SlideShare una empresa de Scribd logo
1 de 61
Introduction
Overview:
• what’s the Internet?
• what’s a protocol?
• network edge; hosts, access net,
physical media
• network core: packet/circuit
switching, Internet structure
• performance: loss, delay, throughput
• security
• protocol layers, service models
• history
1-1
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-2
What’s the Internet: “nuts and bolts” view
• millions of connected
computing devices: hosts
= end systems
– running network apps
1-3
Home network
Institutional network
Mobile network
Global ISP
Regional ISP
router
PC
server
wireless
laptop
cellular
handheld
wired
links
access
points
 communication links
 fiber, copper, radio,
satellite
 transmission rate =
bandwidth
 routers: forward packets
(chunks of data)
What’s the Internet: “nuts and bolts” view
• protocols control sending,
receiving of msgs
– e.g., TCP, IP, HTTP, Skype,
Ethernet
• Internet: “network of
networks”
– loosely hierarchical
– public Internet versus private
intranet
• Internet standards
– RFC: Request for comments
– IETF: Internet Engineering Task
Force
1-4
Home network
Institutional network
Mobile network
Global ISP
Regional ISP
What’s the Internet: a service view
• communication infrastructure
enables distributed applications:
– Web, VoIP, email, games, e-
commerce, file sharing
• communication services
provided to apps:
– reliable data delivery from
source to destination
– “best effort” (unreliable) data
delivery
1-5
What’s a protocol?
human protocols:
• “what’s the time?”
• “I have a question”
• introductions
… specific msgs sent
… specific actions taken
when msgs received, or
other events
network protocols:
• machines rather than
humans
• all communication activity
in Internet governed by
protocols
1-6
protocols define format, order of
msgs sent and received among
network entities, and actions
taken on msg transmission,
receipt
What’s a protocol?
a human protocol and a computer network protocol:
1-7
Hi
Hi
Got the
time?
2:00
TCP connection
request
TCP connection
response
Get http://www.awl.com/kurose-ross
<file>
time
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-8
A closer look at network structure:
• network edge:
applications and hosts
1-9
 access networks,
physical media: wired,
wireless
communication links
 network core:
 interconnected routers
 network of networks
The network edge:
• end systems (hosts):
– run application programs
– e.g. Web, email
– at “edge of network”
1-10
client/server
peer-peer
 client/server model
 client host requests, receives service
from always-on server
 e.g. Web browser/server; email
client/server
 peer-peer model:
 minimal (or no) use of dedicated
servers
 e.g. Skype, BitTorrent
telephone
network Internet
home
dial-up
modem
ISP
modem
(e.g., AOL)
home
PC
central
office
 Uses existing telephony infrastructure
 Home is connected to central office
 up to 56Kbps direct access to router (often less)
 Can’t surf and phone at same time: not “always on”
Dial-up Modem
telephone
network
DSL
modem
home
PC
home
phone
Internet
DSLAM
Existing phone line:
0-4KHz phone; 4-50KHz
upstream data; 50KHz-1MHz
downstream data
splitter
central
office
Digital Subscriber Line (DSL)
 Also uses existing telephone infrastruture
Cable Network Architecture: Overview
1-13
home
cable headend
cable distribution
network (simplified)
Typically 500 to 5,000 homes
Cable Network Architecture: Overview
1-14
home
cable headend
cable distribution
network
server(s)
Cable Network Architecture: Overview
1-15
home
cable headend
cable distribution
network (simplified)
Wireless access networks
• shared wireless access network
connects end system to router
– via base station aka “access point”
• wireless LANs:
– 802.11b/g (WiFi): 11 or 54 Mbps
• wider-area wireless access
– provided by telco operator
– ~2Mbps over cellular system (EVDO,
UMTS, HSPA)
– Next 4G: WiMAX (10’s Mbps) and
LTE over wide area
1-16
base
station
mobile
hosts
router
Home networks
Typical home network components:
• DSL or cable modem
• router/firewall/NAT
• Ethernet
• wireless access
point
1-17
wireless
access
point
wireless
laptops
router/
firewall
cable
modem
to/from
cable
headend
Ethernet
Physical Media
• Bit: propagates between
transmitter/rcvr pairs
• physical link: what lies
between transmitter & receiver
• guided media:
– signals propagate in solid media:
copper, fiber, coax
• unguided media:
– signals propagate freely, e.g.,
radio
Twisted Pair (TP)
• two insulated copper wires
– Category 3: traditional
phone wires, 10 Mbps
Ethernet
– Category 5:
100Mbps Ethernet
1-18
Physical Media: coax, fiber
Coaxial cable:
• two concentric copper
conductors
• bidirectional
• baseband:
– single channel on cable
– legacy Ethernet
• broadband:
– multiple channels on cable
– HFC
1-19
Fiber optic cable:
 glass fiber carrying light
pulses, each pulse a bit
 high-speed operation:
 high-speed point-to-point
transmission (e.g., 10’s-100’s
Gps)
 low error rate: repeaters
spaced far apart ; immune to
electromagnetic noise
Physical media: radio
• signal carried in
electromagnetic spectrum
• no physical “wire”
• bidirectional
• propagation environment
effects:
– reflection
– obstruction by objects
– interference
1-20
Radio link types:
 terrestrial microwave
 e.g. up to 45 Mbps channels
 LAN (e.g., Wifi)
 11Mbps, 54 Mbps, 300 Mbps
 wide-area (e.g., cellular)
 3G cellular: ~ 1 Mbps
 4G cellular: ~ 21 Mbps
 satellite
 Kbps to 45Mbps channel (or
multiple smaller channels)
 270 msec end-end delay
 geosynchronous versus low
altitude
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-21
The Network Core
• mesh of interconnected
routers
• the fundamental question:
how is data transferred
through net?
– circuit switching:
dedicated circuit per call:
telephone net
– packet-switching: data
sent thru net in discrete
“chunks”
1-22
Network Core: Circuit Switching
End-end resources
reserved for “call”
• link bandwidth, switch
capacity
• dedicated resources: no
sharing
• circuit-like (guaranteed)
performance
• call setup required
1-23
Network Core: Circuit Switching
network resources (e.g.,
bandwidth) divided into
“pieces”
• pieces allocated to calls
• resource piece idle if not
used by owning call (no
sharing)
1-24
 dividing link bandwidth into
“pieces”
 frequency division
 time division
Circuit Switching: FDM and TDM
1-25
FDM
frequency
time
TDM
frequency
time
4 users
Example:
Network Core: Packet Switching
each end-end data stream divided
into packets
• user A, B packets share
network resources
• each packet uses full link
bandwidth
• resources used as needed
1-26
resource contention:
 aggregate resource demand
can exceed amount
available
 congestion: packets queue,
wait for link use
 store and forward: packets
move one hop at a time
 Node receives complete packet
before forwardingBandwidth division into “pieces”
Dedicated allocation
Resource reservation
Packet Switching: Statistical Multiplexing
Sequence of A & B packets does not have fixed pattern, bandwidth
shared on demand statistical multiplexing.
TDM: each host gets same slot in revolving TDM frame.
1-27
A
B
C
100 Mb/s
Ethernet
1.5 Mb/s
D E
statistical multiplexing
queue of packets
waiting for output
link
Packet-switching: store-and-forward
• takes L/R seconds to
transmit (push out) packet
of L bits on to link at R bps
• store and forward: entire
packet must arrive at
router before it can be
transmitted on next link
• delay = 3L/R (assuming
zero propagation delay)
Example:
• L = 7.5 Mbits
• R = 1.5 Mbps
• transmission delay = 15
sec
1-28
R R R
L
Internet structure: network of networks
• roughly hierarchical
• at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable and
Wireless), national/international coverage
– treat each other as equals
1-29
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-1
providers
interconnect
(peer)
privately
Internet structure: network of networks
• “Tier-2” ISPs: smaller (often regional) ISPs
– Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs
1-30
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
Tier-2 ISP pays
tier-1 ISP for
connectivity to rest
of Internet
 tier-2 ISP is
customer of
tier-1 provider
Tier-2 ISPs also
peer privately
with each other.
Internet structure: network of networks
• “Tier-3” ISPs and local ISPs
– last hop (“access”) network (closest to end systems)
1-31
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
Local and tier- 3
ISPs are
customers of
higher tier ISPs
connecting them
to rest of Internet
Internet structure: network of networks
• a packet passes through many networks!
1-32
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISPTier-2 ISP
Tier-2 ISP Tier-2 ISP
Tier-2 ISP
local
ISP
local
ISP
local
ISP
local
ISP
local
ISP Tier 3
ISP
local
ISP
local
ISP
local
ISP
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-33
How do loss and delay occur?
packets queue in router buffers
• packet arrival rate to link exceeds output link capacity
• packets queue, wait for turn
1-34
A
B
packet being transmitted (delay)
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Four sources of packet delay
• 1. nodal processing:
– check bit errors
– determine output link
1-35
A
B
propagation
transmission
nodal
processing queueing
 2. queueing
 time waiting at output link
for transmission
 depends on congestion level
of router
Delay in packet-switched networks
3. Transmission delay:
• R=link bandwidth (bps)
• L=packet length (bits)
• time to send bits into link
= L/R
4. Propagation delay:
• d = length of physical link
• s = propagation speed in
medium (~2x108
m/sec)
• propagation delay = d/s
1-36
A
B
propagation
transmission
nodal
processing queueing
Note: s and R are very
different quantities!
Nodal delay
• dproc = processing delay
– typically a few microsecs or less
• dqueue = queuing delay
– depends on congestion
• dtrans = transmission delay
– = L/R, significant for low-speed links
• dprop = propagation delay
– a few microsecs to hundreds of msecs
1-37
proptransqueueprocnodal ddddd +++=
Queueing delay (revisited)
• R=link bandwidth (bps)
• L=packet length (bits)
• a=average packet arrival
rate
1-38
traffic intensity = La/R
 La/R ~ 0: average queueing delay small
 La/R -> 1: delays become large
 La/R > 1: more “work” arriving than can be
serviced, average delay infinite!
Packet loss
• queue (buffer) preceding link in buffer has
finite capacity
• packet arriving to full queue dropped (lost)
• lost packet may be retransmitted by previous
node, by source end system, or not at all
1-39
A
B
packet being transmitted
packet arriving to
full buffer is lost
buffer
(waiting area)
Throughput
• throughput: rate (bits/time unit) at which
bits transferred between sender/receiver
– instantaneous: rate at given point in time
– average: rate over longer period of time
1-40
server, with
file of F bits
to send to client
link capacity
Rs bits/sec
link capacity
Rc bits/sec
pipe that can carry
fluid at rate
Rs bits/sec)
pipe that can carry
fluid at rate
Rc bits/sec)
server sends bits
(fluid) into pipe
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-41
Protocol “Layers”
Networks are complex!
• many “pieces”:
– hosts
– routers
– links of various
media
– applications
– protocols
– hardware, software
Question:
Is there any hope of
organizing structure of
network?
Or at least our discussion of
networks?
1-42
Organization of air travel
• a series of steps
1-43
ticket (purchase)
baggage (check)
gates (load)
runway takeoff
airplane routing
ticket (complain)
baggage (claim)
gates (unload)
runway landing
airplane routing
airplane routing
Layering of airline functionality
Layers: each layer implements a service
– via its own internal-layer actions
– relying on services provided by layer below
1-44
ticket (purchase)
baggage (check)
gates (load)
runway (takeoff)
airplane routing
departure
airport
arrival
airport
intermediate air-traffic
control centers
airplane routing airplane routing
ticket (complain)
baggage (claim
gates (unload)
runway (land)
airplane routing
ticket
baggage
gate
takeoff/landing
airplane routing
Why layering?
Dealing with complex systems:
• explicit structure allows identification, relationship of
complex system’s pieces
– layered reference model for discussion
• modularization eases maintenance, updating of system
– change of implementation of layer’s service
transparent to rest of system
– e.g., change in gate procedure doesn’t affect
rest of system
1-45
Internet protocol stack
• application: supporting network
applications
– FTP, SMTP, HTTP
• transport: process-process data transfer
– TCP, UDP
• network: routing of datagrams from
source to destination
– IP, routing protocols
• link: data transfer between neighboring
network elements
– PPP, Ethernet
• physical: bits “on the wire”
1-46
application
transport
network
link
physical
ISO/OSI reference model
• presentation: allow applications to
interpret meaning of data, e.g.,
encryption, compression, machine-
specific conventions
• session: synchronization, checkpointing,
recovery of data exchange
1-47
application
presentation
session
transport
network
link
physical
Encapsulation
1-48
source
application
transport
network
link
physical
HtHn M
segment Ht
datagram
destination
application
transport
network
link
physical
HtHnHl M
HtHn M
Ht M
M
network
link
physical
link
physical
HtHnHl M
HtHn M
HtHn M
HtHnHl M
router
switch
message M
Ht M
Hn
frame
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-49
Network Security
• The field of network security is about:
– how bad guys can attack computer networks
– how we can defend networks against attacks
– how to design architectures that are immune to
attacks
1-50
Malware into hosts via Internet
• Malware can get in host from a virus, worm, or trojan
horse.
• Spyware malware can record keystrokes, web sites visited,
upload info to collection site.
• Infected host can be enrolled in a botnet, used for spam
and DDoS attacks.
• Malware is often self-replicating: from an infected host,
seeks entry into other hosts
1-51
Malware into hosts via Internet
• Trojan horse
– Hidden part of some
otherwise useful software
– Today often on a Web page
(Active-X, plugin)
• Virus
– infection by receiving object
(e.g., e-mail attachment),
actively executing
– self-replicating: propagate
itself to other hosts, users
1-52
 Worm:
 infection by passively receiving
object that gets itself executed
 self- replicating: propagates to
other hosts, users
Sapphire Worm: aggregate scans/sec
in first 5 minutes of outbreak (CAIDA, UWisc data)
Attack on servers and network infrastructure
• Denial of service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by overwhelming
resource with bogus traffic
1-53
1. select target
2. break into hosts around
the network (see botnet)
3. send packets toward target
from compromised hosts target
Packet sniffing
– broadcast media (shared Ethernet, wireless)
– promiscuous network interface reads/records all
packets (e.g., including passwords!) passing by
1-54
A
B
C
src:B dest:A payload
 Wireshark software used for end-of-chapter labs is a
(free) packet-sniffer
False source addresses
• IP spoofing: send packet with false source address
1-55
A
B
C
src:B dest:A payload
1.1 What is the Internet?
1.2 Network edge
 end systems, access networks, links
1.3 Network core
 circuit switching, packet switching, network structure
1.4 Delay, loss and throughput in packet-switched
networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
1-56
Internet History
• 1961: Kleinrock - queueing
theory shows effectiveness of
packet-switching
• 1964: Baran - packet-
switching in military nets
• 1967: ARPAnet conceived by
Advanced Research Projects
Agency
• 1969: first ARPAnet node
operational
• 1972:
– ARPAnet public demonstration
– NCP (Network Control Protocol) first
host-host protocol
– first e-mail program
– ARPAnet has 15 nodes
1-57
1961-1972: Early packet-switching principles
Internet History
• 1970: ALOHAnet satellite network
in Hawaii
• 1974: Cerf and Kahn - architecture
for interconnecting networks
• 1976: Ethernet at Xerox PARC
• ate70’s: proprietary architectures:
DECnet, SNA, XNA
• late 70’s: switching fixed length
packets (ATM precursor)
• 1979: ARPAnet has 200 nodes
Cerf and Kahn’s internetworking
principles:
– minimalism, autonomy - no
internal changes required to
interconnect networks
– best effort service model
– stateless routers
– decentralized control
define today’s Internet architecture
1-58
1972-1980: Internetworking, new and proprietary nets
Internet History
• 1983: deployment of
TCP/IP
• 1982: smtp e-mail
protocol defined
• 1983: DNS defined for
name-to-IP-address
translation
• 1985: ftp protocol defined
• 1988: TCP congestion
control
• new national networks:
Csnet, BITnet, NSFnet,
Minitel
• 100,000 hosts connected
to confederation of
networks
1-59
1980-1990: new protocols, a proliferation of networks
Internet History
• Early 1990’s: ARPAnet
decommissioned
• 1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
• early 1990s: Web
– hypertext [Bush 1945, Nelson
1960’s]
– HTML, HTTP: Berners-Lee
– 1994: Mosaic, later Netscape
– late 1990’s: commercialization of
the Web
Late 1990’s – 2000’s:
• more killer apps: instant
messaging, P2P file sharing
• network security to forefront
• est. 50 million host, 100 million+
users
• backbone links running at Gbps
1-60
1990, 2000’s: commercialization, the Web, new apps
Internet History
2007 – till
• ~500 million hosts
• Voice, Video over IP
• P2P applications: BitTorrent (file
sharing) Skype (VoIP), PPLive
(video)
• more applications: YouTube,
gaming
• wireless, mobility
1-61

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Computer network
Computer networkComputer network
Computer network
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Data communication MIS
Data communication MISData communication MIS
Data communication MIS
 
Communications
CommunicationsCommunications
Communications
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Data communication
Data communicationData communication
Data communication
 
data communication
data communicationdata communication
data communication
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Data communication
Data communicationData communication
Data communication
 
Unit2.2
Unit2.2Unit2.2
Unit2.2
 
Data Communication & computer network: Channel types
Data Communication & computer network: Channel types Data Communication & computer network: Channel types
Data Communication & computer network: Channel types
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Data communication basics
Data communication basicsData communication basics
Data communication basics
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 

Destacado

Sept 2017 static routing and packet forwarding
Sept 2017    static routing and packet forwardingSept 2017    static routing and packet forwarding
Sept 2017 static routing and packet forwardingshahin raj
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and modelsshahin raj
 
Sept 2017 technology management
Sept 2017  technology managementSept 2017  technology management
Sept 2017 technology managementshahin raj
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISProsmida
 
Chap 03
Chap 03Chap 03
Chap 03IGNOU
 
ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)Mohamad Arif
 
Network Tier Architecture
Network Tier ArchitectureNetwork Tier Architecture
Network Tier ArchitectureVR Talsaniya
 
Chap 01
Chap 01Chap 01
Chap 01IGNOU
 
Chap 04
Chap 04Chap 04
Chap 04IGNOU
 
Modeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApModeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApEr. Ashish Pandey
 
Chap 02
Chap 02Chap 02
Chap 02IGNOU
 
Sept 2017 boot process
Sept 2017   boot processSept 2017   boot process
Sept 2017 boot processshahin raj
 

Destacado (20)

Sept 2017 static routing and packet forwarding
Sept 2017    static routing and packet forwardingSept 2017    static routing and packet forwarding
Sept 2017 static routing and packet forwarding
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
Sept 2017 technology management
Sept 2017  technology managementSept 2017  technology management
Sept 2017 technology management
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISP
 
Network delay
Network delayNetwork delay
Network delay
 
Chap 03
Chap 03Chap 03
Chap 03
 
ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)ISP di malaysia(internet service provider)
ISP di malaysia(internet service provider)
 
Network Tier Architecture
Network Tier ArchitectureNetwork Tier Architecture
Network Tier Architecture
 
Isp, the things to know.
Isp, the things to know.Isp, the things to know.
Isp, the things to know.
 
Chap 01
Chap 01Chap 01
Chap 01
 
NWU Wireless
NWU WirelessNWU Wireless
NWU Wireless
 
Chap 04
Chap 04Chap 04
Chap 04
 
Modeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By ApModeling Style and Delay Model of VHDL By Ap
Modeling Style and Delay Model of VHDL By Ap
 
Chap 02
Chap 02Chap 02
Chap 02
 
Josetnis rodriguez electiva i.pptx
Josetnis rodriguez electiva i.pptxJosetnis rodriguez electiva i.pptx
Josetnis rodriguez electiva i.pptx
 
Chap 14 rip, ospf
Chap 14 rip, ospfChap 14 rip, ospf
Chap 14 rip, ospf
 
Albert Eckhout (1610 1666)
Albert Eckhout (1610 1666)Albert Eckhout (1610 1666)
Albert Eckhout (1610 1666)
 
Sept 2017 boot process
Sept 2017   boot processSept 2017   boot process
Sept 2017 boot process
 
Chap 17 dns
Chap 17 dnsChap 17 dns
Chap 17 dns
 

Similar a Sept 2017 introduction

ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxhuypmg22git
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introductionKhánh Ghẻ
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thAndy Juan Sarango Veliz
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3hz3012
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptxhuanyuzhang5
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
network basics
network basicsnetwork basics
network basicsAvin Ash
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppthome107
 

Similar a Sept 2017 introduction (20)

ComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptxComputerNetwork_Introductions_C1_en.pptx
ComputerNetwork_Introductions_C1_en.pptx
 
1st Talk
1st Talk1st Talk
1st Talk
 
Lecture No. 1.ppt
Lecture No. 1.pptLecture No. 1.ppt
Lecture No. 1.ppt
 
Chapter1 introduction
Chapter1 introductionChapter1 introduction
Chapter1 introduction
 
Chapter_1_.pptx
Chapter_1_.pptxChapter_1_.pptx
Chapter_1_.pptx
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Chapter1
Chapter1Chapter1
Chapter1
 
Chapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7thChapter 1 - Computer Networking a top-down Approach 7th
Chapter 1 - Computer Networking a top-down Approach 7th
 
Ch1 internet Networks
Ch1 internet NetworksCh1 internet Networks
Ch1 internet Networks
 
3rd edition chapter1
3rd edition chapter13rd edition chapter1
3rd edition chapter1
 
Module1.ppt
Module1.pptModule1.ppt
Module1.ppt
 
Lec 2 and_3
Lec 2 and_3Lec 2 and_3
Lec 2 and_3
 
1 introduction
1 introduction1 introduction
1 introduction
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
Chapter1 Introduction.pptx
Chapter1 Introduction.pptxChapter1 Introduction.pptx
Chapter1 Introduction.pptx
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
network basics
network basicsnetwork basics
network basics
 
Week_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.pptWeek_1_Intro_Internet_arch_Applications.ppt
Week_1_Intro_Internet_arch_Applications.ppt
 

Más de shahin raj

Sept 2017 communication system and protocols
Sept 2017  communication system and protocolsSept 2017  communication system and protocols
Sept 2017 communication system and protocolsshahin raj
 
Sept 2017 cisco certification routers
Sept 2017  cisco certification routersSept 2017  cisco certification routers
Sept 2017 cisco certification routersshahin raj
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocolsshahin raj
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network designshahin raj
 
Sept 2017 multimedia
Sept 2017   multimediaSept 2017   multimedia
Sept 2017 multimediashahin raj
 
Sept 2017 internetworking
Sept 2017   internetworkingSept 2017   internetworking
Sept 2017 internetworkingshahin raj
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routingshahin raj
 
Overview note e-comerce
Overview note e-comerceOverview note e-comerce
Overview note e-comerceshahin raj
 
6 fundamental liberties
6 fundamental liberties6 fundamental liberties
6 fundamental libertiesshahin raj
 

Más de shahin raj (9)

Sept 2017 communication system and protocols
Sept 2017  communication system and protocolsSept 2017  communication system and protocols
Sept 2017 communication system and protocols
 
Sept 2017 cisco certification routers
Sept 2017  cisco certification routersSept 2017  cisco certification routers
Sept 2017 cisco certification routers
 
Sept 2017 osi and tcp ip protocols
Sept 2017   osi  and tcp ip protocolsSept 2017   osi  and tcp ip protocols
Sept 2017 osi and tcp ip protocols
 
Sept 2017 network design
Sept 2017   network designSept 2017   network design
Sept 2017 network design
 
Sept 2017 multimedia
Sept 2017   multimediaSept 2017   multimedia
Sept 2017 multimedia
 
Sept 2017 internetworking
Sept 2017   internetworkingSept 2017   internetworking
Sept 2017 internetworking
 
Sept 2017 dynamic routing
Sept 2017   dynamic routingSept 2017   dynamic routing
Sept 2017 dynamic routing
 
Overview note e-comerce
Overview note e-comerceOverview note e-comerce
Overview note e-comerce
 
6 fundamental liberties
6 fundamental liberties6 fundamental liberties
6 fundamental liberties
 

Último

OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsAlirezaBagherian3
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 

Último (20)

OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal Compressors
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 

Sept 2017 introduction

  • 1. Introduction Overview: • what’s the Internet? • what’s a protocol? • network edge; hosts, access net, physical media • network core: packet/circuit switching, Internet structure • performance: loss, delay, throughput • security • protocol layers, service models • history 1-1
  • 2. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-2
  • 3. What’s the Internet: “nuts and bolts” view • millions of connected computing devices: hosts = end systems – running network apps 1-3 Home network Institutional network Mobile network Global ISP Regional ISP router PC server wireless laptop cellular handheld wired links access points  communication links  fiber, copper, radio, satellite  transmission rate = bandwidth  routers: forward packets (chunks of data)
  • 4. What’s the Internet: “nuts and bolts” view • protocols control sending, receiving of msgs – e.g., TCP, IP, HTTP, Skype, Ethernet • Internet: “network of networks” – loosely hierarchical – public Internet versus private intranet • Internet standards – RFC: Request for comments – IETF: Internet Engineering Task Force 1-4 Home network Institutional network Mobile network Global ISP Regional ISP
  • 5. What’s the Internet: a service view • communication infrastructure enables distributed applications: – Web, VoIP, email, games, e- commerce, file sharing • communication services provided to apps: – reliable data delivery from source to destination – “best effort” (unreliable) data delivery 1-5
  • 6. What’s a protocol? human protocols: • “what’s the time?” • “I have a question” • introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols: • machines rather than humans • all communication activity in Internet governed by protocols 1-6 protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
  • 7. What’s a protocol? a human protocol and a computer network protocol: 1-7 Hi Hi Got the time? 2:00 TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> time
  • 8. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-8
  • 9. A closer look at network structure: • network edge: applications and hosts 1-9  access networks, physical media: wired, wireless communication links  network core:  interconnected routers  network of networks
  • 10. The network edge: • end systems (hosts): – run application programs – e.g. Web, email – at “edge of network” 1-10 client/server peer-peer  client/server model  client host requests, receives service from always-on server  e.g. Web browser/server; email client/server  peer-peer model:  minimal (or no) use of dedicated servers  e.g. Skype, BitTorrent
  • 11. telephone network Internet home dial-up modem ISP modem (e.g., AOL) home PC central office  Uses existing telephony infrastructure  Home is connected to central office  up to 56Kbps direct access to router (often less)  Can’t surf and phone at same time: not “always on” Dial-up Modem
  • 12. telephone network DSL modem home PC home phone Internet DSLAM Existing phone line: 0-4KHz phone; 4-50KHz upstream data; 50KHz-1MHz downstream data splitter central office Digital Subscriber Line (DSL)  Also uses existing telephone infrastruture
  • 13. Cable Network Architecture: Overview 1-13 home cable headend cable distribution network (simplified) Typically 500 to 5,000 homes
  • 14. Cable Network Architecture: Overview 1-14 home cable headend cable distribution network server(s)
  • 15. Cable Network Architecture: Overview 1-15 home cable headend cable distribution network (simplified)
  • 16. Wireless access networks • shared wireless access network connects end system to router – via base station aka “access point” • wireless LANs: – 802.11b/g (WiFi): 11 or 54 Mbps • wider-area wireless access – provided by telco operator – ~2Mbps over cellular system (EVDO, UMTS, HSPA) – Next 4G: WiMAX (10’s Mbps) and LTE over wide area 1-16 base station mobile hosts router
  • 17. Home networks Typical home network components: • DSL or cable modem • router/firewall/NAT • Ethernet • wireless access point 1-17 wireless access point wireless laptops router/ firewall cable modem to/from cable headend Ethernet
  • 18. Physical Media • Bit: propagates between transmitter/rcvr pairs • physical link: what lies between transmitter & receiver • guided media: – signals propagate in solid media: copper, fiber, coax • unguided media: – signals propagate freely, e.g., radio Twisted Pair (TP) • two insulated copper wires – Category 3: traditional phone wires, 10 Mbps Ethernet – Category 5: 100Mbps Ethernet 1-18
  • 19. Physical Media: coax, fiber Coaxial cable: • two concentric copper conductors • bidirectional • baseband: – single channel on cable – legacy Ethernet • broadband: – multiple channels on cable – HFC 1-19 Fiber optic cable:  glass fiber carrying light pulses, each pulse a bit  high-speed operation:  high-speed point-to-point transmission (e.g., 10’s-100’s Gps)  low error rate: repeaters spaced far apart ; immune to electromagnetic noise
  • 20. Physical media: radio • signal carried in electromagnetic spectrum • no physical “wire” • bidirectional • propagation environment effects: – reflection – obstruction by objects – interference 1-20 Radio link types:  terrestrial microwave  e.g. up to 45 Mbps channels  LAN (e.g., Wifi)  11Mbps, 54 Mbps, 300 Mbps  wide-area (e.g., cellular)  3G cellular: ~ 1 Mbps  4G cellular: ~ 21 Mbps  satellite  Kbps to 45Mbps channel (or multiple smaller channels)  270 msec end-end delay  geosynchronous versus low altitude
  • 21. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-21
  • 22. The Network Core • mesh of interconnected routers • the fundamental question: how is data transferred through net? – circuit switching: dedicated circuit per call: telephone net – packet-switching: data sent thru net in discrete “chunks” 1-22
  • 23. Network Core: Circuit Switching End-end resources reserved for “call” • link bandwidth, switch capacity • dedicated resources: no sharing • circuit-like (guaranteed) performance • call setup required 1-23
  • 24. Network Core: Circuit Switching network resources (e.g., bandwidth) divided into “pieces” • pieces allocated to calls • resource piece idle if not used by owning call (no sharing) 1-24  dividing link bandwidth into “pieces”  frequency division  time division
  • 25. Circuit Switching: FDM and TDM 1-25 FDM frequency time TDM frequency time 4 users Example:
  • 26. Network Core: Packet Switching each end-end data stream divided into packets • user A, B packets share network resources • each packet uses full link bandwidth • resources used as needed 1-26 resource contention:  aggregate resource demand can exceed amount available  congestion: packets queue, wait for link use  store and forward: packets move one hop at a time  Node receives complete packet before forwardingBandwidth division into “pieces” Dedicated allocation Resource reservation
  • 27. Packet Switching: Statistical Multiplexing Sequence of A & B packets does not have fixed pattern, bandwidth shared on demand statistical multiplexing. TDM: each host gets same slot in revolving TDM frame. 1-27 A B C 100 Mb/s Ethernet 1.5 Mb/s D E statistical multiplexing queue of packets waiting for output link
  • 28. Packet-switching: store-and-forward • takes L/R seconds to transmit (push out) packet of L bits on to link at R bps • store and forward: entire packet must arrive at router before it can be transmitted on next link • delay = 3L/R (assuming zero propagation delay) Example: • L = 7.5 Mbits • R = 1.5 Mbps • transmission delay = 15 sec 1-28 R R R L
  • 29. Internet structure: network of networks • roughly hierarchical • at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable and Wireless), national/international coverage – treat each other as equals 1-29 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately
  • 30. Internet structure: network of networks • “Tier-2” ISPs: smaller (often regional) ISPs – Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs 1-30 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPTier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet  tier-2 ISP is customer of tier-1 provider Tier-2 ISPs also peer privately with each other.
  • 31. Internet structure: network of networks • “Tier-3” ISPs and local ISPs – last hop (“access”) network (closest to end systems) 1-31 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPTier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet
  • 32. Internet structure: network of networks • a packet passes through many networks! 1-32 Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-2 ISPTier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP
  • 33. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-33
  • 34. How do loss and delay occur? packets queue in router buffers • packet arrival rate to link exceeds output link capacity • packets queue, wait for turn 1-34 A B packet being transmitted (delay) packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers
  • 35. Four sources of packet delay • 1. nodal processing: – check bit errors – determine output link 1-35 A B propagation transmission nodal processing queueing  2. queueing  time waiting at output link for transmission  depends on congestion level of router
  • 36. Delay in packet-switched networks 3. Transmission delay: • R=link bandwidth (bps) • L=packet length (bits) • time to send bits into link = L/R 4. Propagation delay: • d = length of physical link • s = propagation speed in medium (~2x108 m/sec) • propagation delay = d/s 1-36 A B propagation transmission nodal processing queueing Note: s and R are very different quantities!
  • 37. Nodal delay • dproc = processing delay – typically a few microsecs or less • dqueue = queuing delay – depends on congestion • dtrans = transmission delay – = L/R, significant for low-speed links • dprop = propagation delay – a few microsecs to hundreds of msecs 1-37 proptransqueueprocnodal ddddd +++=
  • 38. Queueing delay (revisited) • R=link bandwidth (bps) • L=packet length (bits) • a=average packet arrival rate 1-38 traffic intensity = La/R  La/R ~ 0: average queueing delay small  La/R -> 1: delays become large  La/R > 1: more “work” arriving than can be serviced, average delay infinite!
  • 39. Packet loss • queue (buffer) preceding link in buffer has finite capacity • packet arriving to full queue dropped (lost) • lost packet may be retransmitted by previous node, by source end system, or not at all 1-39 A B packet being transmitted packet arriving to full buffer is lost buffer (waiting area)
  • 40. Throughput • throughput: rate (bits/time unit) at which bits transferred between sender/receiver – instantaneous: rate at given point in time – average: rate over longer period of time 1-40 server, with file of F bits to send to client link capacity Rs bits/sec link capacity Rc bits/sec pipe that can carry fluid at rate Rs bits/sec) pipe that can carry fluid at rate Rc bits/sec) server sends bits (fluid) into pipe
  • 41. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-41
  • 42. Protocol “Layers” Networks are complex! • many “pieces”: – hosts – routers – links of various media – applications – protocols – hardware, software Question: Is there any hope of organizing structure of network? Or at least our discussion of networks? 1-42
  • 43. Organization of air travel • a series of steps 1-43 ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing
  • 44. Layering of airline functionality Layers: each layer implements a service – via its own internal-layer actions – relying on services provided by layer below 1-44 ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers airplane routing airplane routing ticket (complain) baggage (claim gates (unload) runway (land) airplane routing ticket baggage gate takeoff/landing airplane routing
  • 45. Why layering? Dealing with complex systems: • explicit structure allows identification, relationship of complex system’s pieces – layered reference model for discussion • modularization eases maintenance, updating of system – change of implementation of layer’s service transparent to rest of system – e.g., change in gate procedure doesn’t affect rest of system 1-45
  • 46. Internet protocol stack • application: supporting network applications – FTP, SMTP, HTTP • transport: process-process data transfer – TCP, UDP • network: routing of datagrams from source to destination – IP, routing protocols • link: data transfer between neighboring network elements – PPP, Ethernet • physical: bits “on the wire” 1-46 application transport network link physical
  • 47. ISO/OSI reference model • presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine- specific conventions • session: synchronization, checkpointing, recovery of data exchange 1-47 application presentation session transport network link physical
  • 48. Encapsulation 1-48 source application transport network link physical HtHn M segment Ht datagram destination application transport network link physical HtHnHl M HtHn M Ht M M network link physical link physical HtHnHl M HtHn M HtHn M HtHnHl M router switch message M Ht M Hn frame
  • 49. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-49
  • 50. Network Security • The field of network security is about: – how bad guys can attack computer networks – how we can defend networks against attacks – how to design architectures that are immune to attacks 1-50
  • 51. Malware into hosts via Internet • Malware can get in host from a virus, worm, or trojan horse. • Spyware malware can record keystrokes, web sites visited, upload info to collection site. • Infected host can be enrolled in a botnet, used for spam and DDoS attacks. • Malware is often self-replicating: from an infected host, seeks entry into other hosts 1-51
  • 52. Malware into hosts via Internet • Trojan horse – Hidden part of some otherwise useful software – Today often on a Web page (Active-X, plugin) • Virus – infection by receiving object (e.g., e-mail attachment), actively executing – self-replicating: propagate itself to other hosts, users 1-52  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)
  • 53. Attack on servers and network infrastructure • Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1-53 1. select target 2. break into hosts around the network (see botnet) 3. send packets toward target from compromised hosts target
  • 54. Packet sniffing – broadcast media (shared Ethernet, wireless) – promiscuous network interface reads/records all packets (e.g., including passwords!) passing by 1-54 A B C src:B dest:A payload  Wireshark software used for end-of-chapter labs is a (free) packet-sniffer
  • 55. False source addresses • IP spoofing: send packet with false source address 1-55 A B C src:B dest:A payload
  • 56. 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 1-56
  • 57. Internet History • 1961: Kleinrock - queueing theory shows effectiveness of packet-switching • 1964: Baran - packet- switching in military nets • 1967: ARPAnet conceived by Advanced Research Projects Agency • 1969: first ARPAnet node operational • 1972: – ARPAnet public demonstration – NCP (Network Control Protocol) first host-host protocol – first e-mail program – ARPAnet has 15 nodes 1-57 1961-1972: Early packet-switching principles
  • 58. Internet History • 1970: ALOHAnet satellite network in Hawaii • 1974: Cerf and Kahn - architecture for interconnecting networks • 1976: Ethernet at Xerox PARC • ate70’s: proprietary architectures: DECnet, SNA, XNA • late 70’s: switching fixed length packets (ATM precursor) • 1979: ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles: – minimalism, autonomy - no internal changes required to interconnect networks – best effort service model – stateless routers – decentralized control define today’s Internet architecture 1-58 1972-1980: Internetworking, new and proprietary nets
  • 59. Internet History • 1983: deployment of TCP/IP • 1982: smtp e-mail protocol defined • 1983: DNS defined for name-to-IP-address translation • 1985: ftp protocol defined • 1988: TCP congestion control • new national networks: Csnet, BITnet, NSFnet, Minitel • 100,000 hosts connected to confederation of networks 1-59 1980-1990: new protocols, a proliferation of networks
  • 60. Internet History • Early 1990’s: ARPAnet decommissioned • 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) • early 1990s: Web – hypertext [Bush 1945, Nelson 1960’s] – HTML, HTTP: Berners-Lee – 1994: Mosaic, later Netscape – late 1990’s: commercialization of the Web Late 1990’s – 2000’s: • more killer apps: instant messaging, P2P file sharing • network security to forefront • est. 50 million host, 100 million+ users • backbone links running at Gbps 1-60 1990, 2000’s: commercialization, the Web, new apps
  • 61. Internet History 2007 – till • ~500 million hosts • Voice, Video over IP • P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video) • more applications: YouTube, gaming • wireless, mobility 1-61

Notas del editor

  1. Two simple multiple access control techniques. Each mobile’s share of the bandwidth is divided into portions for the uplink and the downlink. Also, possibly, out of band signaling. As we will see, used in AMPS, GSM, IS-54/136