mapping • returns mapping to local name server

c. Cogent, Herndon, VA (5 other sites) d. U Maryland College Park, MD k. RIPE London (17 other sites) h. ARL Aberdeen, MD j. Verisign, Dulles VA (69 other sites ) i. Netnod, Stockholm (37 other sites) e. NASA Mt View, CA m. WIDE Tokyo f. Internet Software C. (5 other sites) Palo Alto, CA (and 48 other sites) a. Verisign, Los Angeles CA 13 logical root name (5 other sites) “servers” worldwide b. USC-ISI Marina del Rey, CA l. ICANN Los Angeles, CA •each “server” replicated (41 other sites) g. US DoD Columbus, many times OH (5 other sites)

Application Layer 2-18 TLD, authoritative servers top-level domain (TLD) servers: • responsible for com, org, net, edu, aero, jobs, museums, and all top-level country domains, e.g.: uk, fr, ca, jp • Network Solutions maintains servers for .com TLD • Educause for .edu TLD authoritative DNS servers: • organization’s own DNS server(s), providing authoritative hostname to IP mappings for organization’s named hosts • can be maintained by organization or service provider

Application Layer 2-19 Local DNS name server

. does not strictly belong to hierarchy . each ISP (residential ISP, company, university) has one • also called “default name server” . when host makes DNS query, query is sent to its local DNS server • has local cache of recent name-to-address translation pairs (but may be out of date!) • acts as proxy, forwards query into hierarchy

Application Layer 2-20 DNS name root DNS server resolution example 2 . 3 host at TLD DNS server magee.clarku.edu wants 4 IP address for gaia.cs.umass.edu 5 local DNS server iterated query: cube.clarku.edu . contacted server 7 6 replies with name of 1 8 server to contact authoritative DNS server . “I don’t know this dns.cs.umass.edu name, but ask this requesting host server” magee.clarku.edu

gaia.cs.umass.edu

Application Layer 2-21 DNS name root DNS server resolution example 2 3 7 recursive query: 6 . puts burden of name TLD DNS resolution on server contacted name local DNS server server cube.clarku.edu 5 4 . heavy load at upper 1 8 levels of hierarchy? authoritative DNS server dns.cs.umass.edu requesting host magee.clarku.edu

gaia.cs.umass.edu

Application Layer 2-22 Try it yourself:

DNS Utility: nslookup

Example: nslookup www.clarku.edu Will use the default DNS server.

nslookup www.clarku.edu 8.8.8.8 Will use Google’s DNS server at 8.8.8.8

Check the command line for options.

Application Layer 2-23 DNS: caching, updating records

. once (any) name server learns mapping, it caches mapping • cache entries timeout (disappear) after some time (TTL) • TLD servers typically cached in local name servers • thus root name servers not often visited . cached entries may be out-of-date (best effort name-to-address translation!) • if name host changes IP address, may not be known Internet-wide until all TTLs expire . update/notify mechanisms proposed IETF standard • RFC 2136

Application Layer 2-24 DNS records

DNS: distributed database storing resource records (RR)

RR format: (name, value, type, ttl)

type=A type=CNAME . is hostname name . name is alias name for some “ ” . value is IP address canonical (the real) name type=NS . www.ibm.com is really • name is domain (e.g., servereast.backup2.ibm.com foo.com) . value is canonical name • value is hostname of authoritative name type=MX server for this domain . value is name of mailserver associated with name

Application Layer 2-25 DNS protocol, messages

. query and reply messages, both with same message

format 2 bytes 2 bytes message header identification flags . identification: 16 bit # for # questions # answer RRs query, reply to query uses # authority RRs # additional RRs same # . flags: questions (variable # of questions) . query or reply . recursion desired answers (variable # of RRs) . recursion available . reply is authoritative authority (variable # of RRs)

additional info (variable # of RRs)

Application Layer 2-26 DNS protocol, messages

2 bytes 2 bytes

identification flags

# questions # answer RRs

# authority RRs # additional RRs name, type fields for a query questions (variable # of questions)

RRs in response answers (variable # of RRs) to query records for authoritative servers authority (variable # of RRs) “ ” additional helpful additional info (variable # of RRs) info that may be used

Application Layer 2-27 Inserting records into DNS

. example: new startup “Network Utopia” . register name networkuptopia.com at DNS registrar (e.g., Network Solutions) • provide names, IP addresses of authoritative name server (primary and secondary) • registrar inserts two RRs into .com TLD server: (networkutopia.com, dns1.networkutopia.com, NS) (dns1.networkutopia.com, 212.212.212.1, A) . create authoritative server type A record for www.networkuptopia.com; type MX record for networkutopia.com

Application Layer 2-28 Attacking DNS

DDoS attacks redirect attacks . bombard root servers . man-in-middle with traffic • Intercept queries • not successful to date . DNS poisoning • traffic filtering . Send bogus relies to • local DNS servers cache DNS server, which IPs of TLD servers, caches allowing root server exploit DNS for DDoS bypass . . bombard TLD servers send queries with spoofed source • potentially more dangerous address: target IP . requires amplification

Application Layer 2-29 Chapter 2: outline

2.1 principles of network 2.5 P2P applications applications 2.6 video streaming and 2.2 Web and HTTP content distribution 2.3 electronic mail networks • SMTP, POP3, IMAP 2.7 socket programming 2.4 DNS with UDP and TCP

Application Layer 2-30 Pure P2P architecture

. no always-on server . arbitrary end systems directly communicate . peers are intermittently connected and change IP addresses examples: • file distribution (BitTorrent) • Streaming (KanKan) • VoIP ()

Application Layer 2-31 File distribution: client-server vs P2P

Question: how much time to distribute file (size F) from one server to N peers? • peer upload/download capacity is limited resource

us: server upload capacity

d : peer i download u i file, size F 1 d1 capacity us u2 d server 2

di uN network (with abundant

bandwidth) ui dN

ui: peer i upload capacity

Application Layer 2-32 File distribution time: client-server

. server transmission: must sequentially send (upload) N F file copies: us d • time to send one copy: F/u i s network • time to send N copies: NF/us ui . client: each client must download file copy

• dmin = min client download rate • min client download time: F/dmin

time to distribute F to N clients using Dc-s > max{NF/us,,F/dmin} client-server approach

increases linearly in N

Application Layer 2-33 File distribution time: P2P

. server transmission: must upload at least one copy F us • time to send one copy: F/us . di client: each client must network download file copy ui

• min client download time: F/dmin . clients: as aggregate must download NF bits

• max upload rate (limiting max download rate) is us + Σui time to distribute F to N clients using DP2P > max{F/us,,F/dmin,,NF/(us + Σui)} P2P approach

increases linearly in N … … but so does this, as each peer brings service capacity

Application Layer 2-34 Client-server vs. P2P: example

client upload rate = u, F/u = 1 hour, us = 10u, dmin ≥ us

3.5 P2P 3 Client-Server 2.5

2

1.5

1

0.5 Minimum Distribution Time Distribution Minimum

0 0 5 10 15 20 25 30 35 N

Application Layer 2-35 P2P file distribution: BitTorrent

. file divided into 256Kb chunks . peers in torrent send/receive file chunks

tracker: tracks peers torrent: group of peers participating in torrent exchanging chunks of a file

Alice arrives … … obtains list of peers from tracker … and begins exchanging file chunks with peers in torrent

Application Layer 2-36 P2P file distribution: BitTorrent

. peer joining torrent: • has no chunks, but will accumulate them over time from other peers • registers with tracker to get list of peers, connects to subset of peers (“neighbors”) . while downloading, peer uploads chunks to other peers . peer may change peers with whom it exchanges chunks . churn: peers may come and go . once peer has entire file, it may (selfishly) leave or (altruistically) remain in torrent

Application Layer 2-37 BitTorrent: requesting, sending file chunks requesting chunks: sending chunks: tit-for-tat . at any given time, different . Alice sends chunks to those peers have different subsets four peers currently sending her of file chunks chunks at highest rate . periodically, Alice asks each • other peers are choked by Alice peer for list of chunks that (do not receive chunks from her) they have • re-evaluate top 4 every10 secs . Alice requests missing . every 30 secs: randomly select chunks from peers, rarest another peer, starts sending first chunks • “optimistically unchoke” this peer • newly chosen peer may join top 4

Application Layer 2-38 BitTorrent: tit-for-tat

(1) Alice “optimistically unchokes” Bob (2) Alice becomes one of Bob’s top-four providers; Bob reciprocates (3) Bob becomes one of Alice’s top-four providers

higher upload rate: find better trading partners, get file faster !

Application Layer 2-39 Chapter 2: summary our study of network apps now complete!

. application architectures . specific protocols: • client-server • HTTP • P2P • S M T P, P O P, I M A P . application service requirements: • DNS • reliability, bandwidth, delay • P2P: BitTorrent . Internet transport service . video streaming, CDNs model . socket programming: connection-oriented, • TCP, UDP sockets reliable: TCP • unreliable, datagrams: UDP

Application Layer 2-40 Chapter 2: summary most importantly: learned about protocols!

. typical request/reply important themes: message exchange: . control vs. messages • client requests info or service • in-band, out-of-band • server responds with . centralized vs. decentralized data, status code . stateless vs. stateful . message formats: . reliable vs. unreliable message • headers: fields giving info about data transfer • data: info(payload) . “complexity at network being communicated edge”

Application Layer 2-41