Professional Documents
Culture Documents
04 - PS & NetSec
04 - PS & NetSec
application
transport
network
data link
physical
Questions
• How does PS work? What is store-and-
forward?
• What is hop-by-hop routing?
• Why does losses and delays occur? What
are the 4 sources of packet delays?
• What is throughput?
• What/why of network security?
1
The Internet – Recap
PC mobile network
• millions of connected
server computing devices:
wireless – hosts = end systems global ISP
laptop
smartphone – running network apps
home
❖ communication links network
regional ISP
wireless ▪ fiber, copper, radio,
links satellite
wired
links ▪ transmission rate:
bandwidth
❖ Packetswitches: forward
router packets (chunks of data) institutional
network
▪ routers and switches
3
2
The Network Core
• mesh of interconnected
routers
• packet-switching: hosts
break application-layer
messages into packets
– forward packets from one
router to the next, across
links on path from source
to destination
– each packet transmitted at
full link capacity
– hop-by-hop
Packet-switching: Store-and-Forward
L bits
per packet
3 2 1
source destination
R bps R bps
3
Packet Switching: Queuing Delay, Loss
R = 100 Mb/s C
A
D
R = 1.5 Mb/s
B
queue of packets E
waiting for output link
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
8
4
Four Sources of Packet Delay
transmission
A propagation
B
nodal
processing queueing
B
nodal
processing queueing
10
5
Caravan Analogy
100 km 100 km
ten-car toll toll
caravan booth booth
11
12
12
6
Queuing Delay Revisited
average queueing
• R: link bandwidth (bps)
delay
• L: packet length (bits)
• a: average packet arrival
rate
traffic intensity
= La/R
❖ La/R ~ 0: avg. queueing delay small La/R ~ 0
La/R -> 1
13
13
3 probes 3 probes
3 probes
14
14
7
“Real” Internet Delays and Routes
traceroute: gaia.cs.umass.edu to www.eurecom.fr
3 delay measurements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms link
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
18 * * * * means no response (probe lost, router not replying)
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms
15
Packet Loss
• queue (aka buffer) preceding link in buffer has finite
capacity
• packet arriving to full queue dropped (aka lost)
• lost packet may be retransmitted by previous node, by
source end system, or not at all
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
full buffer is lost
16
16
8
Throughput
• throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
– instantaneous: rate at given point in time
– average: rate over longer period of time
server
server,sends
with bits pipe that can carry
link capacity pipe that can carry
link capacity
(fluid)
file of Finto
bitspipe fluid at rate
Rs bits/sec fluid at rate
Rc bits/sec
to send to client Rs bits/sec) Rc bits/sec)
17
17
Throughput – cont’d
• Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
18
18
9
Throughput: Internet Scenario
• per-connection end-
end throughput: Rs
min(Rc,Rs,R/10) Rs Rs
• in practice: Rc or Rs is
often bottleneck R
Rc Rc
Rc
19
20
20
10
Bad guys: put Malware into Hosts via Internet
• malware can get in host from:
– virus: self-replicating infection by receiving/executing
object (e.g., e-mail attachment)
– worm: self-replicating infection by passively receiving
object that gets itself executed
• spyware malware can record keystrokes, web
sites visited, upload info to collection site
• infected host can be enrolled in botnet, used for
DDoS attacks
21
21
22
22
11
Bad Guys Can Sniff Packets
packet “sniffing”:
– broadcast media (shared ethernet, wireless)
– promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by
A C
23
23
24
12
CIA
• Confidentiality
– Information must not be disclosed to unauthorized
entities
• Integrity
– Information must not be altered or injected
• Authenticity or Availability
– The source of information must be authentic
– Network services must be available all the time
25
25
26
26
13