0% found this document useful (0 votes)
299 views36 pages

Chapter#1 Update

The document provides an introduction to computer networking, focusing on the Internet's structure, protocols, and performance. It outlines key concepts such as network edge, core, and the importance of protocols in communication. Additionally, it discusses the types of access networks, physical media, and the implications of security threats like malware and denial of service attacks.

Uploaded by

hayamegren
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
299 views36 pages

Chapter#1 Update

The document provides an introduction to computer networking, focusing on the Internet's structure, protocols, and performance. It outlines key concepts such as network edge, core, and the importance of protocols in communication. Additionally, it discusses the types of access networks, physical media, and the implications of security threats like malware and denial of service attacks.

Uploaded by

hayamegren
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Chapter 1

Introductio
n
A note on the use of these PowerPoint slides:
We’re making these slides freely available to all (faculty, students,
readers). They’re in PowerPoint form so you see the animations; and
can add, modify, and delete slides (including this one) and slide content
to suit your needs. They obviously represent a lot of work on our part.
In return for use, we only ask the following:
 If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
 If you post any slides on a www site, that you note that they are
adapted from (or perhaps identical to) our slides, and note our
copyright of this material.
Computer Networking: A
For a revision history, see the slide note for this page.
Top-Down Approach
Thanks and enjoy! JFK/KWR 8th edition
Jim Kurose, Keith Ross
All material copyright 1996-2020
J.F Kurose and K.W. Ross, All Rights Reserved Pearson, 2020
Introduction: 1-1
Chapter 1: introduction
Chapter goal: Overview/roadmap:
 Get “feel,” “big picture,”  What is the Internet?
introduction to terminology  What is a protocol?
• more depth, detail later in  Network edge: hosts, access network,
course
physical media
 Approach:
 Network core: packet/circuit switching,
• use Internet as example internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-2
The Internet: a “nuts and bolts”
view
Billions of connected mobile network
computing devices: national or global ISP
 hosts = end systems
 running network apps at
Internet’s “edge”

Packet switches: forward


local or
packets (chunks of data) Internet
regional ISP
 routers, switches
home network content
Communication links provider
network datacenter
 fiber, copper, radio, satellite network

 transmission rate: bandwidth


Networks enterprise
 collection of devices, routers, network
links: managed by an organization
Introduction: 1-3
The Internet: a “nuts and bolts”
view
mobile network
4G
 Internet: “network of networks” national or global ISP

• Interconnected ISPs
Streaming
 protocols are everywhere Skype
IP
video
• control sending, receiving of
local or
messages regional ISP
• e.g., HTTP (Web), streaming video,
home network
Skype, TCP, IP, WiFi, 4G, Ethernet content
provider
 Internet standards HTTP network datacenter
network
Ethernet
• RFC: Request for Comments
• IETF: Internet Engineering Task TCP
Force enterprise
network

WiFi
Introduction: 1-4
The Internet: a “service” view
 Infrastructure that provides mobile network

services to applications: national or global ISP

• Web, streaming video, multimedia


teleconferencing, email, games, e- Streaming
commerce, social media, inter- Skype video
connected appliances, … local or
regional ISP

home network content


provider
HTTP network datacenter
network

enterprise
network

Introduction: 1-5
What’s a protocol?
Human protocols: Network protocols:
 “what’s the time?”  computers (devices) rather than humans
 “I have a question”  all communication activity in Internet
 introductions governed by protocols

… specific messages sent


Protocols define the format, order of
… specific actions taken
when message received, messages sent and received among
or other events network entities, and actions taken
on msg transmission, receipt

Introduction: 1-6
What’s a protocol?
A human protocol and a computer network protocol:

Hi TCP connection
request
Hi TCP connection
response
Got the
time? GET [Link]
2:00
<file>
time

Q: other human protocols?


Introduction: 1-7
A closer look at Internet
structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers
local or
regional ISP

home network content


provider
network datacenter
network

enterprise
network

Introduction: 1-8
A closer look at Internet
structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers
local or
Access networks, physical media: regional ISP

 wired, wireless communication links home network content


provider
network datacenter
network

enterprise
network

Introduction: 1-9
A closer look at Internet
structure
mobile network

Network edge: national or global ISP

 hosts: clients and servers


 servers often in data centers
local or
Access networks, physical media: regional ISP

 wired, wireless communication links home network content


provider
network datacenter

Network core:
network

 interconnected routers
 network of networks enterprise
network

Introduction: 1-10
Access networks and physical
media
Q: How to connect end systems mobile network

to edge router?
national or global ISP

 residential access nets


 institutional access networks (school,
company)
local or
 mobile access networks (WiFi, 4G/5G) regional ISP

What to look for: home network content


provider
network
 transmission rate (bits per second) of access datacenter
network
network?
 shared or dedicated access among users?
enterprise
network

Introduction: 1-11
Access networks: cable-based access
cable headend

cable splitter
modem

C
O
V V V V V V N
I I I I I I D D T
D D D D D D A A R
E E E E E E T T O
O O O O O O A A L

1 2 3 4 5 6 7 8 9

Channels

frequency division multiplexing (FDM): different channels transmitted in


different frequency bands
Introduction: 1-12
Wireless access networks
Shared wireless access network connects end system to router
 via base station aka “access point”

Wireless local area networks Wide-area cellular access networks


(WLANs)  provided by mobile, cellular network
 typically within or around operator (10’s km)
building (~100 ft)  10’s Mbps
 802.11b/g/n (WiFi): 11, 54, 450  4G cellular networks (5G available
Mbps transmission rate now)

to Internet
to Internet
Introduction: 1-13
Host: sends packets of data
host sending function:
 takes application message
 breaks into smaller chunks, known two packets,
as packets, of length L bits L bits each
 transmits packet into access
network at transmission rate R 2 1

• link transmission rate, aka link host


capacity, aka link bandwidth R: link transmission rate

packet time needed to L (bits)


transmission = transmit L-bit =
delay packet into link R (bits/sec)
Introduction: 1-14
Links: physical media
 bit: propagates between Twisted pair (TP)
transmitter/receiver pairs  two insulated copper wires
 physical link: what lies • Category 5: 100 Mbps, 1 Gbps Ethernet
between transmitter & • Category 6: 10Gbps Ethernet
receiver
 guided media:
• signals propagate in solid
media: copper, fiber, coax
 unguided media:
• signals propagate freely,
e.g., radio
Introduction: 1-15
Links: physical media
Coaxial cable: Fiber optic cable:
 two concentric copper conductors  glass fiber carrying light pulses, each
pulse a bit
 Bidirectional- operates or moves in  high-speed operation:
two opposite directions.
• high-speed point-to-point
 broadband: transmission (10’s-100’s Gbps)
• multiple frequency channels on cable  low error rate:
• 100’s Mbps per channel • repeaters spaced far apart
• immune to electromagnetic noise

Introduction: 1-16
Links: physical media
Wireless radio Radio link types:
 signal carried in  terrestrial microwave
electromagnetic spectrum • up to 45 Mbps channels

 no physical “wire”  Wireless LAN (WiFi)


• Up to 100’s Mbps
 broadcast and “half-duplex”  wide-area (e.g., cellular)
(sender to receiver)
• 4G cellular: ~ 10’s Mbps
 propagation environment  satellite
effects: • up to 45 Mbps per channel
• reflection • 270 msec end-end delay
• obstruction by objects
• interference
Introduction: 1-17
Chapter 1: roadmap
 What is the Internet?
 What is a protocol?
 Network edge: hosts, access
network, physical media
 Network core: packet/circuit
switching, internet structure
 Performance: loss, delay, throughput
 Security
 Protocol layers, service models
 History
Introduction: 1-18
The network core
 mesh of interconnected mobile network
national or global ISP
routers
 packet-switching: hosts break
application-layer messages
into packets local or
regional ISP

• forward packets from one router home network content


to the next, across links on path provider
network datacenter
from source to destination network

• each packet transmitted at full


link capacity enterprise
network

Introduction: 1-19
Packet-switching: store-and-
forward
L bits
per packet
3 2 1
source destination
R bps R bps

 Transmission delay: takes L/R seconds to


transmit (push out) L-bit packet into link at R One-hop numerical example:
bps  L = 10 Kbits
 Store and forward: entire packet must arrive at  R = 100 Mbps
router before it can be transmitted on next link  one-hop transmission delay
 End-end delay: 2L/R (above), assuming zero = 0.1 msec
propagation delay (more on delay shortly)
Introduction: 1-20
Circuit switching: FDM and TDM
Frequency Division Multiplexing
(FDM) 4 users

frequency
 optical, electromagnetic frequencies
divided into (narrow) frequency
bands
 each call allocated its own band, can
transmit at max rate of that narrow time
band
Time Division Multiplexing (TDM)

frequency
 time divided into slots
 each call allocated periodic slot(s),
can transmit at maximum rate of
(wider) frequency band, but only time
during its time slot(s)
Introduction: 1-21
How do packet loss and delay occur?
packets queue in router buffers
 packets queue, wait for turn
 arrival rate to link (temporarily) exceeds output link capacity: packet loss

packet being transmitted (transmission delay)

B
packets in buffers (queueing delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction: 1-22
Packet delay: four sources
transmission
A propagation

B
nodal
processing queueing

dnodal = dproc + dqueue + dtrans + dprop

dproc: nodal processing dqueue: queueing delay


 check bit errors  time waiting at output link for transmission
 determine output link  depends on congestion level of router
 typically < msec
Introduction: 1-23
Packet delay: four sources
transmission
A propagation

B
nodal
processing queueing

dnodal = dproc + dqueue + dtrans + dprop


dtrans: transmission delay: dprop: propagation delay:
 L: packet length (bits)  d: length of physical link
 R: link transmission rate (bps)  s: propagation speed
 dtrans = L/R  dprop = d/s
dtrans and dprop * Check out the online interactive exercises:
[Link]
very different Introduction: 1-24
Packet loss
 queue (aka buffer) preceding link in buffer has finite capacity
 packet arriving to full queue dropped (aka lost)
 lost packet may be retransmitted by previous node, by source end
system, or not at all
buffer
(waiting area) packet being transmitted
A

B
packet arriving to
full buffer is lost

* Check out the Java applet for an interactive animation on queuing and loss
Introduction: 1-25
Introduction: 1-26
Bad guys: malware
 malware can get in host from:
• virus: self-replicating infection by receiving/executing object
(e.g., e-mail attachment)
• worm: self-replicating infection by passively receiving object that
gets itself executed
 spyware malware can record keystrokes, web sites visited, upload
info to collection site
 infected host can be enrolled in botnet, used for spam or
distributed denial of service (DDoS) attacks

Introduction: 1-27
Bad guys: denial of service
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic

1. select target
2. break into hosts
around the network
(see botnet)
target
3. send packets to target
from compromised
hosts
Introduction: 1-28
Bad guys: packet interception
packet “sniffing”:
 broadcast media (shared Ethernet, wireless)
 promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by

A C

src:B dest:A payload


B

Wireshark software used for our end-of-chapter labs is a (free) packet-sniffer


Introduction: 1-29
Bad guys: fake identity

IP spoofing: send packet with false source address

A C

src:B dest:A payload

… lots more on security (throughout, Chapter 8)


Introduction: 1-30
Why layering?
 Network Models divide communication functions into layers
• Open Systems Interconnection Reference Model (OSI model)
7 layers
• Internet Model (or TCP/IP model)
• 5 layers

 Advantages of Layers
• Networking functionality is modular and the software/hardware at any layer
can be more easily substituted
• E.g., substitute wired for wireless at the physical layer
• Easier to troubleshoot or make changes to one layer at a time

Introduction: 1-31
Network Models
OSI Internet
Model
Application Model

Presentation Application

Session

Transport Transport
Network Network
Data Link Data Link
Physical Physical
Network Models
Layer Purpose Example Protocols / PDU
Standards
5. Application User’s access to network, software to HTTP, SMTP, DNS, FTP, Packet (or Data)
perform work DHCP, IMAP, POP, SSL
4. Transport End-to-End Management TCP, UDP Segment
1. Link application layer to network
2. Segmenting and tracking
3. Flow control

3. Network Deciding where the message goes IP, ICMP Packet


1. Addressing
2. Routing
2. Data Link Move a message from one device to the next Ethernet Frame
1. Controls hardware
2. Formats the message
3. Error checking

1. Physical Transmits the message 100BASE-T, 802.11n


Sender PDU Receiver

Application HTTP Request Packet HTTP Request

Transport TCP HTTP Request Segment TCP HTTP Request

Network IP TCP HTTP Request Packet IP TCP HTTP Request

Data
Link Ethernet
Ethernet IP TCP HTTP Request Frame Ethernet IP TCP HTTP Request

Physical
Sender PDU Receiver

Application HTTP Request Packet HTTP Request

Transport TCP HTTP Request Segment TCP HTTP Request

Network IP TCP HTTP Request Packet IP TCP HTTP Request

Data
Link Ethernet
Ethernet IP TCP HTTP Request Frame Ethernet IP TCP HTTP Request

Physical
Internet protocol stack
 application: supporting network applications
• IMAP, SMTP, HTTP
application
 transport: process-process data transfer
• TCP, UDP transport
 network: routing of datagrams from source to
destination network
• IP, routing protocols
link
 Data link: data transfer between neighboring
network elements physical
• Ethernet, 802.11 (WiFi), PPP
 physical: bits “on the wire”
Introduction: 1-36

You might also like