Beruflich Dokumente
Kultur Dokumente
Datornt/Computer
p
Networks 2010
Scott Fowler
Lecture 1
Sid 2
Literature
Lecture notes
Textbook: J.
J Kurose and K
K. Ross
Ross, Computer
Networking A Top Down Approach, 5th edition
Lecture notes and lab assignments:
http://webstaff.itn.liu.se/~scofo47/TNK108/tnk108.html
(password = )
Supplement material, if needed, will be specified or handed out
Course Staff
Me -> Scott Fowler
Arash Matinrad
Sid 3
75% -89%
89% = 4 (ECTS B)
0 -59%
59% = fail
a ((ECTS
C S F))
g
((3 credits))
Lab assignments
Pass / fail
Show your work and results to the course staff during lab hours
Re-examination
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.4
1
4 Delay,
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-5
millions
server
wireless
laptop
cellular
handheld
of connected
computing devices:
hosts = end systems
running network apps
communication
i ti
access
points
p
wired
links
router
li
links
k
fiber, copper,
radio satellite
radio,
transmission
rate = bandwidth
routers: forward
packets (chunks of
data)
Mobile network
Global ISP
Home network
Regional ISP
I tit ti
Institutional
l network
t
k
p otoco s co
protocols
control
t o se
sending,
d g,
receiving of msgs
Mobile network
Global ISP
e.g.,
g , TCP,, IP,, HTTP,, Skype,
yp ,
Ethernet
Internet: network of
networks
Home network
R i
Regional
l ISP
loosely hierarchical
public Internet versus private
intranet
Institutional network
I
Internet
standards
d d
RFC: Request for comments
IETF: Internet Engineering
Task Force
Introduction 1-7
communication infrastructure
enables distributed
applications:
Web, VoIP, email, games,
e-commerce, file sharing
communication services
provided to apps:
reliable data delivery from
source to destination
best effort (unreliable)
data delivery
Introduction 1-8
Whatss a protocol?
What
human
u a p
protocols:
otoco s
I have
h
a question
ti
introductions
network
et o protocols:
p otoco s
all communication
activity in Internet
governed by protocols
Whatss a protocol?
What
a human
u a p
protocol
otoco a
and
d a co
computer
pute network
et o p
protocol:
otoco
Hi
TCP connection
request
Hi
TCP connection
ti
response
Got the
time?
Get http://www.awl.com/kurose
http://www.awl.com/kurose-ross
ross
2:00
<file>
time
network core:
interconnected
i t
t d
routers
network of
networks
Introduction 1-11
client/server model
client host requests, receives
service from always-on server
e.g. Web browser/server;
email client/server
peer-peer model:
institutional access
networks (school
(school,
company)
Keep in mind:
bandwidth
b
d idth (bit
(bits per
second) of access
network?
shared or dedicated?
Physical Media
Twisted Pair (TP)
Category 3: traditional
phone wires, 10 Mbps
Eth
Ethernet
t
guided media:
Category 5:
100Mbps Ethernet
unguided
id d media:
di
signals propagate freely, e.g.,
radio
Introduction 1-14
bidirectional
baseband:
high-speed point-to-point
transmission (e
(e.g.,
g 10
10ss100s Gps)
broadband:
Introduction 1-15
s g a ca
signal
carried
ed in
electromagnetic
spectrum
no physical wire
bidirectional
propagation environment
effects:
reflection
obstruction by objects
interference
terrestrial microwave
e.g. up to 45 Mbps channels
satellite
t llit
Kbps to 45Mbps channel (or
multiple smaller channels)
270 msec end-end delay
geosynchronous versus low
altitude
Introduction 1-16
roughly hierarchical
Tier-11 ISPs
Ti
ISP &
Content
Distributors,
interconnect
(peer) privately
or at Internet
Exchange Points
IXPs
Large Content
Distributor
(e.g., Akamai)
IXP
Tier 1 ISP
Tier 1 ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Introduction 1-17
to/from backbone
peering
to/from customers
Introduction 1-18
tier-2
Tier 2
Tier 2 ISP Tier 2
ISP
ISP
P
IXP
Tier 1 ISP
Tier 2
Tier 1 ISP
ISP
P Tier 2
Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Google)
Tierr 1 ISP
S
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Introduction 1-19
Tier
Tier-3
3 ISPs
ISPs, local ISPs
customer of tier 1 or tier 2 network
last hop (access)
( access ) network (closest to end systems)
IXP
Large Content
Distributor
(e.g., Akamai)
Tier 2
Tier 2 ISP Tier 2
ISP
ISP
IXP
Tier 1 ISP
Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Introduction 1-20
IXP
Large Content
Distributor
(e.g., Akamai)
Tier 2
Tier 2 ISP Tier 2
ISP
ISP
IXP
Tier 1 ISP
Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Introduction 1-21
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.4
1
4 Delay
Delay, loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-22
A
B
propagation
nodal
processing
queueing
propagation
nodal
processing
queueing
dtrans and
d dprop
very different
Introduction 1-25
a: average packet
arrival rate
average
a
e queueing
delay
traffic intensity
= La/R
L /R ~ 0
La/R
La/R -> 1
Introduction 1-26
3 probes
b
3 probes
Introduction 1-27
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.4
1
4 Delay,
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-29
Protocol Layers
Networks
et o s are
a e complex,
co p e ,
with many pieces:
hosts
h t
routers
links of various
media
Question:
Is there any hope of
organizing structure of
network?
applications
protocols
hardware, software
Introduction 1-30
ti k t ((complain)
ticket
l i )
baggage (check)
baggage (claim)
gates (load)
gates (unload)
runway takeoff
runway landing
airplane routing
airplane routing
airplane routing
a series of steps
Introduction 1-31
ticket (purchase)
ticket (complain)
ticket
baggage (check)
baggage (claim
baggage
gates (load)
gates (unload)
gate
runway (takeoff)
runway (land)
takeoff/landing
airplane routing
airplane routing
airplane routing
departure
airport
airplane routing
airplane routing
intermediate air-traffic
control centers
arrival
airport
Why layering?
Dealing with complex systems:
transport:
p
process-process
p
p
data transfer
TCP, UDP
network: routing
g of datagrams
g
from source to
destination
IP, routing protocols
application
transport
network
k
link
physical
p
y
Introduction 1-34
application
presentation
session
transport
network
link
physical
needed?
Introduction 1-35
Encapsulation
source
message
segment Ht
datagram Hn Ht
frame Hl Hn Ht
M
M
M
M
application
transport
network
li k
link
physical
link
physical
switch
d ti ti
destination
M
Ht
Hn Ht
Hl Hn Ht
M
M
application
transport
network
link
physical
Hn Ht
Hl Hn Ht
M
M
network
link
physical
Hn Ht
router
Introduction 1-36
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.4
1
4 Delay,
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-37
Network Security
Introduction 1-38
Bad guy
guys: put
pu malware
m w
into hosts via Internet
Trojan horse
hidden part of some
otherwise useful software
today often in Web page
(Active-X, plugin)
virus
infection by receiving object
((e.g.,
g e-mail attachment),
)
actively executing
worm:
iinfection
f
i b
by passively
i l receiving
i i
object that gets itself
executed
self- replicating: propagates to
other hosts, users
self-replicating: propagate
itself to other hosts,
hosts users
sers
Introduction 1-40
Bad g
guys:
y attack server,, network infrastructure
Denial of Dervice (DoS): attackers make resources
(server bandwidth) unavailable to legitimate traffic by
(server,
overwhelming resource with bogus traffic
1. select target
2 break into hosts
2.
around the network
((see botnet))
3. send packets to target
from compromised
h
hosts
target
g
Introduction 1-41
src:B dest:A
payload
A
src:B dest:A
payload
Introduction 1-43
src:B dest:A
llots
t more on security
it (th
(throughout,
h t Ch
Chapter
t 8)
Introduction 1-44
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1 4 Delay,
1.4
Delay loss and throughput in packet-switched
packet switched
networks
1 5 Protocol layers
1.5
layers, service models
1.6 Networks under attack: security
1.7 History
Introduction 1-45
Internet History
1961-1972: Early packet-switching principles
1972:
ARPAnet public demonstration
NCP (Network Control Protocol)
first host-host protocol
first e-mail program
ARPAnet has 15 nodes
Introduction 1-46
Internet History
1972-1980: Internetworking, new and proprietary nets
1976 Ethernet
1976:
Eth
t att Xerox
X
PARC
late70s: proprietary
architectures: DECnet, SNA,
XNA
decentralized control
stateless routers
define todays Internet
architecture
Introduction 1-47
Internet Historyy
1980-1990: new protocols, a proliferation of networks
1983: deployment of
TCP/IP
1985: ftp
pp
protocol
defined
100,000
,
hosts
connected to
confederation of
networks
t
k
Introduction 1-48
Internet History
1990, 2000s: commercialization, the Web, new apps
early
1990s: ARPAnet
decommissioned
1991:
early
1990s: Web
yp
[[Bush 1945,, Nelson
hypertext
1960s]
HTML, HTTP: Berners-Lee
Internet Historyy
2010:
wireless, mobility
Introduction 1-50
Introduction: Summary
Covered a ton of material!
Internet overview
whats a protocol?
network edge
edge, core,
core access
network
context, overview,
context
overview
feel of networking
more depth,
p , detail to
follow!
packet-switching versus
circuit-switching
Internet structure
security
history
Introduction 1-51