DN Chap 1
DN Chap 1
DN Chap 1
Introduction
Computer Networking:
A Top Down Approach ,
5th edition.
diti
Jim Kurose, Keith Ross
Addison-Wesley, April
2009.
Introduction
1-1
Chapter 1: Introduction
Our goal:
tterminology
i l
more depth, detail
later in course
approach:
use Internet as
example
Overview:
whats the Internet?
whats a protocol?
network edge; hosts, access
1-2
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-3
PC
computing devices:
server
access
points
wired
links
router
Mobile network
Global ISP
Home network
Regional ISP
Institutional network
Introduction
1-4
Internet phones
Introduction
1-5
Mobile network
e.g., TCP
TCP, IP
IP, HTTP,
HTTP Skype,
Sk
Ethernet
Internet: network of
networks
loosely hierarchical
public Internet versus
private intranet
Global ISP
Home network
Regional ISP
Institutional network
Internet standards
RFC: Request for comments
IETF: Internet Engineering
Task Force
Introduction
1-6
infrastructure enables
distributed applications
applications:
Web, VoIP, email, games,
e-commerce, file sharing
communication services
provided to apps:
reliable data delivery
from source to
destination
best effort (unreliable)
data delivery
Introduction
1-7
Whats a protocol?
human protocols:
whats the time?
I have a question
introductions
specific msgs sent
specific actions taken
when msgs received,
received
or other events
network protocols:
machines rather than
h
humans
all communication
activity in Internet
governed by protocols
1-8
Whats a protocol?
a human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
response
Got the
time?
Get http://www.awl.com/kurose-ross
2:00
<file>
time
1-9
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-10
applications
pp
and
hosts
access networks,
physical media:
wired, wireless
communication links
network core:
interconnected
routers
network of
networks
Introduction
1-11
Introduction
1-12
peer-peer
client/server model
peer-peer model:
networks (school,
company)
mobile access networks
Keep in mind:
bandwidth (bits per
second) of access
network?
shared or dedicated?
Introduction
1-13
Dial-up Modem
central
office
home
PC
home
dial-up
modem
telephone
network
Internet
ISP
modem
(e.g., AOL)
home
phone
Internet
DSLAM
telephone
network
splitter
DSL
modem
home
PC
central
office
Introduction
1-16
Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
Introduction
1-17
cable headend
cable distribution
network (simplified)
home
Introduction
1-18
cable headend
cable distribution
network
home
Introduction
1-19
Introduction
1-20
cable headend
cable distribution
network (simplified)
home
10
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
D
A
T
A
D
A
T
A
C
O
N
T
R
O
L
Channels
cable headend
home
cable distribution
network
Introduction
1-21
Internet
OLT
central office
ONT
optical
fiber
optical
splitter
ONT
Optical
p
links from central office to the home
Two competing optical technologies:
Passive Optical network (PON)
Active Optical Network (PAN)
Much higher Internet rates; fiber also carries
11
Institutional
router
Ethernet
switch
To Institutions
ISP
100 Mbps
1 Gbps
100 Mbps
server
switch
wireless access
router
base
wireless LANs:
station
802.11b/g (WiFi): 11 or 54 Mbps
wider-area wireless access
provided by telco operator
~1Mbps over cellular system
(EVDO, HSDPA)
next up (?): WiMAX (10s Mbps)
over wide area
mobile
hosts
Introduction
1-24
12
Home networks
Typical home network components:
DSL or cable modem
router/firewall/NAT
t /fi
ll/NAT
Ethernet
wireless access
point
to/from
cable
headend
cable
l
modem
wireless
laptops
router/
firewall
wireless
access
point
Ethernet
Introduction
1-25
Physical Media
Bit: propagates between
transmitter/rcvr pairs
physical link: what lies
between transmitter &
receiver
guided media:
Category 3: traditional
phone wires, 10 Mbps
Ethernet
Category 5:
100Mbps Ethernet
unguided media:
signals propagate freely,
e.g., radio
Introduction
1-26
13
conductors
d t
bidirectional
baseband:
broadband:
multiple channels on
cable
HFC
high-speed point-to-point
transmission (e.g., 10s100s Gps)
Introduction
1-27
electromagnetic
spectrum
no physical wire
bidirectional
propagation
environment effects:
reflection
obstruction by objects
interference
1-28
14
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-29
Introduction
1-30
routers
the fundamental
question: how is data
transferred through net?
circuit switching:
dedicated circuit per
call: telephone net
packet-switching: data
sent thru net in
discrete chunks
15
capacity
dedicated resources:
no sharing
circuit-like
(guaranteed)
performance
call setup required
Introduction
1-31
idle if
into pieces
frequency division
time division
(no sharing)
Introduction
1-32
16
4 users
frequency
time
TDM
frequency
time
Introduction
1-33
Numerical example
How long does it take to send a file of
640,000
640
000 bits from host A to host B over a
circuit-switched network?
All links are 1.536 Mbps
Each link uses TDM with 24 slots/sec
500 msec to establish end-to-end circuit
Introduction
1-34
17
resource contention:
aggregate resource
d
demand
d can exceed
d
amount available
congestion: packets
queue, wait for link use
store and forward:
packets move one hop
p
p
at a time
Introduction
1-35
A
B
statistical multiplexing
1.5 Mb/s
queue of packets
waiting for output
link
1-36
18
Packet-switching: store-and-forward
L
R
Example:
L = 7.5 Mbits
R = 1.5 Mbps
transmission delay = 15
sec
1-37
circuit-switching:
10 users
N users
1 Mbps link
packet switching:
with 35 users,
probability > 10 active
at same time is less
than .0004
Introduction
1-38
19
resource sharing
simpler, no call setup
excessive congestion: packet delay and loss
protocols needed for reliable data transfer,
congestion control
Q: How to provide circuit-like behavior?
bandwidth guarantees needed for audio/video apps
still an unsolved problem (chapter 7)
Introduction
1-39
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Introduction
1-40
20
to/from backbone
peering
to/from customers
Introduction
1-41
Tier-2 ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
Tier 1 ISP
Tier-2 ISPs
also peer
privately with
each other.
Tier-2 ISP
Tier-2 ISP
Introduction
1-42
21
Tier 3
ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
local
local
ISP
ISP
Tier-2 ISP
local
ISP
Tier-2 ISP
local
ISP
Introduction
1-43
local
ISP
Tier 3
ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
local
local
ISP
ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
Tier-2 ISP
local
ISP
Introduction
1-44
22
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-45
capacity
packets queue, wait for turn
A
B
Introduction
1-46
23
2. queueing
time waiting at output
link for transmission
depends on congestion
level of router
transmission
propagation
nodal
processing
queueing
Introduction
1-47
t
transmission
smissi
4. Propagation delay:
d = length of physical link
s = propagation speed in
medium (~2x108 m/sec)
propagation delay = d/s
Note: s and R are very
different quantities!
propagation
nodal
processing
queueing
Introduction
1-48
24
Caravan analogy
100 km
ten-car
caravan
100 km
toll
booth
toll
booth
cars propagate at
100 km/hr
toll booth takes 12 sec to
service car (transmission
time))
car~bit; caravan ~ packet
Q: How long until caravan
is lined up before 2nd toll
booth?
1-49
100 km
toll
booth
1000 km/hr
Toll booth now takes 1
min to service a car
Q: Will cars arrive to
2nd booth before all
cars serviced at 1st
booth?
toll
booth
1-50
25
Nodal delay
d nodal d proc d queue d trans d prop
dproc = processing delay
typically a few microsecs or less
dqueue = queuing delay
depends on congestion
dtrans = transmission delay
y
= L/R, significant for low-speed links
dprop = propagation delay
a few microsecs to hundreds of msecs
Introduction
1-51
Introduction
1-52
arrival rate
26
3 probes
3 probes
Introduction
1-53
1-54
27
Packet loss
queue (aka buffer) preceding link in buffer has
finite capacity
packet arriving to full queue dropped (aka lost)
lost packet may be retransmitted by previous
node, by source end system, or not at all
buffer
((waiting
g area))
A
B
packet arriving to
full buffer is lost
Introduction
1-55
Throughput
throughput: rate (bits/time unit) at which
link
capacity
that
can carry
server,
with
server
sends
bits pipe
R
bits/sec
fluid
at
rate
file
of
F
bits
s
(fluid) into pipe
Rs bits/sec)
to send to client
link that
capacity
pipe
can carry
Rfluid
c bits/sec
at rate
Rc bits/sec)
Introduction
1-56
28
Throughput (more)
Rs
Rs
Rc bits/sec
Rc bits/sec
bit /
bottleneck link
link on end-end path that constrains end-end throughput
Introduction
1-57
end-end
throughput:
min(Rc,Rs,R/10)
in practice: Rc or
Rs is
i often
ft
bottleneck
Rs
Rs
Rs
R
Rc
Rc
Rc
1-58
29
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-59
Protocol Layers
Networks are complex!
many pieces:
hosts
routers
links of various
media
applications
protocols
hardware,
software
Question:
Is there any hope of
organizing structure of
network?
Or at least our discussion
of networks?
Introduction
1-60
30
ticket (complain)
baggage (check)
baggage (claim)
l
gates (load)
gates (unload)
runway takeoff
runway landing
airplane routing
airplane routing
airplane
l
routing
a series of steps
Introduction
1-61
ticket (complain)
ticket
baggage (check)
baggage (claim
baggage
gates (load)
gates (unload)
gate
runway (takeoff)
runway (land)
takeoff/landing
airplane routing
airplane routing
airplane routing
departure
airport
airplane routing
airplane routing
intermediate air-traffic
control centers
arrival
airport
Layers: each
L
h layer
l
implements
i l
t a service
i
via its own internal-layer actions
relying on services provided by layer below
Introduction
1-62
31
Why layering?
Dealing with complex systems:
explicit structure allows identification,
1-63
applications
transfer
TCP, UDP
source to destination
application
pp
transport
network
link
physical
PPP, Ethernet
Introduction
1-64
32
application
presentation
session
transport
network
link
physical
Introduction
Encapsulation
source
message
segment
Ht
datagram Hn Ht
frame Hl Hn Ht
1-65
application
transport
network
link
physical
link
physical
switch
destination
M
Ht
Hn Ht
Hl Hn Ht
application
transport
network
link
physical
Hn Ht
Hl Hn Ht
network
link
physical
Hn Ht
router
Introduction
1-66
33
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-67
Network Security
The field of network security is about:
how bad guys
y can attack computer
p
networks
how we can defend networks against attacks
how to design architectures that are immune to
attacks
Internet not originally designed with
1-68
34
trojan horse.
for spam
p
and DDoS attacks.
1-69
Worm:
infection by
y passively
p
y
receiving object that gets
itself executed
self- replicating: propagates
to other hosts, users
Sapphire Worm: aggregate scans/sec
in first 5 minutes of outbreak (CAIDA, UWisc data)
Introduction
1-70
35
g
traffic
(server, bandwidth) unavailable to legitimate
by overwhelming resource with bogus traffic
1.
select target
target
Introduction
1-71
src:B dest:A
payload
1-72
36
A
src:B dest:A
payload
Introduction
1-73
src:B dest:A
B
Introduction
1-74
37
Network Security
more throughout this course
chapter
p
8: focus
f
on security
y
crypographic techniques: obvious uses and
Introduction
1-75
Chapter 1: roadmap
1.1 What is the Internet?
1 2 Network edge
1.2
end systems, access networks, links
1-76
38
Internet History
1961-1972: Early packet-switching principles
1961: Kleinrock - queueing
theory shows
effectiveness of packetswitching
1964: Baran - packetswitching in military nets
1967: ARPAnet conceived
by Advanced Research
Projects Agency
1969: first ARPAnet node
operational
1972:
ARPAnett public
ARPA
bli demonstration
d
t ti
NCP (Network Control Protocol)
first host-host protocol
first e-mail program
ARPAnet has 15 nodes
Introduction
1-77
Internet History
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite
network in Hawaii
1974: Cerf and Kahn architecture for
interconnecting networks
1976: Ethernet at Xerox
PARC
ate70s: proprietary
architectures: DECnet, SNA,
XNA
late 70s: switching fixed
length packets (ATM
precursor)
1979: ARPAnet has 200 nodes
Introduction
1-78
39
Internet History
1980-1990: new protocols, a proliferation of networks
1983: deployment of
TCP/IP
1982: smtp e-mail
protocol defined
1983: DNS defined
for name-to-IPaddress translation
1985: ftp protocol
defined
1988: TCP congestion
control
Csnet, BITnet,
C
BIT
NSFnet, Minitel
100,000 hosts
connected to
confederation of
networks
Introduction
1-79
Internet History
1990, 2000s: commercialization, the Web, new apps
Early 1990s: ARPAnet
decommissioned
1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
early 1990s: Web
hypertext [Bush 1945, Nelson
1960s]
HTML,
HTML HTTP:
HTTP B
Berners-Lee
L
1994: Mosaic, later Netscape
late 1990s:
commercialization of the Web
network security to
forefront
est. 50 million host, 100
million+ users
backbone links running
g at
Gbps
Introduction
1-80
40
Internet History
2007:
~500 million hosts
Voice, Video over IP
P2P applications: BitTorrent
(file sharing) Skype (VoIP),
PPLive (video)
more applications: YouTube,
gaming
wireless, mobility
Introduction
1-81
Introduction: Summary
Covered a ton of material!
Internet overview
whats
h a protocol?
l?
network edge, core, access
network
packet-switching versus
circuit-switching
Internet structure
performance:
f
lloss, delay,
d l
throughput
layering, service models
security
history
follow!
Introduction
1-82
41