Public speaking course notes Read "Dynamo, Amazon’s Highly Available Key-value Store" Read "Bigtable, A Distributed Storage System for Structured Data" Read "Streaming Systems" 3, Watermarks Read "Streaming Systems" 1&2, Streaming 101 Read "F1, a distributed SQL database that scales" Read "Zanzibar, Google’s Consistent, Global Authorization System" Read "Spanner, Google's Globally-Distributed Database" Read "Designing Data-intensive applications" 12, The Future of Data Systems IOS development with Swift Read "Designing Data-intensive applications" 10&11, Batch and Stream Processing Read "Designing Data-intensive applications" 9, Consistency and Consensus Read "Designing Data-intensive applications" 8, Distributed System Troubles Read "Designing Data-intensive applications" 7, Transactions Read "Designing Data-intensive applications" 6, Partitioning Read "Designing Data-intensive applications" 5, Replication Read "Designing Data-intensive applications" 3&4, Storage, Retrieval, Encoding Read "Designing Data-intensive applications" 1&2, Foundation of Data Systems Three cases of binary search TAMU Operating System 2 Memory Management TAMU Operating System 1 Introduction Overview in cloud computing 2 TAMU Operating System 7 Virtualization TAMU Operating System 6 File System TAMU Operating System 5 I/O and Disk Management TAMU Operating System 4 Synchronization TAMU Operating System 3 Concurrency and Threading TAMU Computer Networks 5 Data Link Layer TAMU Computer Networks 4 Network Layer TAMU Computer Networks 3 Transport Layer TAMU Computer Networks 2 Application Layer TAMU Computer Networks 1 Introduction Overview in distributed systems and cloud computing 1 A well-optimized Union-Find implementation, in Java A heap implementation supporting deletion TAMU Advanced Algorithms 3, Maximum Bandwidth Path (Dijkstra, MST, Linear) TAMU Advanced Algorithms 2, B+ tree and Segment Intersection TAMU Advanced Algorithms 1, BST, 2-3 Tree and Heap TAMU AI, Searching problems Factorization Machine and Field-aware Factorization Machine for CTR prediction TAMU Neural Network 10 Information-Theoretic Models TAMU Neural Network 9 Principal Component Analysis TAMU Neural Network 8 Neurodynamics TAMU Neural Network 7 Self-Organizing Maps TAMU Neural Network 6 Deep Learning Overview TAMU Neural Network 5 Radial-Basis Function Networks TAMU Neural Network 4 Multi-Layer Perceptrons TAMU Neural Network 3 Single-Layer Perceptrons Princeton Algorithms P1W6 Hash Tables & Symbol Table Applications Stanford ML 11 Application Example Photo OCR Stanford ML 10 Large Scale Machine Learning Stanford ML 9 Anomaly Detection and Recommender Systems Stanford ML 8 Clustering & Principal Component Analysis Princeton Algorithms P1W5 Balanced Search Trees TAMU Neural Network 2 Learning Processes TAMU Neural Network 1 Introduction Stanford ML 7 Support Vector Machine Stanford ML 6 Evaluate Algorithms Princeton Algorithms P1W4 Priority Queues and Symbol Tables Stanford ML 5 Neural Networks Learning Princeton Algorithms P1W3 Mergesort and Quicksort Stanford ML 4 Neural Networks Basics Princeton Algorithms P1W2 Stack and Queue, Basic Sorts Stanford ML 3 Classification Problems Stanford ML 2 Multivariate Regression and Normal Equation Princeton Algorithms P1W1 Union and Find Stanford ML 1 Introduction and Parameter Learning

TAMU Computer Networks 1 Introduction

2018-04-18

Preliminaries

Winsock

Parts are identical to Berkeley sockets in Unix.

Initialization

  1. Should be done before other winsock calls.
  2. Once per program.
#include <Winsock2.h>
WSADATA wsaData;
WORD wVersionRequested = MAKEWORD(2,2);
if (WSAStartup(wVersionRequested, &wsaData) != 0)
{
printf("WSAStartup error %d\n", WSAGetLastError());
WSACleanup();
return;
}

Client

Steps for TCP:

  • Open a socket
  • Determine the IP address of the server in URL
    • Check if host is IP address, inet_addr(host)
    • If not, do DNS lookup, gethostbyname(host)
  • Initiate connection with the server, IP and port
    • Convert port to network byte order
  • Send request
  • Receive response
    • Until receive 0 byte.
  • Close socket

Note that all numbers must be in network byte order (MSB first). Convert two-way using

  • host to network, htons(), htonl()
  • network to host, ntohs(), ntohl()

Introduction

Internet

Component:

  • Edge: Hosts (end systems)
  • Core
    • Routers, forward packets
    • Communication links

Internet standards:

  • IETF, Internet Engineering Task Force
  • RFC: Request for comments

The architecture is roughly hierarchical

  • Center: tier-1 ISPs
    • as backbone of the Internet
    • interconnect at public NAPs (network access points)
    • Level3, Sprint, AT&T, Verizon
  • tier-2
    • customers of tier-1
  • tier-3 and local

Delay

4 sources:

  1. Router processing delay
    • check bit error
    • determine output link
    • place packet in buffer
  2. queuing delay
    • at output link
    • depends on congestion level
  3. Transmission delay
    • fire packet out (, packet length, link rate)
  4. Propagation delay

queuing delay increase exponentially as traffic rate approaches link bandwidth

Traceroute

  • traceroute
  • tracert in windows
  1. Send 3 packets for each router along the path to destination.
  2. Routers return responses to the sender.
  3. Sender times intervals.

Packet loss

  1. Queues have finite capacity.
  2. Drop-tail queuing at routers

Protocol Stack

  1. Application
    • interact with users
    • FTP, SMTP, HTTP
    • message
  2. Transport
    • inter-process data transfer
    • TCP, UDP
    • segment
  3. Network
    • routing of datagrams from source to destination host
    • IP, routing protocols
    • datagram
  4. Link
    • data transfer between neighboring network elements
    • Ethernet
    • frame
  5. Physical
    • bits on wire

Reference

This is my class notes while taking CSCE 612 at TAMU. Credit to the instructor Dr. Loguinov.


Creative Commons License
Melon blog is created by melonskin. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
© 2016-2024. All rights reserved by melonskin. Powered by Jekyll.