49
Introduction 1-1 Data Communication and Networking A Top Down Approach Ghana Telecom University College Credit: Jim Kurose, Keith R oss & Addison-Wesley

DataCom Introduction

Embed Size (px)

Citation preview

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 1/49

Introduction 1-1

Data Communicationand Networking

A Top Down ApproachGhana Telecom University College

Credit : Jim Kurose, Keith Ross & Addison-Wesley

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 2/49

Introduction 1-2

GOAL:The main goal of the course is to study data

communication and network characteristics that

affects transmission. The INTERNET will be in focus,

considering the top ² down approach.

It therefore implies that focus will also be given to thefive-layer Internet architecture rather than the

seven-layer OSI architecture

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 3/49

Introduction 1-3

Chapter 1: IntroductionOverview:

Recap of Data Communication and the Internetwhat·s a protocol?

network edge; hosts, access net, physical medianetwork core: packet/circuit switching, Internetstructureperformance: loss, delay, throughput

securityprotocol layers, service modelshistory

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 4/49

Introduction 1-4

Data Networks: recapDescription

Formulate

Components:Info/Message, transmitter, receiver, protocol & channel

Discuss types and topologies

routerserverwired

links

accesspoints PC

wirelesslaptop

cellularhandheld

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 5/49

Introduction 1-5

Internet: Terminologies

World wide computer network made up ofmillions of connected computing devices.

End devices on the internet are termed as nodeor hosts or end systems which run networkapplications.Protocols - End systems run protocols that

control the sending and receiving of informationwithin the Internet.E.g. TCP/IP- main protocol of the Internet.HTTP, FTP, SMTP, Ethernet, etc

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 6/49

Introduction 1-6

Internet: Terminologies

Protocols govern all communication activities inInternet. Protocols define format, order ofmessages sent and received among network

entities, and actions taken on the transmissionand/or receipt of a message

Communication links- End systems are connectedtogether by fiber, copper, radio, satellite, etc

transmission rate = bandwidthRouters - Switching devices through which endsystems are indirectly connected to each other.

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 7/49

Introduction 1-7

Interconnection & Routes visualizationViews of the Internet

Home network

Institutional network

Mobile network

Global ISP

Regional ISP

Visualization from the Opte Project of thevarious routes through a portion of theInternet (Source-Wikipedia.org)

Simple interconnection of network devices

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 8/49

Introduction 1-8

Internet

Internet (Structure): ´network of networksµloosely hierarchicalpublic Internet versus private intranet

Internet standardsRFC: Request for comments

IETF: Internet Engineering Task Force

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 9/49

Introduction 1-9

Internet: a service view

Distributed applications - A distributedapplication runs on end systems and exchangesdata via the Data Network. E.g . Web, VoIP,email, games, e-commerce, file sharing.Communication infrastructure of Internetenables distributed applications.Communication services provided to applications:

reliable data delivery from source todestination (Connection ² Oriented) ´best effortµ (unreliable) data delivery(Connectionless)

Timely delivery not guaranteed

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 10/49

Introduction 1-10

A closer look at network structure:network edge:applications andhosts

access networks,physical media:wired, wirelesscommunication links

network core:interconnectedroutersnetwork of

networks

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 11/49

Introduction 1-11

The network edge:end systems (hosts):

run application programse.g. Web, emailat ´edge of networkµ

client/server

peer-peer

client/server modelclient host requests, receivesservice from always-on servere.g. Web browser/server;email client/server

peer-peer model:minimal (or no) use of

dedicated serverse.g. Skype, BitTorrent

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 12/49

Introduction 1-12

Access networks and physical media

Q: How to connect endsystems to edge router?residential access netsinstitutional accessnetworks (school,company) mobile access networks

Keep in mind:bandwidth (bits persecond) of accessnetwork?shared or dedicated?

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 13/49

Introduction 1-13

Residential access: point to point access

Dialup via modemup to 56Kbps direct access torouter (often less)

Can·t surf and phone at sametime: can·t be ´always onµ

DSL: digital subscriber linedeployment: telephone company (typically) up to 1 Mbps upstream (today typically < 256 kbps) up to 8 Mbps downstream (today typically < 1 Mbps) dedicated physical line to telephone central office

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 14/49

Introduction 1-14

Company access: local area networks

company/univ local areanetwork (LAN) connectsend system to edge routerEthernet:

10 Mbs, 100Mbps,1Gbps, 10Gbps Ethernetmodern configuration:end systems connect

into Ethernet switch

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 15/49

Introduction 1-15

Wireless access networks

shared wireless accessnetwork connects end systemto router

via base station aka ´access

pointµwireless LANs:802.11b/g (WiFi): 11 or 54 Mbps

wider-area wireless accessprovided by telco operator

basestation

mobilehosts

router

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 16/49

Introduction 1-16

Home networks

Typical home network components:DSL or cable modemrouter/firewall/NAT Ethernetwireless accesspoint

wirelessaccesspoint

wirelesslaptops

router/firewallcablemodemto/from

cableheadend

Ethernet

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 17/49

Introduction 1-17

Physical Media

Bit: propagates betweentransmitter/rcvr pairsphysical link: what lies

between transmitter &receiverguided media:

signals propagate in solidmedia: copper, fiber, coax

unguided media:signals propagate freely,e.g., radio

Twisted Pair (TP) two insulated copperwires

Category 3: traditional

phone wires, 10 MbpsEthernetCategory 5:100Mbps Ethernet

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 18/49

Introduction 1-18

Physical Media: coax, fiber

Coaxial cable:two concentric copperconductorsbidirectionalbaseband:

single channel on cablelegacy Ethernet

broadband:multiple channels on

cableHFC

Fiber optic cable:glass fiber carrying lightpulses, each pulse a bithigh-speed operation:

high-speed point-to-pointtransmission (e.g., 10·s-100·s Gps)

low error rate: repeatersspaced far apart ; immuneto electromagnetic noise

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 19/49

Introduction 1-19

Physical media: radio

signal carried inelectromagneticspectrumno physical ´wireµbidirectionalpropagationenvironment effects:

reflection

obstruction by objectsinterference

Radio link types:terrestrial microwave

e.g. up to 45 Mbps channelsLAN(e.g., Wifi)

11Mbps, 54 Mbpswide-area (e.g., cellular)

3G cellular: ~ 1 Mbpssatellite

Kbps to 45Mbps channel (ormultiple smaller channels) 270 msec end-end delaygeosynchronous versus lowaltitude

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 20/49

Introduction 1-20

The Network Core

mesh of interconnectedroutersthe fundamental

question: how is datatransferred through net?circuit switching:dedicated circuit percall: telephone netpacket-switching: datasent thru net indiscrete ´chunksµ

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 21/49

Introduction 1-21

Network Core: Circuit Switching

End-end resourcesreserved for ´callµlink bandwidth, switchcapacitydedicated resources:no sharingcircuit-like

(guaranteed) performancecall setup required

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 22/49

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 23/49

Introduction 1-23

Circuit Switching: FDM and TDM

FDM

frequency

time

TDM

frequency

time

4 usersExample:

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 24/49

Introduction 1-24

Network Core: Packet Switchingeach end-end data stream

divided into packetsuser A, B packets sharenetwork resourceseach packet uses full linkbandwidthresources used as needed

resource contention:aggregate resourcedemand can exceedamount availablecongestion: packetsqueue, wait for link usestore and forward:packets move one hop

at a timeNode receives completepacket before forwarding

Bandwidth division into ́ piecesµDedicated allocationResource reservation

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 25/49

Introduction 1-25

Packet Switching: Statistical Multiplexing

Sequence of A & B packets does not have fixed pattern,bandwidth shared on demand s tati s tical multiplexing .

TDM: each host gets same slot in revolving TDM frame.

A

B

C100 Mb/sEthernet

1.5 Mb/s

D E

s tati s tical multiplexing

queue of packetswaiting for output

link

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 26/49

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 27/49

Introduction 1-27

Packet switching versus circuit switching

1 Mb/s linkeach user:

100 kb/s when ´activeµactive 10% of time

circuit-switching:10 users

packet switching:with 35 users,probability > 10 activeat same time is lessthan .0004

Packet switching allows more users to use network!

N users1 Mbps link

Q: how did we get value 0.0004?

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 28/49

Introduction 1-28

Performance

packets queue in router bufferspacket arrival rate to link exceeds output linkcapacitypackets queue, wait for turn

A

B

packet being transmitted (delay)

packets queueing (delay) free (available) buffers: arriving packets

dropped ( loss) if no free buffers

How do loss and delay occur?

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 29/49

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 30/49

Introduction 1-30

Delay in packet-switched networks3. Transmission delay:

R=link bandwidth (bps) L=packet length (bits) time to send bits intolink = L/R

4. Propagation delay:d = length of physical links = propagation speed inmedium (~2x108 m/sec) propagation delay = d/s

A

B

propagation

transmission

nodal

processing queueing

Note: s and R are verydifferent quantities!

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 31/49

Introduction 1-31

Nodal delay

dproc = processing delaytypically a few microsecs or less

dqueue = queuing delaydepends on congestion

dtrans = transmission delay

= L/R, significant for low-speed linksdprop = propagation delay

a few microsecs to hundreds of msecs

proptransqueue procnodald d d d d !

Nodal delay di sc ussed : http://www.d.umn.edu/~gshute/net/delays-losses.html

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 32/49

Introduction 1-32

´Realµ Internet delays and routes

1 cs-gw ( 128.119.2 40 .25 4) 1 ms 1 ms 2 ms2 border 1 -rt-fa 5 -1 -0 .gw .umass .edu ( 128.119.3.1 45 ) 1 ms 1 ms 2 ms3 cht-vbns .gw.umass .edu ( 128.119.3.13 0) 6 ms 5 ms 5 ms

4 jn1

-at1

-0-0-19.

wor .vbns

.net (

204

.147

.132.129)

16 ms

11ms

13ms5 jn1 -so7-0-0-0 .wae .vbns .net ( 2 04 .1 47 .13 6 .13 6) 21 ms 18 ms 18 ms

6 abilene-vbns .abilene .ucaid .edu ( 198.32.11.9 ) 22 ms 18 ms 22 ms7 nycm-wash .abilene .ucaid .edu ( 198.32.8. 46) 22 ms 22 ms 22 ms8 62. 40 .1 03.253 (6 2. 40 .1 03.253 ) 1 04 ms 1 09 ms 1 06 ms9 de 2 -1. de 1. de .geant .net (6 2. 40 .9 6 .129 ) 1 09 ms 1 02 ms 1 04 ms1 0 de .fr 1. fr .geant .net (6 2. 40 .9 6 .5 0) 113 ms 121 ms 11 4 ms11 renater-gw .fr 1. fr .geant .net (6 2. 40 .1 03.5 4) 112 ms 11 4 ms 112 ms12 nio-n 2. cssi .renater .fr (193.51.2 06 .13 ) 111 ms 11 4 ms 11 6 ms13 nice .cssi .renater .fr (195.22 0 .98.1 02 ) 123 ms 125 ms 12 4 ms1 4 r 3 t2 -nice .cssi .renater .fr (195.22 0 .98.11 0) 12 6 ms 12 6 ms 12 4 ms15 eurecom-valbonne .r 3 t2. ft.net ( 193. 48.5 0 .5 4) 135 ms 128 ms 133 ms1 6 19 4 .21 4 .211.25 (19 4 .21 4 .211.25 ) 12 6 ms 128 ms 12 6 ms1 7 * * *18 * * *19 fantasia .eurecom .fr (193.55.113.1 42 ) 132 ms 128 ms 13 6 m s

traceroute: gaia.cs.umass.edu to www.eurecom.frThree delay measurements fromgaia.cs.umass.edu to cs-gw.cs.umass.edu

* means no response (probe lost, router not replying)

trans-oceaniclink

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 33/49

Introduction 1-33

Packet loss

queue (aka buffer) preceding link in buffer hasfinite capacitypacket arriving to full queue dropped (aka lost) lost packet may be retransmitted by previousnode, by source end system, or not at all

A

B

packet being transmitted

packet arriving tofull buffer is lost

buffer(waiting area)

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 34/49

Introduction 1-34

Throughputthroughput: rate (bits/time unit) at whichbits transferred between sender/receiver

instantaneous : rate at given point in time

average: rate over longer period of time

server, withfile of F bits

to send to client

link capacityRs bits/sec

link capacityRc bits/sec

pipe that can carryfluid at rateRs bits/sec)

pipe that can carryfluid at rateRc bits/sec)

server sends bits(fluid) into pipe

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 35/49

Introduction 1-35

Throughput (more) Rs < Rc What is average end-end throughput?

Rs bits/sec Rc bits/sec

Rs > Rc What is average end-end throughput?

Rs

bits/sec Rc

bits/sec

link on end-end path that constrains end-end throughputbottleneck link

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 36/49

Introduction 1-36

Internet protocol stackapplication: supporting networkapplications

FTP, SMTP, HTTPtransport: process-process datatransfer

TCP, UDPnetwork: routing of datagrams fromsource to destination

IP, routing protocolslink: data transfer betweenneighboring network elements

PPP, Ethernetphysical: bits ´on the wireµ

application

transport

network

link

physical

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 37/49

Introduction 1-37

sourceapplicationtransportnetwork

linkphysical

HtHn M

segment Ht

datagram

destination

applicationtransportnetwork

linkphysical

HtHnHl MHtHn M

Ht MM

networklink

physical

linkphysical

Ht

Hn

Hl

MHtHn M

HtHn M

HtHnHl M

router

switch

Encapsulationmessage M

Ht M

Hnframe

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 38/49

Introduction 1-38

Network SecurityThe field of network security is about:

how bad guys can attack computer networkshow we can defend networks against attackshow to design architectures that are immune toattacks

Internet not originally designed with(much) security in mind

original vision: ´a group of mutually trustingusers attached to a transparent networkµInternet protocol designers playing ´catch-upµSecurity considerations in all layers!

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 39/49

Introduction 1-39

Hackers can put malware into hostsvia Internet

Malware can get in host from a virus, worm, ortrojan horse .

Spyware malware can record keystrokes, websites visited, upload info to collection site.

Infected host can be enrolled in a botnet , usedfor spam and DDoS attacks.

Malware is often self-replicating : from aninfected host, seeks entry into other hosts

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 40/49

Introduction 1-40

Hackers can put malware into hostsvia Internet

Trojan horseHidden part of someotherwise usefulsoftware

Today often on a Webpage (Active-X, plugin) Virus

infection by receivingobject (e.g., e-mail

attachment), activelyexecutingself-replicating:propagate itself toother hosts, users

Worm:infection by passivelyreceiving object that getsitself executed

self- replicating: propagatesto other hosts, usersS apphire Worm: aggregate scans/sec

in first 5 minutes of outbreak (CAIDA, UWisc data)

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 41/49

Introduction 1-41

Hackers can attack servers andnetwork infrastructure

Denial of service (DoS): attackers make resources(server, bandwidth) unavailable to legitimate trafficby overwhelming resource with bogus traffic

1. select target2. break into hosts

around the network(see botnet)

3.send packets towardtarget fromcompromised hosts

target

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 42/49

Introduction 1-42

Hackers can sniff packetsPacket sniffing:

broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records allpackets (e.g., including passwords!) passing by

A

B

C

src:B dest:A payload

Wireshark software used for end-of-chapterlabs is a (free) packet-sniffer

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 43/49

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 44/49

Introduction 1-44

The bad guys can record andplayback

record-and-playback : sniff sensitive info (e.g.,password), and use later

password holder is that user from system point ofview

A

B

C

src:B dest:A user: B; password: foo

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 45/49

Introduction 1-45

Internet History

1961: Kleinrock - queueingtheory showseffectiveness of packet-switching1964: Baran - packet-switching in military nets1967: ARPAnet conceivedby Advanced ResearchProjects Agency1969: first ARPAnet nodeoperational

1972:ARPAnet public demonstrationNCP (Network Control Protocol)

first host-host protocolfirst e-mail programARPAnet has 15 nodes

1961-1972: Early packet-switching principles

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 46/49

Introduction 1-46

Internet History

1970: ALOHAnet satellitenetwork in Hawaii1974: Cerf and Kahn -architecture for

interconnecting networks1976: Ethernet at XeroxPARCate70·s: proprietaryarchitectures: DECnet, SNA,XNA

late 70·s: switching fixedlength packets (ATMprecursor) 1979: ARPAnet has 200 nodes

Cerf and Kahn·s internetworkingprinciples:

minimalism, autonomy - nointernal changes requiredto interconnect networksbest effort service modelstateless routersdecentralized control

define today·s Internetarchitecture

1972-1980: Internetworking, new and proprietary nets

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 47/49

Introduction 1-47

Internet History

1983: deployment ofTCP/IP1982: smtp e-mailprotocol defined1983: DNS definedfor name-to-IP-address translation

1985: ftp protocoldefined1988: TCP congestioncontrol

new national networks:Csnet, BITnet,NSFnet, Minitel

100,000 hostsconnected toconfederation ofnetworks

1980-1990: new protocols, a proliferation of networks

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 48/49

Introduction 1-48

Internet History

Early 1990·s: ARPAnetdecommissioned1991: NSF lifts restrictions oncommercial use of NSFnet(decommissioned, 1995) early 1990s: Web

hypertext [Bush 1945, Nelson1960·s]HTML, HTTP: Berners-Lee1994: Mosaic, later Netscapelate 1990·s:commercialization of the Web

Late 1990·s ² 2000·s:more killer apps: instantmessaging, P2P file sharing

network security toforefrontest. 50 million host, 100million+ usersbackbone links running at

Gbps

1990, 2000·s: commercialization, the Web, new apps

8/8/2019 DataCom Introduction

http://slidepdf.com/reader/full/datacom-introduction 49/49