SlideShare a Scribd company logo
1 of 14
Chapter 2
Application Layer
Computer Networking: A
Top Down Approach,
4th edition.
Jim Kurose, Keith Ross
Addison-Wesley, July
2007.
What Transport Service does an
Application need?
Data Loss
 Loss Tolerant Applications



Some apps (e.g., audio, VoIP)
can tolerate some loss
2% tolerable for VoIP

 Other apps (e.g., file transfer,

email) require 100% reliable
data transfer
Timing
 Application may require
timing guarantee
 Tight timing constraints
multiplayer games, VoIP,
teleconferencing.
 In Non-real time lower delays
are preferred but no tight
constraint on end-to-end
delays.


Throughput
 Bandwidth sensitive
applications (e.g., multimedia)
require minimum amount of
throughput
 Other apps (“elastic apps”)
make use of whatever
throughput they get

e.g .Email, file transfer
Security
 Encryption and decryption
Transport Service Requirements of Common
Applications
Data loss

Throughput

Time Sensitive

file transfer
e-mail
Web documents
real-time audio/video

no loss
no loss
no loss
loss-tolerant

no
no
no
yes, 100’s msec

stored audio/video
interactive games

loss-tolerant
loss-tolerant

elastic
elastic
elastic
audio: 5kbps-1Mbps
video:10kbps-5Mbps
same as above
few kbps -10kbps

Application

yes, few secs
yes, 100’s msec
Internet transport protocols services
TCP service:









connection-oriented: setup

required between client and
server processes
reliable transport between
sending and receiving process
flow control: sender won’t
overwhelm receiver
congestion control: throttle
sender when network
overloaded
does not provide: timing,
minimum throughput
guarantees, security

UDP service:
 unreliable data transfer

between sending and
receiving process
 does not provide:
connection setup,
reliability, flow control,
security
 Throughput and timing
guarantee not provided
Internet Applications: application, transport
protocols
Application
e-mail
remote terminal access
Web
file transfer
streaming multimedia

Internet telephony

Application
layer protocol

Underlying
transport protocol

SMTP [RFC 2821]
Telnet [RFC 854]
HTTP [RFC 2616]
FTP [RFC 959]
RTP [RFC 1889]

TCP
TCP
TCP
TCP
UDP

SIP, Skype

UDP
DNS: Domain Name System
People: many identifiers:


SSN, name, passport #

Internet hosts:



IP address (32 bit)
“name”, e.g.,
ww.yahoo.com - used by
humans

Q: map between IP
addresses and name ?

Domain Name System:


Distributed Database

implemented in hierarchy of
many DNS servers
 An application-layer protocol
that allows hosts to query the
distributed database
 DNS uses UDP over port
number 53.
 RFC 1034 and RFC 1035
DNS
Simple design would have one DNS server
that contains all the mappings
Why not centralize DNS?
 Single point of failure
 Traffic volume
 Distant centralized database
 Maintenance
A centralized database in a single DNS
server doesn’t scale!
Distributed, Hierarchical Database
Root DNS Servers

com DNS servers
yahoo.com
amazon.com
DNS servers DNS servers

org DNS servers

pbs.org
DNS servers

edu DNS servers
poly.edu
umass.edu
DNS servers
DNS servers

Client wants IP for www.amazon.com:
 Client first queries a root server
 The root server returns the IP addresses for TLD servers for
the top level domain com
 The client then contacts one of the TLD servers which returns
the IP address of an authoritative server for amazon.com
 The authoritative server then returns the IP address for the
host name www.amazon.com
DNS: Root Name Servers
 13 root DNS servers world wide
 Each server is a cluster of replicated servers


security and reliability purposes.

 For more information see www.root-servers.org
a Verisign, Dulles, VA
c Cogent, Herndon, VA (also LA)
d U Maryland College Park, MD
g US DoD Vienna, VA
h ARL Aberdeen, MD
j Verisign, ( 21 locations)

e NASA Mt View, CA
f Internet Software C. Palo Alto,
CA (and 36 other locations)

b USC-ISI Marina del Rey, CA
l ICANN Los Angeles, CA

k RIPE London (also 16 other locations)
i Autonomica, Stockholm (plus
28 other locations)
m WIDE Tokyo (also Seoul,
Paris, SF)
TLD and Authoritative Servers
 Top-level Domain (TLD) Servers:
 Responsible for com, org, net, edu, etc, and all
top-level country domains uk, fr, jp.
 Network Solutions maintains servers for com TLD
 Educause for edu TLD
 ICANN: Internet Corporation for Assigned Names
and Numbers
 Authoritative DNS Servers:
 Every organization with publicly accessible hosts
provide accessible DNS records.


That maps the names of those hosts to IP addresses
Authoritative DNS servers houses these DNS records
Local Name Server
 Does not strictly belong to hierarchy

 Each company, university has one.
 Also called “default name server”
 When host makes DNS query, query is sent

to its local DNS server


acts as proxy, forwards query into hierarchy
DNS name
resolution example

root DNS server

2

 Host at cis.poly.edu

3

wants IP address for
gaia.cs.umass.edu

Iterated query:

 Contacted server
replies with name of
server to contact.
 “I don’t know this
name, but ask this
server”.

TLD DNS server
4

5
local DNS server
dns.poly.edu

1

8

requesting host

7

6

authoritative DNS server
dns.cs.umass.edu

cis.poly.edu
gaia.cs.umass.edu
DNS name
resolution example
Recursive Query:

2

 Puts burden of name
resolution on other
server.
DNS Caching
 Extensively used

 Cache entries timeout
(disappear) after some
time
 TLD servers typically
cached in local name
servers
 Thus root name
servers not often
visited

root DNS server

3
7

6

TLD DNS server
local DNS server
dns.poly.edu

1

5

4

8

requesting host

authoritative DNS server
dns.cs.umass.edu

cis.poly.edu
gaia.cs.umass.edu
Assignment 1

 Statefulness in HTTP
 Web Caches (Conditional GET statement)
 Cookies (Set Cookie Header)

More Related Content

What's hot (10)

What is a MS Windows Network Drive
What is a MS Windows Network DriveWhat is a MS Windows Network Drive
What is a MS Windows Network Drive
 
Lecture1 intro
Lecture1 introLecture1 intro
Lecture1 intro
 
Lecture3
Lecture3Lecture3
Lecture3
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Bioinformatics - Internet
Bioinformatics - InternetBioinformatics - Internet
Bioinformatics - Internet
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Whole c++ lectures ITM1 Th
Whole c++ lectures ITM1 ThWhole c++ lectures ITM1 Th
Whole c++ lectures ITM1 Th
 
Lets talk dns
Lets talk dnsLets talk dns
Lets talk dns
 
Application layer
Application layerApplication layer
Application layer
 
Web design EJ3
Web design    EJ3Web design    EJ3
Web design EJ3
 

Viewers also liked

Fusf presentation to share 11.20
Fusf presentation to share 11.20Fusf presentation to share 11.20
Fusf presentation to share 11.20fusfpresent
 
Cim d'àligues. Sessió de vol
Cim d'àligues. Sessió de volCim d'àligues. Sessió de vol
Cim d'àligues. Sessió de volprimariachanel
 
PROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIA
PROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIAPROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIA
PROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIAficarramastrosimini
 
Sosten gwengwe-is-a-malawian-politician
Sosten gwengwe-is-a-malawian-politicianSosten gwengwe-is-a-malawian-politician
Sosten gwengwe-is-a-malawian-politiciankabmebanda1
 
President joyce banda meeting with british prime minister david cameron
President joyce banda meeting with british prime minister david cameronPresident joyce banda meeting with british prime minister david cameron
President joyce banda meeting with british prime minister david cameronkabmebanda1
 
Who would be the audience for your media
Who would be the audience for your mediaWho would be the audience for your media
Who would be the audience for your mediaHollieSmith24
 
What did you learn from audience feedback
What did you learn from audience  feedbackWhat did you learn from audience  feedback
What did you learn from audience feedbacklaurabryanmedia1
 
Taller técnicas efectivas de cobranza
Taller técnicas efectivas de cobranzaTaller técnicas efectivas de cobranza
Taller técnicas efectivas de cobranzaantonio soto
 
Мониторинг социальных настроений стран постсоветского пространства 2004-2012
Мониторинг социальных настроений стран постсоветского пространства 2004-2012Мониторинг социальных настроений стран постсоветского пространства 2004-2012
Мониторинг социальных настроений стран постсоветского пространства 2004-2012абырвалг абырвалг
 
Round up 5
Round up 5Round up 5
Round up 5violina2
 
LEGO® Bricks and the Box
LEGO® Bricks and the BoxLEGO® Bricks and the Box
LEGO® Bricks and the BoxTeknobik
 

Viewers also liked (14)

Fusf presentation to share 11.20
Fusf presentation to share 11.20Fusf presentation to share 11.20
Fusf presentation to share 11.20
 
Cim d'àligues. Sessió de vol
Cim d'àligues. Sessió de volCim d'àligues. Sessió de vol
Cim d'àligues. Sessió de vol
 
PROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIA
PROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIAPROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIA
PROGETTO CORPORADE IDENTITY CONSORZIO OPERATORI FLOROVIVAISTI DI PUGLIA
 
Sosten gwengwe-is-a-malawian-politician
Sosten gwengwe-is-a-malawian-politicianSosten gwengwe-is-a-malawian-politician
Sosten gwengwe-is-a-malawian-politician
 
President joyce banda meeting with british prime minister david cameron
President joyce banda meeting with british prime minister david cameronPresident joyce banda meeting with british prime minister david cameron
President joyce banda meeting with british prime minister david cameron
 
My family
My family My family
My family
 
Who would be the audience for your media
Who would be the audience for your mediaWho would be the audience for your media
Who would be the audience for your media
 
About me
About meAbout me
About me
 
What did you learn from audience feedback
What did you learn from audience  feedbackWhat did you learn from audience  feedback
What did you learn from audience feedback
 
Taller técnicas efectivas de cobranza
Taller técnicas efectivas de cobranzaTaller técnicas efectivas de cobranza
Taller técnicas efectivas de cobranza
 
Мониторинг социальных настроений стран постсоветского пространства 2004-2012
Мониторинг социальных настроений стран постсоветского пространства 2004-2012Мониторинг социальных настроений стран постсоветского пространства 2004-2012
Мониторинг социальных настроений стран постсоветского пространства 2004-2012
 
RP Singh
RP SinghRP Singh
RP Singh
 
Round up 5
Round up 5Round up 5
Round up 5
 
LEGO® Bricks and the Box
LEGO® Bricks and the BoxLEGO® Bricks and the Box
LEGO® Bricks and the Box
 

Similar to Transport Service Requirements and Internet Protocols (20)

D.N.S
D.N.SD.N.S
D.N.S
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
Dns detail understanding
Dns detail understandingDns detail understanding
Dns detail understanding
 
Dns and irc
Dns and ircDns and irc
Dns and irc
 
Internet Domains
Internet DomainsInternet Domains
Internet Domains
 
Dns And Snmp
Dns And SnmpDns And Snmp
Dns And Snmp
 
Secure shell (ssh)
Secure shell (ssh)Secure shell (ssh)
Secure shell (ssh)
 
Dns
DnsDns
Dns
 
6065165.ppt
6065165.ppt6065165.ppt
6065165.ppt
 
DIAPOSITIVAS DNS HTTP SMTP
DIAPOSITIVAS DNS HTTP SMTPDIAPOSITIVAS DNS HTTP SMTP
DIAPOSITIVAS DNS HTTP SMTP
 
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNS
 
Dns
DnsDns
Dns
 
DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
Internet Host Name
Internet Host NameInternet Host Name
Internet Host Name
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Linux basics andng hosti
Linux basics andng hostiLinux basics andng hosti
Linux basics andng hosti
 
Presentation
PresentationPresentation
Presentation
 
Domain name server
Domain name serverDomain name server
Domain name server
 
Presentation
PresentationPresentation
Presentation
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 

More from syedhaiderraza (20)

Week16 lec1
Week16 lec1Week16 lec1
Week16 lec1
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
Week14 lec1
Week14 lec1Week14 lec1
Week14 lec1
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Week13 lec1
Week13 lec1Week13 lec1
Week13 lec1
 
Week11 lec2
Week11 lec2Week11 lec2
Week11 lec2
 
Week11 lec1
Week11 lec1Week11 lec1
Week11 lec1
 
Week10 lec1
Week10 lec1Week10 lec1
Week10 lec1
 
Week9 lec1
Week9 lec1Week9 lec1
Week9 lec1
 
Week8 lec2-bscs1
Week8 lec2-bscs1Week8 lec2-bscs1
Week8 lec2-bscs1
 
Week8 lec1-bscs1
Week8 lec1-bscs1Week8 lec1-bscs1
Week8 lec1-bscs1
 
Week5 lec3-bscs1
Week5 lec3-bscs1Week5 lec3-bscs1
Week5 lec3-bscs1
 
Week5 lec2-bscs1
Week5 lec2-bscs1Week5 lec2-bscs1
Week5 lec2-bscs1
 
Week5 lec1-bscs1
Week5 lec1-bscs1Week5 lec1-bscs1
Week5 lec1-bscs1
 
Week4 lec2-bscs1
Week4 lec2-bscs1Week4 lec2-bscs1
Week4 lec2-bscs1
 
Week4 lec1-bscs1
Week4 lec1-bscs1Week4 lec1-bscs1
Week4 lec1-bscs1
 
Week3 lec3-bscs1
Week3 lec3-bscs1Week3 lec3-bscs1
Week3 lec3-bscs1
 
Week3 lec 1
Week3 lec 1Week3 lec 1
Week3 lec 1
 
Week2 lec3-bscs1
Week2 lec3-bscs1Week2 lec3-bscs1
Week2 lec3-bscs1
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Transport Service Requirements and Internet Protocols

  • 1. Chapter 2 Application Layer Computer Networking: A Top Down Approach, 4th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.
  • 2. What Transport Service does an Application need? Data Loss  Loss Tolerant Applications   Some apps (e.g., audio, VoIP) can tolerate some loss 2% tolerable for VoIP  Other apps (e.g., file transfer, email) require 100% reliable data transfer Timing  Application may require timing guarantee  Tight timing constraints multiplayer games, VoIP, teleconferencing.  In Non-real time lower delays are preferred but no tight constraint on end-to-end delays.  Throughput  Bandwidth sensitive applications (e.g., multimedia) require minimum amount of throughput  Other apps (“elastic apps”) make use of whatever throughput they get  e.g .Email, file transfer Security  Encryption and decryption
  • 3. Transport Service Requirements of Common Applications Data loss Throughput Time Sensitive file transfer e-mail Web documents real-time audio/video no loss no loss no loss loss-tolerant no no no yes, 100’s msec stored audio/video interactive games loss-tolerant loss-tolerant elastic elastic elastic audio: 5kbps-1Mbps video:10kbps-5Mbps same as above few kbps -10kbps Application yes, few secs yes, 100’s msec
  • 4. Internet transport protocols services TCP service:      connection-oriented: setup required between client and server processes reliable transport between sending and receiving process flow control: sender won’t overwhelm receiver congestion control: throttle sender when network overloaded does not provide: timing, minimum throughput guarantees, security UDP service:  unreliable data transfer between sending and receiving process  does not provide: connection setup, reliability, flow control, security  Throughput and timing guarantee not provided
  • 5. Internet Applications: application, transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia Internet telephony Application layer protocol Underlying transport protocol SMTP [RFC 2821] Telnet [RFC 854] HTTP [RFC 2616] FTP [RFC 959] RTP [RFC 1889] TCP TCP TCP TCP UDP SIP, Skype UDP
  • 6. DNS: Domain Name System People: many identifiers:  SSN, name, passport # Internet hosts:   IP address (32 bit) “name”, e.g., ww.yahoo.com - used by humans Q: map between IP addresses and name ? Domain Name System:  Distributed Database implemented in hierarchy of many DNS servers  An application-layer protocol that allows hosts to query the distributed database  DNS uses UDP over port number 53.  RFC 1034 and RFC 1035
  • 7. DNS Simple design would have one DNS server that contains all the mappings Why not centralize DNS?  Single point of failure  Traffic volume  Distant centralized database  Maintenance A centralized database in a single DNS server doesn’t scale!
  • 8. Distributed, Hierarchical Database Root DNS Servers com DNS servers yahoo.com amazon.com DNS servers DNS servers org DNS servers pbs.org DNS servers edu DNS servers poly.edu umass.edu DNS servers DNS servers Client wants IP for www.amazon.com:  Client first queries a root server  The root server returns the IP addresses for TLD servers for the top level domain com  The client then contacts one of the TLD servers which returns the IP address of an authoritative server for amazon.com  The authoritative server then returns the IP address for the host name www.amazon.com
  • 9. DNS: Root Name Servers  13 root DNS servers world wide  Each server is a cluster of replicated servers  security and reliability purposes.  For more information see www.root-servers.org a Verisign, Dulles, VA c Cogent, Herndon, VA (also LA) d U Maryland College Park, MD g US DoD Vienna, VA h ARL Aberdeen, MD j Verisign, ( 21 locations) e NASA Mt View, CA f Internet Software C. Palo Alto, CA (and 36 other locations) b USC-ISI Marina del Rey, CA l ICANN Los Angeles, CA k RIPE London (also 16 other locations) i Autonomica, Stockholm (plus 28 other locations) m WIDE Tokyo (also Seoul, Paris, SF)
  • 10. TLD and Authoritative Servers  Top-level Domain (TLD) Servers:  Responsible for com, org, net, edu, etc, and all top-level country domains uk, fr, jp.  Network Solutions maintains servers for com TLD  Educause for edu TLD  ICANN: Internet Corporation for Assigned Names and Numbers  Authoritative DNS Servers:  Every organization with publicly accessible hosts provide accessible DNS records.  That maps the names of those hosts to IP addresses Authoritative DNS servers houses these DNS records
  • 11. Local Name Server  Does not strictly belong to hierarchy  Each company, university has one.  Also called “default name server”  When host makes DNS query, query is sent to its local DNS server  acts as proxy, forwards query into hierarchy
  • 12. DNS name resolution example root DNS server 2  Host at cis.poly.edu 3 wants IP address for gaia.cs.umass.edu Iterated query:  Contacted server replies with name of server to contact.  “I don’t know this name, but ask this server”. TLD DNS server 4 5 local DNS server dns.poly.edu 1 8 requesting host 7 6 authoritative DNS server dns.cs.umass.edu cis.poly.edu gaia.cs.umass.edu
  • 13. DNS name resolution example Recursive Query: 2  Puts burden of name resolution on other server. DNS Caching  Extensively used  Cache entries timeout (disappear) after some time  TLD servers typically cached in local name servers  Thus root name servers not often visited root DNS server 3 7 6 TLD DNS server local DNS server dns.poly.edu 1 5 4 8 requesting host authoritative DNS server dns.cs.umass.edu cis.poly.edu gaia.cs.umass.edu
  • 14. Assignment 1  Statefulness in HTTP  Web Caches (Conditional GET statement)  Cookies (Set Cookie Header)