Professional Documents
Culture Documents
Introduction to Computer
Networks
Chapter 1: Introduction
Dr. Jiang Li
(Adapted from “Computer Networking: A Top Down Approach Featuring the Internet”,
6th edition. Copyrighted by Jim Kurose, Keith Ross)
EECS, Howard Univ. Jiang Li
1
Chapter 1: Introduction
Our goal: Overview:
q Get “feel” and q What’s the Internet?
terminology q What’s a protocol?
q More depth, detail later q Network edge: hosts, access net,
in course physical media
q Approach: q Network core: packet/circuit
q Use Internet as switching, Internet structure
example q Performance: loss, delay,
throughput
q Security
q Protocol layers, service models
q History
EECS, Howard Univ. Jiang Li
2
Chapter 1: Roadmap
1.1 What is the Internet?
1.2 Network edge
q End systems, access networks, links
1.3 Network core
q Circuit switching, packet switching, network
structure
1.4 Delay, loss and throughput in packet-
switched networks
1.5 Protocol layers, service models
1.6 Networks under attack: security
1.7 History
EECS, Howard Univ. Jiang Li
3
The Internet: a “services” view
q Communication infrastructure
enables distributed applications:
q Web, streaming video, mobile network
Networks enterprise
§ collection of devices, routers, network
links: managed by an
organization
Gaming devices
Others?
Internet phones Fitbit
q WAN
q Wide Area Network
q Network over a large area (e.g. across multiple cities)
Streaming
q protocols are everywhere Skype
IP
video
q control sending, receiving
local or
of messages regional
ISP
q e.g., HTTP (Web), home network content
streaming video, Skype, HTTP
provider
network datacenter
TCP, IP, WiFi, 4G, Ethernet Ethernet
network
Hi
TCP connection
request
Hi
TCP connection
Got the response
time? Get http://www.awl.com/kurose-ross
2:00
<file>
time
mobile network
national or global ISP
Network edge:
qhosts: clients and servers
qservers often in data centers
local or
regional
ISP
home network content
provider
network datacenter
network
enterprise
network
mobile network
national or global ISP
Network edge:
qhosts: clients and servers
qservers often in data centers
local or
enterprise
network
mobile network
Network core:
§ interconnected routers enterprise
§ network of networks network
enterprise
network
DSL splitter
modem DSLAM
cable splitter
modem
C
O
V V V V V V N
I I I I I I D D T
D D D D D D A A R
E E E E E E T T O
O O O O O O A A L
1 2 3 4 5 6 7 8 9
Channels
to/from headend or
central office
often combined
in single box
to Internet
to Internet
Enterprise link to
ISP (Internet)
institutional router
Ethernet institutional mail,
switch web servers
local or
regional
ISP
home network content
provider
network datacenter
network
§ guided media:
• signals propagate in solid
media: copper, fiber, coax
§ unguided media:
• signals propagate freely,
e.g., radio
mobile network
q mesh of interconnected national or global ISP
routers
q packet-switching: hosts break
application-layer messages local or
routing
algorithm Routing:
§ global action:
Forwarding: local forwarding table
header value output link determine source-
q aka “switching” 0100
0101
3
2 destination paths
q local action: move 0111
1001
2
1 taken by packets
arriving packets
from router’s input § routing algorithms
1
link to appropriate
router output link 3 2
11
01
L bits
per packet
32 1
source destination
R bps R bps
R = 100 Mb/s
A C
D
B R = 1.5 Mb/s
E
queue of packets
waiting for transmission
over output link
frequency
frequencies divided into (narrow)
frequency bands
q each call allocated its own band,
can transmit at max rate of that time
narrow band
frequency
(TDM)
q time divided into slots
…..
N
§ each user: users 1 Gbps link
• 100 Mb/s when “active”
• active 10% of time
Q: how many users can use this network under circuit-switching and packet switching?
§ circuit-switching: 10 users
§ packet switching: with 35 users, Q: how did we get value 0.0004?
probability > 10 active at same time
is less than .0004 *
Q: what if > 35 users
* Check out the online interactive exercises for more examples: http://gaia.cs.umass.edu/kurose_ross/interactive
Circuit-switched Packet-switched
networks networks
… access
net
access
net …
access
net
access
access net
net
access
access net
net
…
…
access access
net net
access
net
access
net
access
net
access
… … net
access access
net access net
net
… access
net
access
net …
access
net
access
access
net
… … net
access
access net
net
…
each other directly doesn’t
…
access
scale: O(N2) connections. access
…
net net
access
net
access
net
access
net
access
…
… … net
access access
net access net
net
…
global
access
net
ISP access
net
access
net
access
net
access
net
access
… … net
access access
net access net
net
… access
net
access
net …
access
net
access
access net
net
access
ISP A
access net
net
…
…
access
net
ISP B access
net
access ISP C
net
access
net
access
net
access
… … net
access access
net access net
net
ISP A
access net
net
…
…
access
net
IXP ISP B access
net
access ISP C
net
access
net
access
net
peering link
access
… … net
access access
net access net
net
… access
net
access
net …
access
net
access
access net
net
IXP access
ISP A
access net
net
…
…
access
net
IXP ISP B access
net
access ISP C
net
access
net
access
net regional ISP access
… … net
access access
net access net
net
ISP A
access net
net
…
…
Content provider network
access
net
IXP ISP B access
net
access ISP C
net
access
net
access
net regional ISP access
… … net
access access
net access net
net
B
packets in buffers (queueing delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
transmission
A propagation
B
nodal
processing queueing
transmission
A propagation
B
nodal
processing queueing
100 km 100 km
100 km 100 km
100 km 100 km
3 probes 3 probes
3 probes
packet arriving to
B full buffer is lost
* Check out the Java applet for an interactive animation (on publisher’s website) of queuing and loss
§ throughput: rate (bits/time unit) at which bits are being sent from
sender to receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
link capacity
pipe that can carry linkthat
pipe capacity
can carry
Rsfluid
bits/sec
at rate Rfluid
c bits/sec
at rate
serverserver,
sendswith
bits
(fluid) (Rs bits/sec) (Rc bits/sec)
fileinto
of Fpipe
bits
to send to client
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
§ per-connection end-
Rs end throughput:
Rs Rs min(Rc,Rs,R/10)
§ in practice: Rc or Rs is
R often bottleneck
Rc Rc
Rc
* Check out the online interactive exercises for more
examples: http://gaia.cs.umass.edu/kurose_ross/
source destination
network Hn Ht M network
Network-layer protocol transfers transport-layer
segment [Ht | M] from one host to another, using link
link layer
Hl H n Ht services
M link
Link-layer protocol transfers datagram [Hn| [Ht |M]
from host to neighboring host, using network-layer
physical services physical
§ link-layer protocol encapsulates network datagram
[Hn| [Ht |M], with link-layer header Hl to create a
source link-layer frame destination
source destination
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
packet “sniffing”:
§ broadcast media (shared Ethernet, wireless)
§ promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by
A C
src:B dest:A
payload B
A C
src:B dest:A
payload
B
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target
from compromised
hosts