Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Networks and Internets With Internet Applications, 4e by Douglas E. Comer

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 19

Computer Networks and Internets with

Internet Applications, 4e

By Douglas E. Comer

Lecture PowerPoints
By Lami Kaya, LKaya@ieee.org

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1
Chapter 2

Motivation
and
Tools

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 2
Topics Covered

• 2.1 Introduction
• 2.2 Resource Sharing
• 2.3 Growth Of The Internet
• 2.4 Probing The Internet
• 2.5 Interpreting A Ping Response
• 2.6 Tracing A Route
• 2.7 Summary

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 3
2.1 Introduction

This chapter
• discusses the size and rapid growth of the Internet, and
• introduces a few basic tools that can be used to explore
NW

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 4
2.2 Resource Sharing (1)
• Some of the earliest computer NW were built to extend
existing computing facilities.
– NW were devised that allowed multiple computers to access a
shared peripheral device such as a printer or a disk
• Main motivation for the first NW were share large-scale
computational power
• The U.S. Department of Defense (DoD)
– Advanced Research Projects Agency (ARPA) was concerned
about the lack of high-powered computers

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 5
2.2 Resource Sharing (2)
• Many of the ARPA research projects needed access to
the latest equipment
– Each research group wanted one of each new computer type
• By the latter 1960s, it became obvious that the ARPA
budget could not keep up with demand
– As an alternative, ARPA started investigating data NW
– The agency decided to give each group one computer
– Interconnect the computer with a data NW
• The ARPA NW research turned out to be revolutionary

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 6
2.3 Growth Of The Internet
• The Internet has grown from the early research
prototype
– to a global communication system that reaches all countries
• Figure 2.1 illustrates how the Internet has grown
– The figure contains a graph of the number of computers
attached to the Internet as a function of the years from 1981-
2003
• When plotted on log-scale as in Figure 2.2
– the growth appears approximately linear
• meaning that the Internet has experienced exponential growth over
two decades
– The Internet has been doubling in size every 9-12 months

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 7
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 8
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 9
2.4 Probing The Internet (1)
• The program begins by walking through the Domain Name System
(DNS),
– system that stores names for computers and then uses a program that
tests to see whether the computer is currently online
• Tools used to probe the Internet are also available to users
• One of the simplest probing tools is a program known as ping:
– Ex: ping www.netbook.cs.purdue.edu
• The ping program sends a message to the specified computer and
then waits a short time for a response.
– If a response arrives, ping reports to the user that the computer is alive
– otherwise, ping reports that the computer is not responding
– Ex: www.netbook.cs.purdue.edu is alive
• Figure 2.3 shows an example of ping output with the timing and
repetition options turned on

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 10
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 11
2.4 Probing The Internet (2)
• In Figure 2.3, ping sends one request each second
– and produces one line of output for each response received
• The output tells the size of the packet received
– the sequence number, and the round-trip time in milliseconds
• When the user interrupts the program,
– ping produces a summary that specifies the number of packets
sent and received
– packet loss
– and the minimum
– mean
– and maximum round-trip times

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 12
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 13
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 14
2.5 Interpreting A Ping Response (1)
• When no response is received, ping cannot help
determine the reason:
– The remote computer could be turned off
– disconnected from the NW
– its NW interface could have failed
– SW running may not respond to ping
– the local computer could be disconnected from the NW
– the NW to which the remote computer attaches could have failed
– failure of an intermediate computer or NW
– Finally, ping sometimes fails because the NW has become so
congested with traffic that delays are unreasonably long
• Ping has no way to determine the cause of the problem

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 15
2.5 Interpreting A Ping Response (2)
• Another reason why ping may fail to generate a
response is less subtle:
– some companies configure their site to reject ping packets
• The motivation for disabling ping is security:
– if a corporation allows ping traffic to enter its site
• the site becomes susceptible to a denial-of-service or flooding
attack
– so many ping packets arrive that the company's NW and
computers cannot respond to legitimate requests
– To avoid such attacks,
• the company merely rejects ping packets before they enter

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 16
2.6 Tracing A Route (1)
• traceroute used to determine the intermediate computers
along the path to a remote destination
– Ex: traceroute www.netbook.cs.purdue.edu
• Figure 2.6 shows the output from traceroute with the
destination berkeley.edu
• traceroute provides more information than ping
– Each line corresponds to each of intermediate computers
– and one corresponds to the final destination itself
• traceroute cannot be used for all destinations
– NW administrators may choose to disable it
• to prevent outsiders from obtaining detailed information about their
architecture

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 17
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 18
2.6 Tracing A Route (2)
• Figure 2.6 illustrates another features of traceroute:
– a report of packet loss
• Traceroute sends three probes for each intermediate computer
• When the three responses arrive,
– traceroute prints the name of the intermediate computer, and gives the
minimum, average, and maximum round-trip times.
• The line with asterisks indicates two of three probes received no
response (i.e., packets were lost)
• In a later test, all probes were received successfully
• We can conclude that the loss was a temporary condition
– probably caused by congestion on one of the paths between the source
and destination

© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 19

You might also like