Professional Documents
Culture Documents
Introduction
Introduction 1-2
The network core
mesh of interconnected routers
packet-switching: hosts break
application-layer messages into
packets
forward packets from one router to
the next, across links on path from
source to destination
each packet transmitted at full link
capacity
Introduction 1-3
Packet-switching: store-and-forward
L bits
per packet
3 2 1
source destination
R bps R bps
R = 100 Mb/s C
A
D
R = 1.5 Mb/s
B
queue of packets E
waiting for output link
routing algorithm
dedicated resources: no
sharing
circuit-like (guaranteed) performance
Introduction 1-7
Circuit switching: FDM versus TDM
Example:
FDM
4 users
frequency
time
TDM
frequency
Introduction
time 1-8
Packet switching versus circuit switching
packet switching allows more users to use network!
example:
1 Mb/s link
N
each user: users
• 100 kb/s when “active” 1 Mbps link
• active 10% of time
circuit-switching:
10 users Q: how did we get value 0.0004?
packet switching: Q: what happens if > 35 users ?
with 35 users, probability >
10 active at same time is
Introduction 1-9
less than .0004 *
Packet switching versus circuit switching
is packet switching a “slam dunk winner?”
Introduction 1-11
Internet structure: network of networks
Question: given millions of access ISPs, how to connect
them together?
access access
net net
access
net
access
access net
net
access
access net
net
access access
net net
access
net
access
net
access
net
access
net
access access
net access net
Introduction net 1-12
Internet structure: network of networks
Option: connect each access ISP to every other access ISP?
access access
net net
access
net
access
access net
net
access
access net
net
access
net
access
net
access
net
access
net
access access
net access net
Introduction net 1-13
Internet structure: network of networks
Option: connect each access ISP to one global transit ISP?
Customer and provider ISPs have economic agreement.
access access
net net
access
net
access
access net
net
access
access net
net
global
access
net
ISP access
net
access
net
access
net
access
net
access
net
access access
net access net
Introduction net 1-14
Internet structure: network of networks
But if one global ISP is viable business, there will be competitors
….
access access
net net
access
net
access
access net
net
access
access net
net
ISP A
access
net ISP B access
net
access
net
ISP C
access
net
access
net
access
net
access access
net access net
Introduction net 1-15
Internet structure: network of networks
But if one global ISP is viable business, there will be competitors
…. which must be interconnected
access access
Internet exchange point
net net
access
net
access
access net
net
access
IXP access
net
net
ISP A
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
IXP access
net
net
ISP A
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net regional net
access
net
access access
net access net
Introduction net 1-17
Internet structure: network of networks
… and content provider networks (e.g., Google, Microsoft,
Akamai) may run their own network, to bring services, content
close to end users
access access
net net
access
net
access
access net
net
access
IXP access
net
net
ISP A
Content provider network
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net regional net
access
net
access access
net access net
Introduction net 1-18
Internet structure: network of networks
POP: point-of-presence
to/from backbone
peering
… … …
…
to/from customers
Introduction 1-20
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-21
How do loss and delay occur?
B
packets queueing (delay)
free (available) buffers: arriving packets
Introduction
dropped (loss) if no free buffers 1-22
Four sources of packet delay
transmission
A propagation
B
nodal
processing queueing
B
nodal
processing queueing
100 km 100 km
ten-car toll toll
caravan booth booth
100 km 100 km
ten-car toll toll
caravan booth booth
average queueing
R: link bandwidth (bps)
delay
L: packet length (bits)
a: average packet
arrival rate
traffic intensity
= La/R
La/R ~ 0: avg. queueing delay small La/R ~ 0
Introduction 1-27
La/R -> 1
“Real” Internet delays and routes
3 probes 3 probes
3 probes
Introduction 1-28
“Real” Internet delays, routes
traceroute: gaia.cs.umass.edu to www.eurecom.fr
3 delay measurements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms link
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
18 * * * * means no response (probe lost, router not replying)
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms
Introduction 1-29
Packet loss
queue (aka buffer) preceding link in buffer has finite capacity
packet arriving to full queue dropped (aka lost)
lost packet may be retransmitted by previous node, by source end system,
or not at all
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
Introduction
full buffer is lost 1-30
Throughput
server,
server withbits
sends linkpipe
capacity
that can carry linkpipe
capacity
that can carry
file of into
(fluid) F bitspipe Rs bits/sec
fluid at rate Rc bits/sec
fluid at rate
to send to client Rs bits/sec) Rc bits/sec)
Introduction 1-31
Throughput (more)
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-32
Throughput: Internet scenario
per-connection end-end
throughput: min(Rc,Rs,R/10)
Rs
in practice: Rc or Rs is often
bottleneck Rs Rs
Rc Rc
Rc
hosts
routers Question:
is there any hope of organizing
links of various structure of network?
media
applications …. or at least our discussion of
networks?
protocols
hardware,
software
Introduction 1-35
Organization of air travel
a series of steps
Introduction 1-36
Layering of airline functionality
airplane routing airplane routing airplane routing airplane routing airplane routing
Introduction 1-38
Internet protocol stack
physical
Introduction 1-39
ISO/OSI reference model
Introduction 1-40
source Encapsulation
message M application
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction 1-41
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-42
Network security
Introduction 1-43
Bad guys: put malware into hosts via Internet
Introduction 1-44
Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources (server, bandwidth)
unavailable to legitimate traffic by overwhelming resource with bogus
traffic
1. select target
2. break into hosts around
the network (see botnet)
3. send packets to target from
compromised hosts
target
Introduction 1-45
Bad guys can sniff packets
packet “sniffing”:
broadcast media (shared Ethernet, wireless)
promiscuous network interface reads/records all packets (e.g., including
passwords!) passing by
A C
Application Layer
Transport Layer
The Network Layer: Data Plane
The Network Layer: Control Plane
The Link Layer and LANs
Wireless and Mobile Networks
Security in Computer Networks
Introduction 2-49