Computer Networks5
Computer Networks5
COMPUTER NETWORKS
Arno Fischer
Introductions 1
• Professor: Arno Fischer
• 3. Semester CS Students (You must attend at least 60 percent
of all events!)
• Content of course is partly based on the books Computer
Networks and Internet, Douglas E. Comer and LINUX
programming, Richard Stones and Neil Matthew
• Grading is based on knowledge gained (you must write a test)
and active participation in the exercises (you must give a short
presentation about networking issues and about your
programming work and hand in program code and
presentations)
16.10.2024 Arno Fischer ©2024 SRH Berlin 2
Introductions 2
• Theorie: mainly based on the content of the slides and some extra
calculation exercises demonstrated
• active participation:
• Short presentation of some network services (based on youtube
videos)
• Use of wireshark
• Programming in c using stuff from Comer or Stones, sockets,
client/server Applications with visual studio code and/or shell-
terminal
• Programming in python using stuff from neuralnine network
Applications using PyCharm CE and shell
• Fundamental principles
• Concepts
• Terminology (lots of it)
• Key aspects of networking
• Commercial aspects
• Vendors
• Products
• Prices
• Markets and marketing
• How to engineer network equipment
• How to configure/operate networks
• How to design new protocols
Questions?
• Closed networks
• Vertical approach
• Each vendor designs/ builds their own
• Given technology owned by vendor
• Vendor may license technology to other groups
• Open networks
• Competitive approach
• Multiple groups collaborate to define a technology
• To insure interoperability, specifications written in standards documents that are
available to everyone
• Companies build products according to standards
Questions?
Jon Postel wrote this in an early version of the TCP specification in 1980, and it has since been
referred to as Postel's Law.
No!
16.10.2024 Arno Fischer ©2024 SRH Berlin 47
A Few Subtle Complications Of
Layering
• Layering diagrams are abstract and simplistic
• Details and exceptions complicate practical systems
• Four examples
• Cross-layer communication
• Multiple protocols per layer
• Layering in an Internet
• Technologies that intertwine layers
• Cross-layer functions
• Routing protocols operate at layer 5 but change layer 3 forwarding tables
• Address resolution maps layer 3 addresses to layer 2 addresses
• Layer circularities
• Tunneling can be used to send IPv6 (a layer 3 protocol) over IPv4 (another
layer 3 protocol)
• Virtual Private Networks (VPNs) send IP over IP
Questions?
Hire really, really smart people and have them design a single,
large protocol that handles all aspects of communication
without dividing the problem into smaller subproblems
Questions?
• Consequence
• Every Internet communication, including voice and video teleconferencing, involves
communication among application programs Computer
Questions?
• Web browsing
• Email
• File transfer
• Remote login and remote desktop
• Domain Name System (name lookup)
• Web browsing
• Email
• File transfer
• Remote login and remote desktop
• Domain Name System (name lookup)
https://www.srh-berlin.de/hochschule/hochschulteam/hartmann-michael/
Connected to www.srh-berlin.de .
Escape character is ’^]’.
GET /hochschule/hochschulteam/hartmann-michael/ HTTP/1.0
HTTP/1.1 200 OK
Date: Mon, 10 Oct 2022 11:38:27 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.8r
Last-Modified: Mon, 17 Oct 2021 22:21:41 GMT
ETag: "bafb0-a50-4af8607f7c740"
Accept-Ranges: bytes
Content-Length: 2640
Connection: close
Content-Type: text/html
...data from the web page follows here
• Web browsing
• Email
• File transfer
• Remote login and remote desktop
• Domain Name System (name lookup)
• Each part of the message has a MIME header that starts with the separator
and specifies content type and encoding
• Example
--xyz123
Content-Type: image/jpeg
<---blank line ends header
• Web browsing
• Email
• File transfer
• Remote login and remote desktop
• Domain Name System (name lookup)
• Web browsing
• Email
• File transfer
• Remote login and remote desktop
• Domain Name System (name lookup)
• Remote login
• Intended for systems with command-line interface
• Internet standard is TELNET
• Secure shell (ssh) encrypts transfers
• To appreciate the complexity of application protocols look at the TELNET
standard
• Remote desktop
• Intended for systems that have a Graphical User Interface (GUI)
• No Internet standards
• Move to thin client has revived interest
• Web browsing
• Email
• File transfer
• Remote login and remote desktop
• Domain Name System (name lookup)
• Although convenient for humans, a host name does not specify which
servers are running (e,g., a computer named mail could run a web
server)
Given:
A request message from a DNS name resolver
Provide:
A response message that contains the address
Method:
Extract the name, N, from the request
if ( server is an authority for N ) {
Form and send an authoritative response
to the requester;
else if ( answer for N is in the cache ) {
Form and send a nonauthoritative response
to the requester;
Questions?
16.10.2024 Arno Fischer ©2024 SRH Berlin 143
Questions?