Tutorial
u To understand basic technologies that
Overview of Internet comprise an Internet architecture
Architecture
u To understand unique features of an
Internet architecture
Jun Murai
Keio Univ.
jun@wide.ad.jp
2002/8/5
2002/8/5 11 2002/8/5
2002/8/5 22
KEYWORDS AGENDA
u Best Effort u Introduction
u Scalability u Core technologies of the Internet
u Security
u Operating technologies of the Internet
u Operation
u Communication media and Internet
u Autonomy
architectures
u Distributed
u Technologies for environmental
u Exponential Growth
application
u End System
u Application architecture
2002/8/5
2002/8/5 33 2002/8/5
2002/8/5 44
1
Hierarchical Protocols OSI Model and Internet
u Transmission side:
side:Each layer hands Architecture
data by adding its information to the
lower layer
u Reception side :Each layer hands data Application
by eliminating its information to the Presentation Application
upper layer Data to transmit Session
Protocol overhead Transport TCP UDP
Network IP
Data link Network Interface
Information for
Physical Physical
each layer
2002/8/5
2002/8/5 77 2002/8/5
2002/8/5 88
2002/8/5
2002/8/5 99 2002/8/5
2002/8/5 10
10
B B
A A
2
Network Protocol
u Network layer
Ø IP - Internet Protocol
Core Technologies of u Transport layer
the Internet Ø TCP - Transport Control Protocol
Application Application
Functions of IP IP Address
u Identification of host u 32bi taddress space(IPv4)
space(IPv4)
Ø 32bit identifier
identifier −IP
−IP address u ID to connect to a TCP/IP network
Ø One and only ID in the world
u Determination of a route Ø No duplication allowed
Ø Determine a route from part of IP address Ø Identifies the user and the other party
u Relaying data u Structured address
Ø Serial relay system Ø Consists of a network address to indicate a
u Dividing data network and a host address to indicate a
host
Ø Too large data is divided and re-
re- structured Ø Flexible structure with net mask
Ø Determines a route from the
2002/8/5 15 2002/8/5
network portion 16
2002/8/5 15 2002/8/5 16
11111111111111111111111 000000000
Net mask NO
NO
23bi
t Determines
Determines toto whom
whom Destination
Destination is
is me?
me?
data
data shall
shall be
be relayed
relayed
32bit
Network YES
YES
10111011101010110011010000000000
part
23bi
t Relays
Relays to
to an
an appropriate
appropriate Relays
Relaystotothe
theupper
upperlayer
layer
32bit network
network interface
interface Checking
Checkingthe
thedestination
destinationport
port##
Host part 00000000000000000000000 110011010
2002/8/5 23bi
t 17 2002/8/5 18
2002/8/5 17 2002/8/5 18
3
IP Header ICMP
u Internet Control Message Protocol
u Includes information required for delivery u Compensates functions of IP
of data gram
Ø Non- reachable to the destination, flow
Non-
Ø Transmitter address control
Ø Recipient address Ø Reports an error instead of IP
Ø Data gram length, etc....
u Appended to each data gram Application
4
OSPF Transport Layer
Open Shortest Path Find
u Connects data reached to the machine with the
corresponding application
u Routers within a given site share a same u TCP
database.
u UDP
u A Shortest
Shortest Path Tree is formed using Application
this information.
TCP UDP
u Copes flexibly to changes of a network IP
Network Interface
Physical
2002/8/5
2002/8/5 25
25 2002/8/5
2002/8/5 26
26
TCP
Transmission Control Protocol
u Performs data transmission controls
u Supply of Datagram type communication
Ø IP is a Datagram type communication
u Specific features include......
Ø Datagram type communication requires no new Ø Adds reliability to IP
functions Ø Virtual Circuit type communication
Ø Transport layer identifies applications Ø Error detection and error correction
Ø Identifier is sufficient for identification Ø Flow control
Ø Re--structuring of orders
Re
Ø Supplies data transmission interface
2002/8/5
2002/8/5 29
29 2002/8/5
2002/8/5 30
30
5
End of Connection
Connection Start u Connection is ended with a FIN Flag
Transmitter Recipient u Connection may be ended for each side
2002/8/5
2002/8/5 31
31 2002/8/5
2002/8/5 32
32
2002/8/5
2002/8/5 35
35 2002/8/5
2002/8/5 36
36
6
Congestion control rule1
rule1:Judge from reply Congestion control rule2:
rule2:
Make traffic smaller when congested
Early reply→
reply→ less congested→
congested→transmit more Slow reply
reply→→congested
congested→→ transmit only
a small amount
2002/8/5
2002/8/5 37
37 2002/8/5
2002/8/5 38
38
No reply→
reply→congested
congested→→transmit only Early reply→
reply→ less congested→
congested→transmit slowly
a small amount
2002/8/5
2002/8/5 39
39 2002/8/5
2002/8/5 40
40
2002/8/5
2002/8/5 41
41 2002/8/5
2002/8/5 42
42
7
Names & IP Address DNS
u Computer is suited to handle numerical data
Domain Name System
Ø Computers only require addresses u Manages host names (Ex: mail0.sfc.keio.ac.jp) &
u Man is not good at handling numerical data IP addresses(Ex: 133.200.113.5) mapping
Ø Distributed database of host names & IP
Ø Names are easier to handle than numerical
addresses
data
Ø Has information on all hosts in the world
u Names
Ø May be searched from anywhere in the world
Ø Host names (Ex:
(Ex:mail0 )
Ø Management of hierarchical master information
Ø Organization names (Ex
Ex:
:sfc.keio.ac.jp) Ø Server:
Server :Data form and how to respond
Ø Client:
Client:Contact information and how to contact
wide kei
o j
ais
t cs leland sr DHCPOFFER
DHCPOFFER DHCP
DHCP Client
Client
DHCPREQUEST
DHCPREQUEST
DHCPACK
DHCPACK
sf
c mag Notifies
Notifies network
network addresses,
addresses, etc.
etc.
2002/8/5
2002/8/5 46
46
QoS Intelligence
Quality of Service
toward outside
End system-
system- oriented End
u Quality End Edge system-
system- oriented
Ø Guarantee of “ reachability
reachability””
Ø Guarantee of band width
Ø Guarantee of delay
u Priority-- based control
Priority Core Core
routers routers
Edge Edge
2002/8/5
2002/8/5 47
47 2002/8/5
2002/8/5 48
48
8
Causes of slow Internet Causes of slow Internet
u Delay in reply u Delay in reply
Ø The other party is slow Ø The other party is slow
Ø Route is slow in the middle of it Ø Route is slow in the middle of it
u When the other party is slow u When the other party is slow
Ø The other party is overloaded Ø The other party is overloaded
Ø Too many accesses Ø Too many accesses
Ø Insufficient process capacity Ø Insufficient process capacity
u When route is slow in the middle u When route is slow in the middle
Ø Overflow is occurring in some queue Ø Overflow is occurring in some queue
2002/8/5
2002/8/5 49
49 2002/8/5
2002/8/5 50
50
9
RED
Random Early Detection
u Technology to guarantee transmission of
traffics with higher priority by decreasing Communication media
congestion by delaying less prioritized and Internet
traffics when loads on the router
increases architecture
u Marks or rejects packets in queue
according to their priorities
2002/8/5
2002/8/5 55
55 2002/8/5
2002/8/5 56
56
10