Lecture 1 Advanced Computer Network 13-10-1
Lecture 1 Advanced Computer Network 13-10-1
Fall
Overview/roadmap:
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access network,
physical media
• Network core: packet/circuit switching,
internet structure
• Protocol layers, service models
Introduction: 1-2
Roadmap
Overview/roadmap:
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access network,
physical media
• Network core: packet/circuit switching,
internet structure
• Protocol layers, service models
Introduction: 1-3
The Internet: a “nuts and bolts” view
Billions of connected mobile network
computing devices: national or global ISP
▪ hosts = end systems
▪ running network apps at
Internet’s “edge”
• Interconnected ISPs
▪ protocols are everywhere Skype
IP
Streaming
video
• control sending, receiving of
messages local or
regional ISP
• e.g., HTTP (Web), streaming video,
Skype, TCP, IP, WiFi, 4G, Ethernet home network content
provider
▪ Internet standards HTTP network datacenter
network
WiFi
Introduction: 1-5
The Internet: a “service” view
• Infrastructure that provides mobile network
Introduction: 1-6
Roadmap
Overview/roadmap:
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access network,
physical media
• Network core: packet/circuit switching,
internet structure
• Protocol layers, service models
Introduction: 1-7
What’s a protocol?
Human protocols: Network protocols:
▪ “what’s the time?” ▪ computers (devices) rather than humans
▪ “I have a question” ▪ all communication activity in Internet
▪ introductions governed by protocols
Introduction: 1-8
What’s a protocol?
A human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET http://gaia.cs.umass.edu/kurose_ross
2:00
<file>
time
Introduction: 1-10
mobile network
enterprise
network
Introduction: 1-11
Network edge: mobile network
national or global ISP
• hosts: clients and servers
• servers often in data centers
Access networks, physical media: local or
regional ISP
• wired, wireless communication links
home network content
provider
network datacenter
network
enterprise
network
Introduction: 1-12
Network edge: mobile network
▪ network of networks
enterprise
network
Introduction: 1-13
Access networks and physical media
Q: How to connect end systems to mobile network
national or global ISP
edge router?
• residential access nets
• institutional access networks (school,
company)
local or
• mobile access networks (WiFi, 4G/5G) regional ISP
enterprise
network
Introduction: 1-14
Access networks: home networks
Wireless and wired
devices
to/from headend or
central office
often combined
in single box
Enterprise link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers
to Internet
to Internet
Introduction: 1-17
Roadmap
• What is the Internet?
• What is a protocol?
• Network edge: hosts, access
network, physical media
• Network core: packet/circuit
switching, internet structure
• Protocol layers, service mode
Introduction: 1-18
The network core
• mesh of interconnected routers
mobile network
national or global ISP
link capacity
enterprise
network
Introduction: 1-19
Packet-switching: queueing delay, loss
R = 100 Mb/s
A C
D
B R = 1.5 Mb/s
E
queue of packets
waiting for output link
Packet queuing and loss: if arrival rate (in bps) to link exceeds
transmission rate (bps) of link for a period of time:
• packets will queue, waiting to be transmitted on output link
• packets can be dropped (lost) if memory (buffer) in router fills
up
Introduction: 1-20
Packet-switching: queueing delay, loss
https://computerscience.unicam.it/marcantoni/reti/applet/QueuingAndLossInteractive/1.html
Introduction: 1-21
Two key network-core functions
Introduction: 1-23
Circuit switching: FDM and TDM
Frequency Division Multiplexing
(FDM)
• optical, electromagnetic frequencies
4 users
frequency
divided into (narrow) frequency bands
• each call allocated its own band, can
transmit at max rate of that narrow
band
Time Division Multiplexing (TDM) time
• time divided into slots
• each call allocated periodic slot(s), can
frequency
transmit at maximum rate of (wider)
frequency band, but only during its time
slot(s)
time
Introduction: 1-24
Packet switching versus circuit switching
Is packet switching a “slam dunk winner”?
▪ great for “bursty” data – sometimes has data to send, but at other times not
• resource sharing
• simpler, no call setup
▪ excessive congestion possible: packet delay and loss due to buffer overflow
• protocols needed for reliable data transfer, congestion control
▪ Q: How to provide circuit-like behavior?
• bandwidth guarantees traditionally used for audio/video applications
Introduction: 1-26
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?
access access
net net
access
net
access
access net
net
access
access net
net
access access
net net
access
net
access
net
access
net
access
net
access access
net access net
net
Introduction: 1-27
Internet structure: a “network of networks”
Question: given millions of access ISPs, how to connect them together?
access access
net net
access
net
access
access net
net
access
access net
net
access
net
access
net
access
net
access
net
access access
net access net
net
Introduction: 1-28
Internet structure: a “network of networks”
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.
access access
net net
access
net
access
access net
net
access
access net
net
global
access
net
ISP access
net
access
net
access
net
access
net
access
net
access access
net access net
net
Introduction: 1-29
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors ….
access access
net net
access
net
access
access net
net
access
access net
net ISP A
access
net ISP B access
net
access ISP C
net
access
net
access
net
access
net
access access
net access net
net
Introduction: 1-30
Internet structure: a “network of networks”
But if one global ISP is viable business, there will be competitors …. who will
want to be connected
Internet exchange point
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A
access
net
IXP ISP B access
net
access ISP C
net
access
net
access
net
peering link
access
net
access access
net access net
net
Introduction: 1-31
Internet structure: a “network of networks”
… and regional networks may arise to connect access nets to ISPs
access access
net net
access
net
access
access net
net
IXP access
access net
net ISP A
access
net
IXP ISP B access
net
access ISP C
net
access
net
access
net
regional ISP access
net
access access
net access net
net
Introduction: 1-32
Chapter 1: roadmap
▪ What is the Internet?
▪ What is a protocol?
▪ Network edge: hosts, access
network, physical media
▪ Network core: packet/circuit
switching, internet structure
▪ Performance: loss, delay,
throughput
▪ Security
▪ Protocol layers, service models
Introduction: 1-33
How do packet delay and loss occur?
▪ packets queue in router buffers, waiting for turn for transmission
▪ queue length grows when arrival rate to link (temporarily) exceeds output link
capacity
▪ packet loss occurs when memory to hold queued packets fills up
packet being transmitted (transmission delay)
B
packets in buffers (queueing delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction: 1-34
Packet delay: four sources
transmission
A propagation
B
nodal
processing queueing
B
nodal
processing queueing
3 probes 3 probes
3 probes
Introduction: 1-38
Real Internet delays and routes
traceroute: gaia.cs.umass.edu to www.eurecom.fr
3 delay measurements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 3 delay measurements
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms to border1-rt-fa5-1-0.gw.umass.edu
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic link
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms looks like delays
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms decrease! Why?
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
18 * * * * means no response (probe lost, router not replying)
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms
B
packet arriving to
full buffer is lost
* Check out the Java applet for an interactive animation (on publisher’s website) of queuing and loss
Introduction: 1-40
Throughput
▪ throughput: rate (bits/time unit) at which bits are being sent from
sender to receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
link capacity
pipe that can carry linkthat
pipe capacity
can carry
Rsfluid
bits/sec
at rate Rfluid
c bits/sec
at rate
serverserver,
sends with
bits
(fluid) into pipe (Rs bits/sec) (Rc bits/sec)
file of F bits
to send to client
Introduction: 1-41
Throughput
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction: 1-42
Throughput: network scenario
▪ per-connection end-
Rs end throughput:
Rs Rs min(Rc,Rs,R/10)
▪ in practice: Rc or Rs is
R often bottleneck
Rc Rc
Rc
* Check out the online interactive exercises for more
examples: http://gaia.cs.umass.edu/kurose_ross/
A C
Introduction: 1-46
Bad guys: fake identity
IP spoofing: injection of packet with false source address
A C
Introduction: 1-47
Bad guys: denial of service
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target
from compromised
hosts
Introduction: 1-48
Chapter 1: roadmap
▪ What is the Internet?
▪ What is a protocol?
▪ Network edge: hosts, access network,
physical media
▪ Network core: packet/circuit
switching, internet structure
▪ Performance: loss, delay, throughput
▪ Security
▪ Protocol layers, service models
▪ History
Introduction: 1-49
Protocol “layers” and reference models
Networks are complex, Question: is there any
with many “pieces”: hope of organizing
▪ hosts structure of network?
▪ routers ▪and/or our discussion
▪ links of various media of networks?
▪ applications
▪ protocols
▪ hardware, software
Introduction: 1-50
Example: organization of air travel
end-to-end transfer of person plus baggage
ticket (purchase) ticket (complain)
baggage (check) baggage (claim)
gates (load) gates (unload)
runway takeoff runway landing
airplane routing airplane routing
airplane routing
Introduction: 1-53
Layered Internet protocol stack
▪ application: supporting network applications
• HTTP, IMAP, SMTP, DNS
application
application
▪ transport: process-process data transfer
• TCP, UDP transport
transport
▪ network: routing of datagrams from source to
destination network
• IP, routing protocols
link
▪ link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
▪ physical: bits “on the wire”
Introduction: 1-54
Services, Layering and Encapsulation
M
application Application exchanges messages to implement some application
application service using services of transport layer
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) from transport
one process to another, using services of network layer
source destination
Introduction: 1-55
Services, Layering and Encapsulation
M
application application
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) from transport
one process to another, using services of network layer
network Hn Ht M network
Network-layer protocol transfers transport-layer segment
[Ht | M] from one host to another, using link layer services
link link
▪ network-layer protocol encapsulates
transport-layer segment [Ht | M] with
physical network layer-layer header Hn to create a physical
network-layer datagram
source • Hn used by network layer protocol to destination
implement its service
Introduction: 1-56
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
network Hn Ht M network
Network-layer protocol transfers transport-layer segment
[Ht | M] from one host to another, using link layer services
link Hl Hn Ht M link
Link-layer protocol transfers datagram [Hn| [Ht |M] from
host to neighboring host, using network-layer services
physical physical
▪ link-layer protocol encapsulates network
datagram [Hn| [Ht |M], with link-layer header
source Hl to create a link-layer frame destination
Introduction: 1-57
Encapsulation
Matryoshka dolls (stacking dolls)
physical physical
source destination
Introduction: 1-59
message M
source
application
Encapsulation: an
segment
datagram Hn Ht
Ht M
M
transport
network
end-end view
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-60