0% found this document useful (0 votes)
111 views

Chapter Presentation

Communication Networks Alberto Leon-Garcia ,Indra Widjaja

Uploaded by

balu51
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views

Chapter Presentation

Communication Networks Alberto Leon-Garcia ,Indra Widjaja

Uploaded by

balu51
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 114

Chapter 2

Applications and
Layered Architectures
Protocols, Services & Layering
OSI Reference Model
TCP/IP Architecture
How the Layers Work Together
Berkeley Sockets
Application Layer Protocols & Utilities
Chapter 2
Applications and
Layered Architectures
Protocols, Services & Layering
Layers, Services & Protocols
 The overall communications process
between two or more machines connected
across one or more networks is very complex
 Layering partitions related communications
functions into groups that are manageable
 Each layer provides a service to the layer
above
 Each layer operates according to a protocol
 Let’s use examples to show what we mean
Web Browsing Application
 World Wide Web allows users to access resources
(i.e. documents) located in computers connected to
the Internet
 Documents are prepared using HyperText Markup
Language (HTML)
 A browser application program is used to access the
web
 The browser displays HTML documents that include
links to other documents
 Each link references a Uniform Resource Locator
(URL) that gives the name of the machine and the
location of the given document
 Let’s see what happens when a user clicks on a link
1. DNS
A. 64.15.247.200

Q. www.nytimes.com?

 User clicks on http://www.nytimes.com/


 URL contains Internet name of machine (www.nytimes.com), but
not Internet address
 Internet needs Internet address to send information to a machine
 Browser software uses Domain Name System (DNS) protocol to
send query for Internet address
 DNS system responds with Internet address
2. TCP ACK

ACK, TCP Connection Request


From: 64.15.247.200 Port 80
To:128.100.11.13 Port 1127

TCP Connection Request


From: 128.100.11.13 Port 1127
To: 64.15.247.200 Port 80

 Browser software uses HyperText Transfer Protocol (HTTP) to send


request for document
 HTTP server waits for requests by listening to a well-known port number
(80 for HTTP)
 HTTP client sends request messages through an “ephemeral port
number,” e.g. 1127
 HTTP needs a Transmission Control Protocol (TCP) connection between
the HTTP client and the HTTP server to transfer messages reliably
3. HTTP Content

200 OK

GET / HTTP/1.1

 HTTP client sends its request message: “GET …”


 HTTP server sends a status response: “200 OK”
 HTTP server sends requested file
 Browser displays document

 Clicking a link sets off a chain of events across the Internet!


 Let’s see how protocols & layers come into play…
Protocols
 A protocol is a set of rules that governs how
two or more communicating entities in a layer
are to interact
 Messages that can be sent and received
 Actions that are to be taken when a certain
event occurs, e.g. sending or receiving
messages, expiry of timers
 The purpose of a protocol is to provide a
service to the layer above
Layers
 A set of related communication functions that can be
managed and grouped together
 Application Layer: communications functions that are
used by application programs
 HTTP, DNS, SMTP (email)
 Transport Layer: end-to-end communications
between two processes in two machines
 TCP, User Datagram Protocol (UDP)
 Network Layer: node-to-node communications
between two machines
 Internet Protocol (IP)
Example: HTTP
 HTTP is an application layer protocol
 Retrieves documents on behalf of a browser
application program
 HTTP specifies fields in request messages
and response messages
 Request types; Response codes
 Content type, options, cookies, …
 HTTP specifies actions to be taken upon
receipt of certain messages
HTTP Protocol

GET
HTTP HTTP
Client Server
Response

 HTTP assumes messages can be exchanged


directly between HTTP client and HTTP server
 In fact, HTTP client and server are processes
running in two different machines across the Internet
 HTTP uses the reliable stream transfer service
provided by TCP
Example: TCP
 TCP is a transport layer protocol
 Provides reliable byte stream service between two
processes in two computers across the Internet
 Sequence numbers keep track of the bytes that have
been transmitted and received
 Error detection and retransmission used to recover
from transmission errors and losses
 TCP is connection-oriented: the sender and receiver
must first establish an association and set initial
sequence numbers before data is transferred
 Connection ID is specified uniquely by
(send port #, send IP address, receive port #, receiver IP address)
HTTP uses service of TCP

HTTP HTTP
client server
Response
GET

Port 1127 Port 80

TCP
GET
Response
TCP 80, 1127 1127, 80TCP
GET
bytes
Response
Example: DNS Protocol
 DNS protocol is an application layer protocol
 DNS is a distributed database that resides in
multiple machines in the Internet
 DNS protocol allows queries of different types
 Name-to-address or Address-to-name
 Mail exchange
 DNS usually involves short messages and so
uses service provided by UDP
 Well-known port 53
Local
Authoritative
Name
Name
Server
Server
1 5 4
2 3
6

Root
Name
Server
 Local Name Server: resolve frequently-used names
 University department, ISP
 Contacts Root Name server if it cannot resolve query
 Root Name Servers: 13 globally
 Resolves query or refers query to Authoritative Name Server
 Authoritative Name Server: last resort
 Every machine must register its address with at least two authoritative
name servers
Example: UDP
 UDP is a transport layer protocol
 Provides best-effort datagram service
between two processes in two computers
across the Internet
 Port numbers distinguish various processes
in the same machine
 UDP is connectionless
 Datagram is sent immediately
 Quick, simple, but not reliable
Summary
 Layers: related communications functions
 Application Layer: HTTP, DNS
 Transport Layer: TCP, UDP
 Network Layer: IP
 Services: a protocol provides a communications
service to the layer above
 TCP provides connection-oriented reliable byte transfer
service
 UDP provides best-effort datagram service
 Each layer builds on services of lower layers
 HTTP builds on top of TCP
 DNS builds on top of UDP
 TCP and UDP build on top of IP
Chapter 2
Applications and
Layered Architectures
OSI Reference Model
Why Layering?
 Layering simplifies design, implementation, and
testing by partitioning overall communications
process into parts
 Protocol in each layer can be designed separately
from those in other layers
 Protocol makes “calls” for services from layer below
 Layering provides flexibility for modifying and
evolving protocols and services without having to
change layers below
 Monolithic non-layered architectures are costly,
inflexible, and soon obsolete
Open Systems Interconnection
 Network architecture:
 Definition of all the layers
 Design of protocols for every layer
 By the 1970s every computer vendor had developed
its own proprietary layered network architecture
 Problem: computers from different vendors could
not be networked together
 Open Systems Interconnection (OSI) was an
international effort by the International Organization
for Standardization (ISO) to enable multivendor
computer interconnection
OSI Reference Model
 Describes a seven-layer abstract reference model
for a network architecture
 Purpose of the reference model was to provide a
framework for the development of protocols
 OSI also provided a unified view of layers, protocols,
and services which is still in use in the development
of new protocols
 Detailed standards were developed for each layer,
but most of these are not in use
 TCP/IP protocols preempted deployment of OSI
protocols
7-Layer OSI Reference Model
Application Application
End-to-End Protocols
Application Application
Layer Layer
Presentation Presentation
Layer Layer
Session Session
Layer Layer
Transport Transport
Layer Layer
Network Network Network Network
Layer Layer Layer Layer
Data Link Data Link Data Link Data Link
Layer Layer Layer Layer
Physical Physical Physical Physical
Layer Layer Layer Layer

Communicating End Systems


One or More Network Nodes
Physical Layer
 Transfers bits across link
 Definition & specification of the physical
aspects of a communications link
 Mechanical: cable, plugs, pins...
 Electrical/optical: modulation, signal strength, voltage
levels, bit times, …
 functional/procedural: how to activate, maintain, and
deactivate physical links…
 Ethernet, DSL, cable modem, telephone
modems…
 Twisted-pair cable, coaxial cable optical fiber,
radio, infrared, …
Data Link Layer
 Transfers frames across direct connections
 Groups bits into frames
 Detection of bit errors; Retransmission of frames
 Activation, maintenance, & deactivation of data link
connections
 Medium access control for local area networks
 Flow control
frames
Data Link Data Link
Layer Layer

Physical bits Physical


Layer Layer
Network Layer
 Transfers packets across multiple links
and/or multiple networks
 Addressing must scale to large networks
 Nodes jointly execute routing algorithm to
determine paths across the network
 Forwarding transfers packet across a node
 Congestion control to deal with traffic surges
 Connection setup, maintenance, and
teardown when connection-based
Internetworking
Ethernet LAN
 Internetworking is part of network layer and provides transfer
     
of packets across multiple possibly dissimilar networks
ATM
 Gateways (routers) direct packets across networks
Network ATM
Switch

ATM ATM
HSwitch Switch

ATM
H Switch
Net
Net 33
G
Net
Net 11 G
G
G
Net55
Net
H Net 2 G Net 4 G
H

G = gateway
H = host
Transport Layer
 Transfers data end-to-end from process in a
machine to process in another machine
 Reliable stream transfer or quick-and-simple single-
block transfer
 Port numbers enable multiplexing
 Message segmentation and reassembly
 Connection setup, maintenance, and release
Transport Transport
Layer Layer

Network Network Network Network


Layer Layer Layer Layer

Communication Network
Application & Upper Layers
 Application Layer: Provides
services that are frequently
required by applications: DNS, Application
Application
web acess, file transfer, email… Application
Layer
Application
 Presentation Layer: machine- Layer
Presentation
independent representation of Transport
Layer
data… Layer
Session
 Session Layer: dialog Layer

management, recovery from Transport


Layer
errors, …
Incorporated into
Application Layer
Headers & Trailers
 Each protocol uses a header that carries addresses,
sequence numbers, flag bits, length indicators, etc…
 CRC check bits may be appended for error detection
Application APP DATA Application

Application Application
AH APP DATA
Layer Layer
Transport Transport
Layer TH AH APP DATA Layer

Network Network
Layer NH TH AH APP DATA Layer

Data Link Data Link


Layer DH NH TH AH APP DATA CRC Layer

Physical Physical
Layer bits Layer
OSI Unified View: Protocols
 Layer n in one machine interacts with layer n in
another machine to provide a service to layer n +1
 The entities comprising the corresponding layers on
different machines are called peer processes.
 The machines use a set of rules and conventions
called the layer-n protocol.
 Layer-n peer processes communicate by
exchanging Protocol Data Units (PDUs)
n-PDUs

n n
Entity Entity

Layer n peer protocol


OSI Unified View: Services
 Communication between peer processes is
virtual and actually indirect
 Layer n+1 transfers information by invoking the
services provided by layer n
 Services are available at Service Access Points
(SAP’s)
 Each layer passes data & control information to
the layer below it until the physical layer is
reached and transfer occurs
 The data passed to the layer below is called a
Service Data Unit (SDU)
 SDU’s are encapsulated in PDU’s
Layers, Services & Protocols

n+1 n+1
entity entity

n-SDU n-SDU
n-SAP n-SAP

n-SDU H
n entity n entity
H n-SDU
n-PDU
Interlayer Interaction
layer

N+1 user N provider N provider N+1 user

Request
Indication

on se
p
Res

onfirm
C

System A System B
Connectionless & Connection-
Oriented Services
 Connection-Oriented  Connectionless
 Three-phases:  Immediate SDU
1. Connection setup transfer
between two SAPs  No connection setup
to initialize state  E.g. UDP, IP
information  Layered services need
2. SDU transfer
not be of same type
3. Connection release  TCP operates over IP
 E.g. TCP, ATM  IP operates over ATM
Segmentation & Reassembly
 A layer may impose a limit
on the size of a data block (a) Segmentation
that it can transfer for n-SDU
implementation or other
reasons
 Thus a layer-n SDU may be n-PDU n-PDU n-PDU
too large to be handled as a
single unit by layer-(n-1)
 Sender side: SDU is
(b) Reassembly
segmented into multiple
PDUs n-SDU
 Receiver side: SDU is
reassembled from
sequence of PDUs n-PDU n-PDU n-PDU
Multiplexing
 Sharing of layer n service by multiple layer n+1 users
 Multiplexing tag or ID required in each PDU to
determine which users an SDU belongs to
n+1 n+1
entity entity
n+1 n+1
entity entity

n-SDU n-SDU
n-SDU H
n entity n entity
H n-SDU
n-PDU
Summary
 Layers: related communications functions
 Application Layer: HTTP, DNS
 Transport Layer: TCP, UDP
 Network Layer: IP
 Services: a protocol provides a communications
service to the layer above
 TCP provides connection-oriented reliable byte transfer
service
 UDP provides best-effort datagram service
 Each layer builds on services of lower layers
 HTTP builds on top of TCP
 DNS builds on top of UDP
 TCP and UDP build on top of IP
Chapter 2
Applications and
Layered Architectures
TCP/IP Architecture
How the Layers Work Together
Why Internetworking?
 To build a “network of networks” or internet
 operating over multiple, coexisting, different network
technologies
 providing ubiquitous connectivity through IP packet transfer
 achieving huge economies of scale
H

H
Net53
Net
Net51
Net G
G
G
G
Net55
Net
H G G
Net52
Net Net54
Net
H
Why Internetworking?
 To provide universal communication services
 independent of underlying network technologies
 providing common interface to user applications

Reliable Stream Service


H
Net53
Net
Net51
Net G
G
G
G
Net55
Net
H G G
Net52
Net Net54
Net
H
User Datagram Service
Why Internetworking?
 To provide distributed applications
 Any application designed to operate based on Internet communication services immediately operates across the entire Internet
 Rapid deployment of new applications
 Email, WWW, Peer-to-peer

 Applications independent of network technology


 New networks can be introduced below
 Old network technologies can be retired
Internet Protocol Approach
 IP packets transfer information across Internet
Host A IP → router→ router…→ router→ Host B IP
 IP layer in each router determines next hop (router)
 Network interfaces transfer IP packets across networks
Host A Router Host B
Router
Transport Internet Transport
Layer Layer Internet Layer
Layer
Internet Network Internet
Interface
Net51
Net Network
Layer Layer
Interface
Router Network
Network
Interface Internet Interface
Layer
Net54
Net Network Net53
Net52
Net Net
Interface
TCP/IP Protocol Suite
HTTP SMTP DNS RTP
Distributed
applications User
Reliable
TCP UDP
stream datagram
service service

Best-effort (ICMP, ARP)


IP
connectionless
packet transfer

Network Network Network


interface 1 interface 2 interface 3

Diverse network technologies


Internet Names & Addresses
Internet Names Internet Addresses
 Each host a a unique name  Each host has globally unique
 Independent of physical logical 32 bit IP address
location  Separate address for each physical
 Facilitate memorization by connection to a network
humans  Routing decision is done based on
 Domain Name
destination IP address
 Organization under single  IP address has two parts:
administrative unit  netid and hostid
 Host Name
 netid unique
 Name given to host
 netid facilitates routing
computer
 User Name  Dotted Decimal Notation:
 Name assigned to user int1.int2.int3.int4
(intj = jth octet)
[email protected] 128.100.10.13

DNS resolves IP name to IP address


Physical Addresses
 LANs (and other networks) assign physical
addresses to the physical attachment to the network
 The network uses its own address to transfer
packets or frames to the appropriate destination
 IP address needs to be resolved to physical address
at each IP network interface
 Example: Ethernet uses 48-bit addresses
 Each Ethernet network interface card (NIC) has globally
unique Medium Access Control (MAC) or physical address
 First 24 bits identify NIC manufacturer; second 24 bits are
serial number
 00:90:27:96:68:07 12 hex numbers

Intel
Example internet
Server PC
Router
(2,1)
(1,1) s (1,3) r
PPP
Netid=2 (2,2)
w
Ethernet *PPP does not use addresses
(netid=1) Workstation

(1,2)

Physical
netid hostid
address
server 1 1 s
workstation 1 2 w
router 1 3 r
router 2 1 -
PC 2 2 -
Encapsulation

IP
header IP Payload

Ethernet IP
IP Payload FCS
header header

 Ethernet header contains:


 source and destination physical addresses
 network protocol type (e.g. IP)
IP packet from workstation to
server
Server PC
Router
(2,1)
(1,1) PPP
s (1,3) r (2,2)
w
Ethernet w, s (1,2), (1,1)

Workstation
(1,2)

1. IP packet has (1,2) IP address for source and (1,1) IP address for
destination
2. IP table at workstation indicates (1,1) connected to same network, so
IP packet is encapsulated in Ethernet frame with addresses w and s
3. Ethernet frame is broadcast by workstation NIC and captured by
server NIC
4. NIC examines protocol type field and then delivers packet to its IP
layer
IP packet from server to PC
Server PC
Router
(2,1) (1,1), (2,2)
(1,1) s (1,3) r (2,2)
w
s, r (1,1), (2,2)

Workstation
(1,2)
1. IP packet has (1,1) and (2,2) as IP source and destination addresses
2. IP table at server indicates packet should be sent to router, so IP packet is encapsulated in
Ethernet frame with addresses s and r
3. Ethernet frame is broadcast by server NIC and captured by router NIC
4. NIC examines protocol type field and then delivers packet to its IP layer
5. IP layer examines IP packet destination address and determines IP packet should be routed to
(2,2)
6. Router’s table indicates (2,2) is directly connected via PPP link
7. IP packet is encapsulated in PPP frame and delivered to PC
8. PPP at PC examines protocol type field and delivers packet to PC IP layer
How the layers work together
(a) Server PC
Router
(2,1)
(1,1) s (1,3) r PPP
(2,2)
Ethernet
HTTP uses process-to-process
Reliable byte stream transfer of
TCP connection:
Server Server socket: (IP Address, 80)
(b) PC
PC socket (IP Address, Eph. #)
HTTP TCP uses node-to-node HTTP
Unreliable packet transfer of IP
TCP Server IP address & PC IP address TCP
IP IP IP
Network interface Network interface Network interface
Internet
Router
Ethernet PPP
Encapsulation
TCP Header contains
source & destination HTTP Request
port numbers

IP Header contains
source and destination TCP
IP addresses; header HTTP Request
transport protocol type

Ethernet Header contains


source & destination MAC IP TCP
header header HTTP Request
addresses;
network protocol type

Ethernet IP TCP
HTTP Request FCS
header header header
How the layers work together:
Network Analyzer Example

Internet

 User clicks on http://www.nytimes.com/


 Ethereal network analyzer captures all frames
observed by its Ethernet NIC
 Sequence of frames and contents of frame can be
examined in detail down to individual bytes
Top Pane Middle Pane
Ethereal windows
shows shows
frame/packet encapsulation for
sequence a given frame

Bottom Pane shows hex & text


Top pane: frame sequence
TCP
DNS Connection
HTTP
Query Setup
Request &
Response
Middle pane: Encapsulation

Ethernet Frame

Ethernet
Protocol Type Destination and
Source
Addresses
Middle pane: Encapsulation
And a lot of
other stuff!
IP Packet

IP Source and
Destination
Addresses

Protocol Type
Middle pane: Encapsulation

TCP Segment

Source and
Destination Port
Numbers

GET

HTTP
Request
Summary
 Encapsulation is key to layering
 IP provides for transfer of packets across
diverse networks
 TCP and UDP provide universal
communications services across the Internet
 Distributed applications that use TCP and
UDP can operate over the entire Internet
 Internet names, IP addresses, port numbers,
sockets, connections, physical addresses
Chapter 2
Applications and
Layered Architectures
Sockets
Socket API
 API (Application Programming Interface)
 Provides a standard set of functions that can be called by
applications
 Berkeley UNIX Sockets API
 Abstraction for applications to send & receive data
 Applications create sockets that “plug into” network
 Applications write/read to/from sockets
 Implemented in the kernel
 Facilitates development of network applications
 Hides details of underlying protocols & mechanisms
 Also in Windows, Linux, and other OS’s
Communications through Socket
Interface
Client Server
Socket Socket
Application 1 Application 2
interface interface

User User
descriptor descriptor
Kernel Kernel
Socket Socket
• Application references a
socket through a descriptor
port number • Socket bound to a port number port number

Underlying Underlying
communication communication
protocols protocols

Communications
network
Stream mode of service
Connection-oriented  Connectionless
 First, setup connection  Immediate transfer of one
between two peer block of information
application processes (boundaries preserved)
 Then, reliable bidirectional
 No setup overhead & delay
in-sequence transfer of byte
 Destination address with
each block
stream (boundaries not
preserved in transfer)
 Send/receive to/from
multiple peer processes
 Multiple write/read between
 Best-effort service only
peer processes  Possible out-of-order
 Finally, connection release  Possible loss
 Uses TCP  Uses UDP
Client & Server Differences
 Server
 Specifies well-known port # when creating socket
 May have multiple IP addresses (net interfaces)
 Waits passively for client requests
 Client
 Assigned ephemeral port #
 Initiates communications with server
 Needs to know server’s IP address & port #
 DNS for URL & server well-known port #
 Server learns client’s address & port #
Socket Calls for Connection-
Oriented Mode
Server does Passive Open
Server  socket creates socket to listen for connection

socket()
requests
 Server specifies type: TCP (stream)

bind()  socket call returns: non-negative integer descriptor;


or -1 if unsuccessful
listen()
Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Server does Passive Open
Server  bind assigns local address & port # to socket with

socket()
specified descriptor
 Can wildcard IP address for multiple net interfaces

bind()  bind call returns: 0 (success); or -1 (failure)


 Failure if port # already in use or if reuse option not
listen() set Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Server does Passive Open
Server  listen indicates to TCP readiness to receive

socket()
connection requests for socket with given descriptor
 Parameter specifies max number of requests that

bind() may be queued while waiting for server to accept


them
listen()  listen call returns: 0 (success); or -1 (failure)
Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Server does Passive Open
Server  Server calls accept to accept incoming requests
 accept blocks if queue is empty
socket()

bind()

listen()
Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Client does Active Open
Server  socket creates socket to connect to server
 Client specifies type: TCP (stream)
socket()
 socket call returns: non-negative integer descriptor;
bind() or -1 if unsuccessful

listen()
Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Client does Active Open
Server  connect establishes a connection on the local socket

socket()
with the specified descriptor to the specified remote
address and port #
bind()  connect returns 0 if successful; -1 if unsuccessful

listen()
Client
accept()
socket()
Note: connect
Blocks Connect initiates TCP three-way
negotiation connect()
handshake
Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
 accept wakes with incoming connection request
Server  accept fills client address & port # into address structure
socket()
 accept call returns: descriptor of new connection socket
(success); or -1 (failure)
bind()  Client & server use new socket for data transfer
 Original socket continues to listen for new requests
listen()
Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Data Transfer
Server  Client or server call write to transmit data into a
connected socket
socket()
 write specifies: socket descriptor; pointer to a buffer;

bind() amount of data; flags to control transmission behavior


 write call returns: # bytes transferred (success); or -1
listen() (failure); blocks until all data transferred
Client
accept()
socket()
Blocks Connect
negotiation connect()

Data write()
read()

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Data Transfer
Server  Client or server call read to receive data from a
connected socket
socket()
 read specifies: socket descriptor; pointer to a buffer;

bind() amount of data


 read call returns: # bytes read (success); or -1 (failure);
listen() blocks if no data arrives
Client
accept()
socket()
Note: write and read
Blocks Connect can be called multiple
negotiation connect()
times to transfer byte
Data streams in both
read() write() directions

write() Data
read()

close()
close()
Socket Calls for Connection-
Oriented Mode
Connection Termination
Server  Client or server call close when socket is no longer
needed
socket()
 close specifies the socket descriptor

bind()  close call returns: 0 (success); or -1 (failure)

listen()
Client
accept()
socket()
Note: close initiates
Blocks Connect TCP graceful close
negotiation connect()
sequence
Data write()
read()

write() Data
read()

close()
close()
Example: TCP Echo Server
/* A simple echo server using TCP */ /* Bind an address to the socket */
#include <stdio.h> bzero((char *)&server, sizeof(struct sockaddr_in));
#include <sys/types.h> server.sin_family = AF_INET;
#include <sys/socket.h> server.sin_port = htons(port);
#include <netinet/in.h> server.sin_addr.s_addr = htonl(INADDR_ANY);
if (bind(sd, (struct sockaddr *)&server,
#define SERVER_TCP_PORT 3000 sizeof(server)) == -1) {
#define BUFLEN 256 fprintf(stderr, "Can't bind name to socket\n");
exit(1);
int main(int argc, char **argv) }
{
int n, bytes_to_read; /* queue up to 5 connect requests */
int sd, new_sd, client_len, port; listen(sd, 5);
struct sockaddr_in server, client;
char *bp, buf[BUFLEN]; while (1) {
client_len = sizeof(client);
switch(argc) { if ((new_sd = accept(sd, (struct sockaddr *)&client,
case 1: &client_len)) == -1) {
port = SERVER_TCP_PORT; fprintf(stderr, "Can't accept client\n");
break; exit(1);
case 2: }
port = atoi(argv[1]);
break; bp = buf;
default: bytes_to_read = BUFLEN;
fprintf(stderr, "Usage: %s [port]\n", argv[0]); while ((n = read(new_sd, bp, bytes_to_read)) > 0) {
exit(1); bp += n;
} bytes_to_read -= n;
}
/* Create a stream socket */ printf("Rec'd: %s\n", buf);
if ((sd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
fprintf(stderr, "Can't create a socket\n"); write(new_sd, buf, BUFLEN);
exit(1); printf("Sent: %s\n", buf);
} close(new_sd);
}
close(sd);
return(0);
}
Example: TCP Echo Client
/* A simple TCP client */ bzero((char *)&server, sizeof(struct sockaddr_in));
#include <stdio.h> server.sin_family = AF_INET;
#include <netdb.h> server.sin_port = htons(port);
#include <sys/types.h> if ((hp = gethostbyname(host)) == NULL) {
#include <sys/socket.h> fprintf(stderr, "Can't get server's address\n");
#include <netinet/in.h> exit(1);
}
#define SERVER_TCP_PORT 3000 bcopy(hp->h_addr, (char *)&server.sin_addr, hp->h_length);
#define BUFLEN 256
/* Connecting to the server */
int main(int argc, char **argv) if (connect(sd, (struct sockaddr *)&server,
{ sizeof(server)) == -1) {
int n, bytes_to_read; fprintf(stderr, "Can't connect\n");
int sd, port; exit(1);
struct hostent *hp; }
struct sockaddr_in server; printf("Connected: server's address is %s\n", hp->h_name);
char *host, *bp, rbuf[BUFLEN], sbuf[BUFLEN];
printf("Transmit:\n");
switch(argc) { gets(sbuf);
case 2: write(sd, sbuf, BUFLEN);
host = argv[1];
port = SERVER_TCP_PORT; printf("Receive:\n");
break; bp = rbuf;
case 3: bytes_to_read = BUFLEN;
host = argv[1]; while ((n = read(sd, bp, bytes_to_read)) > 0) {
port = atoi(argv[2]); bp += n;
break; bytes_to_read -= n;
default: }
fprintf(stderr, "Usage: %s host [port]\n", argv[0]); printf("%s\n", rbuf);
exit(1);
} close(sd);
return(0);
/* Create a stream socket */ }
if ((sd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
fprintf(stderr, "Can't create a socket\n");
exit(1);
}
Socket Calls for Connection-Less
Mode
Server started
Server  socket creates socket of type UDP (datagram)
 socket call returns: descriptor; or -1 if unsuccessful
socket()
 bind assigns local address & port # to socket with
specified descriptor; Can wildcard IP address
bind()
Client
recvfrom() socket()

Data
Blocks until server
receives data from sendto()
client
sendto() Data
recvfrom()

close()
close()
Socket Calls for Connection-Less
Mode
 recvfrom copies bytes received in specified socket
Server into a specified location
 recvfrom blocks until data arrives
socket()

bind()
Client
recvfrom() socket()

Data
Blocks until server
receives data from sendto()
client
sendto() Data
recvfrom()

close()
close()
Socket Calls for Connection-Less
Mode
Client started
Server  socket creates socket of type UDP (datagram)
 socket call returns: descriptor; or -1 if unsuccessful
socket()

bind()
Client
recvfrom() socket()

Data
Blocks until server
receives data from sendto()
client
sendto() Data
recvfrom()

close()
close()
Socket Calls for Connection-Less
Mode
Client started
Server  sendto transfer bytes in buffer to specified socket
 sendto specifies: socket descriptor; pointer to a
socket() buffer; amount of data; flags to control transmission
behavior; destination address & port #; length of
destination address structure
bind()
 sendto returns: # bytes sent; or -1 if unsuccessful
Client
recvfrom() socket()

Data
Blocks until server
receives data from sendto()
client
sendto() Data
recvfrom()

close()
close()
Socket Calls for Connection-Less
Mode
 recvfrom wakes when data arrives
Server  recvfrom specifies: socket descriptor; pointer to a
buffer to put data; max # bytes to put in buffer; control
socket() flags; copies: sender address & port #; length of
sender address structure
 recvfrom returns # bytes received or -1 (failure)
bind()
Client
recvfrom() socket()

Data
Note: receivefrom
Blocks until server returns data from at
receives data from sendto()
client
most one send, i.e.
from one datagram
sendto() Data
recvfrom()

close()
close()
Socket Calls for Connection-Less
Mode
Socket Close
Server  Client or server call close when socket is no longer
needed
socket()  close specifies the socket descriptor
 close call returns: 0 (success); or -1 (failure)

bind()
Client
recvfrom() socket()

Data
Blocks until server
receives data from sendto()
client
sendto() Data
recvfrom()

close()
close()
Example: UDP Echo Server
/* Echo server using UDP */ /* Bind an address to the socket */
#include <stdio.h> bzero((char *)&server, sizeof(server));
#include <sys/types.h> server.sin_family = AF_INET;
#include <sys/socket.h> server.sin_port = htons(port);
#include <netinet/in.h> server.sin_addr.s_addr = htonl(INADDR_ANY);
if (bind(sd, (struct sockaddr *)&server,
#define SERVER_UDP_PORT 5000 sizeof(server)) == -1) {
#define MAXLEN 4096 fprintf(stderr, "Can't bind name to socket\n");
exit(1);
int main(int argc, char **argv) }
{
int sd, client_len, port, n; while (1) {
char buf[MAXLEN]; client_len = sizeof(client);
struct sockaddr_in server, client; if ((n = recvfrom(sd, buf, MAXLEN, 0,
(struct sockaddr *)&client, &client_len)) < 0) {
switch(argc) { fprintf(stderr, "Can't receive datagram\n");
case 1: exit(1);
port = SERVER_UDP_PORT; }
break;
case 2: if (sendto(sd, buf, n, 0,
port = atoi(argv[1]); (struct sockaddr *)&client, client_len) != n) {
break; fprintf(stderr, "Can't send datagram\n");
default: exit(1);
fprintf(stderr, "Usage: %s [port]\n", argv[0]); }
exit(1); }
} close(sd);
return(0);
/* Create a datagram socket */ }
if ((sd = socket(AF_INET, SOCK_DGRAM, 0)) == -1) {
fprintf(stderr, "Can't create a socket\n");
exit(1);
}
Example: UDP Echo Client
#include <stdio.h>
#include <string.h>
#include <sys/time.h> else {
#include <netdb.h> fprintf(stderr,
#include <sys/types.h> "Usage: %s [-s data_size] host [port]\n", pname);
#include <sys/socket.h> exit(1);
#include <netinet/in.h> }
#define SERVER_UDP_PORT 5000
#define MAXLEN 4096 if ((sd = socket(AF_INET, SOCK_DGRAM, 0)) == -1) {
#define DEFLEN 64 fprintf(stderr, "Can't create a socket\n");
exit(1);
long delay(struct timeval t1, struct timeval t2) }
{ bzero((char *)&server, sizeof(server));
long d; server.sin_family = AF_INET;
d = (t2.tv_sec - t1.tv_sec) * 1000; server.sin_port = htons(port);
d += ((t2.tv_usec - t1.tv_usec + 500) / 1000); if ((hp = gethostbyname(host)) == NULL) {
return(d); fprintf(stderr, "Can't get server's IP address\n");
} exit(1);
int main(int argc, char **argv) }
{ bcopy(hp->h_addr, (char *) &server.sin_addr, hp->h_length);
int data_size = DEFLEN, port = SERVER_UDP_PORT;
int i, j, sd, server_len; if (data_size > MAXLEN) {
char *pname, *host, rbuf[MAXLEN], sbuf[MAXLEN]; fprintf(stderr, "Data is too big\n");
struct hostent *hp; exit(1);
struct sockaddr_in server; }
struct timeval start, end; for (i = 0; i < data_size; i++) {
unsigned long address; j = (i < 26) ? i : i % 26;
sbuf[i] = 'a' + j;
pname = argv[0]; }
argc--; gettimeofday(&start, NULL); /* start delay measurement */
argv++; server_len = sizeof(server);
if (argc > 0 && (strcmp(*argv, "-s") == 0)) { if (sendto(sd, sbuf, data_size, 0, (struct sockaddr *)
if (--argc > 0 && (data_size = atoi(*++argv))) { &server, server_len) == -1) {
argc--; fprintf(stderr, "sendto error\n");
argv++; exit(1);
} }
else { if (recvfrom(sd, rbuf, MAXLEN, 0, (struct sockaddr *)
fprintf(stderr, &server, &server_len) < 0) {
"Usage: %s [-s data_size] host [port]\n", pname); fprintf(stderr, "recvfrom error\n");
exit(1); exit(1);
} }
} gettimeofday(&end, NULL); /* end delay measurement */
if (argc > 0) { if (strncmp(sbuf, rbuf, data_size) != 0)
host = *argv; printf("Data is corrupted\n");
if (--argc > 0) close(sd);
port = atoi(*++argv); return(0);
} }
Chapter 2
Applications and
Layered Architectures
Application Layer Protocols &
IP Utilities
Telnet (RFC 854)
 Provides general bi-directional byte-oriented TCP-
based communications facility (Network Virtual
Terminal)
 Initiating machine treated as local to the remote host
 Used to connect to port # of other servers and to
interact with them using command line

Server
process

NVT NVT
Network Virtual Terminal
 Network Virtual Terminal
 Lowest common denominator terminal
 Each machine maps characteristics to NVT
 Negotiate options for changes to the NVT
 Data input sent to server & echoed back
 Server control functions : interrupt, abort
output, are-you-there, erase character, erase
line
 Default requires login & password
telnet
 A program that uses the Telnet protocol
 Establishes TCP socket
 Sends typed characters to server
 Prints whatever characters arrive
 Try it to retrieve a web page (HTTP) or to
send an email (SMTP)
File Transfer Protocol (RFC 959)
 Provides for transfer of file from one machine
to another machine
 Designed to hide variations in file storage
 FTP parameter commands specify file info
 File Type: ASCII, EBCDIC, image, local.
 Data Structure: file, record, or page
 Transmission Mode: stream, block, compressed
 Other FTP commands
 Access Control: USER, PASS, CWD, QUIT, …
 Service: RETR, STOR, PWD, LIST, …
FTP File Transfer

User
interface

Control
Server PI User PI
connection

Data
Server DTP User DTP
connection

Server FTP User FTP

PI = Protocol interface
DTP = Data transfer process
Two TCP Connections
Control connection Data connection
 Set up using Telnet  To perform file transfer,
protocol on well-known obtain lists of files,
port 21 directories
 FTP commands & replies  Each transfer requires new
between protocol data connection
interpreters  Passive open by user PI
 PIs control the data with ephemeral port #
transfer process  Port # sent over control
 User requests close of connection
control connection;  Active open by server
server performs the close using port 20
FTP Replies
Reply Meaning

1yz Positive preliminary reply (action has begun, but wait for another reply before sending
a new command).
2yz Positive completion reply (action completed successfully; new command may be
sent).
3yz Positive intermediary reply (command accepted, but action cannot be performed
without additional information; user should send a command with the necessary
information).
4yz Transient negative completion reply (action currently cannot be performed; resend
command later).
5zy Permanent negative completion reply (action cannot be performed; do not resend it).

x0z Syntax errors.


x1z Information (replies to requests for status or help).
x2z Connections (replies referring to the control and data connections).
x3z Authentication and accounting (replies for the login process and accounting
procedures).
x4z Unspecified.
x5z File system status.
FTP Client (192.168.1.132: 1421) establishes Control
Connection to FTP Server (128.100.132.23: 21)
User types ls to list files in directory (frame 31 on control)
FTP Server (128.100.132.23: 20) establishes Data
Connection to FTP Client (192.168.1.132: 1422)
User types get index.html to request file transfer in control
connection (frame 47 request); File transfer on new data
connection (port 1423, fr. 48, 49, 51)
Hypertext Transfer Protocol
 RFC 1945 (HTTP 1.0), RFC 2616 (HTTP 1.1)
 HTTP provides communications between
web browsers & web servers
 Web: framework for accessing documents &
resources through the Internet
 Hypertext documents: text, graphics,
images, hyperlinks
 Documents prepared using Hypertext Markup
Language (HTML)
HTTP Protocol
 HTTP servers use well-known port 80
 Client request / Server reply
 Stateless: server does not keep any
information about client
 HTTP 1.0 new TCP connection per
request/reply (non-persistent)
 HTTP 1.1 persistent operation is default
HTTP Typical Exchange
HTTP Message Formats
 HTTP messages written in ASCII text
 Request Message Format
 Request Line (Each line ends with carriage return)
 Method URL HTTP-Version \r\n
 Method specifies action to apply to object
 URL specifies object
 Header Lines (Ea. line ends with carriage return)
 Attribute Name: Attribute Value
 E.g. type of client, content, identity of requester, …
 Last header line has extra carriage return)
 Entity Body (Content)
 Additional information to server
HTTP Request Methods
Request Meaning
method
GET Retrieve information (object) identified by the URL.
HEAD Retrieve meta-information about the object, but do not transfer
the object; Can be used to find out if a document has
changed.
POST Send information to a URL (using the entity body) and retrieve
result; used when a user fills out a form in a browser.
PUT Store information in location named by URL
DELETE Remove object identified by URL
TRACE Trace HTTP forwarding through proxies, tunnels, etc.
OPTIONS Used to determine the capabilities of the server, or
characteristics of a named resource.
Universal Resource Locator
 Absolute URL
 scheme://hostname[:port]/path
 http://www.nytimes.com/

 Relative URL
 /path
 /
HTTP Request Message
HTTP Response Message
 Response Message Format
 Status Line
 HTTP-Version Status-Code Message
 Status Code: 3-digit code indicating result
 E.g. HTTP/1.0 200 OK
 Headers Section
 Information about object transferred to client
 E.g. server type, content length, content type, …
 Content
 Object (document)
HTTP Response Message
HTTP Proxy Server & Caching
 Web users generate large traffic volumes
 Traffic causes congestion & delay
 Can improve delay performance and reduce
traffic in Internet by moving content to servers
closer to the user
 Web proxy servers cache web information
 Deployed by ISPs
 Customer browsers configured to first access
ISPs proxy servers
 Proxy replies immediately when it has requested
object or retrieves the object if it does not
Cookies and Web Sessions
 Cookies are data exchanged by clients & servers as
header lines
 Since HTTP stateless, cookies can provide context
for HTTP interaction
 Set cookie header line in reply message from server
+ unique ID number for client
 If client accepts cookie, cookie added to client’s
cookie file (must include expiration date)
 Henceforth client requests include ID
 Server site can track client interactions, store these
in a separate database, and access database to
prepare appropriate responses
Cookie Header Line;
ID is 24 hexadecimal numeral
PING
 Application to determine if host is reachable
 Based on Internet Control Message Protocol
 ICMP informs source host about errors
encountered in IP packet processing by routers or
by destination host
 ICMP Echo message requests reply from
destination host
 PING sends echo message & sequence #
 Determines reachability & round-trip delay
 Sometimes disabled for security reasons
PING from NAL host

Microsoft(R) Windows DOS


(c)Copyright Microsoft Corp 1990-2001.

C:\DOCUME~1\1>ping nal.toronto.edu
Pinging nal.toronto.edu [128.100.244.3] with 32 bytes of data:
Reply from 128.100.244.3: bytes=32 time=84ms TTL=240
Reply from 128.100.244.3: bytes=32 time=110ms TTL=240
Reply from 128.100.244.3: bytes=32 time=81ms TTL=240
Reply from 128.100.244.3: bytes=32 time=79ms TTL=240
Ping statistics for 128.100.244.3:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 79ms, Maximum = 110ms, Average = 88ms

C:\DOCUME~1\1>
Traceroute
 Find route from local host to a remote host
 Time-to-Live (TTL)
 IP packets have TTL field that specifies maximum # hops
traversed before packet discarded
 Each router decrements TTL by 1
 When TTL reaches 0 packet is discarded
 Traceroute
 Send UDP to remote host with TTL=1
 First router will reply ICMP Time Exceeded Msg
 Send UDP to remote host with TTL=2, …
 Each step reveals next router in path to remote host
Traceroute from home PC to
university host
Tracing route to www.comm.utoronto.ca [128.100.11.60]
over a maximum of 30 hops:

1 1 ms <10 ms <10 ms 192.168.2.1 Home Network


2 3 ms 3 ms 3 ms 10.202.128.1
3 4 ms 3 ms 3 ms gw04.ym.phub.net.cable.rogers.com [66.185.83.142]
4 * * * Request timed out.
5 47 ms 59 ms 66 ms gw01.bloor.phub.net.cable.rogers.com [66.185.80.230]
6 3 ms 3 ms 38 ms gw02.bloor.phub.net.cable.rogers.com [66.185.80.242]
7 8 ms 3 ms 5 ms gw01.wlfdle.phub.net.cable.rogers.com [66.185.80.2] Rogers Cable
8 8 ms 7 ms 7 ms gw02.wlfdle.phub.net.cable.rogers.com [66.185.80.142] ISP
9 4 ms 10 ms 4 ms gw01.front.phub.net.cable.rogers.com [66.185.81.18]
10 6 ms 4 ms 5 ms ra1sh-ge3-4.mt.bigpipeinc.com [66.244.223.237] Shaw Net
11 16 ms 17 ms 13 ms rx0sh-hydro-one-telecom.mt.bigpipeinc.com [66.244.223.246] Hydro One
12 7 ms 14 ms 8 ms 142.46.4.2
13 10 ms 7 ms 6 ms utorgw.onet.on.ca [206.248.221.6] Ontario Net
14 7 ms 6 ms 11 ms mcl-gateway.gw.utoronto.ca [128.100.96.101]
15 7 ms 5 ms 8 ms sf-gpb.gw.utoronto.ca [128.100.96.17] University of
16 7 ms 7 ms 10 ms bi15000.ece.utoronto.ca [128.100.96.236] Toronto
17 7 ms 9 ms 9 ms www.comm.utoronto.ca [128.100.11.60]

Trace complete.
ipconfig
 Utility in Microsoft® Windows to display
TCP/IP information about a host
 Many options
 Simplest: IP address, subnet mask, default
gateway for the host
 Information about each IP interface of a host
 DNS hostname, IP addresses of DNS servers,
physical address of network card, IP address, …
 Renew IP address from DHCP server
netstat
 Queries a host about TCP/IP network status
 Status of network drivers & their interface
cards
 #packets in, #packets out, errored packets, …
 State of routing table in host
 TCP/IP active server processes
 TCP active connections
netstat protocol statistics
IPv4 Statistics ICMPv4 Statistics

Packets Received = 71271 Received Sent


Received Header Errors = 0 Messages 10 6
Received Address Errors = 9
Datagrams Forwarded = 0 Errors 0 0
Unknown Protocols Received = 0
Received Packets Discarded = 0 Destination Unreachable 8 1
Received Packets Delivered = 71271
Output Requests = 70138 Time Exceeded 0 0
Routing Discards = 0
Discarded Output Packets = 0 Parameter Problems 0 0
Output Packet No Route = 0
Reassembly Required = 0 Source Quenches 0 0
Reassembly Successful = 0
Reassembly Failures = 0 Redirects 0 0
Datagrams Successfully Fragmented = 0
Datagrams Failing Fragmentation = 0 Echos 0 2
Fragments Created = 0
Echo Replies 2 0
UDP Statistics for IPv4
Timestamps 0 0
Datagrams Received = 6810
No Ports = 15 Timestamp Replies 0 0
Receive Errors = 0
Datagrams Sent = 6309 Address Masks 0 0

Address Mask Replies 0 0


tcpdump and Network Protocol
Analyzers
 tcpdump program captures IP packets on a
network interface (usually Ethernet NIC)
 Filtering used to select packets of interest
 Packets & higher-layer messages can be
displayed and analyzed
 tcpdump basis for many network protocol
analyzers for troubleshooting networks
 We use the open source Ethereal analyzer to
generate examples
 www.ethereal.com

You might also like