Académique Documents
Professionnel Documents
Culture Documents
Chapter 1
Introduction
Our goal:
Computer Networking:
A Top Down Approach ,
4th edition.
diti
Jim Kurose, Keith Ross
Addison-Wesley, July
2007.
Introduction
Overview:
whats the Internet?
whats a protocol?
network edge; hosts, access
net, physical media
network core: packet/circuit
switching, Internet structure
performance: loss,
loss delay,
delay
throughput
security
protocol layers, service models
history
Introduction
1-1
1-2
Chapter 1: roadmap
PC
server
wireless
laptop
cellular
handheld
access
points
wired
links
router
1-3
millions of connected
computing devices:
fiber, copper,
radio, satellite
transmission
rate = bandwidth
routers: forward
packets (chunks of
data)
Mobile network
Global ISP
Home network
Regional ISP
Institutional network
Introduction
1-4
Web-enabled toaster +
weather forecaster
Global ISP
e.g., TCP
TCP, IP
IP, HTTP,
HTTP Skype,
Sk
Ethernet
Home network
Internet: network of
IP picture frame
http://www.ceiva.com/
Regional ISP
networks
loosely hierarchical
public Internet versus
private intranet
Institutional network
Internet standards
Worlds smallest web server
http://www-ccs.cs.umass.edu/~shri/iPic.html
Internet phones
Introduction
Introduction
1-5
1-6
Whats a protocol?
human protocols:
whats the time?
I have a question
introductions
infrastructure enables
distributed applications
applications:
Web, VoIP, email, games,
e-commerce, file sharing
communication services
provided to apps:
reliable data delivery
from source to
destination
best effort (unreliable)
data delivery
Introduction
1-7
network protocols:
machines rather than
h
humans
all communication
activity in Internet
governed by protocols
1-8
Whats a protocol?
Chapter 1: roadmap
TCP connection
request
Hi
TCP connection
response
Got the
time?
Get http://www.awl.com/kurose-ross
2:00
<file>
time
1-9
1-10
Introduction
1-12
network edge:
applications
pp
and
hosts
access networks,
physical media:
wired, wireless
communication links
peer-peer
client/server model
network core:
interconnected
routers
network of
networks
Introduction
peer-peer model:
1-11
TCP - Transmission
Control Protocol
Internets reliable data
transfer service
reliable in
reliable,
in-order
order bytebyte
HTTP (Web),
(Web) FTP (file
transfer), Telnet
(remote login), SMTP
(email)
same as before!
loss: acknowledgements
and retransmissions
flow control:
congestion control:
Introduction
1-13
streaming media,
teleconferencing, DNS,
Internet telephony
1-14
residential
d
l access nets
institutional access
networks (school,
company)
mobile access networks
Keep in mind:
bandwidth (bits per
second) of access
network?
shared or dedicated?
Introduction
1-15
Introduction
1-16
Introduction
1-17
Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
Introduction
1-18
Introduction
1-20
cable headend
cable distribution
network (simplified)
cable headend
home
cable distribution
network
Introduction
1-19
home
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
D
A
T
A
D
A
T
A
C
O
N
T
R
O
L
Channels
cable headend
cable distribution
network (simplified)
cable headend
home
cable distribution
network
Introduction
home
Introduction
1-21
1-22
wireless LANs:
802.11b/g (WiFi): 11 or 54 Mbps
router
base
station
1-23
mobile
hosts
Introduction
1-24
Home networks
Physical Media
cable
modem
wireless
laptops
router/
firewall
Introduction
1-25
1-26
broadband:
multiple channels on
cable
HFC
Category 3: traditional
phone wires, 10 Mbps
Ethernet
Category 5:
100Mbps Ethernet
wireless
access
point
Introduction
unguided media:
Ethernet
Coaxial cable:
high-speed point-to-point
transmission (e.g., 10s100s Gps)
Introduction
1-27
signal carried in
electromagnetic
spectrum
no physical wire
bidirectional
propagation
environment effects:
reflection
obstruction by objects
interference
satellite
Kbps to 45Mbps channel (or
multiple smaller channels)
270 msec end-end delay
geosynchronous versus low
altitude
Introduction
1-28
Chapter 1: roadmap
mesh of interconnected
routers
the fundamental
question: how is data
transferred through net?
circuit switching:
dedicated circuit per
call: telephone net
packet-switching: data
sent thru net in
discrete chunks
Introduction
1-29
End-end resources
reserved for call
call
network resources
(e.g., bandwidth)
divided into pieces
1-30
(no sharing)
Introduction
1-31
Introduction
1-32
Numerical example
Example:
FDM
4 users
frequency
time
TDM
Introduction
1-34
resource contention:
aggregate resource
d
demand
d can exceed
d
amount available
congestion: packets
queue, wait for link use
store and forward:
packets move one hop
at a time
Node receives complete
packet before forwarding
Introduction
Introduction
1-33
1-35
100 Mb/s
Ethernet
A
B
statistical multiplexing
1.5 Mb/s
queue of packets
waiting for output
link
1-36
Packet-switching: store-and-forward
L
R
1 Mb/s link
each user:
Example:
L = 7.5 Mbits
R = 1.5 Mbps
transmission delay = 15
sec
N users
circuit-switching:
1 Mbps link
10 users
packet switching:
with 35 users,
probability > 10 active
at same time is less
than .0004
1-38
Introduction
1-37
1-39
roughly hierarchical
at center: tier-1 ISPs (e.g.,
g Verizon, Sprint,
p
AT&T,
Cable and Wireless), national/international coverage
treat each other as equals
Tier-1
providers
interconnect
(peer)
privately
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Introduction
1-40
10
POP: point-of-presence
to/from backbone
peering
Tier-2 ISP
to/from customers
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
Introduction
Tier-2 ISP
Tier 1 ISP
Tier-2 ISP
Tier-2 ISP
Introduction
1-41
Tier-2 ISPs
also peer
privately with
each other.
1-42
Tier 3
ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
Tier-2 ISP
Tier 3
ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
Introduction
1-43
local
ISP
Tier-2 ISP
local
ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
Tier-2 ISP
local
ISP
Introduction
1-44
11
Chapter 1: roadmap
p
packet
arrival rate to link exceeds output
p link
capacity
packets queue, wait for turn
A
B
1-45
3. Transmission delay:
R=link bandwidth (bps)
L=packet length (bits)
time to send bits into
link = L/R
transmission
propagation
nodal
processing
t
transmission
s issi
1-46
1-47
4. Propagation delay:
d = length of physical link
s = propagation speed in
medium (~2x108 m/sec)
propagation delay = d/s
Note: s and R are very
different quantities!
propagation
queueing
Introduction
Introduction
2. queueing
nodal
processing
queueing
Introduction
1-48
12
Caravan analogy
100 km
ten-car
caravan
100 km
toll
booth
cars propagate at
100 km/hr
toll booth takes 12 sec to
service car (transmission
time))
car~bit; caravan ~ packet
Q: How long until caravan
is lined up before 2nd toll
booth?
100 km
ten-car
caravan
toll
booth
toll
booth
100 km
toll
booth
1-49
Nodal delay
Introduction
1-50
Introduction
1-52
depends on congestion
La/R
L
/R ~ 0:
0 average queueing
i delay
d l small
ll
La/R -> 1: delays become large
La/R > 1: more work arriving than can be
serviced, average delay infinite!
Introduction
1-51
13
3 probes
3 probes
Introduction
Packet loss
buffer
((waiting
g area))
1-54
Throughput
Introduction
1-53
link
capacity
server,
with
that
can carry
server
sends
bits pipe
Rs bits/sec
file of
F bits
fluid
at rate
(fluid)
into
pipe
to send to client
Rs bits/sec)
packet arriving to
full buffer is lost
Introduction
1-55
link that
capacity
pipe
can carry
Rfluid
c bits/sec
at rate
Rc bits/sec)
Introduction
1-56
14
Throughput (more)
Rc bits/sec
Rc bits/sec
bit /
bottleneck link
Rs
R
Rc
Rc
Rc
Introduction
1-57
Chapter 1: roadmap
Rs
Rs
per-connection
end-end
throughput:
min(Rc,Rs,R/10)
in practice: Rc or
Rs is
i often
ft
bottleneck
1-58
Protocol Layers
Networks are complex!
many pieces:
hosts
routers
links of various
media
applications
protocols
hardware,
software
1-59
Question:
Is there any hope of
organizing structure of
network?
Introduction
1-60
15
ticket (complain)
ticket (purchase)
ticket (complain)
ticket
baggage (check)
( l
)
baggage (claim)
baggage (check)
baggage (claim
baggage
gates (unload)
gate
gates (unload)
gates (load)
gates (load)
runway (takeoff)
runway (land)
takeoff/landing
runway takeoff
runway landing
airplane routing
airplane routing
airplane routing
airplane routing
airplane routing
airplane routing
departure
airport
airplane routing
intermediate air-traffic
control centers
arrival
airport
Layers: each
L
h layer
l
implements
i l
t a service
i
via its own internal-layer actions
relying on services provided by layer below
airplane routing
a series of steps
Introduction
Introduction
1-61
Why layering?
1-62
application
pp
transport
network
link
physical
PPP, Ethernet
1-63
Introduction
1-64
16
Encapsulation
source
message
segment
application
Ht
datagram Hn Ht
frame Hl Hn Ht
application
transport
network
link
physical
link
physical
presentation
session
switch
transport
network
destination
link
physical
Introduction
Ht
Hn Ht
Hl Hn Ht
application
transport
network
link
physical
Hn Ht
Hl Hn Ht
network
link
physical
router
Introduction
1-65
Chapter 1: roadmap
Hn Ht
1-66
Network Security
attacks on Internet infrastructure:
1-67
Introduction
1-68
17
Virus
infection by receiving
object (e.g.,
(e.g. e
e-mail
mail
attachment), actively
executing
self-replicating:
propagate itself to
other hosts, users
Worm:
infection by
y passively
p
y
receiving object that gets
itself executed
self- replicating: propagates
to other hosts, users
Sapphire Worm: aggregate scans/sec
in first 5 minutes of outbreak (CAIDA, UWisc data)
Introduction
1.
select target
target
Introduction
1-69
1-70
Masquerade as you
src:B dest:A
payload
A
src:B dest:A
payload
B
B
1-71
Introduction
1-72
18
Masquerade as you
Masquerade as you
later ..
A
src:B dest:A
src:B dest:A
B
Introduction
Introduction
1-73
Network Security
1-74
Chapter 1: roadmap
1-75
Introduction
1-76
19
Internet History
Internet History
1972:
ARPA t public
ARPAnet
bli d
demonstration
t ti
NCP (Network Control Protocol)
first host-host protocol
first e-mail program
ARPAnet has 15 nodes
Introduction
Introduction
1-77
Internet History
Internet History
1983: deployment of
TCP/IP
1982: smtp e-mail
protocol defined
1983: DNS defined
for name-to-IPaddress translation
1985: ftp protocol
defined
1988: TCP congestion
control
Introduction
1-79
1-78
Introduction
1-80
20
Internet History
Introduction: Summary
Covered a ton of material!
Internet overview
whats
h a protocol?
l?
network edge, core, access
network
packet-switching versus
circuit-switching
Internet structure
performance:
f
lloss, d
delay,
l
throughput
layering, service models
security
history
2007:
~500 million hosts
Voice, Video over IP
P2P applications: BitTorrent
(file sharing) Skype (VoIP),
PPLive (video)
more applications: YouTube,
gaming
wireless, mobility
Introduction
1-81
follow!
Introduction
1-82
21