nawaporn29255212307
Download
Report
Transcript nawaporn29255212307
ON DEMAND LECTURE PART II
By Dr. Nawaporn Wisitpongphan
ON DEMAND OUTLINE
Voice Over IP (VoIP)
Hyper Text Transfer Protocol (HTTP)
Domain Name Server (DNS)
INTRODUCTION TO VOIP
Broadband Internet offers high-speed connection
Many applications become viable e.g., multimedia
streaming, VoIP, etc.
The technology for transmitting voice
conversation over the Internet has been available
since early 1980s
VoIP allows two-way voice transmission over
broadband connections
VoIP also carries telephony signals as digital
audio
Reduce data rate by using speech data compression
Encapsulating in a packet stream sent over IP
network
VOIP
Not yet a big player with less than 5% of market
Cost savings, enhanced voice services and new
applications major advantages
VoIP gateways bridge circuit-switched PSTN and
packet-switched Internet
Gateways packetize, and compress voice, route
packets, authenticate users, and manage network of
gateways
VOIP HARDWARE
Enterprise gateway
VoIP routers
Voice cards perform packetization and compression
functions in a router
IP PBX
Deployed between PBX and WAN device (router) for call
set-up,routing, and conversion
Distributed telephony servers that operat ein packtswitched mode
ISP VoIP gateways
Aggregate incoming traffic and routing
VOIP INFRASTRUCTURE
VOIP ARCHITECTURE
IMPLEMENTING VOIP
VOIP STANDARDS
H.323
SIP
Based on ISDN and limited to point-to-point
applications
Application layer (signaling) protocol
Establishes temp sessions for multimedia conferences,
telephony, mobile phone-to-instant messaging
LDAP
Standard directory server technology for Internet
Enables retrieval of information from multi-vendor
directories
Used for free phone and Internet phone number hosting
THE PHONE WORKS – WHY BOTHER
WITH VOIP
user perspective
carrier perspective
variable compression: tin can to broadcast
quality no need for dedicated lines
better codecs + silence suppression – packet
header overhead = maybe reduced bandwidth
security through encryption
shared facilities simplify management,
redundancy
caller & talker identification
advanced services
better user interface (more than 12 keys, visual
feedback, semantic rather than stimulus)
cheaper bit switching
no local access fees (but dropping to 1c/min
for PSTN)
transmit as data rather than voiceband data
(14.4 kb/s)
adding video, application sharing is easy
VOIP VS PSTN (PUBLIC SWITCH
TELEPHONE NETWORK)
VoIP can transmit more than one phone call over the same
broadband connection
Conference call, call forwarding, auto redial, caller ID are
free of charge
Secure calls using protocols such as (Secure Real-Time
Transport Protocol)
Connection Independence. Can use VoIP anywhere there’s
an Internet
Integration with other services available
Mobility
VOIP:
DRAWBACK AND CHALLENGES
Available Bandwidth
Network Latency
Packet Loss
Jitter
Echo
Security
Realiability
THE FIVE-PHASE
"Technology Trigger" — The first phase of a hype cycle is the "technology
trigger" or breakthrough, product launch or other event that generates
significant press and interest.
"Peak of Inflated Expectations" — In the next phase, a frenzy of publicity
typically generates over-enthusiasm and unrealistic expectations. There may
be some successful applications of a technology, but there are typically more
failures.
"Trough of Disillusionment" — Technologies enter the "trough of
disillusionment" because they fail to meet expectations and quickly become
unfashionable. Consequently, the press usually abandons the topic and the
technology.
"Slope of Enlightenment" — Although the press may have stopped covering
the technology, some businesses continue through the "slope of enlightenment"
and experiment to understand the benefits and practical application of the
technology.
"Plateau of Productivity" — A technology reaches the "plateau of
productivity" as the benefits of it become widely demonstrated and accepted.
The technology becomes increasingly stable and evolves in second and third
generations. The final height of the plateau varies according to whether the
technology is broadly applicable or benefits only a niche market
HYPE CYCLE 2005
HYPE CYCLE 2006
HYPE CYCLE 2007
HYPE CYCLE 2008
HYPE CYCLE 2009
HTTP
ARCHITECTURAL OVERVIEW
Client with Web browser program
Server with Web Server and pages (html)
Other servers with Web Servers and pages
Links between pages
BROWSER OPERATION
WHEN
USER
CLICKS ON A LINK
B picks the URL from the clicked link
B gets IP address of Web server from DNS
B open TCP connection to the (IP, port 80)
B sends a request for page (HTTP packet)
W.S. sends the linked page (HTTP packet)
Page is in html language
B. closes TCP connection
B. interpret html, displays page to user
B fetches & presents images linked to the file
THE CLIENT SIDE
non
html in page: PDF, GIF, JPEG, MP3, MPEG, ...
Plug-ins:
Code installed as an extension to the
browser
Helper
Applications, invoked by B as a separate
process
Plug-in
Helper Application
SERVER SIDE
Accepts TCP connection
Gets name of requested file (HTTP packet)
Gets the file (local disk)
Sends back the file (HTTP packets)
Release TCP connection
To improve performance
Maintain cache of files
Multithreading
MULTI-THREADED WEB SERVER
Front-end thread accept request, build record
Pass record to a Working Thread
All threads share memory , including the cache
If page not in cache, WT initiates disk read
TASKS OF A WORKING THREAD
Resolving name of the file
Authenticating client (another lecture)
Perform access control on client
Check the cache
Fetch file from disk
Determine MIME type of file
This will be sent to the client
Send reply to client
Construct HTTP packet(s)
Write in the Web Server log
What if the CPU can’t handle the load?
SERVER FARM ON A LAN
Problems
Each Processing Node has its own cache
P.N. “specialize” with certain files
Both requests and replies via the Front-end
Solution?
TCP HANDOFF
Front-end passes the TCP endpoint (IP, port) to the
Processing Node
Processing Node send page to Client
Normal
TCP Handoff
URLS – UNIFORM RESOURCE LOCATERS
URL provides answers to what?
What is the name of the page?
What is the location of the page?
How to access the page (which protocol)?
?
?
STATELESSNESS AND COOKIES
HTTP is request/reply; stateless
But, server needs:
to recognize users (registered?, adapt home page)
to keep track of visited items (shopping cart)
Cookies (small text files) keep that info.
Stored at Client
C:\Documents and Settings\aviv\Cookies
Identified by domain name of the sending server
COOKIES: STRUCTURE
domain:
where the cookie came from
Path: root of the file tree related to cookie
Content: variableName=value pairs. Anything
Expires – if set it is kept (persistent cookie)
Secure: If set cookie is sent only to secure server
Usages?
USING COOKIES
Casino
server chooses which gambling option it
presents
Store Server puts “items in cart” in the cookie
Web Portal server presents stock prices and Sport
results
sneaky.com records visits of UserID in certain pages
pages include adds/banners/small pictures
User not aware its browser visited sneaky.com
User profile is built, maybe with name/password
USER-SERVER
STATE: COOKIES
Many major Web sites
use cookies
Four components:
1) cookie header line in
the HTTP response
message
2) cookie header line in
HTTP request message
3) cookie file kept on
user’s host and
managed by user’s
browser
4) back-end database at
Web site
Example:
Susan access Internet
always from same PC
She visits a specific ecommerce site for first
time
When initial HTTP
requests arrives at site,
site creates a unique ID
and creates an entry in
backend database for
ID
33
COOKIES: KEEPING “STATE” (CONT.)
client
Cookie file
server
usual http request msg
usual http response +
ebay: 8734
Cookie file
amazon: 1678
ebay: 8734
one week later:
Cookie file
amazon: 1678
ebay: 8734
Set-cookie: 1678
usual http request msg
cookie: 1678
usual http response
msg
usual http request msg
cookie: 1678
usual http response
msg
server
creates ID
1678 for user
cookiespecific
action
cookiespectific
action
34
WEB CACHES (PROXY SERVER)
Goal: satisfy client request without involving origin server
user sets browser: Web
accesses via cache
browser sends all HTTP
requests to cache
object in cache: cache
returns object
else cache requests object
from origin server, then
returns object to client
origin
server
client
client
Proxy
server
origin
server
35
MORE ABOUT WEB CACHING
Cache acts as both client
and server
Typically cache is installed
by ISP (university,
company, residential ISP)
Why Web caching?
Reduce response time for
client request.
Reduce traffic on an
institution’s access link.
Internet dense with caches
enables “poor” content
providers to effectively
deliver content (but so
does P2P file sharing)
36
CACHING EXAMPLE
origin
Assumptions
servers
average object size = 100,000
bits
public
Internet
avg. request rate from
institution’s browsers to origin
servers = 15/sec
delay from institutional router to
1.5 Mbps
any origin server and back to
access link
router = 2 sec
institutional
Consequences
utilization on LAN = 15%
utilization on access link = 100%
total delay = Internet delay +
access delay + LAN delay
= 2 sec + minutes + milliseconds
network
10 Mbps LAN
institutional
cache
37
CACHING EXAMPLE (CONT)
Possible solution
increase bandwidth of access
link to, say, 10 Mbps
Consequences
utilization on LAN = 15%
utilization on access link = 15%
Total delay = Internet delay +
access delay + LAN delay
= 2 sec + msecs + msecs
often a costly upgrade
origin
servers
public
Internet
10 Mbps
access link
institutional
network
10 Mbps LAN
institutional
cache
38
CACHING EXAMPLE (CONT)
origin
servers
Install cache
suppose hit rate is .4
Consequence
40% requests will be satisfied
almost immediately
60% requests satisfied by
origin server
utilization of access link
reduced to 60%, resulting in
negligible delays (say 10
msec)
total avg delay = Internet
delay + access delay + LAN
delay = .6*(2.01) secs +
milliseconds < 1.4 secs
public
Internet
1.5 Mbps
access link
institutional
network
10 Mbps LAN
institutional
cache
39
DNS
DNS: DOMAIN NAME SYSTEM
Domain Name System:
distributed database
implemented in hierarchy of
many name servers
application-layer protocol host,
routers, name servers to
communicate to resolve names
(address/name translation)
note: core Internet function,
implemented as applicationlayer protocol
complexity at network’s
“edge”
Why not centralize DNS?
single point of failure
traffic volume
distant centralized database
maintenance
doesn’t scale!
41
DISTRIBUTED, HIERARCHICAL DATABASE
Root DNS Servers
com DNS servers
yahoo.com
amazon.com
DNS servers DNS servers
org DNS servers
pbs.org
DNS servers
edu DNS servers
poly.edu
umass.edu
DNS serversDNS servers
Client wants IP for www.amazon.com; 1st approx:
Client queries a root server to find com DNS server
Client queries com DNS server to get amazon.com
DNS server
Client queries amazon.com DNS server to get IP
address for www.amazon.com
42
DNS: ROOT NAME SERVERS
contacted by local name server that can not resolve name
root name server:
contacts authoritative name server if name mapping not known
gets mapping
returns mapping to local name server
a Verisign, Dulles, VA
c Cogent, Herndon, VA (also Los Angeles)
d U Maryland College Park, MD
k RIPE London (also Amsterdam,
g US DoD Vienna, VA
i Frankfurt)
Autonomica, Stockholm (plus
h ARL Aberdeen, MD
3 other locations)
j Verisign, ( 11 locations)
m WIDE Tokyo
e NASA Mt View, CA
f Internet Software C. Palo
Alto, CA (and 17 other locations)
13 root name
servers worldwide
b USC-ISI Marina del Rey, CA
l ICANN Los Angeles, CA
43
TLD AND AUTHORITATIVE SERVERS
Top-level domain (TLD) servers: responsible for com,
org, net, edu, etc, and all top-level country domains
uk, fr, ca, jp.
Network solutions maintains servers for com TLD
Education for edu TLD
Authoritative DNS servers: organization’s DNS
servers, providing authoritative hostname to IP
mappings for organization’s servers (e.g., Web and
mail).
Can be maintained by organization or service provider
44
LOCAL NAME SERVER
Does not strictly belong to hierarchy
Each ISP (residential ISP, company, university)
has one.
Also called “default name server”
When a host makes a DNS query, query is sent to
its local DNS server
Acts as a proxy, forwards query into hierarchy.
45
root DNS server
ITERATED QUERIES
2
Host at cis.poly.edu
wants IP address for
gaia.cs.umass.edu
3
4
TLD DNS server
5
local DNS server
iterated query:
contacted server replies
with name of server to
contact
“I don’t know this name,
but ask this server”
dns.poly.edu
1
8
requesting host
7
6
authoritative DNS server
dns.cs.umass.edu
cis.poly.edu
gaia.cs.umass.edu
46
root DNS server
RECURSIVE QUERIES
recursive query:
puts burden of name
resolution on
contacted name
server
heavy load?
2
3
7
6
TLD DNS server
local DNS server
dns.poly.edu
1
5
4
8
requesting host
authoritative DNS server
dns.cs.umass.edu
cis.poly.edu
gaia.cs.umass.edu
47