Escolar Documentos
Profissional Documentos
Cultura Documentos
Introduction
Computer Networking:
A Top Down Approach ,
5th edition.
Jim Kurose, Keith Ross
Addison-Wesley, April
2009.
Chapter 1: Introduction
Our goal:
Overview:
Introduction 1-2
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
end systems, access networks, links
PC
server
wireless
laptop
cellular
handheld
access
points
wired
links
router
of connected
computing devices:
hosts = end systems
running network apps
communication
links
fiber, copper,
radio, satellite
transmission
rate = bandwidth
Mobile network
Global ISP
Home network
Regional ISP
Institutional network
routers:
forward
packets (chunks of
data)
Introduction 1-4
Global ISP
Internet: network of
networks
Mobile network
loosely hierarchical
public Internet versus
private intranet
Home network
Regional ISP
Institutional network
Internet standards
communication
infrastructure enables
distributed applications:
Web, VoIP, email, games,
e-commerce, file sharing
communication services
provided to apps:
reliable data delivery
from source to
destination
best effort (unreliable)
data delivery
Introduction 1-6
Whats a protocol?
human protocols:
whats the time?
I have a question
introductions
specific msgs sent
specific actions
taken when msgs
received, or other
events
network protocols:
machines rather than
humans
all communication
activity in Internet
governed by protocols
Whats a protocol?
a human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
response
Got the
time?
Get http://www.awl.com/kurose-ross
2:00
<file>
time
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
network core:
interconnected
routers
network of
networks
Introduction 1-10
peer-peer
client/server model
peer-peer model:
Dial-up Modem
central
office
home
PC
home
dial-up
modem
telephone
network
Internet
ISP
modem
(e.g., AOL)
home
phone
Internet
DSLAM
telephone
network
splitter
DSL
modem
home
PC
central
office
Introduction 1-14
Introduction 1-15
Diagram: http://www.cabledatacomnews.com/cmic/diagram.html
Introduction 1-16
cable headend
cable distribution
network (simplified)
home
Introduction 1-17
cable headend
cable distribution
network
home
Introduction 1-18
cable headend
cable distribution
network (simplified)
home
Introduction 1-19
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
D
A
T
A
D
A
T
A
C
O
N
T
R
O
L
Channels
cable headend
cable distribution
network
home
Introduction 1-20
Internet
OLT
ONT
optical
fiber
central office
optical
splitter
ONT
institutional
router
to institutions
ISP
100 Mbps
1 Gbps
100 Mbps
server
wireless LANs:
router
base
station
mobile
hosts
Introduction 1-23
Home networks
Typical home network components:
DSL or cable modem
router/firewall/NAT
Ethernet
wireless access point
to/from
cable
headend
cable
modem
router/
firewall
Ethernet
wireless
laptops
wireless
access
point
Introduction 1-24
Physical Media
Category 3: traditional
phone wires, 10 Mbps
Ethernet
Category 5:
100Mbps Ethernet
unguided media:
Introduction 1-25
broadband:
multiple channels on
cable
HFC
Introduction 1-26
signal carried in
electromagnetic
spectrum
no physical wire
bidirectional
propagation
environment effects:
reflection
obstruction by objects
interference
terrestrial microwave
e.g. up to 45 Mbps channels
satellite
Kbps to 45Mbps channel (or
multiple smaller channels)
270 msec end-end delay
geosynchronous versus low
altitude
Introduction 1-27
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
Introduction 1-28
mesh of interconnected
routers
the fundamental
question: how is data
transferred through net?
circuit switching:
dedicated circuit per
call: telephone net
packet-switching: data
sent thru net in
discrete chunks
Introduction 1-29
Introduction 1-30
Introduction 1-31
FDM
4 users
frequency
time
TDM
frequency
time
Introduction 1-32
Numerical example
Introduction 1-33
resource contention:
aggregate resource
demand can exceed
amount available
congestion: packets
queue, wait for link use
store and forward:
packets move one hop
at a time
node receives complete
packet before
forwarding
Introduction 1-34
A
B
statistical multiplexing
1.5 Mb/s
queue of packets
waiting for output
link
Packet-switching: store-and-forward
L
R
Example:
L = 7.5 Mbits
R = 1.5 Mbps
transmission delay = 15
sec
Introduction 1-36
N
users
..
Example:
1 Mb/s link
each user:
1 Mbps link
circuit-switching:
10 users
packet
switching:
Introduction 1-37
roughly hierarchical
at center: small # of well-connected large networks
Large Content
Distributor
(e.g., Akamai)
IXP
Tier 1 ISP
Tier 1 ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Introduction 1-39
tier-2
Tier 2
Tier 2 ISP Tier 2
ISP
ISP
IXP
Tier 1 ISP
Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Introduction 1-40
Tier 2
IXP
Tier 2 ISP Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Akamai)
IXP
Tier 1 ISP
Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Introduction 1-41
Tier 2
IXP
Tier 2 ISP Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Akamai)
IXP
Tier 1 ISP
Tier 2
Tier 1 ISP
ISP Tier 2
Tier 2
ISP
ISP
Large Content
Distributor
(e.g., Google)
Tier 1 ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Introduction 1-42
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
Introduction 1-43
A
B
propagation
nodal
processing
queueing
propagation
nodal
processing
queueing
Introduction 1-46
Caravan analogy
100 km
ten-car
caravan
100 km
toll
booth
cars propagate at
100 km/hr
toll booth takes 12 sec to
service car (transmission
time)
car~bit; caravan ~ packet
Q: How long until caravan is
lined up before 2nd toll
booth?
toll
booth
time to push entire
caravan through toll
booth onto highway =
12*10 = 120 sec
time for last car to
propagate from 1st to
2nd toll both: 100km/
(100km/hr)= 1 hr
A: 62 minutes
Introduction 1-47
toll
booth
100 km
toll
booth
Introduction 1-48
average queueing
delay
traffic intensity
= La/R
La/R ~ 0
La/R -> 1
Introduction 1-49
3 probes
3 probes
Introduction 1-50
Packet loss
queue (aka buffer) preceding link in buffer has
finite capacity
packet arriving to full queue dropped (aka lost)
lost packet may be retransmitted by previous
node, by source end system, or not at all
buffer
(waiting area)
A
B
packet arriving to
full buffer is lost
Introduction 1-52
Throughput
link
capacity
that
can carry
server,
server
sendswith
bits pipe
fluid
at rate
file of
F bits
(fluid)
into
pipe
Rs bits/sec
to send to client
Rs bits/sec)
link that
capacity
pipe
can carry
at rate
Rfluid
c bits/sec
Rc bits/sec)
Introduction 1-53
Throughput (more)
Rc bits/sec
Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-54
per-connection
end-end
throughput:
min(Rc,Rs,R/10)
in practice: Rc or Rs
is often bottleneck
Rs
Rs
Rs
R
Rc
Rc
Rc
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
Introduction 1-56
Protocol Layers
Networks are complex,
with many pieces:
hosts
routers
links of various
media
applications
protocols
hardware,
software
Question:
Is there any hope of
organizing structure of
network?
Or at least our discussion of
networks?
Introduction 1-57
ticket (complain)
baggage (check)
baggage (claim)
gates (load)
gates (unload)
runway takeoff
runway landing
airplane routing
airplane routing
airplane routing
a series of steps
Introduction 1-58
ticket (complain)
ticket
baggage (check)
baggage (claim
baggage
gates (load)
gates (unload)
gate
runway (takeoff)
runway (land)
takeoff/landing
airplane routing
airplane routing
airplane routing
departure
airport
airplane routing
airplane routing
intermediate air-traffic
control centers
arrival
airport
Introduction 1-59
Why layering?
Dealing with complex systems:
TCP, UDP
application
transport
network
link
physical
application
presentation
session
transport
network
link
physical
Introduction 1-62
Encapsulation
source
message
segment
Ht
datagram Hn Ht
frame Hl Hn Ht
M
M
M
M
application
transport
network
link
physical
link
physical
switch
destination
M
Ht
Hn Ht
Hl Hn Ht
application
transport
network
link
physical
Hn Ht
Hl Hn Ht
network
link
physical
Hn Ht
router
Introduction 1-63
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
Introduction 1-64
Network Security
part of some
otherwise useful software
today often in Web page
(Active-X, plugin)
virus
infection
by receiving
object (e.g., e-mail
attachment), actively
executing
self-replicating: propagate
itself to other hosts,
users
worm:
infection
by passively receiving
object that gets itself
executed
self- replicating: propagates to
other hosts, users
Sapphire Worm: aggregate scans/sec
in first 5 minutes of outbreak (CAIDA, UWisc data)
Introduction 1-67
target
Introduction 1-68
src:B dest:A
payload
A
src:B dest:A
payload
Introduction 1-70
src:B dest:A
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
Introduction 1-72
Internet History
1961-1972: Early packet-switching principles
1972:
ARPAnet public demonstration
NCP (Network Control Protocol)
first host-host protocol
first e-mail program
ARPAnet has 15 nodes
Introduction 1-73
Internet History
1972-1980: Internetworking, new and proprietary nets
Introduction 1-74
Internet History
1980-1990: new protocols, a proliferation of networks
1983: deployment of
TCP/IP
1982: smtp e-mail
protocol defined
1983: DNS defined
for name-to-IPaddress translation
1985: ftp protocol
defined
1988: TCP congestion
control
Introduction 1-75
Internet History
1990, 2000s: commercialization, the Web, new apps
early
1990s: ARPAnet
decommissioned
1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
early 1990s: Web
hypertext [Bush 1945, Nelson
1960s]
HTML, HTTP: Berners-Lee
1994: Mosaic, later Netscape
late 1990s: commercialization
of the Web
Introduction 1-76
Internet History
2010:
~750 million hosts
voice, video over IP
P2P applications: BitTorrent
(file sharing) Skype (VoIP),
PPLive (video)
more applications: YouTube,
gaming, Twitter
wireless, mobility
Introduction 1-77
Introduction: Summary
Covered a ton of material!
Internet overview
whats a protocol?
network edge, core, access
network
packet-switching versus
circuit-switching
Internet structure
performance: loss, delay,
throughput
layering, service models
security
history
Introduction 1-78