Documente Academic
Documente Profesional
Documente Cultură
1-1
Overview:
Network Core:
Packet Switching Circuit Switching Internet structure Performance: Loss Delay Throughput Protocol layers, service models Security
1-2
routers the fundamental question: how is data transferred through net? circuit switching: dedicated circuit per call: Ex: Telephone Net packet-switching: data sent thru net in discrete chunks
1-3
capacity dedicated resources: no sharing circuit-like (guaranteed) performance call setup required
1-4
idle if
(no sharing)
1-5
frequency time
1-6
Tier 1 ISP
1-7
to/from backbone
peering
to/from customers
1-8
Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet tier-2 ISP is customer of tier-1 provider
Tier-2 ISP
Tier-2 ISP
Tier 1 ISP
Tier-2 ISP
Tier-2 ISP
1-9
local ISP
Tier 1 ISP
local ISP
local ISP
local ISP
Tier 1 ISP
Tier-2 ISP local local ISP ISP
A B
packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers
1-12
A B
transmission
propagation
nodal processing
queueing
1-13
A B
transmission
nodal processing
queueing
1-14
Caravan analogy
100 km ten-car caravan toll booth toll booth 100 km
cars propagate at
100 km/hr toll booth takes 12 sec to service car (transmission time) car~bit; caravan ~ packet Q: How long until caravan is lined up before 2nd toll booth?
caravan through toll booth onto highway = 12*10 = 120 sec Time for last car to propagate from 1st to 2nd toll both: 100km/(100km/hr)= 1 hr A: 62 minutes
1-15
1000 km/hr Toll booth now takes 1 min to service a car Q: Will cars arrive to 2nd booth before all cars serviced at 1st booth?
at 2nd booth and 3 cars still at 1st booth. 1st bit of packet can arrive at 2nd router before packet is fully transmitted at 1st router!
Nodal delay
d nodal d proc d queue d trans d prop
dproc = processing delay typically a few microsecs or less dqueue = queuing delay depends on congestion dtrans = transmission delay = L/R, significant for low-speed links dprop = propagation delay a few microsecs to hundreds of msecs
1-17
arrival rate
1-18
measurement from source to router along end-end Internet path towards destination. For all i:
sends three packets that will reach router i on path towards destination router i will return packets to sender sender times interval between transmission and reply.
3 probes 3 probes
3 probes
1-19
Packet loss
Queue (Buffer) preceding link in buffer has
finite capacity Packet arriving to full queue dropped (Lost) Lost packet may be retransmitted by previous node, by source end system, or not at all
A
B
buffer (waiting area) packet being transmitted
Throughput
throughput: rate (bits/time unit) at which
link capacity server, with server sends bits pipe that can carry Rs bits/sec fluid at rate file into pipe (fluid) of F bits Rs bits/sec) to send to client
link capacity pipe that can carry Rfluid at rate c bits/sec Rc bits/sec)
1-21
Throughput (more)
Rs
Rs
bottleneck link
link on end-end path that constrains end-end throughput
1-22
Rs
R Rc Rc
Rs
Rc
Protocol Layers
Networks are complex! Question: many pieces: Is there any hope of hosts organizing structure of routers network? links of various media Or at least our discussion of networks? applications protocols hardware, software
1-24
baggage (check)
gates (load) runway takeoff airplane routing
airplane routing
airplane routing
a series of steps
1-25
ticket (complain) baggage (claim gates (unload) runway (land) airplane routing airplane routing airplane routing
arrival airport
Layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below
1-26
Why layering?
Dealing with complex systems:
explicit structure allows identification,
relationship of complex systems pieces layered reference model for discussion modularization eases maintenance, updating of system change of implementation of layers service transparent to rest of system e.g., change in gate procedure doesnt affect rest of system layering considered harmful?
1-27
applications
transfer
TCP, UDP
source to destination
interpret meaning of data, e.g., encryption, compression, machinespecific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack missing these layers! these services, if needed, must be implemented in application
application
presentation session
transport
network link
physical
1-29
source
message segment
Ht M M M M
frame Hl Hn Ht
datagram Hn Ht
Encapsulation
destination
M
Ht
Hn Ht Hl Hn Ht
M M M
Hn Ht Hl Hn Ht
M
M
Hn Ht
router
1-30
Network Security
The field of network security is about:
how bad guys can attack computer networks how we can defend networks against attacks how to design architectures that are immune to attacks
users attached to a transparent network Internet protocol designers playing catch-up Security considerations in all layers!
1-31
trojan horse.
1-33
(server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic
1.
select target
around the network (see botnet) 3. send packets toward target from compromised hosts
target
1-34
src:B dest:A
payload
1-36
src:B dest:A
B
1-37
Network Security
more throughout this part
obvious uses
1-38