Chapter 14 - Bilal A. Bajwa

Download Report

Transcript Chapter 14 - Bilal A. Bajwa

Information Technology in Theory
By Pelin Aksoy and Laura DeNardis
Chapter 14
Internet Architecture
Objectives
• Become familiar with important Internet
technology milestones
• Understand fundamental Internet architectural
features such as Internet exchange points, the
Domain Name System, IP addresses, and Uniform
Resource Locators
• Understand the technology underlying popular
Internet applications
Information Technology in Theory
2
Objectives (continued)
• Examine the centralized administrative functions that
keep the Internet running, including management of
domain names and Internet addresses
• Contemplate economic and social issues associated
with the Internet
Information Technology in Theory
3
Internet History
• The cold war
• Launch of Sputnik in 1957
• ARPA founded within the Department of Defense
(DoD)
• ARPANET
• Packet switching by Paul Baran
• TCP/IP by Vinton Cerf and Robert Kahn
• The World Wide Web
Information Technology in Theory
4
Internet History (continued)
• Web browser Mosaic by Marc Andreessen
• Wireless access
• Etc.
Information Technology in Theory
5
Internet History (continued)
Information Technology in Theory
6
Internet Architectural Components
• The Internet includes the following important
technological systems and components:
– Internet backbone and routers
– Internet exchange points (IXPs)
– The Internet Protocol (IP)
– The Domain Name System (DNS)
– Uniform Resource Locators (URLs)
Information Technology in Theory
7
Internet Backbone and Routers
• Internet backbone: the global collection of highcapacity trunks
• Is not owned and operated by any single company or
government
• Rather, it is a collection of high-speed, interconnected
networks run by large network service providers
such as AT&T, British Telecom, France Telecom,
Qwest, and Verizon, etc.
Information Technology in Theory
8
Internet Backbone and Routers
(continued)
• The foundation of the Internet’s architecture is an
enormous number of routers
• The router reads the destination IP address and uses a
routing table to look up information for how to
forward the packet
• A routing table is essentially a database on the router
that provides information for how destinations can be
reached most efficiently
Information Technology in Theory
9
Internet Backbone and Routers
(continued)
• The routers in one service provider’s networks can
communicate with routers in other such networks
because they adhere to the same routing protocols
• These protocols enable routers to share network
changes that are reflected in updates to router tables
• An example of a routing protocol that provides this
service is Border Gateway Protocol (BGP)
Information Technology in Theory
10
Internet Backbone and Routers
(continued)
Information Technology in Theory
11
Internet Exchange Points
• Traffic from one network flows seamlessly to other
networks across the Internet through interconnection
locations called Internet exchange points (IXPs)
• The exchange point serves as a juncture at which
packets from different networks are exchanged and
routed toward their appropriate destinations
Information Technology in Theory
12
Internet Exchange Points (continued)
• Peering agreements allow service providers to share
the costs of shared exchange points and provide
service-level agreements for characteristics such as
reliability and latency, the delay that packets undergo
en route to a destination
Information Technology in Theory
13
Internet Exchange Points (continued)
Information Technology in Theory
14
The Internet Protocol
• The Internet Protocol (IP) is a critical part of
TCP/IP and the circulatory system of the Internet in
many ways
• IP is the one protocol needed in almost every instance
of information sharing over the Internet
• The function of IP is to route blocks of information
from a source to a destination over a complex
network
Information Technology in Theory
15
The Internet Protocol (continued)
• To perform this routing, IP uses a hierarchical
addressing scheme that assigns a hardwareindependent (logical rather than physical) address to
every device connected to the Internet
• Recall that the IP address is software defined; it is
distinct from a MAC address that is physically
associated with a LAN adapter such as an Ethernet
card
Information Technology in Theory
16
IP Addresses
• Each device that communicates over the Internet must
use a unique address known as an IP address
• The traditional standard for IP addresses, called IPv4
(IP Version 4), specifies 32 bits for each address
• An IP address is a combination of 32 ones and zeros
such as the following:
01011110000101001100001111011100
Information Technology in Theory
17
IP Addresses (continued)
• Industry convention dictates a shorthand method,
dotted decimal format, for discussing and managing
IP addresses
• For example, an IP address in dotted decimal format
might be 94.20.195.220
• The Internet address length of 32 bits theoretically
provides 4,294,967,296 (calculated as 232) unique
addresses
Information Technology in Theory
18
IP Addresses (continued)
• As the Internet grew internationally and new
applications such as wireless Internet access and
Internet telephony emerged, the Internet Engineering
Task Force (IETF) identified the possibility that the
reserve of Internet addresses might be exhausted
• The need for more global Internet addresses was
recognized in the early 1990s
Information Technology in Theory
19
IP Addresses (continued)
• The IETF engineered two initial technical approaches
to conserving Internet addresses:
– Classless Interdomain Routing (CIDR), which
eliminated the Class A, B, and C distinctions
– Network Address Translation (NAT), a technique
that allowed a network device such as a router to
share a limited number of public IP addresses
among many devices on a private network
• When a computing device on a private network
accesses the Internet, NAT dynamically allocates a
globally unique, temporary, public IP address for
transmission over the public Internet
Information Technology in Theory
20
IP Addresses (continued)
Information Technology in Theory
21
IPv6
• In addition to these address conservation strategies,
the IETF selected a new standard, now called IPv6
(Internet Protocol Version 6), to exponentially
expand the number of globally unique addresses
• Shorthand notation based on the Hex system
• Example of an IPv6 address in Hex shorthand
notation:
– FDDC:AC10:8132:BA32:4F12:1070:DD13:6921
Information Technology in Theory
22
IPv6 (continued)
•
•
•
•
•
•
•
•
•
FDDC = 1111110111011100
AC10 = 1010110000010000
8132 = 1000000100110010
BA32 = 1011101000110010
4F12 = 0100111100010010
1070 = 0001000001110000
DD13 = 1101110100010011
6921 = 0110100100100001
IPv6 deployment is occurring more rapidly in Asia and other
countries than in the United States
Information Technology in Theory
23
The Domain Name System
• Even the shorthand dotted decimal format, which was
designed to make IP addresses less unwieldy, is
difficult to remember and use
• Fortunately, Internet users do not have to remember
numeric IP addresses while using the Internet
– Instead, users can employ alphanumeric names that are
easy to remember, such as www.yale.edu.
• These are known as domain names
Information Technology in Theory
24
The Domain Name System (continued)
• Each domain name has an associated IP address
• Example of a domain name and an associated IP
address:
cnn.com 64.236.29.120
• The DNS is like a hierarchical tree; the suffix, which
is the component at the far right of any domain name,
is called the top-level domain (TLD)
Information Technology in Theory
25
The Domain Name System (continued)
•
•
•
•
•
•
•
.com (for commercial businesses)
.org (for nonprofit organizations)
.edu (for educational institutions)
.gov (for the U.S. government)
.mil (for the U.S. military)
.net (for networks)
.int (for international entities)
Information Technology in Theory
26
The Domain Name System (continued)
Information Technology in Theory
27
The Domain Name System (continued)
• Within a domain name, the word to the left of the toplevel domain is called a second-level domain
• Domain names can also have third- and fourth-level
domains
• A method is needed to translate between
alphanumeric domain names and the associated IP
addresses required for routing information across the
Internet
• This translation is called address resolution and is
performed by the DNS
Information Technology in Theory
28
The Domain Name System (continued)
• An important architectural component of the Internet
is its collection of root name servers, which are
usually just called root servers
• These servers maintain a master file, called the root
zone file, that lists the names and IP addresses of the
official DNS servers for all TLDs
Information Technology in Theory
29
The Domain Name System (continued)
Information Technology in Theory
30
Uniform Resource Locators
• A URL is a string of characters associated with a
specific information resource, such as www.ebay.com,
www.gmu.edu, and so on
• Many URLs relate to Web access via HTTP, but note
that URLs also apply to many other Internet protocols
and information resources
• Instead of “http,” the first part of a URL could
include “ftp” for File Transfer Protocol, “news” for
Usenet news, or other Internet resource types
Information Technology in Theory
31
Uniform Resource Locators
(continued)
Information Technology in Theory
32
Internet Applications
• At one point, the Internet primarily allowed file
sharing and electronic mail
• Over time, Internet applications have expanded to the
World Wide Web, text messaging, Internet telephony,
multimedia file sharing, and much more
Information Technology in Theory
33
E-Mail
• E-mail is a store and forward system that does not
require the simultaneous online presence of senders
and receivers
• The de facto messaging protocol that historically has
supported Internet e-mail is SMTP, or Simple Mail
Transfer Protocol
• Today messages incorporate multimedia and include
attachments, thanks to newer messaging formats such
as MIME
Information Technology in Theory
34
E-Mail (continued)
• The arrival of e-mail at a local server and its
transmission from the remote server to the recipient
are separate transactions that use different sets of
communications protocols, known as mail retrieval
protocols
– Post Office Protocol (POP)
– Internet Message Access Protocol (IMAP)
Information Technology in Theory
35
E-Mail (continued)
Information Technology in Theory
36
Messaging
• Unlike e-mail, text messaging generally requires both
users to be online or on their mobile phones
simultaneously
• When you send a text message to a recipient, a
window opens and displays the message on the
recipient’s computing device
Information Technology in Theory
37
The World Wide Web
• The Web was a revolutionary advancement over
previous data-sharing tools for several reasons:
– It allows many users to simultaneously access the
same information
– It provides hyperlinked information—clicking a
textual link takes a user to another location
– It combines multimedia information such as video,
text, image, and sound
Information Technology in Theory
38
The World Wide Web (continued)
• The Web was a revolutionary advancement over
previous data-sharing tools for several reasons
(continued):
– It allows access to anyone connected to the
Internet from any computing platform
– It provides searchable information
– Anyone can develop their own information site
and inexpensively make it available to millions of
people
Information Technology in Theory
39
The World Wide Web (continued)
• The WWW uses a standard network protocol,
Hypertext Transfer Protocol (HTTP), to establish and
maintain communications over the Internet between a
computer user (client) and a Web site (server)
• Web interactions also require the encoding of
information in a standard format called Hypertext
Markup Language (HTML) or eXtensible Markup
Language (XML)
Information Technology in Theory
40
The World Wide Web (continued)
Information Technology in Theory
41
File Sharing and P2P
• The TCP/IP suite has historically provided a specific
protocol to enable file sharing over the Internet: FTP,
or File Transfer Protocol
• As Internet technologies have grown, file sharing has
expanded to include stored videos, audio files, and
images
• P2P file sharing was realized through music- and
video-sharing systems
• Rather than storing files on a server or large database
management system, P2P technologies distribute files
that are stored on the hard drives of individual users
Information Technology in Theory
42
File Sharing and P2P (continued)
• P2P file sharing of any copyrighted information,
including music and movies, is illegal though
widespread
• A series of well-publicized lawsuits, especially those
brought by the Recording Industry Association of
America (RIAA), have attempted to curtail
downloading of copyrighted information
• However, countless applications of P2P network
technology are legal and hold great promise for
efficiently sharing information
Information Technology in Theory
43
File Sharing and P2P (continued)
Information Technology in Theory
44
Internet Telephony
• VoIP is a cost-effective alternative to traditional
telephone service and has quickly become a major
Internet application
• The main advantage of Internet telephony is that
telephone calls are virtually free to users who already
pay for an Internet connection
Information Technology in Theory
45
Internet Broadcasting
• The advantage of “simulcasting” over the Internet is
that the broadcast has no physical or geographical
limitation
• A radio station can easily broadcast over the Internet
and reach a worldwide audience at very little cost
without having to contend with spectrum limitations
and regulations
Information Technology in Theory
46
Internet Administration
• Does anyone run the Internet?
• Who is in charge of the many administrative
functions and standards setting that keep the Internet
up and running?
• The success of the Internet as an interoperable,
universal communications medium requires common,
compatible standards
Information Technology in Theory
47
Administration of Internet Names and
Numbers
• If connecting to the Internet requires an IP address,
and if each address must be globally unique, someone
has to be responsible for allocating and administering
these resources
• The IANA, under the auspices of the Internet
Corporation for Assigned Names and Numbers
(ICANN), still has centralized responsibility for the
IP address space, including both IPv4 and IPv6
• The IANA, in turn, allocates large blocks of
addresses to regional Internet registries (RIRs) and
national Internet registries (NIRs)
Information Technology in Theory
48
Administration of Internet Names and
Numbers (continued)
• In 1998, the U.S. Department of Commerce issued a
white paper calling for the creation of a private,
nonprofit corporation to administer these names
• This new entity became ICANN
• The greatest controversy over ICANN has involved
the questions of who should make these policy
decisions and have the authority to allocate IP
addresses
Information Technology in Theory
49
Internet Standards Setting
• The IETF establishes common network technical
specifications and standards for the Internet
• The Internet standards process is complex, and
involves the proposal of a draft standards
specification followed by a period of iterative
revision by a “working group” that anyone can join
Information Technology in Theory
50
Internet Standards Setting (continued)
• Technical specifications step through a progressive
approval process that begins with the designation of a
proposed standard, evolves to a draft standard, and
culminates in a standard
• The World Wide Web Consortium (W3C) develops
Web specifications
• The Institute of Electrical and Electronics Engineers
(IEEE) establishes Internet-related LAN standards
such as the Wi-Fi specifications
Information Technology in Theory
51
Internet Open Issues
• The Internet has been accompanied by a host of
economic and social policy questions:
– Should online sales be taxed?
– Should voice services that use Internet telephony
(VoIP) be regulated and taxed, like other more
traditional services?
– How might a major Internet outage or
cyberterrorist attack affect nations economically?
Information Technology in Theory
52
Internet Open Issues (continued)
• Some countries restrict or prohibit Internet access for
political or religious reasons
– Whose laws should apply, and how should they apply
to a network that transcends national boundaries?
– In what ways will the Internet intersect with politics?
– What are the ramifications of the international digital
divide, in which some countries have widespread
Internet access and computing resources, and others
have limited resources?
Information Technology in Theory
53
Net Neutrality
• Net neutrality is a phrase that has received a great
deal of attention in the early twenty-first century
• Net neutrality has several meanings, but it generally
refers to the principle of nondiscrimination on the
Internet
• According to the Net neutrality principle, a cable
company that controls a residential broadband
connection should not be able to serve as a gatekeeper
that makes certain content more readily available to
consumers
Information Technology in Theory
54
Net Neutrality (continued)
• Those who oppose Net neutrality legislation argue
that the Internet’s architecture is not neutral already,
because of how content is presented by search
companies and because of the tiered service-level
pricing offered by service providers
Information Technology in Theory
55
Net Neutrality (continued)
• Opponents also note that engineering quality of
service (QoS) prioritization is necessary on an
application basis so that latency-sensitive applications
such as video and voice are given a higher
transmission priority than information that is not as
time sensitive, such as data
Information Technology in Theory
56
Summary
• The Internet is not a single network or technology, but
a collection of systems that can interconnect because
they use common TCP/IP and routing protocols and
common architectural approaches such as packet
switching
• Different service provider networks interconnect at
locations called IXPs
– Peering agreements dictate how they share
costs and provide acceptable performance
Information Technology in Theory
57
Summary (continued)
• The use of IP is arguably the defining architectural
characteristic of being “on the Internet”
• Devices that are connected to the Internet require an
Internet address—either a 32-bit address under the
IPv4 standard or a 128-bit address under the newer
IPv6 standard
• The DNS is a hierarchical, distributed database
management system that performs the important task
of address resolution
Information Technology in Theory
58
Summary (continued)
• Internet applications are constantly evolving, but they
fall into the broad categories of e-mail, messaging,
the Web, file sharing, telephony, and Internet
broadcasting
• The Internet requires centralized administrative
coordination, such as managing the IP address space
and establishing standards
Information Technology in Theory
59