Computer Networking A Top-Down Approach Featuring the Internet phần 3 doc

67 471 1
Computer Networking A Top-Down Approach Featuring the Internet phần 3 doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Keith\book\applications\smtp provide functionality that allows a user to pause/resume a message or to reposition within a message; furthermore, streaming over TCP is often leads to poor reception (see Chapter 6) These inadequacies will hopefully be addressed in the upcoming years Possible solutions are discussed in [Gay 1997] [Hess 1998] [Shurman 1996] and [Turner 1999] References In addition to the references below, a readable but detailed, overview of modern electronic mail is given in [Hughes 1998] [Gay 1997] V Gay and B Dervella, "MHEGAM - A Multimedia Messaging System," IEEE Multimedia Magazine, Oct-Dec 1997, pp 22-29 [Hess 1998] C Hess, D Lin and K Nahrstedt, "VistaMail: An Integrated Multimedia Mailing System," IEEE Multimedia Magazine, Oct.-Dec, 1988, pp 13-23 [Hughes 1998] L Hughes, Internet E-mail: Protocols, Standards and Implementation, Artech House, Norwood, MA, 1998 [Padhye 1999] J Padhye and J Kurose, "An Empirical Study of Client Interactions with a Continuous-Media Courseware Server," IEEE Internet Computing, April 1999 [RFC 821] J.B Postel, "Simple Mail Transfer Protocol," [RFC 821], August 1982 [RFC 822] D.H Crocker, "Standard for the Format of ARPA Internet Text Messages," [RFC 822], August 1982 [RFC 977] B Kantor and P Lapsley, "Network News Transfer Protocol," [RFC 977], February 1986 [RFC 1730] M Crispin, "Internet Message Access Protocol - Version 4," [RFC 1730], December 1994 [RFC 1911] G Vaudreuil, "Voice Profil for Internet Mail," [RFC 1911], February 1996 [RFC 1939] J Myers and M Rose, "Post Office Protocol - Version 3," [RFC 1939], May 1996 [RFC 2045] N Borenstein and N Freed, "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies," [RFC 2045], November 1996 [RFC 2046] N Borenstein and N Freed, "Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types," [RFC 2046], November 1996 [RFC 2048] N Freed, J Klensin and J Postel "Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures," [RFC 2048], November 1996 [Schurmann 1996] G Schurmann, "Multimedia Mail," Multimedia Systems, ACM Press, Oct 1996, pp 281-295 [Turner 1999] D.A Turner and K.W Ross, "Continuous-Media Internet E-Mail: Infrastructure Inadequacies and Solutions, http://www.eurecom.fr/~ross/MMNetLab.htm Search RFCs and Internet Drafts If you are interested in an Internet Draft relating to a certain subject or protocol enter the keyword(s) here Query: Press button to submit your query or reset the form: Submit Reset Query Options: Case insensitive Maximum number of hits: 25 file:///D|/Downloads/Livros/computaỗóo/Computer%20Ne own%20Approach%20Featuring%20the%20Internet/smtp.htm (13 of 14)20/11/2004 15:51:55 Keith\book\applications\smtp Return to Table Of Contents Copyright Keith W Ross and James F Kurose 1996-2000 All rights reserved file:///D|/Downloads/Livros/computaỗóo/Computer%20Ne own%20Approach%20Featuring%20the%20Internet/smtp.htm (14 of 14)20/11/2004 15:51:55 The Domain Name System 2.5 DNS - The Internet's Directory Service We human beings can be identified in many ways For example, we can be identified by the names that appear on our birth certificates We can be identified by our social security numbers We can be identified by our driver's license numbers Although each of these identifiers can be used to identify people, within a given context, one identifier may be more appropriate than an other For example, the computers at the IRS (the infamous tax collecting agency in the US) prefer to use fixed-length social security numbers rather than birth-certificate names On the other hand, ordinary people prefer the more mnemonic birth-certificate names rather than social security numbers (Indeed, can you imagine saying, "Hi My name is 13267-9875 Please meet my husband, 178-87-1146.") Just as humans can be identified in many ways, so too can Internet hosts One identifier for a host is its hostname Hostnames such as cnn.com, www.yahoo.com, gaia.cs.umass.edu and surf.eurecom.fr are mnemonic and are therefore appreciated by humans However, hostnames provide little, if any, information about the location within the Internet of the host (A hostname such as surf.eurecom.fr, which ends with the country code fr, tells us that the host is in France, but doesn't say much more.) Furthermore, because hostnames can consist of variable-length alpha-numeric characters, they would be difficult to process by routers For these reasons, hosts are also identified by so-called IP addresses We will discuss IP addresses in some detail in Chapter 4, but it is useful to say a few brief words about them now An IP address consists of four bytes and has a rigid hierarchical structure An IP address looks like 121.7.106.83, where each period separates one of the bytes expressed in decimal notation from to 127 An IP address is hierarchical because as we scan the address from left to right, we obtain more and more specific information about where (i.e., within which network, in the network of networks) the host is located in the Internet (Just as when we scan a postal address from bottom to top we obtain more and more specific information about where the residence is located) An IP address is included in the header of each IP datagram, and Internet routers use this IP address to route s datagram towards its destination 2.5.1 Services Provided by DNS We have just seen that there are two ways to identify a host a hostname and an IP address People prefer the more mnemonic hostname identifier, while routers prefer fixed-length, hierarchically-structured IP addresses In order to reconcile these different preferences, we need a directory service that translates hostnames to IP addresses This is the main task of the the Internet's Domain Name System (DNS) The DNS is (i) a distributed database implemented in a hierarchy of name servers and (ii) an application-layer protocol that allows hosts and name servers to communicate in order to provide the translation service Name servers are usually Unix machines running the Berkeley Internet Name Domain (BIND) software The DNS protocol runs over UDP and uses port 53 Following this chapter we provide interactive links to DNS programs that allow you to translate arbitrary hostnames, among other things DNS is commonly employed by other application-layer protocols including HTTP, SMTP and FTP - to translate usersupplied host names to IP addresses As an example, consider what happens when a browser (i.e., an HTTP client), running on some user's machine, requests the URL www.someschool.edu/index.html In order for the user's machine to be able to send an HTTP request message to the Web server www.someschool.edu, the user's machine must obtain the IP address of www someschool.edu This is done as follows The same user machine runs the client-side of the DNS application The browser extracts the hostname, www.someschool.edu, from the URL and passes the hostname to the client-side of the DNS application As part of a DNS query message, the DNS client sends a query containing the hostname to a DNS server The DNS client eventually receives a reply, which includes the IP address for the hostname The browser then opens a TCP connection to the HTTP server process located at that IP address All IP datagrams sent to from the client to server as part of this connection will include this IP address in the destination address field of the datagrams In particular, the IP datagram(s) that encapsulate the HTTP request message use this IP address We see from this example that DNS adds an additional delay sometimes substantial to the Internet applications that use DNS Fortunately, as we shall discuss below, the desired IP address is often cached in a "near by" DNS name server, which helps to reduce the DNS network traffic as well as the average DNS delay file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (1 of 10)20/11/2004 15:51:57 The Domain Name System Like HTTP, FTP, and SMTP, the DNS protocol is an application-layer protocol since (i) it runs between communicating end systems (again using the client-server paradigm), and (ii) it relies on an underlying end-to-end transport protocol (i.e., UDP) to transfer DNS messages between communicating end systems In another sense, however, the role of the DNS is quite different from Web, file transfer, and email applications Unlike these applications, the DNS is not an application with which a user directly interacts Instead, the DNS provides a core Internet function namely, translating hostnames to their underlying IP addresses, for user applications and other software in the Internet We noted earlier in Section 1.2 that much of the "complexity" in the Internet architecture is located at the "edges" of the network The DNS, which implements the critical name-to-address translation process using clients and servers located at the edge of the network, is yet another example of that design philosophy DNS provides a few other important services in addition to translating hostnames to IP addresses: q q q Host aliasing: A host with a complicated hostname can have one or more alias names For example, a hostname such as relay1.west-coast.enterprise.com could have, say, two aliases such as enterprise.com and www.enterprise.com In this case, the hostname relay1.west-coast.enterprise.com is said to be canonical hostname Alias hostnames, when present, are typically more mnemonic than a canonical hostname DNS can be invoked by an application to obtain the canonical hostname for a supplied alias hostname as well as the IP address of the host Mail server aliasing: For obvious reasons, it is highly desirable that email addresses be mnemonic For example, if Bob has an account with Hotmail, Bob's email address might be as simple as bob@hotmail.com However, the hostname of the Hotmail mail server is more complicated and much less mnemonic than simply hotmail.com (e.g., the canonical hostname might be something like relay1.west-coast.hotmail.com) DNS can be invoked by a mail application to obtain the canonical hostname for a supplied alias hostname as well as the IP address of the host In fact, DNS permits a company's mail server and Web server to have identical (aliased) hostnames; for example, a company's Web server and mail server can both be called enterprise.com Load Distribution: Increasingly, DNS is also being used to perform load distribution among replicated servers, such as replicated Web servers Busy sites, such as cnn.com, are replicated over multiple servers, with each server running on a different end system, and having a different IP address For replicated Web servers, a set of IP addresses is thus associated with one canonical hostname The DNS database contains this set of IP addresses When clients make a DNS query for a name mapped to a set of addresses, the server responds with the entire set of IP addresses, but rotates the ordering of the addresses within each reply Because a client typically sends its HTTP request message to the IP address that is listed first in the set, DNS rotation distributes the traffic among all the replicated servers DNS rotation is also used for email so that multiple mail servers can have the same alias name The DNS is specified in [RFC 1034] and [RFC 1035], and updated in several additional RFCs It is a complex system, and we only touch upon key aspects of its operation here The interested reader is referred to these RFCs and the book [Abitz 1993] 2.5.2 Overview of How DNS Works We now present a high-level overview of how DNS works Our discussion shall focus on the hostname to IP address translation service From the client's perspective, the DNS is a black box The client sends a DNS query message into the black box, specifying the hostname that needs to be translated to an IP address On many Unix-based machines, gethostbyname() is the library routine that an application calls in order to issue the query message In Section 2.7, we shall present a Java program that begins by issuing a DNS query After a delay, ranging from milliseconds to tens of seconds, the client receives a DNS reply message that provides the desired mapping Thus, from the client's perspective, DNS is a simple, straightforward translation service But in fact, the black box that implements the service is complex, consisting of large number of name servers distributed around the globe, as well as an application-layer protocol that specifies how the name servers and querying hosts communicate file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (2 of 10)20/11/2004 15:51:57 The Domain Name System A simple design for DNS would have one Internet name server that contains all the mappings In this centralized design, clients simply direct all queries to the single name server, and the name server responds directly to the querying clients Although the simplicity of this design is attractive, it is completely inappropriate for today's Internet, with its vast (and growing) number of hosts The problems with a centralized design include: q q q q A single point of failure If the name server crashes, so too does the entire Internet! Traffic volumes A single name server would have to handle all DNS queries (for all the HTTP requests, email messages, etc generated from millions of hosts) Distant centralized database A single name server cannot be "close" to all the querying clients If we put the single name server in New York City, then all queries from Australia must travel to the other side of the globe, perhaps over slow and congested links This can lead to significant delays (thereby increasing the "world wide wait" for the Web and other applications) Maintenance The single name server would have to keep records for all Internet hosts Not only would this centralized database be huge, but it would have to be updated frequently to account for every new host There are also authentication and authorization problems associated with allowing any user to register a host with the centralized database In summary, a centralized database in a single name server simply doesn't scale Consequently, the DNS is distributed by design In fact, the DNS is a wonderful example of how a distributed database can be implemented in the Internet In order to deal with the issue of scale, the DNS uses a large number of name servers, organized in a hierarchical fashion and distributed around the world No one name server has all of the mappings for all of the hosts in the Internet Instead, the mappings are distributed across the name servers To a first approximation, there are three types of name servers: local name servers, root name servers, and authoritative name servers These name servers, again to a first approximation, interact with each other and with the querying host as follows: q q q Local name servers: Each ISP - such as a university, an academic department, an employee's company or a residential ISP - has a local name server (also called a default name server) When a host issues a DNS query message, the message is first sent to the host's local name server The IP address of the local name server is typically configured by hand in a host (On a Windows 95/98 machine, you can find the IP address of the local name server used by your PC by opening the Control Panel, and then selecting "Network", then selecting an installed TCP/IP component, and then selecting the DNS configuration folder tab.) The local name server is typically "close" to the client; in the case of an institutional ISP, it may be on the same LAN as the client host; for a residential ISP, the name server is typically separated from the client host by no more than a few routers If a host requests a translation for another host that is part of the same local ISP, then the local name server will be able to immediately provide the the requested IP address For example, when the host surf.eurecom.fr requests the IP address for baie.eurecom.fr, the local name server at Eurecom will be able to provide the requested IP address without contacting any other name servers Root name servers: In the Internet there are a dozen or so of "root name servers," most of which are currently located in North America A February 1998 map of the root servers is shown in Figure 2.5-1 When a local name server cannot immediately satisfy a query from a host (because it does not have a record for the hostname being requested), the local name server behaves as a DNS client and queries one of the root name servers If the root name server has a record for the hostname, it sends a DNS reply message to the local name server, and the local name server then sends a DNS reply to the querying host But the root name server may not have a record for the hostname Instead, the rootname server knows the IP address of an "authoritative name server" that has the mapping for that particular hostname Authoritative name servers: Every host is registered with an authoritative name server Typically, the authoritative name server for a host is a name server in the host's local ISP (Actually, each host is required to have at least two authoritative name servers, in case of failures.) By definition, a name server is authoritative for a host if it always has a DNS record that translates the host's hostname to that host's IP address When an authoritative name server is queried by a root server, the authoritative name server responds with a DNS reply that contains the requested mapping The root server then forwards the mapping to the local name server, which in turn forwards the mapping to the requesting file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (3 of 10)20/11/2004 15:51:57 The Domain Name System host Many name servers act as both local and and authoritative name servers Figure 2.5-1: A February 1998 map of the DNS root servers Obtained from the WIA alliance Web site (http://www.wia.org) Let's take a look at a simple example Suppose the host surf.eurecom.fr desires the IP address of gaia.cs.umass.edu Also suppose that Eurecom's local name server is called dns.eurecom.fr and that an authoritative name server for gaia.cs.umass.edu is called dns.umass.edu As shown in Figure 2.5-2, the host surf.eurecom.fr first sends a DNS query message to its local name server, dns.eurecom.fr The query message contains the hostname to be translated, namely, gaia.cs.umass.edu The local name server forwards the query message to a root name server The root name server forwards the query message to the name server that is authoritative for all the hosts in the domain umass.edu, namely, to dns.umass.edu The authoritative name server then sends the desired mapping to the querying host, via the root name server and the local name server Note that in this example, in order to obtain the mapping for one hostname, six DNS messages were sent: three query messages and three reply messages file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (4 of 10)20/11/2004 15:51:57 The Domain Name System Figure 2.5-2: Recursive queries to obtain the mapping for gaia.cs.umass.edu Our discussion up to this point has assumed that the root name server knows the IP address of an authoritative name server for every hostname This assumption may be incorrect For a given hostname, the root name server may only know the IP address of an intermediate name server that in turn knows the IP address of an authoritative name server for the hostname To illustrate this, consider once again the above example with the host surf.eurecom.fr querying for the IP address of gaia.cs umass.edu Suppose now that the University of Massachusetts has a name server for the university, called dns.umass.edu Also suppose that each of the departments at University of Massachusetts has its own name server, and that each departmental name server is authoritative for all the hosts in the department As shown in Figure 2.5-3, when the root name server receives a query for a host with hostname ending with umass.edu it forwards the query to the name server dns.umass.edu This name server forwards all queries with hostnames ending with cs.umass.edu to the name server dns.cs.umass.edu, which is authoritative for all hostnames ending with cs.umass.edu The authoritative name server sends the desired mapping to the intermediate name server, dns.umass.edu, which forwards the mapping to the root name server, which forwards the mapping to the local name server, dns.eurecom.fr, which forwards the mapping to the requesting host! In this example, eight DNS messages are sent Actually, even more DNS messages can be sent in order to translate a single hostname - there can be two or more intermediate name servers in the chain between the root name server and the authoritative name server! file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (5 of 10)20/11/2004 15:51:57 The Domain Name System Figure 2.5-3: Recursive queries with an intermediate name server between the root and authoritative name servers The examples up to this point assumed that all queries are recursive queries When a host or name server A makes a recursive query to a name server B, then name server B obtains the requested mapping on behalf of A and then forwards the mapping to A The DNS protocol also allows for iterative queries at any step in the chain between requesting host and authoritative name server When a name server A makes an iterative query to name server B, if name server B does not have the requested mapping, it immediately sends a DNS reply to A that contains the IP address of the next name server in the chain, say, name server C Name server A then sends a query directly to name server C In the sequence of queries that are are required to translate a hostname, some of the queries can be iterative and others recursive Such a combination of recursive and iterative queries is illustrated in Figure 2.5-4 Typically, all queries in the query chain are recursive except for the query from the local name server to the root name server, which is iterative (Because root servers handle huge volumes of queries, it is preferable to use the less burdensome iterative queries for root servers.) file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (6 of 10)20/11/2004 15:51:57 The Domain Name System Figure 2.5-4: A query chain with recursive and iterative queries Our discussion this far has not touched on one important feature of the DNS: DNS caching In reality, DNS extensively exploits caching in order to improve the delay performance and to reduce the number of DNS messages in the network The idea is very simple When a name server receives a DNS mapping for some hostname, it caches the mapping in local memory (disk or RAM) while passing the message along the name server chain Given a cached hostname/ IPaddress translation pair, if another query arrives to the name server for the same hostname, the name server can provide the desired IP address, even if it is not authoritative for the hostname In order to deal with the ephemeral hosts, a cached record is discarded after a period of time (often set to two days) As an example, suppose that surf.eurecom.fr queries the DNS for the IP address for the hostname cnn.com Furthermore suppose that a few hours later, another Eurecom host, say baie.eurecom.fr, also queries DNS with the same hostname Because of caching, the local name server at Eurecom will be able to immediately return the IP address to the requesting host without having to query name servers on another continent Any name server may cache DNS mappings 2.5.3 DNS Records The name servers that together implement the DNS distributed database, store Resource Records (RR) for the hostname to IP address mappings Each DNS reply message carries one or more resource records In this and the following subsection, we provide a brief overview of DNS resource records and messages; more details can be found in [Abitz] or in the DNS RFCs [RFC 1034] [RFC 1035] A resource record is a four-tuple that contains the following fields: file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (7 of 10)20/11/2004 15:51:57 The Domain Name System (Name, Value, Type, TTL) TTL is the time to live of the resource record; it determines the time at which a resource should be removed from a cache In the example records given below, we will ignore the TTL field The meaning of Name and Value depend on Type: q q q q If Type=A, then Name is a hostname and Value is the IP address for the hostname Thus, a Type A record provides the standard hostname to IP address mapping As an example, (relay1.bar.foo.com, 145.37.93.126, A) is a Type A record If Type=NS, then Name is a domain (such as foo.com) and Value is the hostname of a server that knows how to obtain the IP addresses for hosts in the domain This record is used to route DNS queries further along in the query chain As an example, (foo.com, dns.foo.com, NS) is a Type NS record If Type=CNAME, then Value is a canonical hostname for the alias hostname Name This record can provide querying hosts the canonical name for a hostname As an example, (foo.com, relay1.bar.foo.com, CNAME) is a CNAME record If Type=MX, then Value is a hostname of a mail server that has an alias hostname Name As an example, (foo com mail.bar.foo.com, MX) is an MX record MX records allow the hostnames of mail servers to have simple aliases If a name server is authoritative for a particular hostname, then the name server will contain a Type A record for the hostname (Even if the name server is not authoritative, it may contain a Type A record in its cache.) If a server is not authoritative for a hostname, then the server will contain a Type NS record for the domain that includes the hostname; it will also contain a Type A record that provides the IP address of the name server in the Value field of the NS record As an example, suppose a root server is not authoritative for the host gaia.cs.umass.edu Then the root server will contain a record for a domain that includes the host cs.umass.edu, e.g., (umass.edu, dns.umass.edu, NS) The root server would also contain a type A record which maps the name server dns.umass.edu to an IP address, e.g., (dns.umass.edu, 128.119.40.111, A) 2.5.4 DNS Messages Earlier in this section we alluded to DNS query and reply messages These are the only two kinds of DNS messages Furthermore, both request and reply messages have the same format, as shown in Figure 2.5-5 file:///D|/Downloads/Livros/computaỗóo/Computer%20Net -Down%20Approach%20Featuring%20the%20Internet/dns.htm (8 of 10)20/11/2004 15:51:57 Multiplexing and Demultiplexing Network Applications Figure 3.2-3: Two clients, using the same port numbers to communicate with the same server application Now that we understand how the transport layer can multiplex and demultiplex messages from/to network applications, let's move on and discuss one of the Internet's transport protocols, UDP In the next section we shall see that UDP adds little more to the network layer protocol than multiplexing/demultiplexing service References [RFC 1700] J Reynolds and J Postel, "Assigned Numbers," RFC 1700, October 1994 Return to Table of Contents Copyright 1996-2000 Keith W Ross and James F Kurose file:///D|/Downloads/Livros/computaỗóo/Computer%20Net own%20Approach%20Featuring%20the%20Internet/fund.html (4 of 4)20/11/2004 15:52:04 UDP: the User Datagram Protocol 3.3 Connectionless Transport: UDP The Internet makes two transport protocols available to its applications, UDP and TCP In this section we take a close look at UDP: how it works and what it does The reader is encouraged to refer back to material in Section 2.1, which includes an overview of the UDP service model, and to the material in Section 2.7, which discusses socket programming over UDP To motivate our discussion about UDP, suppose you were interested in designing a no-frills, bare-bones transport protocol How might you go about doing this? You might first consider using a vacuous transport protocol In particular, on the sending side, you might consider taking the messages from the application process and passing them directly to the network layer; and on the receiving side, you might consider taking the messages arriving from the network layer and passing them directly to the application process But as we learned in the previous section, we have to a little more than nothing At the very least, the transport layer must provide a multiplexing/demultiplexing service in order to pass data between the network layer and the correct application UDP, defined in [RFC 768], does just about as little as a transport protocol can Aside from the multiplexing/demultiplexing function and some light error checking, it adds nothing to IP In fact, if the application developer chooses UDP instead of TCP, then the application is talking almost directly with IP UDP takes messages from application process, attaches source and destination port number fields for the multiplexing/demultiplexing service, adds two other fields of minor importance, and passes the resulting "segment" to the network layer The network layer encapsulates the segment into an IP datagram and then makes a best-effort attempt to deliver the segment to the receiving host If the segment arrives at the receiving host, UDP uses the port numbers and the IP source and destination addresses to deliver the data in the segment to the correct application process Note that with UDP there is no handshaking between sending and receiving transport-layer entities before sending a segment For this reason, UDP is said to be connectionless DNS is an example of an application-layer protocol that uses UDP When the DNS application (see section 2.5) in a host wants to make a query, it constructs a DNS query message and passes the message to a UDP socket (see Section 2.7) Without performing any handshaking, UDP adds a header fields to the message and passes the resulting segment to the network layer The network layer encapsulates the UDP segment into a datagram and sends the datagram to a name server The DNS application at the querying host then waits for a reply to its query If it doesn't receive a reply (possibly because UDP lost the query or the reply), it either tries sending the query to another nameserver, or it informs the invoking application that it can't get a reply We mention that the DNS specification permits DNS to run over TCP instead of UDP; in practice, however, DNS almost always runs over UDP Now you might be wondering why an application developer would ever choose to build an application over UDP rather than over TCP Isn't TCP always preferable to UDP since TCP provides a reliable data file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (1 of 7)20/11/2004 15:52:05 UDP: the User Datagram Protocol transfer service and UDP does not? The answer is no, as many applications are better suited for UDP for the following reasons: q q q q No connection establishment As we shall discuss in Section 3.5, TCP uses a three-way handshake before it starts to transfer data UDP just blasts away without any formal preliminaries Thus UDP does not introduce any delay to establish a connection This is probably the principle reason why DNS runs over UDP rather than TCP DNS would be much slower if it ran over TCP HTTP uses TCP rather than UDP, since reliability is critical for Web pages with text But, as we briefly discussed in Section 2.2, the TCP connection establishment delay in HTTP is an important contributor to the "world wide wait" No connection state TCP maintains connection state in the end systems This connection state includes receive and send buffers, congestion control parameters, and sequence and acknowledgment number parameters We will see in Section 3.5 that this state information is needed to implement TCP's reliable data transfer service and to provide congestion control UDP, on the other hand, does not maintain connection state and does not track any of these parameters For this reason, a server devoted to a particular application can typically support many more active clients when the application runs over UDP rather than TCP Small segment header overhead The TCP segment has 20 bytes of header overhead in every segment, whereas UDP only has bytes of overhead Unregulated send rate TCP has a congestion control mechanism that throttles the sender when one or more links between sender and receiver becomes excessively congested This throttling can have a severe impact on real-time applications, which can tolerate some packet loss but require a minimum send rate On the other hand, the speed at which UDP sends data is only constrained by the rate at which the application generates data, the capabilities of the source (CPU, clock rate, etc.) and the access bandwidth to the Internet We should keep in mind, however, that the receiving host does not necessarily receive all the data - when the network is congested, a significant fraction of the UDP-transmitted data could be lost due to router buffer overflow Thus, the receive rate is limited by network congestion even if the sending rate is not constrained Table 3.1-1 lists popular Internet applications and the transport protocols that they use As we expect, email, remote terminal access, the Web and file transfer run over TCP these applications need the reliable data transfer service of TCP Nevertheless, many important applications run over UDP rather TCP UDP is used for RIP routing table updates (see Chapter on the network layer), because the updates are sent periodically, so that lost updates are replaced by more up-to-date updates UDP is used to carry network management (SNMP - see Chapter 8) data UDP is preferred to TCP in this case, since network management must often run when the network is in a stressed state - precisely when reliable, congestion-controlled data transfer is difficult to achieve Also, as we mentioned earlier, DNS runs over UDP, thereby avoiding TCP's connection establishment delays Application Application-layer protocol Underlying Transport Protocol file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (2 of 7)20/11/2004 15:52:05 UDP: the User Datagram Protocol electronic mail SMTP TCP remote terminal access Telnet TCP Web HTTP TCP file transfer FTP TCP remote file server NFS typically UDP streaming multimedia proprietary typically UDP Internet telephony proprietary typically UDP Network Management SNMP typically UDP Routing Protocol RIP typically UDP Name Translation DNS typically UDP Figure 3.1-1: Popular Internet applications and their underlying transport protocols As shown in Figure 3.1-1, UDP is also commonly used today with multimedia applications, such as Internet phone, real-time video conferencing, and streaming of stored audio and video We shall take a close look at these applications in Chapter We just mention now that all of these applications can tolerate a small fraction of packet loss, so that reliable data transfer is not absolutely critical for the success of the application Furthermore, interactive real-time applications, such as Internet phone and video conferencing, react very poorly to TCP's congestion control For these reasons, developers of multimedia applications often choose to run the applications over UDP instead of TCP Finally, because TCP cannot be employed with multicast, multicast applications run over UDP Although commonly done today, running multimedia applications over UDP is controversial to say the least As we mentioned above, UDP lacks any form of congestion control But congestion control is needed to prevent the network from entering a congested state in which very little useful work is done If everyone were to start streaming high bit-rate video without using any congestion control, there would be so much packet overflow at routers that no one would see anything Thus, the lack of congestion control in UDP is a potentially serious problem Many researchers have proposed new mechanisms to force all sources, including UDP sources, to perform adaptive congestion control [Mahdavi] Before discussing the UDP segment structure, we mention that it is possible for an application to have reliable data transfer when using UDP This can be done if reliability is built into the application itself (e g., by adding acknowledgement and retransmission mechanisms, such as those we shall study in the next section) But this a non-trivial task that would keep an application developer busy debugging for a long time Nevertheless, building reliability directly into the application allows the application to "have its cake and eat it too" that is, application processes can communicate reliably without being constrained by the transmission rate constraints imposed by TCP's congestion control mechanism Application-level file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (3 of 7)20/11/2004 15:52:05 UDP: the User Datagram Protocol reliability also allows an application to tailor its own application-specific form of error control An interactive real-time may occasionally choose to retransmit a lost message, provided that round trip network delays are small enough to avoid adding significant playout delays [Papadopoulos 1996] Many of today's proprietary streaming applications just this they run over UDP, but they have built acknowledgements and retransmissions into the application in order reduce packet loss UDP Segment Structure The UDP segment structure, shown in Figure 3.3-2, is defined in [RFC 768] Figure 3.3-2: UDP segment structure The application data occupies the data field of the UDP datagram For example, for DNS, the data field contains either a query message or a response message For a streaming audio application, audio samples fill the data field The UDP header has only four fields, each consisting of four bytes As discussed in the previous section, the port numbers allow the destination host to pass the application data to the correct process running on that host (i.e., perform the demultiplexing function) The checksum is used by the receiving host to check if errors have been introduced into the segment during the course of its transmission from source to destination (Basic principles of error detection are described in Section 5.2.) UDP Checksum The UDP checksum provides for error detection UDP at the sender side performs the one's complement file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (4 of 7)20/11/2004 15:52:05 UDP: the User Datagram Protocol of the sum of all the 16-bit words in the segment This result is put in the checksum field of the UDP segment (In truth, the checksum is also calculated over a few of the fields in the IP header in addition to the UDP segment But we ignore this detail in order to see the forest through the trees.) When the segment arrives (if it arrives!) at the receiving host, all 16-bit words are added together, including the checksum If this sum equals 1111111111111111, then the segment has no detected errors If one of the bits is a zero, then we know that errors have been introduced into the segment Here we give a simple example of the checksum calculation You can find details about efficient implementation of the calculation in the [RFC 1071] As an example, suppose that we have the following three 16-bit words: 0110011001100110 0101010101010101 0000111100001111 The sum of first of these 16-bit words is: 0110011001100110 0101010101010101 1011101110111011 Adding the third word to the above sum gives 1011101110111011 0000111100001111 1100101011001010 The 1's complement is obtained by converting all the 0s to 1s and converting all the 1s to 0s Thus the 1's complement of the sum 1100101011001010 is 0011010100110101, which becomes the checksum At the receiver, all four 16-bit words are added, including the checksum If no errors are introduced into the segment, then clearly the sum at the receiver will be 1111111111111111 If one of the bits is a zero, then we know that errors have been introduced into the segment In section 5.1, we'll see that the Internet checksum is not foolproof even if the sum equals 111111111111111, it is still possible that there are undetected errors in the segment For this reason, a number of protocols use more sophisticated error detection techniques than simple checksumming You may wonder why UDP provides a checksum in the first place, as many link-layer protocols (including the popular Ethernet protocol) also provide error checking? The reason is that there is no guarantee that all the links between source and destination provide error checking one of the links may use a protocol that does not provide error checking Because IP is supposed to run over just about file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (5 of 7)20/11/2004 15:52:05 UDP: the User Datagram Protocol any layer-2 protocol, it is useful for the transport layer to provide error checking as a safety measure Although UDP provides error checking, it does not anything to recover from an error Some implementations of UDP simply discard the damaged segment; others pass the damaged segment to the application with a warning That wraps up our discussion of UDP We will soon see that TCP offers reliable data transfer to its applications as well as other services that UDP doesn't offer Naturally, TCP is also more complex than UDP Before discussing TCP, however, it will be useful to step back and first discuss the underlying principles of reliable data transfer, which we in the subsequent section We will then explore TCP in Section 3.5, where we will see that TCP has it foundations in these underlying principles References [Papadopoulos 1996] C Papadopoulos and G Parulkar, "Retransmission-Based Error Control for Continuous Media Applications," Proceedings of the 6th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), April 1996 [Mahdavi] J Mahdavi and S Floyd, "The TCP-Friendly Website," http://www.psc.edu/networking/ tcp_friendly.html [RFC 768] J.Postel, "User Datagram Protocol," RFC 768, August 1980 [RFC 1071] R Braden, D Borman, C Partridge, "Computing The Internet Checksum," RFC 1071, September 1988 Search RFCs and Internet Drafts If you are interested in an Internet Draft relating to a certain subject or protocol enter the keyword(s) here Query: Press button to submit your query or reset the form: Submit Reset Query Options: Case insensitive Maximum number of hits: 25 file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (6 of 7)20/11/2004 15:52:05 UDP: the User Datagram Protocol Return to Table Of Contents Copyright Keith W Ross and James F Kurose 1996-2000 file:///D|/Downloads/Livros/computaỗóo/Computer%20Net Down%20Approach%20Featuring%20the%20Internet/UDP.html (7 of 7)20/11/2004 15:52:05 Principle of Reliable Data Transfer 3.4 Principles of Reliable Data Transfer In this section, we consider the problem of reliable data transfer in a general context This is appropriate since the problem of implementing reliable data transfer occurs not only at the transport layer, but also at the link layer and the application layer as well The general problem is thus of central importance to networking Indeed, if one had to identify a ``top-10'' list of fundamentally important problems in all of networking, this would be a top candidate to lead that list In the next section we will examine TCP and show, in particular, that TCP exploits many of the principles that we are about to describe Figure 3.4-1: Reliable data transfer: service model and service implementation Figure 3.4-1 illustrates the framework for our study of reliable data transfer The service abstraction provided to the upper layer entities is that of a reliable channel through which data can be transferred With a reliable channel, no transferred data bits are corrupted (flipped from to 1, or vice versa) or lost, and all are delivered in the order in which they were sent This is precisely the service model offered by TCP to the Internet applications that invoke it It is the responsibility of a reliable data transfer protocol to implement this service abstraction This task is made difficult by the fact that layer below the reliable data transfer protocol may be unreliable For example, TCP is a reliable data transfer protocol that is implemented on top of an unreliable (IP) end-end network layer More generally, the layer beneath the two reliablycommunicating endpoints might consist of a single physical link (e.g., as in the case of a link-level data transfer protocol) or a global internetwork (e.g., as in the case of a transport-level protocol) For our purposes, however, we can view this lower layer simply as an unreliable point-to-point channel In this section, we will incrementally develop the sender and receiver sides of a reliable data transfer protocol, considering increasingly complex models of the underlying channel Figure 3.4-1(b) illustrates the interfaces for our data transfer protocol The sending side of the data transfer protocol will be invoked from above by a call to rdt_send() It will be passed the data to be delivered to the upper-layer at the receiving side (Here rdt stands for ``reliable data transfer'' protocol and _send indicates that the sending side of rdt is being called The first step in developing any protocol is to choose a good name!) On the receiving side, rdt_rcv() will be called when a packet arrives from the receiving side of the channel When the rdt protocol wants to deliver data to the upper-layer, it will so by calling deliver_data() In the following we use the terminology "packet" rather than "segment" for the protocol data unit Because the theory developed in this section applies to computer networks in general, and file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (1 of 20)20/11/2004 15:52:08 Principle of Reliable Data Transfer not just to the Internet transport layer, the generic term "packet" is perhaps more appropriate here In this section we consider only the case of unidirectional data transfer, i.e., data transfer from the sending to receiving side The case of reliable bidirectional (i.e., full duplex) data transfer is conceptually no more difficult but considerably more tedious Although we consider only unidirectional data transfer, it is important to note that the sending and receiving sides of our protocol will nonetheless need to transmit packets in both directions, as indicated in Figure 3.4-1 We will see shortly that in addition to exchanging packets containing the data to be transferred, the sending and receiving sides of rdt will also need to exchange control packets back and forth Both the send and receive sides of rdt send packets to the other side by a call to udt_send() (unreliable data transfer) 3.4.1 Building a Reliable Data Transfer Protocol Reliable Data Transfer over a Perfectly Reliable Channel: rdt1.0 We first consider the simplest case in which the underlying channel is completely reliable The protocol itself, which we will call rdt1.0, is trivial The finite state machine (FSM) definitions for the rdt1.0 sender and receiver are shown in Figure 3.4-2 The sender and receiver FSMs in Figure 3.4-2 each have just one state The arrows in the FSM description indicate the transition of the protocol from one state to another (Since each FSM in Figure 3.4-2 has just one state, a transition is necessarily from the one state back to itself; we'll see more complicated state diagrams shortly.) The event causing the transition is shown above the horizontal line labeling the transition, and the action(s) taken when the event occurs are shown below the horizontal line The sending side of rdt simply accepts data from the upper-layer via the rdt_send(data)event, puts the data into a packet (via the action make_pkt(packet,data)) and sends the packet into the channel In practice, the rdt_send(data)event would result from a procedure call (e.g., to rdt_send()) by the upper layer application On the receiving side, rdt receives a packet from the underlying channel via the rdt_rcv(packet) event, removes the data from the packet (via the action extract(packet,data)) and passes the data up to the upper-layer In practice, the rdt_rcv (packet)event would result from a procedure call (e.g., to rdt_rcv()) from the lower layer protocol In this simple protocol, there is no difference between a unit of data and a packet Also, all packet flow is from the sender to receiver - with a perfectly reliable channel there is no need for the receiver side to provide any feedback to the sender since nothing can go wrong! Figure 3.4-2: rdt1.0 - a protocol for a completely reliable channel Reliable Data Transfer over a Channel with Bit Errors: rdt2.0 A more realistic model of the underlying channel is one in which bits in a packet may be corrupted Such bit errors typically occur in the physical components of a network as a packet is transmitted, propagates, or is buffered We'll continue to assume for the file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (2 of 20)20/11/2004 15:52:08 Principle of Reliable Data Transfer moment that all transmitted packets are received (although their bits may be corrupted) in the order in which they were sent Before developing a protocol for reliably communicating over such a channel, first consider how people might deal with such a situation Consider how you yourself might dictate a long message over the phone In a typical scenario, the message taker might say ``OK'' after each sentence has been heard, understood, and recorded If the message taker hears a garbled sentence, you're asked to repeat the garbled sentence This message dictation protocol uses both positive acknowledgements (``OK'') and negative acknowledgements (``Please repeat that'') These control messages allow the receiver to let the sender know what has been received correctly, and what has been received in error and thus requires repeating In a computer network setting, reliable data transfer protocols based on such retransmission are known ARQ (Automatic Repeat reQuest) protocols Fundamentally, two additional protocol capabilities are required in ARQ protocols to handle the presence of bit errors: q q Error detection First, a mechanism is needed to allow the receiver to detect when bit errors have occurred Recall from Sections 3.3 that the UDP transport protocol uses the Internet checksum field for exactly this purpose In Chapter we'll examine error detection and correction techniques in greater detail; These techniques allow the receiver to detect, and possibly correct packet bit errors For now, we need only know that these techniques require that extra bits (beyond the bits of original data to be transferred) be sent from the sender to receiver; these bits will be gathered into the packet checksum field of the rdt2.0 data packet Receiver feedback Since the sender and receiver are typically executing on different end systems, possibly separated by thousands of miles, the only way for the sender to learn of the receiver's view of the world (in this case, whether or not a packet was received correctly) is for the receiver to provide explicit feedback to the sender The positive (ACK) and negative acknowledgement (NAK) replies in the message dictation scenario are an example of such feedback Our rdt2.0 protocol will similarly send ACK and NAK packets back from the receiver to the sender In principle, these packets need only be one bit long, e.g., a zero value could indicate a NAK and a value of could indicate an ACK Figure 3.4-3 shows the FSM representation of rdt2.0, a data transfer protocol employing error detection, positive acknowledgements (ACKs), and negative acknowledgements (NAKs) The send side of rdt2.0 has two states In one state, the send-side protocol is waiting for data to be passed down from the upper layer In the other state, the sender protocol is waiting for an ACK or a NAK packet from the receiver If an ACK packet is received (the notation rdt_rcv(rcvpkt) && isACK(rcvpkt) in Figure 3.4-3 corresponds to this event), the sender knows the most recently transmitted packet has been received correctly and thus the protocol returns to the state of waiting for data from the upper layer If a NAK is received, the protocol retransmits the last packet and waits for an ACK or NAK to be returned by the receiver in response to the retransmitted data packet It is important to note that when the receiver is in the wait-for-ACK-or-NAK state, it can not get more data from the upper layer; that will only happen after the sender receives an ACK and leaves this state Thus, the sender will not send a new piece of data until it is sure that the receiver has correctly received the current packet Because of this behavior, protocols such as rdt2.0 are known as stop-and-wait protocols The receiver-side FSM for rdt2.0 still has a single state On packet arrival, the receiver replies with either an ACK or a NAK, depending on whether or not the received packet is corrupted In Figure 3.4-3, the notation rdt_rcv(rcvpkt) && corrupt (rcvpkt) corresponds to the event where a packet is received and is found to be in error file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (3 of 20)20/11/2004 15:52:08 Principle of Reliable Data Transfer Figure 3.4-3: rdt2.0 - a protocol for a channel with bit-errors Protocol rdt2.0 may look as if it works but unfortunately has a fatal flaw In particular, we haven't accounted for the possibility that the ACK or NAK packet could be corrupted! (Before proceeding on, you should think about how this problem may be fixed.) Unfortunately, our slight oversight is not as innocuous as it may seem Minimally, we will need to add checksum bits to ACK/ NAK packets in order to detect such errors The more difficult question is how the protocol should recover from errors in ACK or NAK packets The difficulty here is that if an ACK or NAK is corrupted, the sender has no way of knowing whether or not the receiver has correctly received the last piece of transmitted data Consider three possibilities for handling corrupted ACKs or NAKs: q q q For the first possibility, consider what a human might in the message dictation scenario If the speaker didn't understand the ``OK'' or ``Please repeat that'' reply from the receiver, the speaker would probably ask ``What did you say?'' (thus introducing a new type of sender-to-receiver packet to our protocol) The speaker would then repeat the reply But what if the speaker's ``What did you say'' is corrupted? The receiver, having no idea whether the garbled sentence was part of the dictation or a request to repeat the last reply, would probably then respond with ``What did you say?'' And then, of course, that response might be garbled Clearly, we're heading down a difficult path A second alternative is to add enough checksum bits to allow the sender to not only detect, but recover from, bit errors This solves the immediate problem for a channel which can corrupt packets but not lose them A third approach is for the sender to simply resend the current data packet when it receives a garbled ACK or NAK packet This, however, introduces duplicate packets into the sender-to-receiver channel The fundamental difficulty with duplicate packets is that the receiver doesn't know whether the ACK or NAK it last sent was received correctly at the sender Thus, it can not know a priori whether an arriving packet contains new data or is a retransmission! A simple solution to this new problem (and one adopted in almost all existing data transfer protocols including TCP) is to add a new field to the data packet and have the sender number its data packets by putting a sequence number into this field The receiver then need only check this sequence number to determine whether or not the received packet is a retransmission For this simple case of a stop-and-wait protocol, a 1-bit sequence number will suffice, since it will allow the receiver to know whether the sender is resending the previously transmitted packet (the sequence number of the received packet has the same sequence number file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (4 of 20)20/11/2004 15:52:08 Principle of Reliable Data Transfer as the most recently received packet) or a new packet (the sequence number changes, i.e., moves ``forward'' in modulo arithmetic) Since we are currently assuming a channel that does not lose packets, ACK and NAK packets not themselves need to indicate the sequence number of the packet they are ACKing or NAKing, since the sender knows that a received ACK or NAK packet (whether garbled or not) was generated in response to its most recently transmitted data packet Figure 3.4-4: rdt2.1 sender file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (5 of 20)20/11/2004 15:52:08 Principle of Reliable Data Transfer Figure 3.4-5: rdt2.1 recevier Figures 3.4-4 and 3.4-5 show the FSM description for rdt2.1, our fixed version of rdt2.0 The rdt2.1 sender and receiver FSM's each now have twice as many states as before This is because the protocol state must now reflect whether the packet currently being sent (by the sender) or expected (at the receiver) should have a sequence number of or Note that the actions in those states where a 0-numbered packet is being sent or expected are mirror images of those where a 1-numbered packet is being sent or expected; the only differences have to with the handling of the sequence number Protocol rdt2.1 uses both positive and negative acknowledgements from the receiver to the sender A negative acknowledgement is sent whenever a corrupted packet, or an out of order packet, is received We can accomplish the same effect as a NAK if instead of sending a NAK, we instead send an ACK for the last correctly received packet A sender that receives two ACKs for the same packet (i.e., receives duplicate ACKs) knows that the recevier did not correctly receive the packet following the packet that is being ACKed twice Many TCP implementations use the receipt of so-called "triple duplicate ACKs" (three ACK packets all ACK'ing the same packet) to trigger a retransmission at the sender Our NAK-free reliable data transfer protocol for a channel with bit errors is rdt2.2, shown in Figure 3.4-6 and 3.4-7 file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (6 of 20)20/11/2004 15:52:08 Principle of Reliable Data Transfer Figure 3.4-6: rdt2.2 sender file:///D|/Downloads/Livros/computaỗóo/Computer%20Netwo pproach%20Featuring%20the%20Internet/principles_rdt.htm (7 of 20)20/11/2004 15:52:08 ... packages The java.io package contains classes for input and output streams In particular, the java.io package contains the BufferedReader and DataOutputStream classes, classes that the program... contain the hostname of a mail server associated with the alias name Name The additional section will contain a Type A record providing the IP address for the canonical hostname of the mail server... receivePacket.getPort(); The above three lines unravel the packet that arrives from the client The first of the three lines extracts the data from the packet and places the data in the String sentence; it has an analogous

Ngày đăng: 14/08/2014, 13:21

Từ khóa liên quan

Mục lục

  • Local Disk

    • 2. Application Layer

      • 2.5 DNS - The Internet's Directory Service

        • Interactive Programs for Exploring DNS

        • 2.6 Socket Programming with TCP

        • 2.7 Socket Programming with UDP

        • 2.8 Building a Simple Web Server

        • 2.10 Summary

        • 2.11 Homework Problems and Discussion Questions

        • 3. Transport Layer

          • 3.1 Transport Layer Services and Principles

          • 3.2 Multiplexing and Demultiplexing Network Applications

          • 3.3 Connectionless Transport: UDP

          • 3.4 Principle of Reliable Data Transfer

Tài liệu cùng người dùng

Tài liệu liên quan