計(jì)算機(jī)網(wǎng)絡(luò)英文課件:lecture-08-DNS and P2P_第1頁
計(jì)算機(jī)網(wǎng)絡(luò)英文課件:lecture-08-DNS and P2P_第2頁
計(jì)算機(jī)網(wǎng)絡(luò)英文課件:lecture-08-DNS and P2P_第3頁
計(jì)算機(jī)網(wǎng)絡(luò)英文課件:lecture-08-DNS and P2P_第4頁
計(jì)算機(jī)網(wǎng)絡(luò)英文課件:lecture-08-DNS and P2P_第5頁
已閱讀5頁,還剩26頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、Computer Networking Lecture 8DNS and P2P March 16, 2017Dr. Qingyao WSome slides are from lectures of Prof. J.F Kurose and K.W. RossDNS: Domain Name SystemPeople: many identifiers: SSN, name, passport #Internet hosts, routers: IP address (32 bit) - used for addressing datagrams “name”, e.g., - used b

2、y humansQ: map between IP addresses and name ?Domain Name System:distributed database implemented in hierarchy of many name serversapplication-layer protocol: host, routers, name servers to communicate to resolve names (address/name translation) note: core Internet function, implemented as applicati

3、on-layer protocol complexity at networks “edge” Primarily uses UDP;DNS Why not centralize DNS? single point of failure traffic volume distant centralized database maintenancedoesnt scale!DNS services hostname to IP address translation host aliasing Canonical, alias names mail server aliasing load di

4、stribution replicated Web servers: set of IP addresses for one canonical nameCanonical:relay1.west-relay1.west-Alias:E mnemonicRoot DNS Serverscom DNS serversorg DNS serversedu DNS DNS DNS DNS DNS DNS serversDistributed, Hierarchical DatabaseClient wants

5、IP for ; 1st approx: client queries a root server to find com DNS server client queries com DNS server to get DNS server client queries DNS server to get IP address for Top-level Domain DNS ServerRoot DNS ServerAuthoritative DNS ServerDNS: Root name serversroot name server: contacts authoritative na

6、me server if name mapping not known gets mapping (hostname, IP) returns mapping to local name server 13 root name servers worldwideb USC-ISI Marina del Rey, CAl ICANN Los Angeles, CAe NASA Mt View, CAf Internet Software C. Palo Alto, CA (and 36 other locations)i Autonomica, Stockholm (plus 28 other

7、locations)k RIPE London (also 16 other locations)m WIDE Tokyo (also Seoul, Paris, SF)a Verisign, Dulles, VAc Cogent, Herndon, VA (also LA)d U Maryland College Park, MDg US DoD Vienna, VAh ARL Aberdeen, MDj Verisign, ( 21 locations)TLD and Authoritative Servers Top-level domain (TLD) servers: respons

8、ible for com, org, net, edu, etc, and all top-level country domains uk, fr, ca, jp. Network Solutions maintains servers for com TLD Educause for edu TLD Authoritative DNS servers: organizations DNS servers, providing authoritative hostname to IP mappings for organizations servers (e.g., Web, mail).

9、can be maintained by organization or service providerLocal Name Server does not strictly belong to hierarchy each ISP (residential ISP, company, university) has one. also called “default name server” when host makes DNS query, query is sent to its local DNS server acts as proxy, forwards query into

10、hierarchyrequesting root DNS serverlocal DNS server0 (apple)123456authoritative DNS 378TLD DNS serverDNS name resolution example Host at wants IP address for iterative query:contacted server replies with name of server to contact“I dont know thi

11、s name, but ask this server”9requesting 9root DNS serverlocal DNS server0 (apple)12456authoritative DNS 378TLD DNS server3recursive query:puts burden of name resolution on contacted name serverDNS name resolution exampleDNS: caching and updating recor

12、ds once (any) name server learns mapping, it caches mapping cache entries timeout (disappear) after some time TLD servers typically cached in local name servers Thus root name servers not often visited update/notify mechanisms under design by IETF RFC 2136 /html.charters/dnsind-cha

13、rter.htmlDNS recordsDNS: distributed db storing resource records (RR) Type=NS name is domain (e.g. ) value is hostname of authoritative name server for this domainRR format: (name, value, type, ttl) Type=A name is hostname value is IP address Type=CNAME name is alias name for some “canonical” (the r

14、eal) name is really value is canonical name Type=MX value is canonical name of mailserver associated with nameDNS protocol, messagesDNS protocol : query and reply messages, both with same message formatmsg headeridentification: 16 bit # for query, reply to query uses same #flags: query or reply (1 b

15、it) recursion desired recursion available reply is authoritativeDNS protocol, messagesName, type fields for a queryRRs in responseto queryrecords forauthoritative serversadditional “helpful”info that may be usedInserting records into DNS example: new startup “Ubipass” register name at DNS registrar

16、(e.g., Network Solutions) provide names, IP addresses of authoritative name server (primary and secondary) registrar inserts two RRs into com TLD server:(, , NS)(, , A) create authoritative server Type A record for ; Type MX record for How do people get IP address of your Web site?Try n

17、slookup in windowsipconfig /displaydns; Nslookup d Try nslookup in windowsNslookup d Peer to Peer file sharingP2P file sharingExample Alice runs P2P client application on her notebook computer intermittently connects to Internet; gets new IP address for each connection asks for “Hey Jude” applicatio

18、n displays other peers that have copy of Hey Jude. Alice chooses one of the peers, Bob. file is copied from Bobs PC to Alices notebook: HTTP while Alice downloads, other users uploading from Alice. Alices peer is both a Web client and a transient Web server.All peers are servers = highly scalable!P2

19、P: centralized directoryOriginal “Napster” design1) when peer connects, it informs central server: IP address content2) Alice queries for “Hey Jude”3) Alice requests file from Bobcentralizeddirectory serverpeersAliceBob111123P2P: problems with centralized directory single point of failure performanc

20、e bottleneck copyright infringement: “target” of lawsuit is obvious file transfer is decentralized, but locating content is highly centralizedQuery flooding: Gnutella fully distributed no central server public domain protocol many Gnutella clients implementing protocoloverlay network: graph edge bet

21、ween peer X and Y if theres a TCP connection all active peers and edges form overlay net edge: virtual (not physical) link given peer typically connected with 10 overlay neighborsGnutella: protocolQueryQueryHitQueryQueryQueryHitQueryQueryQueryHitFile transfer:HTTPr Query messagesent over existing TC

22、Pconnectionsr peers forwardQuery messager QueryHit sent over reversepathScalability:limited scopefloodingGnutella: Peer joining1.joining peer Alice must find another peer in Gnutella network: use list of candidate peers2.Alice sequentially attempts TCP connections with candidate peers until connecti

23、on setup with Bob3.Flooding: Alice sends Ping message to Bob; Bob forwards Ping message to his overlay neighbors (who then forward to their neighbors.)rpeers receiving Ping message respond to Alice with Pong message4.Alice receives many Pong messages, and can then setup additional TCP connectionsPee

24、r leaving?Hierarchical Overlay between centralized index, query flooding approaches each peer is either a group leader or assigned to a group leader. TCP connection between peer and its group leader. TCP connections between some pairs of group leaders. group leader tracks content in its childrenordi

25、nary peergroup-leader peerneighoring relationshipsin overlay networkComparing Client-server, P2P architecturesQuestion : How much time distribute file initially at one server to N other computers?usu2d1d2u1uNdNServerNetwork (with abundant bandwidth)File, size Fus: server upload bandwidthui: client/p

26、eer i upload bandwidthdi: client/peer i download bandwidthClient-server: file distribution timeusu2d1d2u1uNdNServerNetwork (with abundant bandwidth)F server sequentially sends N copies: NF/us time client i takes F/di time to downloadincreases linearly in N(for large N)= dcs = max NF/us, F/min(di) iT

27、ime to distribute F to N clients using client/server approach P2P: file distribution timeusu2d1d2u1uNdNServerNetwork (with abundant bandwidth)F server must send one copy: F/us time client i takes F/di time to download NF bits must be downloaded (aggregate) fastest possible upload rate (assuming all nodes sending file chunks to same peer): us + S Suii=1,NdP2P = max F/us, F/min(di) , NF/(us + Sui) ii=1,NComparing Client-server, P2P architecturesP2P Case Study: BitTorrent tracker: tracks peers participating in torrenttorrent: group of peers exchanging chunks of a fileobtain listof peers

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論