Professional Documents
Culture Documents
B B
nodal queuing nodal queuing
processing processing
Beware: s and R are very
Packets experience variable delays along the path from source to
destination dnodal = dproc + dqueue + dtrans + dprop different quantities!
Four sources of delay at each hop
» Nodal processing: Transmission delay = time Propagation delay = d/s
Check for bit errors » Transmission » d = length of physical link
Determine the output interface to “put bits onto the link”
» s = signal propagation speed in
to forward packet on = L/R medium (~2x108 m/sec)
» Queuing: » Propagation
Time spent waiting at outbound interface for transmission » R = link bandwidth (bps)
Duration depends on the level of congestion at the interface » L = packet length (bits)
3 4
Transmission & Propagation Example Transmission & Propagation Example
Transmission on a “slow” link Transmission on a “fast” link
Time = 0 1,544,000 bps (T-1) 622,080,000 bps (OC-12)
1,000,000 193 bytes/ms Time = 0 77,760 bytes/ms
bytes to 1,000,000
send bytes to
30 ms propagation latency send
Time = 10 ms 30 ms propagation latency
998,070 1,930 bytes in the link Time = 10 ms 777,600 bytes in the link
bytes to 222,400
send bytes to
send
Time = 30 ms
5,790 bytes in the link
Tme = 30 ms 1,000,000 bytes in the link
994,210
bytes to 0
send bytes to send
Time = 5,181.4 ms Bandwidth-Delay Product (BDP) Time = 42.86 ms 0 bytes in the link
0 5,790 bytes in the link 994,210
bytes to bytes 0 1,000,000
send recv’d bytes to send bytes recv’d
5
Understanding the Performance of the Internet Understanding the Performance of the Internet
Delay in packet-switched networks Delay in packet-switched networks
transmission transmission
A propagation A propagation
Transmission delay = 120 Ps
Propagation delay = 10 Ps
Queuing delay = k x 120 Ps
B B Processing delay = 100 Ps
nodal queuing nodal queuing
processing processing
Whatisisk?
What k
k?
Typical transmission delay: 120 Ps Typical processing delay: What dominates end-to-end delay?
» 1,500 byte packet on a 100 Mbps
Ethernet » ??
Typical propagation delay: Note that processing, transmission, and queuing delays are
» ื 1 Ps on a small campus encountered at each hop
Typical queuing delay: » End-to-end delay is largely a function of the number of routers
» ป 25 ms to the West coast
» ?? encountered along the path from source to destination
7 8
Questions Questions
What is the transmission delay for a 2000-byte What are the four types of delay that are
packet over a 1 Mbps link? (potentially) encountered at every router/hop?
Which one may not be encountered?
What is the transmission delay for a 250,000-bit What two things affect the duration of queuing
packet over a 1 Mbps link? delay for a particular packet?
9 10
Understanding the Performance of the Internet
Question Example: What was the delay from my house?
How long would it take a 5000-bit packet to travel from Virginia Beach (11 mile drive from campus,.... )
source to destination over the following network?
11 12
Understanding the Performance of the Internet Understanding the Performance of the Internet
Example: What was the delay from a house 1 mile away? Example: What was the path from the same house?
13 14
Understanding the Performance of the Internet Understanding the Performance of the Internet
Example: What was the path from my house? Traceroute
Cox network - Hampton Roads
Cox - Ashburn, VA
Traceroute program: provides delay measurement
from source to router along end-end Internet path
towards destination.
For all i:
» sends three packets that will reach router i on path
towards destination
» router i will return packets to sender
» sender times interval between transmission and reply
3 probes 3 probes
ODU’s campus router 3 probes
15 16
Understanding the Performance of the Internet Understanding the Performance of the Internet
Packet Loss Throughput
Queue (aka buffer) preceding the link has finite throughput: rate (bits/time unit) at which bits
capacity transferred between sender/receiver
Packet arriving to full queue dropped (aka lost)
» instantaneous: rate at given point in time
» average: rate over long(er) period of time
Lost packet may be retransmitted by previous node, by
source end system, or not at all
buffer
(waiting area) packet being transmitted
A
server,
server sendswith link
bits pipe capacity
that can carry link that
pipe capacity
can carry
file of
(fluid) F bits
into pipe R bits/sec
fluid
s at rate Rfluid
c bits/sec
at rate
B
packet arriving to to send to client Rs bits/sec Rc bits/sec
full buffer is lost
17 18
Understanding the Performance of the Internet Understanding the Performance of the Internet
Throughput Throughput: Internet Scenario
bottleneck link
link on end-end path that constrains end-end throughput 10 connections (fairly) share
backbone bottleneck link R bits/sec
19 20
A Whirlwind Introduction to the Internet Protocol Layering in the Internet
Overview Internet protocol layers (“stack”)
Application layer
What’s the Internet » Supporting network applications
local ISP FTP, SMTP, HTTP
» What’s a protocol?
Transport layer
Network structure » Host-host data transfer
» Network edge TCP, UDP
regional ISP Network layer
» Access networks and physical media
» Routing of packets from source to
» Network core destination
IP, routing protocols
Performance: loss and delay Link layer
Protocol layering » Data transfer between directly
connected network elements
Networks under attack! company Ethernet, 802.11, SONET, … Different services
network
Physical layer specified at each
» The insertion of individual bits “on the wire”
layer interface
Manchester encoding
21 22
Protocol Layering in the Internet Protocol Layering in the Internet
Internet protocol layers (“stack”) Airline Example
Each layer implements a protocol with its peer layer Layers: each layer implements a service
in a distributed system » via its own internal-layer actions
» relying on services provided by layer below
Application protocol
Transport protocol
baggage
baggage (check)
baggag (che
h ck)
k) baggag
baggage (claim
baggage (cla
clai
l im
im baggage
runway (takeoff)
runway (take
k off
off)
ff) runway
runway (land)
(land
and)
d) takeoff/landing
airplane
airpl ne routing
i pla routitin
routing g airplane
airpla
airp ne rou
pla routin
routing
ting
g airplane
airpla
airp ne rou
pla routin
routing
ting
g airplane
p ne routing
airpla
airpla routin
routing
g airplane routing
Physical (signaling)
protocol departure intermediate air-traffic arrival
airport control centers airport
End system A End system B
23 24
Protocol Layering in the Internet Logical Communication Example
Logical communication The transport layer
application data
application Receive data from
transport
transport
application application
The implementation network
network
application
transport
transport
transport
of each layer is link
link Add transport- network
network
physical
physical
distributed network layer protocol link
link
network
net
two or physical network
network
net
two or
throughout the information physical
...
application link
llink
lin
inkk link
link
lin
linkk
application
network transport
transport
physical
physical Send to peer application data
physical
physical
network application
» Some layers just network transport layer transport
transport ack
link
link
distributed on the network
network data
physical
physical application
application application
applicationn Wait for peer
end-systems link
link
transport transport
transport
network
network
... transport
network
network
transport layer to physical
physical application
application application
applicationn
link respond transport
transport ... transport
transport
transport
Thedistributed components link
link link network network
physical network network
physical physica
physical Peer transport
perform actions, exchange physical link
link link
link
messages with peers delivers data to its physical
physical physical
physica
physical
application layer
25 26
Protocol Layering in the Internet Protocol Layering in the Internet
Data flow through protocol layers Protocol layering and data formats
data At sender, each layer takes data from above
application
» Adds header information to create new data unit
application » Passes new data unit to layer below
transport
transport
network Process reversed at receiver
network
link
link link Receive
physical physical network
network
net
two or Message
physical Send
link
llink
lin
inkk
physical Message Source Destination
application physical
application
transport M application application M Message
transport
network
network data Htrans M transport transport Htrans M Segment
link
link
physical
physical application
application application
application Hnet Htrans M network network Hnet Htrans M Datagram
transport transport
transport
network
network
... transport
network
network
Hlink Hnet Htrans M link link Hlink Hnet Htrans M Frame
link
link link
link physical physical
physical
physical
ph physical
cal
physical
27 28
Protocol Layering in the Internet
Common logical functions in most layers Questions
Error control
» Make the logical channel between layers What are the five network protocol layers?
reliable (or simply more reliable)
Flow control
» Avoid overwhelming a peer with data Which layers do end systems use?
Segmentation and reassembly
» Partitioning large messages into smaller Which layers do routers use?
ones at the sender and reassembling them
at the receiver
Multiplexing
» Allowing several higher-level sessions to
share a single lower-level connection
Connection setup
» Handshaking with a peer
29 30
A Whirlwind Introduction to the Internet
Overview Networks Under Attack!
What’s the Internet Attacks on Internet infrastructure:
» What’s a protocol? local ISP » infecting/attacking hosts: malware, spyware, worms, unauthorized
access (data stealing, user accounts)
Network structure
» denial of service: deny access to resources (servers, link bandwidth)
» Network edge
regional ISP
» Access networks and physical media
Internet not originally designed with (much) security in mind
» Network core
» original vision: “a group of mutually trusting users attached to a
Performance: loss and delay transparent network” -
Protocol layering » Internet protocol designers playing “catch-up”
» Security considerations in all layers!
Networks under attack! company
network
31 32
What Can Bad Guys Do? What Can Bad Guys Do?
Malware Denial of service (DoS) attacks
33 34
What Can Bad Guys Do? What Can Bad Guys Do?
Sniff, modify, delete your packets Masquerade as you
IPspoofing: send packet with false source address IPspoofing: send packet with false source address
Record-and-playback: sniff sensitive info (e.g., Record-and-playback: sniff sensitive info (e.g.,
password), and use later password), and use later
» password holder is that user from system point of view » password holder is that user from system point of view
later …..
C C
A A
src:B dest:A user: B; password: foo src:B dest:A user: B; password: foo
B B
37 38
Internet History Lesson
Internet History Lesson 1961-1972: Early packet-switching principles
39 40
Internet History Lesson Internet History Lesson
1972-1980: Internetworking, new and proprietary nets 1980-1990: new protocols, a proliferation of networks
1970: ALOHAnet satellite Cerf and Kahn’s 1982: SMTP e-mail protocol New national networks:
network in Hawaii internetworking principles: defined Csnet, BITnet, NSFnet,
1974: Cerf and Kahn - » minimalism, autonomy - no Minitel
architecture for interconnecting internal changes required to
1983: deployment of TCP/IP
networks interconnect networks
1976: Ethernet at Xerox PARC » best effort service model 100,000 hosts connected
late 70’s: proprietary » stateless routers 1983: DNS defined for name- to confederation of
architectures: DECnet, SNA, » decentralized control to-IP-address translation networks
XNA
late 70’s: switching fixed
length packets (ATM precursor) 1985: FTP protocol defined
1979: ARPAnet has 200 nodes
1988: TCP congestion control
41 42
Internet History Lesson Internet History Lesson
1990, 2000’s: commercialization, the Web, new apps 2007
43 44
A Whirlwind Introduction to the Internet
Summary CS312 Spring 2009
Covered a “ton” of Internet Concepts
You now hopefully have:
material » Context, overview, “feel” of
» Internet overview networking
» What’s a protocol? » More depth, detail later in
» Network edge, core, access course
network
» Performance: loss, delay Something dangerous to
Questions?
» Layering and service mumble at parties!
models
» Backbones, NAPs, ISPs
» Network security
» History