Sei sulla pagina 1di 51

TNK108

Datornt/Computer
p
Networks 2010
Scott Fowler
Lecture 1

Book for the course

Computer Networking: A Top-Down Approach: International Version, 5/E


James
Ja
es F. Kurose,
u ose, U
University
es yo
of Massachusetts,
assac use s, Amherst
es
Keith W. Ross, Polytechnic University, Brooklyn
Publisher: Pearson Higher Education
ISBN-10: 0131365487ISBN-13:9780131365483

Sid 2

Scott Fowler, ITN

Course Information (contd)


(cont d)

Literature
Lecture notes

Textbook: J.
J Kurose and K
K. Ross
Ross, Computer
Networking A Top Down Approach, 5th edition
Lecture notes and lab assignments:
http://webstaff.itn.liu.se/~scofo47/TNK108/tnk108.html
(password = )
Supplement material, if needed, will be specified or handed out

Course Staff
Me -> Scott Fowler
Arash Matinrad

Sid 3

Scott Fowler, ITN

Course Information (cont


(contd)
d)

Examination and grading

2 closed book written exams (3 credits)

90% -100% = 5 (ECTS A)

75% -89%
89% = 4 (ECTS B)

60% -74% = 3 (ECTS C)

0 -59%
59% = fail
a ((ECTS
C S F))

Overall grade = exam, if the result of the lab assignments is pass

g
((3 credits))
Lab assignments

Pass / fail

Show your work and results to the course staff during lab hours

Re-examination

Re-examination periods, not responsible for the times

A single written exam covering the entire scope of the course


Sid 4

Scott Fowler, ITN

Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge

end systems, access networks, links

1.3 Network core

circuit switching, packet switching, network structure

1.4
1
4 Delay,
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-5

Whats the Internet: nuts and bolts view


PC

millions

server
wireless
laptop
cellular
handheld

of connected
computing devices:
hosts = end systems
running network apps

communication
i ti
access
points
p
wired
links

router

li
links
k

fiber, copper,
radio satellite
radio,
transmission
rate = bandwidth
routers: forward
packets (chunks of
data)

Mobile network
Global ISP

Home network
Regional ISP

I tit ti
Institutional
l network
t
k

Whats the Internet: nuts and bolts view

p otoco s co
protocols
control
t o se
sending,
d g,
receiving of msgs

Mobile network
Global ISP

e.g.,
g , TCP,, IP,, HTTP,, Skype,
yp ,
Ethernet

Internet: network of
networks

Home network
R i
Regional
l ISP

loosely hierarchical
public Internet versus private
intranet

Institutional network

I
Internet
standards
d d
RFC: Request for comments
IETF: Internet Engineering
Task Force

Introduction 1-7

Whats the Internet: a service view

communication infrastructure
enables distributed
applications:
Web, VoIP, email, games,
e-commerce, file sharing

communication services
provided to apps:
reliable data delivery from
source to destination
best effort (unreliable)
data delivery
Introduction 1-8

Whatss a protocol?
What
human
u a p
protocols:
otoco s

whats the time?

I have
h
a question
ti

introductions

specific msgs sent


specific actions taken
when msgs received,
or other events

network
et o protocols:
p otoco s

machines rather than


humans

all communication
activity in Internet
governed by protocols

protocols define format,


order of msgs sent and
received among network
entities, and actions
taken on msg
transmission receipt
transmission,
Introduction 1-9

Whatss a protocol?
What
a human
u a p
protocol
otoco a
and
d a co
computer
pute network
et o p
protocol:
otoco

Hi

TCP connection
request

Hi

TCP connection
ti
response

Got the
time?

Get http://www.awl.com/kurose
http://www.awl.com/kurose-ross
ross

2:00

<file>
time

Q: Other human protocols?


Introduction 1-10

A closer look at network structure:


network edge:
applications and
hosts
access networks,
physical media:
wired, wireless
communication links

network core:
interconnected
i t
t d

routers
network of
networks

Introduction 1-11

The network edge:

end systems (hosts):


run application programs
e.g.
e g Web
Web, email
at edge of network

client/server model
client host requests, receives
service from always-on server
e.g. Web browser/server;
email client/server

peer-peer model:

minimal (or no) use of


dedicated servers
e.g. Skype, BitTorrent

Access networks and physical media


Q: How
Q
o to connect
co ect end
e d
systems to edge router?

residential access nets

institutional access
networks (school
(school,
company)

mobile access networks

Keep in mind:

bandwidth
b
d idth (bit
(bits per
second) of access
network?

shared or dedicated?

Physical Media
Twisted Pair (TP)

bit: propagates between


transmitter/rcvr pairs

physical link: what lies


between transmitter &
receiver

Category 3: traditional
phone wires, 10 Mbps
Eth
Ethernet
t

guided media:

Category 5:
100Mbps Ethernet

signals propagate in solid


media: copper, fiber, coax

two insulated copper


wires

unguided
id d media:
di
signals propagate freely, e.g.,
radio
Introduction 1-14

Physical Media: coax, fiber


Coaxial cable:

two concentric copper


conductors

bidirectional

baseband:

Fiber optic cable:

high-speed point-to-point
transmission (e
(e.g.,
g 10
10ss100s Gps)

single channel on cable


legacy Ethernet

broadband:

multiple channels on cable

HFC (Hybrid fibre-coaxial)

glass fiber carrying light


pulses, each pulse a bit
high-speed operation:

low error rate: repeaters


p
spaced far apart ; immune
to electromagnetic noise

Introduction 1-15

Physical media: radio

s g a ca
signal
carried
ed in
electromagnetic
spectrum

no physical wire

bidirectional

propagation environment
effects:
reflection
obstruction by objects
interference

Radio link types:


yp

terrestrial microwave
e.g. up to 45 Mbps channels

LAN (e.g., Wifi)


11Mbps, 54 Mbps

wide-area (e.g., cellular)


3G cellular: ~ 1 Mbps

satellite
t llit
Kbps to 45Mbps channel (or
multiple smaller channels)
270 msec end-end delay
geosynchronous versus low
altitude
Introduction 1-16

Internet structure: network of networks

roughly hierarchical

at center: small # of well-connected


well connected large networks
tier-1 commercial ISPs (e.g., Verizon, Sprint, AT&T, Qwest,
Level3),
) national & international coverage
g
large content distributors (Google, Akamai, Microsoft)
q
((no charges)
g )
treat each other as equals
IXP

Tier-11 ISPs
Ti
ISP &
Content
Distributors,
interconnect
(peer) privately
or at Internet
Exchange Points
IXPs

Large Content
Distributor
(e.g., Akamai)

IXP

Tier 1 ISP

Tier 1 ISP

Large Content
Distributor
(e.g., Google)

Tier 1 ISP

Introduction 1-17

Tier-1 ISP: e.g., Sprint


POP: point-of-presence

to/from backbone
peering

to/from customers

Introduction 1-18

Internet structure: network of networks


tier-2 ISPs: smaller (often regional) ISPs
connect to one or more tier-1 (provider) ISPs
each tier-1 has many tier-2 customer nets
tier 2 pays
p y tier 1 provider
p

tier-2

nets sometimes peer directly with each other


(bypassing tier 1) , or at IXP
IXP
Large Content
Distributor
((e.g.,
g , Akamai)

Tier 2
Tier 2 ISP Tier 2
ISP
ISP
P

IXP

Tier 1 ISP

Tier 2
Tier 1 ISP
ISP
P Tier 2
Tier 2
ISP
ISP

Large Content
Distributor
(e.g., Google)

Tierr 1 ISP
S

Tier 2
ISP

Tier 2
ISP

Tier 2
ISP
Introduction 1-19

Internet structure: network of networks

Tier
Tier-3
3 ISPs
ISPs, local ISPs
customer of tier 1 or tier 2 network
last hop (access)
( access ) network (closest to end systems)

IXP
Large Content
Distributor
(e.g., Akamai)

Tier 2
Tier 2 ISP Tier 2
ISP
ISP

IXP

Tier 1 ISP

Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP

Large Content
Distributor
(e.g., Google)

Tier 1 ISP

Tier 2
ISP

Tier 2
ISP

Tier 2
ISP
Introduction 1-20

Internet structure: network of networks

a packet passes through many networks from source


host to destination host

IXP
Large Content
Distributor
(e.g., Akamai)

Tier 2
Tier 2 ISP Tier 2
ISP
ISP

IXP

Tier 1 ISP

Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP

Large Content
Distributor
(e.g., Google)

Tier 1 ISP

Tier 2
ISP

Tier 2
ISP

Tier 2
ISP
Introduction 1-21

Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge

end systems, access networks, links

1.3 Network core

circuit switching, packet switching, network structure

1.4
1
4 Delay
Delay, loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-22

How do loss and delay occur?


packets queue in router buffers

packet arrival rate to link exceeds output link capacity

packets queue, wait for turn


packet being transmitted (delay)

A
B

packets queueing (delay)


free (available) buffers: arriving packets
d
dropped
d (l
(loss)) if
f no f
free b
buffers
ff
Introduction 1-23

Four sources of packet delay


transmission

propagation

nodal
processing

queueing

dnodal = dproc + dqueue + dtrans + dprop


dproc: nodal processing
check bit errors
determine output link
typically < msec

dqueue: queueing delay

time waiting at output link


for transmission
depends on congestion level
of router
Introduction 1-24

Four sources of packet delay


transmission

propagation

nodal
processing

queueing

dnodal = dproc + dqueue + dtrans + dprop


dtrans: transmission delay:
L: packet length (bits)
R: link bandwidth (bps)
dtrans = L/R

dtrans and
d dprop
very different

dprop: propagation delay:


d: length of physical link
s: propagation speed in
medium (~2x108 m/sec)
dprop = d/s
/

Introduction 1-25

R: link bandwidth (bps)

L: packet length (bits)

a: average packet
arrival rate

average
a
e queueing
delay

Queueing delay (revisited)

traffic intensity
= La/R

La/R ~ 0: avg. queueing delay small


La/R -> 1: avg. queueing delay large
La/R > 1: more work arriving
than can be serviced, average delay infinite!

L /R ~ 0
La/R

La/R -> 1
Introduction 1-26

Real Internet delays and routes

What do real Internet delay & loss look like?

Traceroute program: provides delay measurement


from source to router along end-end Internet path
towards destination. For all i:
sends three packets that will reach router i on path towards
destination
router i will return packets to sender
sender times interval between transmission and reply.
3 probes
b

3 probes
b

3 probes

Introduction 1-27

Real Internet delays and routes


traceroute: gaia.cs.umass.edu to www.eurecom.fr
Three delay measurements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw
g ((128.119.240.254)) 1 ms 1 ms 2 ms
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene
abilene-vbns.abilene.ucaid.edu
vbns abilene ucaid edu (198
(198.32.11.9)
32 11 9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
link
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net
lb
3t2 ft t (193
(193.48.50.54)
48 50 54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
* means no response (probe lost, router not replying)
18 * * *
19 ffantasia.eurecom.fr
t i
f (193.55.113.142)
(193 55 113 142) 132 ms 128 ms 136 ms
Introduction 1-28

Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge

end systems, access networks, links

1.3 Network core

circuit switching, packet switching, network structure

1.4
1
4 Delay,
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-29

Protocol Layers
Networks
et o s are
a e complex,
co p e ,
with many pieces:
hosts
h t
routers
links of various
media

Question:
Is there any hope of
organizing structure of
network?

applications
protocols
hardware, software

Or at least our discussion


off networks?
t
k ?

Introduction 1-30

Organization of air travel


ti k t ((purchase)
ticket
h
)

ti k t ((complain)
ticket
l i )

baggage (check)

baggage (claim)

gates (load)

gates (unload)

runway takeoff

runway landing

airplane routing

airplane routing
airplane routing

a series of steps
Introduction 1-31

Layering of airline functionality

ticket (purchase)

ticket (complain)

ticket

baggage (check)

baggage (claim

baggage

gates (load)

gates (unload)

gate

runway (takeoff)

runway (land)

takeoff/landing

airplane routing

airplane routing

airplane routing
departure
airport

airplane routing

airplane routing

intermediate air-traffic
control centers

arrival
airport

Layers: each layer implements a service


via its own internal
internal-layer
layer actions
relying on services provided by layer below
Introduction 1-32

Why layering?
Dealing with complex systems:

explicit structure allows identification, relationship of


complex systems
system s pieces
layered reference model for discussion

modularization eases maintenance, updating of


system
change of implementation of layers service
transparent to rest of system
e.g., change in gate procedure doesnt affect rest
of system

layering considered harmful?


Introduction 1-33

Internet protocol stack

application: supporting network applications


FTP, SMTP, HTTP

transport:
p
process-process
p
p
data transfer
TCP, UDP

network: routing
g of datagrams
g
from source to
destination
IP, routing protocols

link: data transfer between neighboring


network elements
Ethernet,
Eth
t 802.11
802 11 (WiFi),
(WiFi) PPP

application
transport
network
k
link
physical
p
y

physical: bits on the wire

Introduction 1-34

ISO/OSI reference model

presentation: allow applications to


interpret meaning of data, e.g.,
encryption, compression, machinespecific conventions
session: synchronization,
y
checkpointing, recovery of data
exchange

application
presentation
session
transport
network

Internet stack missing these layers!

link

these services,, if needed,, must be


implemented in application

physical

needed?
Introduction 1-35

Encapsulation

source
message
segment Ht
datagram Hn Ht
frame Hl Hn Ht

M
M
M
M

application
transport
network
li k
link
physical
link
physical
switch

d ti ti
destination
M
Ht

Hn Ht
Hl Hn Ht

M
M

application
transport
network
link
physical

Hn Ht
Hl Hn Ht

M
M

network
link
physical

Hn Ht

router

Introduction 1-36

Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge

end systems, access networks, links

1.3 Network core

circuit switching, packet switching, network structure

1.4
1
4 Delay,
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-37

Network Security

field of network security:


how bad guys can attack computer networks
how we can defend networks against attacks
how to design architectures that are immune to
attacks

Internet not originally


g
y designed
g
with ((much))
security in mind
original vision: a
a group of mutually trusting users
attached to a transparent network
Internet protocol designers playing catch
catch-up
up
security considerations in all layers!

Introduction 1-38

Bad guys: put malware into hosts via Internet

malware can get in host from a virus,


virus worm
worm, or trojan
horse.

spyware malware can record keystrokes, web sites


visited, upload info to collection site.

infected host can be enrolled in botnet,


botnet used for
spam and DDoS attacks.

malware often self-replicating: from one infected


host, seeks entry into other hosts
Introduction 1-39

Bad guy
guys: put
pu malware
m w
into hosts via Internet
Trojan horse
hidden part of some
otherwise useful software
today often in Web page
(Active-X, plugin)

virus
infection by receiving object
((e.g.,
g e-mail attachment),
)
actively executing

worm:
iinfection
f
i b
by passively
i l receiving
i i
object that gets itself
executed
self- replicating: propagates to
other hosts, users

Sapphire Worm: aggregate scans/sec


in first 5 minutes of outbreak (CAIDA, UWisc data)

self-replicating: propagate
itself to other hosts,
hosts users
sers

Introduction 1-40

Bad g
guys:
y attack server,, network infrastructure
Denial of Dervice (DoS): attackers make resources
(server bandwidth) unavailable to legitimate traffic by
(server,
overwhelming resource with bogus traffic
1. select target
2 break into hosts
2.
around the network
((see botnet))
3. send packets to target
from compromised
h
hosts

target
g

Introduction 1-41

The bad guys can sniff packets


Packet sniffing:
broadcast media (shared Ethernet, wireless)
promiscuous network interface reads/records all
packets (e.g., including passwords!) passing by
C

src:B dest:A

payload

Wireshark software used for end-of-chapter


l b is
labs
i a (free)
(f
) packet-sniffer
k t iff
Introduction 1-42

The bad guys can use false source


addresses
IP spoofing:
fi
send packet with false source address
C

A
src:B dest:A

payload

Introduction 1-43

The bad guys can record and playback


record-and-playback: sniff sensitive info (e.g.,
password), and use later
password holder is that user from system point of
view
A

src:B dest:A

user: B; password: foo

llots
t more on security
it (th
(throughout,
h t Ch
Chapter
t 8)
Introduction 1-44

Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge

end systems, access networks, links

1.3 Network core

circuit switching, packet switching, network structure

1 4 Delay,
1.4
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-45

Internet History
1961-1972: Early packet-switching principles

1961: Kleinrock - queueing


theory shows effectiveness
of packet-switching
packet switching

1964: Baran - packetswitching


g in military
y nets

1967: ARPAnet conceived


by Advanced Research
P j t Agency
Projects
A

1969: first ARPAnet node


operational

1972:
ARPAnet public demonstration
NCP (Network Control Protocol)
first host-host protocol
first e-mail program
ARPAnet has 15 nodes

Introduction 1-46

Internet History
1972-1980: Internetworking, new and proprietary nets

1970: ALOHAnet satellite


network in Hawaii
1974: Cerf and Kahn architecture for interconnecting
networks

Cerf and Kahns internetworking


principles:
p
p
minimalism, autonomy no internal changes
required to interconnect
networks

1976 Ethernet
1976:
Eth
t att Xerox
X
PARC

late70s: proprietary
architectures: DECnet, SNA,
XNA

best effort service model

late 70s: switching fixed length


packets (ATM precursor)

decentralized control

1979: ARPAnet has 200 nodes

stateless routers
define todays Internet
architecture

Introduction 1-47

Internet Historyy
1980-1990: new protocols, a proliferation of networks

1983: deployment of
TCP/IP

1982: smtp e-mail


protocol defined
p

1983: DNS defined for


name-to-IP-address
translation

1985: ftp
pp
protocol
defined

1988: TCP congestion


control

new national networks:


Csnet, BITnet, NSFnet,
Minitel

100,000
,
hosts
connected to
confederation of
networks
t
k

Introduction 1-48

Internet History
1990, 2000s: commercialization, the Web, new apps
early

1990s: ARPAnet
decommissioned

1991:

NSF lifts restrictions on


commercial use of NSFnet
((decommissioned,, 1995))

early

1990s: Web

yp
[[Bush 1945,, Nelson
hypertext
1960s]
HTML, HTTP: Berners-Lee

late 1990s 2000s:

more killer apps: instant


messaging, P2P file sharing

network security to forefront

est. 50 million host, 100


million+ users

backbone links running at


Gbps

1994: Mosaic, later Netscape


late 1990s: commercialization of
th W
the
Web
b
Introduction 1-49

Internet Historyy
2010:

~750 million hosts

voice, video over IP

P2P applications: BitTorrent


(file sharing) Skype (VoIP),
PPLive (video)

more applications: YouTube,


gaming, Twitter

wireless, mobility

Introduction 1-50

Introduction: Summary
Covered a ton of material!

Internet overview

whats a protocol?

network edge
edge, core,
core access
network

You now have:

context, overview,
context
overview
feel of networking

more depth,
p , detail to
follow!

packet-switching versus
circuit-switching
Internet structure

performance: loss, delay,


throughput
g p

layering, service models

security

history

Introduction 1-51

Potrebbero piacerti anche