Professional Documents
Culture Documents
Computer Networks
Unit 1 INTRODUCTION
ZHOU Ling
School of Computer Science and Engineering
College of Software Engineering,
Southeast University, Nanjing
ling.zhou@seu.edu.cn
Tentative Lecture Grading Policy
Class attendance 5%
PPT homework + presentation 25%
Final exam (half-open book) 50%
Practice part 20%
Introduction 1-2
Grouping
4 supergroups
Each supergroup includes
20-21 students
10 mini groups
Four presentations
each week
Introduction 1-3
Reference textbooks
Introduction 1-5
Unit 1: Introduction
Our goal: Overview:
get “feel” and what’s a network?
terminology
what’s the Internet?
more depth, detail
later in course network edge: hosts, access
approach:
net, physical media
use Internet as network core: packet/circuit
example switching, Internet structure
performance: loss, delay,
throughput
protocol layers, service models
security
history
Introduction 1-6
Unit 1: roadmap
1.1 What is a network?
1.2 What is the Internet?
1.3 Network edge
end systems, access networks, links
1.4 Network core
circuit switching, packet switching, network structure
1.5 Delay, loss and throughput in packet-switched
networks
1.6 Protocol layers, service models
1.7 Networks under attack: security
1.8 History
Introduction 1-7
Q: What does a
What is a network? cloud represent?
Network
node ?
link Internet host
node
Introduction 1-13
What’s the Internet: “nuts and bolts” view
Mobile network
protocols control sending,
receiving of msgs Global ISP
e.g., TCP, IP, HTTP, Skype,
Ethernet
Internet: “network of Home network
loosely hierarchical
public Internet versus Enterprise network
private intranet
Internet standards
RFC: Request for comments
IETF: Internet Engineering
Task Force
Introduction 1-14
What’s the Internet: a service view
communication infrastructure
enables distributed
applications:
Web, VoIP, email, games,
e-commerce, file sharing
communication services
provided to apps:
reliable data delivery from
source to destination
“best effort” (unreliable)
data delivery (best effort
service is a euphemism for
no service at all)
Introduction 1-15
What’s a protocol?
human protocols: network protocols:
“what’s the time?” machines rather than
“I have a question” humans
introductions all communication
activity in Internet
… specific msgs sent governed by protocols
… specific actions taken protocols define format,
when msgs received, order of msgs sent and
or other events received among network
entities, and actions taken on
msg transmission & receipt
Introduction 1-16
What’s a protocol?
a human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
Got the response
time? Get http://www.seu.edu.cn
2:00
<file>
time
Smoke signals
Traffic lights
Naval signals (ship flags)
Landing lights for aircrafts
…
Introduction 1-18
Internet Architectural Management
IESG IRSG
Introduction 1-20
Domain Name Management
•ICANN generally sets up
the system but delegates all
of the work to IANA
• IANA
• operates at the highest
international level of
organization
• but divides the work up
further among the five
Regional Internet
Registry's.
•These five organizations
give out blocks of numbers
to ISP's.
Introduction 1-21
IETF and non-IETF Submission
IETF Community
Review
IETF Non-IETF
submission submission
Introduction 1-22
IETF Documents – Two Types
All IETF documents are open, i.e., anyone can download and copy
Introduction 1-23
Unit 1: roadmap
1.1 What is a network?
1.2 What is the Internet?
1.3 Network edge
end systems, access networks, links
1.4 Network core
circuit switching, packet switching, network structure
1.5 Delay, loss and throughput in packet-switched
networks
1.6 Protocol layers, service models
1.7 Networks under attack: security
1.8 History
Introduction 1-24
A closer look at network structure:
network edge:
applications and hosts
(devices at the edge)
access networks,
physical media:
wired, wireless
communication links
network core:
interconnected
routers
network of
networks Introduction 1-25
The network edge:
end systems (hosts):
run application programs
e.g. Web, email
at “edge of network” peer-peer
client/server model
client host requests, receives
service from always-on server
client/server
e.g. Web browser/server;
email client/server
peer-peer model:
minimal (or no) use of
dedicated servers
e.g. Skype, BitTorrent
Introduction 1-26
Access networks and physical media
Q: How to connect end
systems to edge router?
residential access nets
institutional access
networks (school,
company)
mobile access networks
Keep in mind:
bandwidth (bits per
second) of access
network?
shared or dedicated?
Introduction 1-27
Digital Subscriber Line (DSL)
Existing phone line: Internet DSLAM :
0-4KHz phone;
home 4-50KHz upstream data; DSL Access Modem
phone 50KHz-1MHz downstream data
DSLAM
splitter
telephone
network
DSL
modem central
office
home
PC
Introduction 1-29
Residential access: cable modems (2)
cable headend
home
cable distribution
network (simplified)
Introduction 1-31
Cable Network Architecture: Overview
server(s)
cable headend
home
cable distribution
network
Introduction 1-32
Cable Network Architecture: Overview
cable headend
home
cable distribution
network (simplified)
Introduction 1-33
Cable Network Architecture: Overview
1 2 3 4 5 6 7 8 9
Channels
cable headend
home
cable distribution
network
Introduction 1-34
Fiber to the Home
Optical Line Terminator (OLT)
Optical Network Terminator (ONT) ONT
Internet optical
fibers
ONT
optical
fiber
OLT
optical
central office splitter
ONT
Introduction 1-37
Dial-up Modem Digital format
Analog format
central
office
telephone
network Internet
home ISP
home
dial-up modem
PC
modem
circuit switches
Introduction 1-38
Access in the Enterprise and Home:
Ethernet and WiFi
On corporate and university campus, and
increasingly home settings, LAN is used to
connect an end system to the edge router.
Introduction 1-39
IEEE 802 Standards
Introduction 1-40
Ethernet Internet access
100 Mbps Institutional
router
Ethernet To Institution’s
switch ISP
100 Mbps
1 Gbps
100 Mbps
server
Introduction 1-42
• WiMAX:
Wireless Interoperability for
Microwave Access
• Making broadband available
anywhere
• Leads WiMAX being a
Personal Broadband technology
Introduction 1-43
Home networks
Typical home network
components:
DSL or cable modem
router/firewall
Ethernet
wireless access point
wireless
to/from laptops
cable Router
cable
modem /firewall
headend
wireless
access
Ethernet point (WAP)
Introduction 1-44
Physical Media
Twisted Pair (TP)
Bit: propagates between two insulated copper
transmitter/rcvr pairs wires
physical link: what lies Category 3: traditional
between transmitter & phone wires, 10 Mbps
receiver Ethernet
Category 5:
guided media:
100Mbps Ethernet
signals propagate in solid
media: copper, fiber, coax
unguided media:
signals propagate freely,
e.g., radio
Introduction 1-45
Physical Media: coax, fiber
Coaxial cable: Fiber optic cable:
two concentric copper glass fiber carrying light
conductors pulses, each pulse a bit
bidirectional high-speed operation:
baseband: high-speed point-to-point
single channel on cable transmission (e.g., 10’s-
legacy Ethernet 100’s Gbps)
Introduction 1-46
Physical media: radio
signal carried in Radio link types:
electromagnetic Terrestrial microwave
spectrum e.g. up to 45 Mbps channels
End-end resources
reserved for “call”
link bandwidth, switch
capacity
dedicated resources: no
sharing
circuit-like (guaranteed)
performance: a constant
rate such as 64kbps in
telephone networks
In the exchange of the
constant speed, call
setup required
Introduction 1-50
Network Core: Circuit Switching
How to carry some Dividing link bandwidth
number of into “pieces”
connections over one e.g., each link has n circuits
physical link? A link is considered to be
network resources a medium providing a
range of frequencies over
(e.g., bandwidth)
all times
divided into “pieces”
A circuit in a link is
pieces allocated to calls implemented with either
resource piece idle if Frequency-Division
not used by owning call Multiplexing (FDM)
(no sharing) Time-Division Multiplexing
(TDM)
Introduction 1-51
Circuit Switching: FDM and TDM
A specific network link supports up to four circuits.
Example:
FDM
4 users
frequency
time
TDM
frequency
Introduction 1-54
Packet Switching: Statistical Multiplexing
100 Mb/s
A Ethernet statistical multiplexing C
1.5 Mb/s
B
queue of packets
waiting for output
link
D E
D
Router
B
H6
Host
H1 E H2 sends packets to H6
A
H1 sends packets to H5
H5
C
H3 Internet
Introduction 1-57
Packet switching versus circuit switching (1)
Packet switching allows more users to use network!
1 Mb/s link
each user:
100 kb/s when “active”
active 10% of time
N users
circuit-switching: 1 Mbps link
10 users
packet switching:
with 35 users,
Q: how did we get value 0.0004?
probability > 10 active
at same time is less
than .0004
Introduction 1-58
Packet switching versus circuit switching (2)
Is packet switching a “slam dunk winner?”
Popular no-booking
restaurants
Introduction 1-60
Virtual-Circuit Packet Switching
Introduction 1-61
Timing in Circuit Switching
Host 1 Host 2
Node 1 Node 2
Circuit
Termination
Introduction 1-62
Comparison of Three Switching
Circuit Switching telegraph Packet Switching
M
Connection
setup
M
Data Message
sending
Connection
release M
t
A B C D A B C D A B C D
Features of
data sending
Store Store Store Store
and and and and
forward Forward forward Forward
Timing of Virtual-Circuit Packet Switching
Host 1 Host 2
Node 1 Node
2
propagation delay
VC between Host 1
establishment and Node 1
Packet 1
Packet 2
Packet 1
Packet 3
Data Packet 2
transfer Packet 1
Packet 3
Packet 2
Packet 3
VC
termination
Introduction 1-64
A Taxonomy of Communication networks
Switched Broadcast
Communication Communication
Network Network
Circuit-Switched Packet-Switched
Communication Communication
Network Network
Tier-1
providers
Tier 1 ISP
interconnect
(peer)
privately
Tier 1 ISP Tier 1 ISP
Tier-2 ISPs
also peer
•Tier-2 ISP pays Tier-2 ISP Tier-2 ISP privately with
tier-1 ISP for
connectivity to Tier 1 ISP each other.
rest of Internet
•Tier-2 ISP is
customer of Tier 1 ISP Tier 1 ISP Tier-2 ISP
tier-1 provider
Tier-2 ISP Tier-2 ISP
Introduction 1-67
Internet structure: network structure 3
local
ISP Tier 3 local
local local
ISP ISP
ISP ISP
Local and tier- Tier-2 ISP Tier-2 ISP
3 ISPs are
customers of Tier 1 ISP
higher tier
ISPs
connecting
them to rest
Tier 1 ISP Tier 1 ISP Tier-2 ISP
of Internet
local
Tier-2 ISP Tier-2 ISP
ISP
local local local
ISP ISP ISP Introduction 1-68
Internet structure: network structure 4
Introduction 1-69
Explanation of some terms
-- PoPs
A PoP is simply a group of one or more
routers (at the same location) in the
provider’s network where customer ISPs
can connect into the provider ISP.
PoPs exist in all levels of the hierarchy, except
for the bottom (access ISP) level.
For a customer network to connect to a
provider’s PoP, it can lease a high-speed link
from a third-party telecommunications provider
to directly connect one of its routers to a
router at the PoP.
Introduction 1-70
Explanation of some terms
-- Multi-homing
Introduction 1-71
Explanation of some terms
-- Peer
When two ISPs peer, it is typically
settlement-free, that is, neither ISP pays
the other.
tier-1 ISPs also peer with one another,
settlement-free.
Normally customer ISPs pay their provider
ISPs to obtain global Internet
interconnectivity.
• To reduce these costs, a pair of nearby ISPs at the
same level of the hierarchy can peer.
Introduction 1-72
Explanation of some terms
-- IXP
A third-party company can create an
Internet Exchange Point (IXP)
typically in a stand-alone building with its own
switches,
a meeting point where multiple ISPs can peer
together.
There are 526 IXPs in the Internet today
https://www.pch.net/ixp/summary
Introduction 1-74
Last updated: Thu, 19 Sep 2019 12:07:24 +0000
local
ISP Tier 3 local
local local
ISP ISP
ISP ISP
Tier-2 ISP Tier-2 ISP
Tier 1 ISP
Computer A → Local ISP → Tier 2 ISP → NAP → Tier 1 ISP → NAP → Tier 2 ISP → Local ISP → ComputerB
Introduction 1-81
How do loss and delay occur?
packets queue in router buffers
packet arrival rate to link exceeds output link
capacity
packets queue, wait for turn
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction 1-82
Four sources of packet delay
1. nodal processing: 2. queuing
check bit errors time waiting at output link for
transmission
determine output link
depends on congestion level of
router
happens mainly in statistical
multiplexing, namely packet-
switched networks
Transmission (μs ms)
A Propagation
(ms)
B
nodal
Processing Queuing (μs ms)
(μs)
Introduction 1-83
Delay in packet-switched networks
3. Transmission delay 4. Propagation delay:
(a.k.a., store-and- d = length of physical link
forward delay): s = propagation speed in
R=link bandwidth (bps) medium (~2x108 m/sec)
L=packet length (bits) propagation delay = d/s
time to send bits into link =
L/R
Time to convert data into
signals Note: s and R are very
different quantities!
transmission
A propagation
B
nodal
processing queuing
Introduction 1-84
Nodal delay
d nodal d proc d queue d trans d prop
Introduction 1-85
Queuing delay (revisit)
R=link bandwidth (bps)
L=packet length (bits)
a=average packet
arrival rate
B
packet arriving to
full buffer is lost
Introduction 1-87
End System, Application, and Other Delays
Additional significant delays in the end
systems
Example 1: an end system wanting to transmit a
packet into a shared medium may purposefully
delay its transmission as part of its protocol.
Example 2: media packetization delay: present
in Voice over-IP (VoIP) applications.
Introduction 1-88
Throughput
throughput: rate (bits/time unit) at which
bits transferred between sender/receiver
instantaneous: rate at given point in time
average: rate over longer period of time
server,
server sendswith link
bits pipe capacity
that can carry link that
pipe capacity
can carry
file of
(fluid) F bits
into pipe Rs bits/sec
fluid at rate Rfluid
c bits/sec
at rate
to send to client Rs bits/sec Rc bits/sec
Introduction 1-89
Throughput (more)
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-90
Throughput: Internet scenario
per-connection end-
Rs
end throughput:
min(Rc,Rs,R/10) Rs Rs
in practice: Rc or Rs
is often bottleneck R
since the backbone
links tend to be Rc Rc
quite faster than
Rc
links in the access
networks
10 connections (fairly) share
backbone bottleneck link R bits/sec
Introduction 1-91
Unit 1: roadmap
1.1 What is a network?
1.2 What is the Internet?
1.3 Network edge
end systems, access networks, links
1.4 Network core
circuit switching, packet switching, network structure
1.5 Delay, loss and throughput in packet-switched
networks
1.6 Protocol layers, service models
How is the Internet organized?
1.7 Networks under attack: security
1.8 History Introduction 1-92
Protocol “Layers”
Networks are complex!
many “pieces”:
hosts Question:
routers Is there any hope of
links of various media organizing structure of
applications network?
protocols
hardware, software Or at least our discussion
of networks?
Introduction 1-93
Organization of air travel
a series of steps
Introduction 1-94
Layering of airline functionality
airplane routing airplane routing airplane routing airplane routing airplane routing
Introduction 1-95
Why layering?
Dealing with complex systems:
explicit structure allows identification, relationship of
complex system’s pieces
layered reference model for discussion
modularization eases maintenance, updating of system
change of implementation of layer’s service transparent to
rest of system
e.g., change in gate procedure doesn’t affect rest of system
layering considered harmful?
Functionality may be duplicated.
One layer may need information present only in another layer
(violates the goal of separation of layers)
Introduction 1-96
Internet protocol stack
application: supporting network
applications application
FTP, SMTP, HTTP
transport: process-process data transport
transfer
TCP, UDP network
network: routing of datagrams from
source to destination link
IP, routing protocols
link: data transfer between physical
neighboring network elements
PPP, Ethernet
physical: bits “on the wire”
Introduction 1-97
OSI reference model
presentation: allow applications to
interpret meaning of data, e.g., application
encryption, compression, machine-
presentation
specific conventions
session: synchronization, session
checkpointing, recovery of data transport
exchange
network
Internet stack “missing” these
layers! link
these services, if needed, must physical
be implemented in application
needed?
Introduction 1-98
message M
source
application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M Tl link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M Tl link router
physical
Introduction 1-99
TCP/IP Model or Internet Protocol Suite
TCP/IP protocols can serve different applications, so called “everything over IP”
TCP/IP protocols allow IP protocol runs on different networks, i.e., “IP over
everything”.
TCP UDP
transport
Introduction 1-103
Bad guys can put malware into
hosts via Internet (2)
Worm:
Trojan horse
Hidden part of some
Malware that can enter a device
otherwise useful software without any explicit user
Non-replicating malware
interaction
that appears to perform a infection by passively receiving
desirable function but object that gets itself executed
instead facilitates self- replicating: propagates to
unauthorized access
other hosts, users
Today often on a Web page
(Active-X, plugin) Sapphire Worm: aggregate scans/sec
Virus in first 5 minutes of outbreak (CAIDA, UWisc data)
Introduction 1-104
Bad guys can attack servers and
network infrastructure
Denial of service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets toward
target from target
compromised hosts
Introduction 1-105
Three Categories of DoS Attacks
Vulnerability attack
Bandwidth flooding
Connection flooding
Introduction 1-106
Distributed Denial of Services (DDoS)
DDoS attacks leveraging botnets with thousands of
comprised hosts are a common occurrence today
A C
A C
Introduction 1-109
The bad guys can record and playback
C
A
Introduction 1-110
Unit 1: roadmap
1.1 What is a network?
1.2 What is the Internet?
1.3 Network edge
end systems, access networks, links
1.4 Network core
circuit switching, packet switching, network structure
1.5 Delay, loss and throughput in packet-switched
networks
1.6 Protocol layers, service models
1.7 Networks under attack: security
1.8 History
Introduction 1-111
Internet History (1)
1961-1972: Early packet-switching principles
Introduction 1-112
Internet History (2)
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite Cerf and Kahn’s internetworking
network in Hawaii principles:
1974: Cerf and Kahn - minimalism, autonomy - no
architecture for internal changes required
interconnecting networks to interconnect networks
1976: Ethernet at Xerox best effort service model
PARC stateless routers
Introduction 1-113
Internet History (3)
1980-1990: new protocols, a proliferation of networks
Introduction 1-115
Internet History (5)
The New Millennium:
Aggressive deployment of broadband Internet access to
homes has set the stage for a wealth of video
applications (e.g., YouTube, Netflix, Skype)
WiFi networks and medium-speed (up to a few Mbps)
Internet access via 3G and 4G cellular telephony
networks
rapid emergence of hand-held computers (iPhones,
Androids, iPads, and so on)
Online social networks (e.g., Facebook and QQ) have
created massive people networks on top of the Internet.
Online service providers, such as Google and Microsoft,
have deployed their own extensive private networks
Clouds …
Introduction 1-116
Introduction: Summary
Covered a “ton” of material!
You now have:
Internet overview
context, overview,
what’s a protocol? “feel” of networking
network edge, core, access more depth, detail to
network follow!
packet-switching versus
circuit-switching
Internet structure
performance: loss, delay,
throughput
layering, service models
security
history
Introduction 1-117
Summary: Internet Architecture
Introduction 1-118
Summary: Minimalist Approach
Dumb network
IP provide minimal functionalities to support connectivity
addressing, forwarding, routing
Advantages
accommodate heterogeneous technologies (Ethernet, modem,
satellite, wireless)
support diverse applications (telnet, ftp, Web, X windows)
decentralized network administration
Introduction 1-119
Homework for all
Packet switching allows more users to use network!
1 Mb/s link
each user:
100 kb/s when “active”
active 10% of time
N users
circuit-switching: 1 Mbps link
10 users
packet switching:
with 35 users,
Q: how did we get value 0.0004?
probability > 10 active
at same time is less
than .0004
Introduction 1-120
Homework
1. List the available residential access technologies in
your city. For each type of access, provide the
advertised downstream rate, upstream rate, and
monthly price.
2. Describe the most popular wireless Internet access
technologies today. Compare and contrast them.
3. Why will two ISPs at the same level of the hierarchy
often peer with each other? How does an IXP earn
money?
4. Some content providers have created their own
networks. Describe Google’s network. What motivates
content providers to create these networks?
Introduction 1-121
Optional Homework
DDos attacks are much harder to detect
and defend against than a DoS attack from
a single host.
Why? Give your explanation in 5 slides.
Introduction 1-122