Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
104 views46 pages

CEN303-1-introduction To Networks

The document provides an introduction to computer networks and the Internet, defining important concepts like protocols, network structure including the edge and core, and how packet switching and circuit switching work in the core. It describes how the Internet is a network of networks comprised of end systems, access networks, and a core of routers that route packets using protocols to enable global communication. Performance factors like loss, delay, and throughput are introduced along with layers of protocols and security challenges networks face.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views46 pages

CEN303-1-introduction To Networks

The document provides an introduction to computer networks and the Internet, defining important concepts like protocols, network structure including the edge and core, and how packet switching and circuit switching work in the core. It describes how the Internet is a network of networks comprised of end systems, access networks, and a core of routers that route packets using protocols to enable global communication. Performance factors like loss, delay, and throughput are introduced along with layers of protocols and security challenges networks face.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Introduction

Chapter 1
CEN303–1438
Chapter 1: introduction
 Objective
 get “feel” and terminology
 more depth, detail later in course
 Outline
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access net, physical media
 network core: packet/circuit switching, Internet structure
 performance: loss, delay, throughput
 protocol layers, service models
 networks under attack: security

2
What’s the Internet
 millions of connected devices: mobile network
 hosts = end systems
 running network apps global ISP

 communication links
home
 fiber, copper, radio, satellite network
regional ISP
 transmission rate
 Packet switches:
 forward packets (chunks of data)

institutional
network

3
What’s the Internet
 Internet: “network of networks” mobile network
 Interconnected ISPs
 protocols control sending, global ISP

receiving of msgs
home
 e.g., TCP, IP, HTTP, Skype, 802.11 network
regional ISP
 Internet standards
 RFC: Request for comments
 IETF: Internet Engineering Task Force

institutional
network

4
What’s the Internet
 Infrastructure that provides mobile network
services to applications:
 Web,VoIP, email, games, global ISP

e-commerce, social nets, …


home
network
regional ISP

institutional
network

5
What’s a protocol?
protocols define format, order of msgs sent and received
among network entities, and actions taken on msg
transmission

6
What’s a protocol?
 a human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time?
2:00
<file>
time

7
Network edge Components
 Outline
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access net, physical media
 network core: packet/circuit switching, Internet structure
 performance: loss, delay, throughput
 protocol layers, service models
 networks under attack: security

8
Network Structure:
 network edge: mobile network
 hosts: clients and servers
 servers often in data centers global ISP

 access networks, physical


media: wired, wireless home
network
communication links regional ISP

 network core:
 Routers
 Switches

institutional
network

9
Host: sends packets of data
 host sending function:
 takes application message
two packets,
 breaks into smaller chunks, L bits each
known as packets,
of length L bits
 transmits packet into 2 1
access network R: link transmission rate
at transmission rate R host
 link transmission rate, aka link capacity, aka link bandwidth

packet time needed to L (bits)


transmission = transmit L-bit =
delay packet into link R (bits/sec)

10
Physical media
 bit: propagates between
transmitter/receiver pairs
 physical link: what lies
between transmitter & receiver
 guided media:
 signals propagate in
solid media: copper, fiber, coax
 unguided media:
 signals propagate freely, e.g., radio

11
network core
 Outline
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access net, physical media
 network core: packet/circuit switching, Internet structure
 performance: loss, delay, throughput
 protocol layers, service models
 networks under attack: security

12
The network core
 mesh of interconnected
routers
 packet-switching: hosts
break application-layer
messages into packets
 forward packets from one
router to the next, across
links on path from source to
destination
 each packet transmitted at
full link capacity

13
Packet-switching: store-and-forward

L bits
per packet

3 2 1
source destination
R bps R bps

 takes L/R seconds to transmit


(push out) L-bit packet into one-hop numerical example:
link at R bps  L = 7.5 Mbits
 store and forward: entire
packet must arrive at router  R = 1.5 Mbps
before it can be transmitted on  one-hop transmission
next link
 end-end delay = 2L/R
delay = 5 sec
(assuming zero propagation
delay)
14
Packet-switching: store-and-forward

R = 100 Mb/s C
A
D
R = 1.5 Mb/s
B
queue of packets E
waiting for output link

 queuing and loss:


 If arrival rate (in bits) to link exceeds transmission
rate of link for a period of time:
 packets will queue, wait to be transmitted on link
 packets can be dropped (lost) if memory (buffer) fills up

15
Two key network-core functions
 routing:  forwarding:
 determines source-  move packets from
destination route taken router’s input to
by packets appropriate router
 routing algorithms output

routing algorithm

local forwarding table


header value output link
0100 3 1
0101 2
0111 2 3 2
1001 1

dest address in arriving


16 packet’s header
Alternative core: circuit switching
 end-end resources
allocated to, reserved for
“call” between source &
dest:
 In diagram, each link has
four circuits.
 call gets 2nd circuit in top
link and 1st circuit in right
link.
 dedicated resources: no
sharing
 circuit-like (guaranteed)
performance
 circuit segment idle if not
used by call (no sharing)
 Commonly used in
traditional telephone
networks
17
Internet structure: network of networks
 End systems connect to Internet via access ISPs
(Internet Service Providers)
 Residential, company and university ISPs
 Access ISPs in turn must be interconnected.
 So that any two hosts can send packets to each other
 Resulting network of networks is very complex
 Evolution was driven by economics and national
policies
 Let’s take a stepwise approach to describe
current Internet structure

18
Internet structure: network of networks
 Question: given millions of access ISPs, how to
connect them together?
access access
net net
access
net
access
access net
net
access
access net
net

access access
net net

access
net
access
net

access
net
access
net
access access
net access net
net

19
Internet structure: network of networks
 Question: given millions of access ISPs, how to
connect them together?
access access
net net
access
net
access
access net
net
access
access net
net

connecting each access ISP


access
to each other directly doesn’t access
net
scale: O(N2) connections. net

access
net
access
net

access
net
access
net
access access
net access net
net

20
Internet structure: network of networks
 Question: given millions of access ISPs, how to
connect them together?
access access
net net
access
net
access
access net
net
access
access net
net

global
access
net
ISP access
net

access
net
access
net

access
net
access
net
access access
net access net
net

21
Internet structure: network of networks
 Question: given millions of access ISPs, how to
connect them together?
access access
net net
access
net
access
access net
net
access
access net
net
ISP A

access access
net ISP B net

access
ISP C
net
access
net

access
net
access
net
access access
net access net
net

22
delay, loss, throughput in networks
 Outline
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access net, physical media
 network core: packet/circuit switching, Internet structure
 performance: loss, delay, throughput
 protocol layers, service models
 networks under attack: security

23
How do loss and delay occur?
 packets queue in router buffers
 packet arrival rate to link (temporarily) exceeds
output link capacity
 packets queue, wait for turn
packet being transmitted (delay)

B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
24
Four sources of packet delay
transmission
A propagation

B
nodal
processing queueing

dnodal = dproc + dqueue + dtrans + dprop

dproc: processing dqueue: queueing delay


 check bit errors  time waiting at output link
 determine output link for transmission
 typically < msec  depends on congestion
level of router
25
Four sources of packet delay
transmission
A propagation

B
nodal
processing queueing

dnodal = dproc + dqueue + dtrans + dprop

dtrans: transmission delay: dprop: propagation delay:


 L: packet length (bits)  d: length of physical link
 R: link bandwidth (bps)  s: propagation speed in medium
 dtrans = L/R (~2x108 m/sec)
dtrans and dprop  dprop = d/s
very different
26
“Real” Internet delays and routes
 what do “real” Internet delay & loss look like?
 traceroute program: provides delay measurement from
source to router along end-end Internet path towards
destination. For all i:
 sends three packets that will reach router i on path towards
destination
 router i will return packets to sender
 sender times interval between transmission and reply.

3 probes 3 probes

3 probes

27
“Real” Internet delays and routes
 traceroute: gaia.cs.umass.edu to www.eurecom.fr
3 delay measurements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms link
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
18 * * * * means no response (probe lost, router not replying)
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms

28
Packet loss
 queue (aka buffer) preceding link in buffer has finite
capacity
 packet arriving to full queue dropped (aka lost)
 lost packet may be retransmitted by previous node,
by source end system, or not at all

buffer
(waiting area) packet being transmitted
A

B
packet arriving to
full buffer is lost
29
Throughput
 throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
 instantaneous: rate at given point in time
 average: rate over longer period of time

server, with link capacity link capacity


file of F bits Rs bits/sec Rc bits/sec
to send to client

30
Throughput (more)
 Rs < Rc What is average end-end throughput?

Rs bits/sec Rc bits/sec

 Rs > Rc What is average end-end throughput?

Rs bits/sec Rc bits/sec

bottleneck link
link on end-end path that constrains end-end throughput
31
Throughput
 throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
 instantaneous: rate at given point in time
 average: rate over longer period of time

server, with link capacity link capacity


file of F bits Rs bits/sec Rc bits/sec
to send to client

32
Throughput: Internet scenario
 per-connection
end-end throughput:
min(Rc,Rs,R/10) Rs
Rs
 in practice: Rs

Rc or Rs
is often bottleneck R

Rc Rc

Rc

10 connections (fairly) share


backbone bottleneck link R bits/sec
33
protocol layers, service models
 Outline
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access net, physical media
 network core: packet/circuit switching, Internet structure
 performance: loss, delay, throughput
 protocol layers, service models
 networks under attack: security

34
Protocol “layers”
 Networks are complex, with many “pieces”:
 hosts
 routers
 links of various media
 applications
 protocols
 hardware, software

35
Why layering?
 dealing with complex systems:
 explicit structure allows identification, relationship of
complex system’s pieces
 layered reference model for discussion
 Layering eases maintenance, updating of system
 change of implementation of layer’s service transparent to rest
of system
 e.g., change in gate procedure doesn’t affect rest of system

36
Internet protocol stack
 application: supporting network applications
 FTP, SMTP, HTTP
application
 transport: process-process data transfer
 TCP, UDP transport
 network: routing of datagrams from
source to destination network
 IP, routing protocols link
 link: data transfer between neighboring
network elements physical
 Ethernet, 802.11 (WiFi), PPP
 physical: bits “on the wire”
37
ISO/OSI reference model
 presentation: allow applications
to interpret meaning of data,
application
e.g., encryption, compression,
machine-specific conventions presentation

 session: synchronization, session


checkpointing, recovery of data exchange transport
 Internet stack “missing” these layers! network
 these services, if needed, link
must be implemented in application
physical
 needed?

38
Encapsulation / Decapsulation
source
message M application
segment Ht M transport
datagram Hn Ht M network
link
frame Hl Hn Ht M link
physical
physical
switch

destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
39
networks under attack: security
 Outline
 what’s the Internet?
 what’s a protocol?
 network edge; hosts, access net, physical media
 network core: packet/circuit switching, Internet structure
 performance: loss, delay, throughput
 protocol layers, service models
 networks under attack: security

40
Network security
 field of network security:
 how bad guys can attack computer networks
 how we can defend networks against attacks
 how to design architectures that are immune to attacks
 Internet not originally designed with (much) security
in mind
 original vision: “a group of mutually trusting users
attached to a transparent network”
 Internet protocol designers playing “catch-up”
 security considerations in all layers!

41
Malicious Software
 malware can get in host from:
 virus: self-replicating infection by receiving/executing
object (e.g., e-mail attachment)
 worm: self-replicating infection by passively receiving
object that gets itself executed
 spyware malware can record keystrokes, web sites
visited, upload info to collection site
 infected host can be enrolled in botnet, used for
spam. DDoS attacks

42
Bad guys: attack server, network
 Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic
 select target
 break into hosts around
the network (see botnet)
 send packets to target
from compromised hosts
target

43
Bad guys can sniff packets
 packet “sniffing”:
 broadcast media (shared ethernet, wireless)
 promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by

A C

src:B dest:A payload


B

 wireshark software used for end-of-chapter labs is a


(free) packet-sniffer
44
Bad guys can use fake addresses
 IP spoofing: send packet with false source address

A C

src:B dest:A payload

… lots more on security (throughout, Chapter 8)


45
References
 Course slides of Computer Networking: A Top
Down Approach, 6th edition , Jim Kurose, Keith Ross,
Addison-Wesley, March 2012

46

You might also like