C1 1page Per Sheet
C1 1page Per Sheet
C1 1page Per Sheet
Introduction
1-1
Chapter 1: Introduction
Our goal:
get feel and terminology more depth, detail later in course approach: use Internet as example
Overview:
whats the Internet? whats a protocol? network edge; hosts, access net, physical media network core: packet/circuit switching, Internet structure performance: loss, delay, throughput security protocol layers, service models history
Introduction 1-2
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-3
Institutional network
router
Introduction
1-4
Internet phones
Introduction 1-5
Internet: mng ca cc
mng
loosely hierarchical public Internet versus private intranet
Institutional network
Whats a protocol?
human protocols: My gi ri? Cho ti hi gii thiu gi i mt thng ip nht nh mt hnh ng nht nh c thc hin khi nhn c thng ip, hoc khi c 1 s kin khc network protocols: My tnh, ko phi ngi Tt c cc hot ng truyn thng trn Internet phi tun th cc protocols
protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt
Introduction 1-8
Whats a protocol?
a human protocol and a computer network protocol:
<file>
Introduction
1-9
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-10
Introduction
1-11
client/server model
Client yu cu v nhn cc dch v t cc server client/server e.g. Web browser/server; email client/server Dng t hoc ko dng cc server dnh ring e.g. Skype, BitTorrent
Introduction 1-12
peer-peer model:
Nh :
Kh nng truyn (bandwidth, bits per second) ca mng truy cp? Dng chung hay dnh ring?
Introduction 1-13
Dial-up Modem
Vn phng trung tm telephone network Internet
My tnh gia nh
S dng h tng mng in thoi ang c My tnh gia nh c kt ni vo vn phng trung tm Tc truy cp trc tip n cc router ln ti 56Kbps Ko th va lt web, va nghe in thoi cng lc
Internet
DSLAM
telephone network
Cng s dng h tng in thoi ang c Tc upstream ln ti 1Mbps (hin gi < 256 Kbps) Tc downstream ln ti 8Mbps (hin gi < 1 Mbps) S dng ng truyn vt l dnh ring ni n vn phng trung tm.
HFC: hybrid fiber coax Bt i xng: 30Mbps downstream, 2 Mbps upstream Mng li cp ng v cp quang ni tng h gia nh n router ca ISP Cc h gia nh chia s truy cp (share access) ti router Khng nh DSL, k thut dedicated access
Introduction 1-16
Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
Introduction
1-17
Introduction
1-18
Introduction
1-19
Introduction
1-20
Channels
Introduction
1-21
OLT
central office
server
c dng ph bin trong cc Cty, trng hc, 10 Mbs, 100Mbps, 1Gbps, 10Gbps Ethernet Hin thi, cc host c ni trc tip n cc Ethernet switch
router
wireless LANs:
802.11b/g (WiFi): 11 or 54 Mbps
base station
mobile hosts
Introduction
1-24
Home networks
Cc thnh phn tiu biu ca home network DSL or cable modem router/firewall/NAT Ethernet wireless access point
to/from cable headend cable modem router/ firewall Ethernet wireless access point
Introduction 1-25
wireless laptops
Physical Media
Bit: propagates between transmitter/rcvr pairs physical link: what lies between transmitter & receiver Phng tin truyn dn (guided media):
signals propagate in solid media: copper, fiber, coax
unguided media:
signals propagate freely, e.g., radio
Introduction 1-26
broadband:
Nhiu knh truyn trn cp HFC
Introduction
1-27
satellite
Kbps to 45Mbps channel (or multiple smaller channels) 270 msec end-end delay geosynchronous versus low altitude
Introduction 1-28
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-29
Introduction
1-31
sharing)
Introduction
1-32
frequency time
Introduction
1-33
Numerical example
Gi 1 file 640,000 bits, t host A n host B qua mng circuit-switched mt bao lu?
Tc ng truyn 1.536 Mbps Mi ng truyn s dng TDM vi 24 slots/sec Cn 500 msec thit lp mch ni 2 im
Introduction
1-34
Tranh chp ti nguyn: Tng nhu cu ti nguyn yu cu c th vt qu kh nng ti nguyn ang c Tc nghn: hng i gi tin, ch s dng ng truyn store and forward: packets move one hop at a time
Node receives complete packet before forwarding
Introduction 1-35
statistical multiplexing
1.5 Mb/s
Sequence of A & B packets does not have fixed pattern, bandwidth shared on demand statistical multiplexing. TDM: each host gets same slot in revolving TDM frame.
Introduction 1-36
Packet-switching: store-and-forward
L R R R
Cn L/R giy truyn ht gi tin L bit ln ng truyn vi tc R bps store and forward: ton b gi tin phi n router trc khi c th c truyn trn nhnh mng k tip. tr (delay) = 3 L/R (gi s ko c tr trn ng truyn)
N users
circuit-switching:
10 users
1 Mbps link
packet switching:
Vi 35 users, xc sut nhiu hn 10 user active cng lc < .0004 Q: Tnh nh th no ra 0.0004?
Introduction
1-38
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Introduction
1-40
to/from customers
Introduction
1-41
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
Tier 1 ISP
Tier-2 ISP
Tier-2 ISP
Introduction
1-42
local ISP
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP local ISP
local ISP
local ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP local local ISP ISP
Tier 1 ISP
Tier-2 ISP local ISP
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-45
A B
packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers
Introduction
1-46
2. queueing
time waiting at output link for transmission depends on congestion level of router
A B
transmission propagation
nodal processing
queueing
Introduction 1-47
A B
transmission
nodal processing
queueing
Introduction
1-48
Caravan analogy
100 km on caravan gm 10 xe Trm thu ph 1 Trm thu ph 2 100 km
Cc xe hi lan truyn vn tc 100 km/h Trm thu ph phc v mi xe mt 12 giy (transmission time) Xe t~bit; caravan ~ packet Q: Thi gian cn on caravan lm xong th tc trm thu ph 1 v tp kt n trm thu ph th 2?
Thi gian trm thu ph y ton on caravan ln ng = 12*10=120 giy Thi gian chic xe sau cng i t trm 1 n trm 2: 100km/(100km/h)= 1 h A: 62 pht
Introduction 1-49
Cc xe lan truyn vi tc 1000km/h Trm thu ph phc v 1 xe mt 1 pht Q: Cc xe s n trm th 2 trc khi tt c cc xe c phc v xong trm 1?
ng vy! Sau 7 pht, xe th nht n trm thu ph 2, v 3 xe vn cn trm 1 Bit u tin ca gi tin c th n router th 2 trc khi gi tin c truyn i ht router th 1!
See Ethernet applet at AWL Web site
Introduction 1-50
Nodal delay
d nodal = d proc + d queue + d trans + d prop
dproc = processing delay
typically a few microsecs or less
Introduction
1-51
3 probes 3 probes
3 probes
Introduction
1-53
Packet loss
Hng i (queue) trc ng truyn c kch thc c hn Cc gi tin n mt hng i y s b mt Cc gi tin b mt c th c truyn li, hoc khng
A B
buffer (waiting area) packet being transmitted
Throughput
Thng lng (throughput) : s bit truyn
gia bn truyn v nhn trong mt n v thi gian
Tc thi: tnh mt thi im. Trung bnh: tnh trong 1 khong thi gian di.
link capacity server, with server sends bits pipe that can carry Rs bits/sec fluid at rate file into pipe (fluid) of F bits Rs bits/sec) to send to client
link capacity pipe that can carry Rfluid at rate c bits/sec Rc bits/sec)
Introduction 1-56
Throughput (more)
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-57
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-59
Protocol Layers
Mng vn phc tp! Gm nhiu th: hosts routers links of various media applications protocols hardware, software
Question:
C cch g t chc cu trc ca mng khng?
Introduction
1-60
ticket (complain) baggage (claim gates (unload) runway (land) airplane routing airplane routing airplane routing
arrival airport
Layers: mi tng (layer) ci t mt dch v (service) Nh chnh nhng hnh ng ngay tng Nh nhng dch v c cung cp bi cc tng bn di n.
Introduction 1-62
Why layering?
i ph vi cc h thng phc tp:
Cu trc r rng cho php nh danh, mi quan h phc tp gia cc thnh phn h thng phc tp M hnh tham kho c phn tng Module ha gip d bo tr v cp nht h thng Vic thay i cch ci ct dch v ca mt tng khng nh hng n phn cn li ca h thng
Introduction
1-63
Introduction
1-64
Introduction
1-65
source
message segment
Ht M M M M
datagram Hn Ht frame Hl Hn Ht
Encapsulation
destination
M Ht Hn Ht Hl Hn Ht M M M
Hn Ht Hl Hn Ht
M M
Hn Ht
router
Introduction
1-66
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-67
Network Security
An ninh mng nhm nghin cu v:
Cch thc k xu tn cng vo MMT Cch thc bo v MMT khi cc t tn cng Cch thc thit k mng khng vi cc t tn cng
Introduction
1-68
1-69
Worm:
Gy ly nhim bng vic tn cng vo cc l hng bo mt, ko cn ngi kch hot T nhn bn: t ly lan chnh n n cc my tnh khc
Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)
Virus
Gy ly nhim nh vic con ngi kch hot ng dng. T nhn bn: t ly lan chnh n n cc file khc trong cng my
Introduction
1-70
2. Xm nhp cc my
3. Huy ng cc my tnh
target
Introduction
1-71
src:B dest:A
payload
Introduction
1-73
B
Introduction 1-74
Network Security
more throughout this course chapter 8: focus on security crypographic techniques: obvious uses and not so obvious uses
Introduction
1-75
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History
Introduction 1-76
Internet History
1961-1972: Early packet-switching principles
1961: Kleinrock - queueing theory shows effectiveness of packet-switching 1964: Baran - packetswitching in military nets 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1972: ARPAnet public demonstration NCP (Network Control Protocol) first host-host protocol first e-mail program ARPAnet has 15 nodes
Introduction
1-77
Internet History
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite network in Hawaii 1974: Cerf and Kahn architecture for interconnecting networks 1976: Ethernet at Xerox PARC ate70s: proprietary architectures: DECnet, SNA, XNA late 70s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes
Cerf and Kahns internetworking principles: minimalism, autonomy - no internal changes required to interconnect networks best effort service model stateless routers decentralized control define todays Internet architecture
Introduction
1-78
Internet History
1980-1990: new protocols, a proliferation of networks
1983: deployment of TCP/IP 1982: smtp e-mail protocol defined 1983: DNS defined for name-to-IP-address translation 1985: ftp protocol defined 1988: TCP congestion control new national networks: Csnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks
Introduction
1-79
Internet History
1990, 2000s: commercialization, the Web, new apps
Early 1990s: ARPAnet decommissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: Web hypertext [Bush 1945, Nelson 1960s] HTML, HTTP: Berners-Lee 1994: Mosaic, later Netscape late 1990s: commercialization
of the Web
Introduction
1-80
Internet History
2007: ~500 million hosts Voice, Video over IP P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video) more applications: YouTube, gaming wireless, mobility
Introduction
1-81
Introduction: Summary
Covered a ton of material! Internet overview whats a protocol? network edge, core, access network packet-switching versus circuit-switching Internet structure performance: loss, delay, throughput layering, service models security history You now have: context, overview, feel of networking more depth, detail to
follow!
Introduction
1-82