2- internet2

2- internet2 - CSE 486/586, Spring 2012 CSE 486/586...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems The Internet in 2 Hours: The Second Hour Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586, Spring 2012 Today Re-position ourselves from the last lecture Main focus today: making transition to transport protocols and applications Again, the design of the Internet is a great example of how to design a solid distributed system. Well look at a few questions that the designers considered. Put yourself in the shoes of a distributed systems designer! Pay attention not just to knowledge, but also to the process of making design decisions. 2 CSE 486/586, Spring 2012 What is the Internet? A (or the?) network of networks Challenge the original designers faced: interconnecting various physical networks. Possible approach: interconnecting networks at the physical level Solution chosen: layering 3 Link hardware Host-to-host connectivity Application-to-application channels Application CSE 486/586, Spring 2012 Challenges in Layering What to put on top of physical networks? Basic things for enabling a conversation between remote hosts: Packet switching (a conversation is divided into smaller units called packets). Addressing (where do I send a msg?) Routing (how do I reach that address?) In addition, what we want (the goals of the original Internet) Most importantly, survivability Protection of a conversation as long as theres a physical path between entities communicating and they are alive . What are some of the threats that disrupt a conversation? Packet loss, out-of-order delivery, duplicate packets, etc. 4 CSE 486/586, Spring 2012 But We Must Ask Ourselves In a conversation, there are two components involved Hosts Network So, one more question: where do we want to put the functionalities?...
View Full Document

Page1 / 23

2- internet2 - CSE 486/586, Spring 2012 CSE 486/586...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online