Escolar Documentos
Profissional Documentos
Cultura Documentos
Introduction
A note on the use of these ppt slides:
Were making these slides freely available to all (faculty, students, readers).
Theyre in PowerPoint form so you see the animations; and can add,
modify, and delete slides (including this one) and slide content to suit your
needs. They obviously represent a lot of work on our part. In return for use,
we only ask the following:
v If you use these slides (e.g., in a class) that you mention their source
(after all, wed like people to use our book!)
v If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this
material.
Computer
Networking: A Top
Down Approach
6th edition
Jim Kurose, Keith Ross
Addison-Wesley
March 2012
Chapter 1: introduction
our goal:
v get feel and
terminology
v more depth, detail
later in course
v approach:
use Internet as
example
overview:
v
v
v
v
v
v
v
v
Introduction 1-2
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
Introduction 1-3
vmillions
wireless
laptop
smartphone
of connected
computing devices:
hosts = end systems
running network apps
vcommunication
links
fiber, copper, radio,
satellite
transmission rate:
bandwidth
wireless
links
wired
links
vPacket
switches: forward
packets (chunks of data)
routers and switches
router
mobile network
global ISP
home
network
regional ISP
institutional
network
Introduction 1-4
Tweet-a-watt:
monitor energy use
Slingbox: watch,
control cable TV remotely
Internet
refrigerator
Internet phones
Introduction 1-5
mobile network
Interconnected ISPs
v
global ISP
Internet standards
home
network
regional ISP
institutional
network
Introduction 1-6
that provides
services to applications:
Web, VoIP, email, games, ecommerce, social nets,
v provides
programming
interface to apps
mobile network
global ISP
home
network
regional ISP
Whats a protocol?
human protocols:
v
v
v
network protocols:
v
v
Whats a protocol?
a human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
response
Got the
time?
Get http://www.awl.com/kurose-ross
2:00
<file>
time
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
Introduction 1-10
edge:
mobile network
global ISP
home
network
regional ISP
network core:
interconnected routers
network of networks
institutional
network
Introduction 1-11
keep in mind:
v
v
Introduction 1-12
DSL splitter
modem
telephone
network
DSLAM
ISP
DSL access
multiplexer
Introduction 1-13
cable splitter
modem
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
V
I
D
E
O
D
A
T
A
D
A
T
A
C
O
N
T
R
O
L
Channels
cable splitter
modem
CMTS
cable modem
termination system
ISP
to/from headend or
central office
often combined
in single box
Introduction 1-16
institutional link to
ISP (Internet)
institutional router
Ethernet
switch
v
v
v
institutional mail,
web servers
wireless LANs:
within building (100 ft)
802.11b/g (WiFi): 11, 54 Mbps
transmission rate
to Internet
to Internet
Introduction 1-18
two packets,
L bits each
2 1
host
time needed to
transmit L-bit
packet into link
L (bits)
R (bits/sec)
1-19
Physical media
v
v
Introduction 1-20
Introduction 1-21
signal carried in
electromagnetic spectrum
no physical wire
bidirectional
propagation environment
effects:
reflection
obstruction by objects
interference
terrestrial microwave
e.g. up to 45 Mbps channels
satellite
Kbps to 45Mbps channel (or
multiple smaller channels)
270 msec end-end delay
geosynchronous versus low
altitude
Introduction 1-22
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
Introduction 1-23
Introduction 1-24
Packet-switching: store-and-forward
L
bits
per
packet
source
v
3 2 1
R bps
R bps
des+na+on
R = 100 Mb/s
R = 1.5 Mb/s
queue of packets
waiting for output link
D
E
routing algorithm
3
2
2
1
1
3 2
v
v
Introduction 1-28
FDM
4 users
frequency
time
TDM
frequency
time
Introduction 1-29
N
users
..
example:
1 Mb/s link
each user:
1 Mbps link
vcircuit-switching:
10 users
vpacket
switching:
Introduction 1-30
v
v
v
net
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
global
ISP
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
ISP A
access
net
ISP B
ISP C
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
net
net
access
net
access
net
IXP
access
net
access
net
ISP A
IXP
access
net
ISP B
ISP C
access
net
peering link
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
IXP
access
net
access
net
ISP A
IXP
access
net
ISP B
ISP C
access
net
regional net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
IXP
access
net
access
net
ISP A
access
net
ISP B
ISP B
access
net
regional net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
Tier 1 ISP
IXP
IXP
Regional ISP
access
ISP
access
ISP
access
ISP
access
ISP
IXP
Regional ISP
access
ISP
access
ISP
access
ISP
access
ISP
to/from backbone
peering
to/from customers
Introduction 1-41
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-42
A
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction 1-43
propagation
nodal
processing
queueing
propagation
nodal
processing
queueing
* Check out the Java applet for an interactive animation on trans vs. prop delay
Introduction 1-45
Caravan analogy
100 km
ten-car
caravan
v
v
v
v
toll
booth
cars propagate at
100 km/hr
toll booth takes 12 sec to
service car (bit transmission
time)
car~bit; caravan ~ packet
Q: How long until caravan is
lined up before 2nd toll
booth?
100 km
toll
booth
Introduction 1-46
toll
booth
100 km
toll
booth
Introduction 1-47
v
v
v
average queueing
delay
traffic intensity
= La/R
v
v
v
* Check out the Java applet for an interactive animation on queuing and loss
La/R ~ 0
La/R -> 1
Introduction 1-48
3 probes
3 probes
3 probes
Introduction 1-49
Introduction 1-50
Packet loss
v queue
B
packet arriving to
full buffer is lost
* Check out the Java applet for an interactive animation on queuing and loss
Introduction 1-51
Throughput
v throughput:
server,
withbits
server
sends
file of into
F bits
(fluid)
pipe
to send
to client
linkpipe
capacity
that can carry
Rs bits/sec
fluid at rate
Rs bits/sec)
linkpipe
capacity
that can carry
Rc bits/sec
fluid at rate
Rc bits/sec)
Introduction 1-52
Throughput (more)
v Rs
v Rs
Rc bits/sec
Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-53
endend throughput:
min(Rc,Rs,R/10)
v in practice: Rc or Rs
is often bottleneck
Rs
Rs
Rs
R
Rc
Rc
Rc
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-55
Protocol layers
Networks are complex,
with many pieces:
hosts
routers
links of various
media
applications
protocols
hardware,
software
Question:
is there any hope of
organizing structure of
network?
. or at least our
discussion of networks?
Introduction 1-56
ticket (complain)
baggage (check)
baggage (claim)
gates (load)
gates (unload)
runway takeoff
runway landing
airplane routing
airplane routing
airplane routing
v a
series of steps
Introduction 1-57
ticket (complain)
ticket
baggage (check)
baggage (claim
baggage
gates (load)
gates (unload)
gate
runway (takeoff)
runway (land)
takeoff/landing
airplane routing
airplane routing
airplane routing
departure
airport
airplane routing
airplane routing
intermediate air-traffic
control centers
arrival
airport
Why layering?
dealing with complex systems:
v explicit
v modularization
system
considered harmful?
Introduction 1-59
supporting network
applications
FTP, SMTP, HTTP
v transport:
transfer
process-process data
TCP, UDP
v network:
v link:
application
transport
network
link
physical
allow applications
to interpret meaning of data,
e.g., encryption, compression,
machine-specific conventions
v session: synchronization,
checkpointing, recovery of data
exchange
v Internet stack missing these
layers!
these services, if needed, must be
implemented in application
needed?
application
presentation
session
transport
network
link
physical
Introduction 1-61
Encapsulation
source
message
segment
Ht
datagram Hn Ht
frame
Hl Hn Ht
application
transport
network
link
physical
link
physical
switch
destination
M
Ht
Hn Ht
Hl Hn Ht
M
M
application
transport
network
link
physical
Hn Ht
Hl Hn Ht
M
M
network
link
physical
Hn Ht
router
Introduction 1-62
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
Introduction 1-63
Network security
v field
of network security:
Introduction 1-64
v spyware
v infected
Introduction 1-65
target
Introduction 1-66
src:B dest:A
payload
v wireshark
Introduction 1-67
A
src:B dest:A
payload
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
end systems, access networks, links
1.3 network core
packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-69
Internet history
1961-1972: Early packet-switching principles
v
v
v
1972:
ARPAnet public demo
NCP (Network Control
Protocol) first host-host
protocol
first e-mail program
ARPAnet has 15 nodes
Introduction 1-70
Internet history
1972-1980: Internetworking, new and proprietary nets
v
v
v
v
v
v
Introduction 1-71
Internet history
1980-1990: new protocols, a proliferation of networks
v
v
v
v
v
Introduction 1-72
Internet history
1990, 2000s: commercialization, the Web, new apps
vearly
1990s: ARPAnet
late 1990s 2000s:
decommissioned
v more killer apps: instant
v1991: NSF lifts restrictions on
messaging, P2P file sharing
commercial use of NSFnet
v network security to
(decommissioned, 1995)
forefront
vearly 1990s: Web
v est. 50 million host, 100
hypertext [Bush 1945, Nelson
million+ users
1960s]
v backbone links running at
Gbps
HTML, HTTP: Berners-Lee
1994: Mosaic, later Netscape
late 1990s:
commercialization of the Web
Introduction 1-73
Internet history
2005-present
v
v
v
v
Introduction: summary
covered a ton of material!
v
v
v
v
v
v
v
Internet overview
whats a protocol?
network edge, core, access
network
packet-switching versus
circuit-switching
Internet structure
performance: loss, delay,
throughput
layering, service models
security
history
Introduction 1-75