Professional Documents
Culture Documents
CH-1 Part-3
CH-1 Part-3
CH-1 Part-3
Chapter Goal
Get “feel,” “big picture,” introduction to terminology
- more depth, detail later in course
68
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
How Do Packet Delay and Loss Occur?
• What is protocol?
• Network Edge
• Network Core
▪ Packets queue in
• Performance
• Protocol Layers
router buffers, waiting
• Security
• History for turn for Packet being transmitted (transmission delay)
Application Layer transmission A
Transport Layer
▪ Queue length grows
Data Plane &
Control Plane: The
when arrival rate to link
(temporarily) exceeds
B
Network Layer
Wireless and Mobile ▪ Packet loss occurs Packets in buffers (queueing delay)
Networks
when memory to hold
Free (available) buffers: arriving packets
queued packets fills
dropped (loss) if no free buffers
up
69
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Packet Delay: Four Sources
• What is protocol?
• Network Edge 𝒅𝒑𝒓𝒐𝒄 : processing delay
transmission
• Network Core
• Performance
• Protocol Layers
▪ Check bit errors
A
• Security
• History
propagation
Application Layer ▪ Determine output link
Transport Layer
▪ Typically < microsecs
B
Data Plane &
Control Plane: The
Network Layer
nodal
The Link Layer and
LANs processing queueing
Wireless and Mobile
𝒅𝒒𝒖𝒆𝒖𝒆 : queueing delay
Networks
𝑑𝑛𝑜𝑑𝑎𝑙 = 𝑑𝑝𝑟𝑜𝑐 + 𝑑𝑞𝑢𝑒𝑢𝑒 + 𝑑𝑡𝑟𝑎𝑛𝑠 + 𝑑𝑝𝑟𝑜𝑝 ▪ Time waiting at output
link for transmission
▪ Depends on
congestion level of
router
70
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Packet Delay: Four Sources 𝒅𝒕𝒓𝒂𝒏𝒔 : transmission delay
▪ L: packet length (bits)
• What is protocol?
• Network Edge
transmission
• Network Core
• Performance
• Protocol Layers
▪ R: link transmission rate
A
• Security
• History
propagation (bps)
Application Layer
𝐿
Transport Layer
▪ 𝑑𝑡𝑟𝑎𝑛𝑠 =
𝑅
B
Data Plane &
Control Plane: The
Network Layer
nodal
The Link Layer and
LANs processing queueing 𝒅𝒑𝒓𝒐𝒑 : propagation delay
Wireless and Mobile
Networks
𝑑𝑛𝑜𝑑𝑎𝑙 = 𝑑𝑝𝑟𝑜𝑐 + 𝑑𝑞𝑢𝑒𝑢𝑒 + 𝑑𝑡𝑟𝑎𝑛𝑠 + 𝑑𝑝𝑟𝑜𝑝 ▪ d: length of physical link
▪ s: propagation speed
(~2x108 m/sec)
𝑑
▪ 𝑑𝑝𝑟𝑜𝑝 =
𝑠
71
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
McD Drive-Thru Caravan Analogy
• What is protocol?
• Network Edge
• Network Core
• Performance
• Protocol Layers 5m 5m
• Security
• History
Application Layer
ten-car waiting in line 1st counter 2nd counter 3rd counter
Transport Layer
(aka 10-bit packet) (aka link)
Data Plane &
Control Plane: The ▪ Car ~ bit; caravan ~ packet; ▪ Time to “push” entire caravan
Network Layer
Application Layer
ten-car waiting in line 1st counter 2nd counter 3rd counter
Transport Layer
(aka 10-bit packet) (aka router)
Data Plane &
Control Plane: The
Network Layer
▪ Suppose cars now “propagate” at 10 m/hr
The Link Layer and
LANs
▪ And suppose toll booth now takes one min to service a car
Wireless and Mobile
Networks ▪ Question:
Will cars arrive to 2nd booth before all cars serviced at first booth?
▪ Answer:
Yes! After 7 min, first car arrives at second booth; three cars still at first
booth
73
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Packet Queueing Delay (revisited)
3 probes 3 probes
3 probes
75
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
“Real” Internet Delays and Routes
• What is protocol?
• Network Edge
• Network Core
traceroute: gaia.cs.umass.edu to www.eurecom.fr
• Performance 3 delay measurements from
• Protocol Layers
• Security gaia.cs.umass.edu to cs-gw.cs.umass.edu
• History
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
Application Layer 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 delay measurements
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms to border1-rt-fa5-1-0.gw.umass.edu
Transport Layer
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
Data Plane & 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
Control Plane: The 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
Network Layer 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic link
The Link Layer and
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
LANs 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
Wireless and Mobile 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms looks like delays decrease!
Networks 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms Why?
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
18 * * * * means no response (probe lost, router not replying)
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms
Application Layer
Transport Layer
B
Data Plane &
Control Plane: The
Network Layer
Application Layer
78
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Throughput
• What is protocol?
• Network Edge
• Network Core Rs < Rc What is average end-end throughput?
• Performance
• Protocol Layers
• Security
• History
Application Layer
Rs bits/sec Rc bits/sec
Transport Layer
bottleneck link
link on end-end path that constrains end-end throughput
79
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Throughput: Network Scenario
• What is protocol?
• Network Edge
• Network Core
• Performance
▪ Per-connection end-end Rs
R
• Protocol Layers
• Security throughput: min (Rc, Rs, ) Rs Rs
• History
10
▪ In practice: Rc or Rs is smaller
Application Layer
Transport Layer
R R
Data Plane &
Control Plane: The than
Network Layer N
The Link Layer and
LANs
▪ Bottleneck link is at network Rc Rc
Wireless and Mobile edge
Rc
Networks
81
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Example: Organization of Air Travel
• What is protocol?
• Network Edge
• Network Core
• Performance
• Protocol Layers
• Security
• History end-to-end transfer of person plus baggage
Application Layer
Transport Layer
ticket (purchase) ticket (complain)
Data Plane &
Control Plane: The baggage (check) baggage (claim)
Network Layer
Transport Layer
gates (load) gate service gates (unload)
Data Plane &
Control Plane: The runway takeoff runway service runway landing
Network Layer
83
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Why Layering?
• What is protocol?
• Network Edge
• Network Core
Approach to designing/discussing complex systems:
• Performance
• Protocol Layers
• Security
• History
▪ Explicit structure allows identification,
Application Layer relationship of system’s pieces
Transport Layer
▪ Layered reference model for discussion
Data Plane &
84
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Layered Internet Protocol Stack
• What is protocol?
• Network Edge
• Network Core
▪ Application: supporting network applications
▪ HTTP, IMAP, SMTP, DNS
• Performance
• Protocol Layers
• Security
• History application
application
Application Layer ▪ Transport: process-process data transfer
Transport Layer
▪ TCP, UDP transport
transport
Data Plane &
85
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Services, Layering and Encapsulation
• What is protocol?
• Network Edge
• Network Core
• Performance
• Protocol Layers M
• Security
• History application Application exchanges messages to implement some application
application service using services of transport layer
Application Layer
Ht M
Transport Layer transport Transport-layer protocol transfers M (e.g., reliably) from one
transport
Data Plane & process to another, using services of network layer
Control Plane: The
Network Layer
network ▪ transport-layer protocol encapsulates network
The Link Layer and
LANs application-layer message, M, with transport
Wireless and Mobile link layer-layer header Ht to create a transport-layer link
Networks segment
• Ht used by transport layer protocol to physical
physical
implement its service
source destination
86
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Services, Layering and Encapsulation
• What is protocol?
• Network Edge
• Network Core
• Performance
• Protocol Layers M
• Security
• History application application
Application Layer
Ht M
Transport Layer transport Transport-layer protocol transfers M (e.g., reliably) from one
transport
Data Plane & process to another, using services of network layer
Control Plane: The
Network Layer
network Hn Ht M network
The Link Layer and Network-layer protocol transfers transport-layer segment [Ht | M]
LANs
from one host to another, using link layer services
Wireless and Mobile link link
Networks
▪ network-layer protocol encapsulates
physical transport-layer segment [Ht | M] with physical
network layer-layer header Hn to create a
source
network-layer datagram destination
• Hn used by network layer protocol to
implement its service
87
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Services, Layering and Encapsulation
• What is protocol?
• Network Edge
• Network Core
• Performance
• Protocol Layers M
• Security
• History application application
Application Layer
Ht M
Transport Layer transport transport
Data Plane &
Control Plane: The
Network Layer
network Hn Ht M network
The Link Layer and Network-layer protocol transfers transport-layer segment [Ht | M]
LANs
from one host to another, using link layer services
Wireless and Mobile link Hl Hn Ht M link
Networks
Link-layer protocol transfers datagram [Hn| [Ht |M] from host to
physical neighboring host, using network-layer services physical
▪ link-layer protocol encapsulates network
source datagram [Hn| [Ht |M], with link-layer header Hl destination
to create a link-layer frame
88
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Services, Layering and Encapsulation
• What is protocol?
• Network Edge
• Network Core
• Performance
• Protocol Layers M
• Security
• History
application M application
Application Layer message
Ht M
Transport Layer transport Ht M transport
Data Plane & segment
Control Plane: The
Network Layer network Hn Ht M Hn Ht M network
The Link Layer and datagram
LANs
Hl Hn Ht M link
Wireless and Mobile
link Hl Hn Ht M
Networks frame
physical physical
source destination
89
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Encapsulation: An End-to-End View
• What is protocol?
• Network Edge
• Network Core source
• Performance
• Protocol Layers message M application
• Security segment
• History
Htt M transport
datagram Hn Ht M network
Application Layer
frame Hl Hn Ht M link
Transport Layer
physical
Data Plane &
Control Plane: The link
Network Layer
physical
The Link Layer and
LANs
switch
Wireless and Mobile
Networks
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
90
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Network security
• What is protocol?
• Network Edge
• Network Core
▪ Internet not originally designed with (much) security in mind
▪ Original vision: “a group of mutually trusting users attached to a
• Performance
• Protocol Layers
• Security
• History
transparent network”
Application Layer
Transport Layer
▪ Internet protocol designers playing “catch-up”
Data Plane &
Control Plane: The
▪ Security considerations in all layers!
Network Layer
91
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Bad Guys: Packet Interception
• What is protocol?
• Network Edge
• Network Core
Packet “sniffing”:
• Performance
• Protocol Layers
• Security
• History
▪ Broadcast media (shared Ethernet, wireless)
Application Layer
▪ Promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by
Transport Layer
92
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Bad Guys: Fake Identity
• What is protocol?
• Network Edge
• Network Core
IP spoofing:
• Performance
• Protocol Layers
• Security
• History
▪ Injection of packet with false source address
Application Layer
Transport Layer
93
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Bad Guys: Denial of Service
• What is protocol?
• Network Edge
• Network Core
Denial of Service (DoS):
• Performance
• Protocol Layers
• Security
• History
▪ Attackers make resources (server,
Application Layer bandwidth) unavailable to
Transport Layer
legitimate traffic by overwhelming
resource with bogus traffic
Data Plane &
Control Plane: The
Network Layer
94
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Lines of Defense
• What is protocol?
• Network Edge
• Network Core
▪ Authentication: Proving you are who you say you are
• Performance
• Protocol Layers
▪ Cellular networks provides hardware identity via SIM card; no such hardware assist
• Security
• History
in traditional Internet
Application Layer
▪ Confidentiality: Via encryption
Transport Layer
Wireless and Mobile ▪ Firewalls: Specialized “middleboxes” in access and core networks:
Networks
▪ Off-by-default: filter incoming packets to restrict senders, receivers, applications
▪ Detecting/reacting to DOS attacks
96
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Internet History
• What is protocol?
• Network Edge
• Network Core
1972-1980: Internetworking, new and
• Performance
• Protocol Layers
proprietary networks Cerf and Kahn’s
• Security
• History
▪ 1970: ALOHAnet satellite network in Hawaii internetworking
Application Layer principles:
Transport Layer ▪ 1974: Cerf and Kahn - architecture for ▪ Minimalism, autonomy
Data Plane & interconnecting networks - no internal changes
Control Plane: The
Network Layer
required to
The Link Layer and ▪ 1976: Ethernet at Xerox PARC interconnect networks
LANs
▪ Best-effort service
Wireless and Mobile
Networks
▪ Late 70’s: proprietary architectures: DECnet, model
SNA, XNA ▪ Stateless routing
▪ Decentralized control
▪ 1979: ARPAnet has 200 nodes
Define today’s Internet
architecture
97
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Internet History
• What is protocol?
• Network Edge
• Network Core
1980-1990: new protocols, a proliferation of networks
▪ 1983: Deployment of TCP/IP
• Performance
• Protocol Layers
• Security
• History
98
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Internet History
• What is protocol?
• Network Edge
• Network Core
1990, 2000s: commercialization, the Web, new applications
• Performance
• Protocol Layers ▪ Early 1990s: ARPAnet decommissioned
• Security
• History
▪ 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)
Application Layer
100
Chapter 1
Computer Networks and the Internet
Computer Networks
and the Internet
• What is Internet?
Additional Chapter 1 slides
• What is protocol?
• Network Edge
• Network Core
ISO/OSI reference model
• Performance
• Protocol Layers
• Security
Two layers not found in Internet protocol
• History
stack!
Application Layer
102
103