CS 4390 Computer Networks

Similar documents
end systems, access networks, links circuit switching, packet switching, network structure

Computer Networking Introduction

Computer Networks & Security 2016/2017

Chapter 1 Introduction

Chapter 1: roadmap parte B

CSC 401 Data and Computer Communications Networks

CSCE 463/612 Networks and Distributed Processing Spring 2018

Chapter I: Introduction

CSEE 4119 Computer Networks. Chapter 1 Introduction (2/2) Introduction 1-1

Fundamentals of Information Systems

CC451 Computer Networks

Chapter 1. Computer Networks and the Internet

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3

Four sources of packet delay

Network core and metrics

Packet-switching: store-and-forward

Course on Computer Communication and Networks. Lecture 2 Chapter 1: Introduction: Part B: Network structure, performance, security prelude

ELE 543 Computer Network

Chapter 1 Computer Networks and the Internet

CMSC 332: Computer Networks Intro (cont.)

Internetworking Technology -

Chapter 1 Introduction

Communication In Smart Grid Part1 (Basics of Networking)

CSE 434 Spring 2013 Computer Networks

Chapter 1 Introduction

Course on Computer Communication and Networks. Lecture 2 Chapter 1: Introduction: Part B: Network structure, performance, security prelude

Lecture 12. Application Layer. Application Layer 1

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks

Chapter 1 Introduction

Chapter 1 Introduction. Introduction 1-1

Chapter 1 Introduction

Internet: A Brief Overview. Introduction 2-1

COMP 562: Advanced Topics in Networking

Introduction. overview: our goal: get feel and terminology more depth, detail later in course approach: use Internet as example

Chapter 1: introduction

LECTURE 1 - INTRODUCTION. Jacob Aae Mikkelsen

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Chapter 1 Introduction

Chapter 1 Introduction

CS4491/02 Fog Computing. Network Basics

EC441 Fall 2018 Introduction to Computer Networking Chapter 1: Introduction

Chapter 1 Introduction

Chapter 1 Introduction

Chapter 1 Introduction

Chapter 1 Introduction. Introduction 1-1

Chapter 1 Introduction

Chapter 1 Introduction

TCN-5030 Computer Communications and Networking Technologies

Δίκτυα Μετάδοσης Δεδομένων Data Networks. Introduction 1-1

Chapter 1 Introduction

Chapter 1 Introduction

Chapter 1 Introduction

EECS 3214: Computer Network Protocols and Applications

Chapter 1: Introduction Chapter 1 Introduction

Data Communications & Computer Networks

Chapter 1 Introduction

Chapter 1 Introduction

CSE 3214 Course Overview. CSE 3214: Computer Network Protocols and Applications. Chapter 1: roadmap. Chapter 1: Introduction. 1-5 Introduction 1-6

Chapter 1: Introduction. Chapter 1 Introduction. Chapter 1: roadmap. Fun internet appliances. What s the Internet: nuts and bolts view

Chapter 1: Introduction. Chapter 1 Introduction. Chapter 1: roadmap. What s the Internet: nuts and bolts view

Chapter 1 Introduction

Chapter 1: Introduction. Chapter 1 Introduction. Chapter 1: roadmap. Cool internet appliances. What s the Internet: nuts and bolts view

Introduction to Computer Networks. Chapter 1: introduction

Computer Networks Chapter 1: Introduction. Introduction

Chapter 1 Introduction

Internetworking With TCP/IP

Introduction to Computer Networks. Roadmap

Chapter 1 Introduction

Chapter 1 Introduction

Chapter 1 Introduction

CS 3516: Advanced Computer Networks

Chapter 1. Introduction

Introduction to Security. Computer Networks Term A15

Chapter 1 Introduction

Last Lecture. Nuts-and-bolts description of the Internet. ! The topology. ! The communication links. ! The core. ! The edge

Chapter 1: Introduction. Chapter 1 Introduction. Chapter 1: roadmap. What s the Internet: nuts and bolts view

Outline. TCP/IP Internet

Chapter 1. Our goal: Overview: terminology what s a protocol? more depth, detail. net, physical media use Internet as. approach:

Chapter 1. Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

CMPT-371: Data Communication and Networking. Bob Gill, P.Eng., FEC, smieee Introduction 2-1

CMPT-371: Data Communication and Networking. Bob Gill, P.Eng., FEC, smieee Introduction 0-1

Chapter 1. Introduction

CMP-330 Computer Networks

Chapter 1 Introduction

Chapter 1 Introduction

Computer Networking Introduction

Chapter 1 Introduction

Chapter 1. Introduction

Chapter 1: Introduction. Chapter 1 Introduction. Cool internet appliances. What s the Internet: nuts and bolts view

Chapter 1 Introduction

ECS 451 Data Communications and Networks. Introduction 1-1

Course on Computer Communication and Networks, CTH/GU

Computer Networks. Reference. Introduction. Chapter 1: roadmap. Chapter 1: Introduction. Bu-Ali Sina University, Hamedan. Overview: Our goal:

CSCD 330 Network Programming Spring 2018 Lecture 3 Introduction to Networks. Reading: Chapter 1 - Continued

Informática y Comunicaciones. Chapter 1 Introduction to Communications

Chapter 1 Introduction

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

CSCD 330 Network Programming Winter 2016

Network layer Network Layer 4-1

CSC/CPE 520 The Internet of Things. Simon Koo, Ph.D. Ananse.IO and Santa Clara University

Transcription:

CS 4390 Computer Networks UT D application transport network data link physical Session 04 Packet Switching dapted from Computer Networking a Top-Down pproach 1996-2012 by J.F Kurose and K.W. Ross, ll Rights Reserved Host: Sends Packets of Data host sending function: takes application message breaks into smaller chunks, known as packets, of length L bits transmits packet into access network at transmission rate R link transmission rate, aka link capacity, aka link bandwidth 2 host 1 two packets, L bits each R: link transmission rate packet transmission delay time needed to transmit L-bit packet into link = = L (bits) R (bits/sec) 2 1

The Network Core mesh of interconnected routers packet-switching: hosts break application-layer messages into packets forward packets from one router to the next, across links on path from source to destination each packet transmitted at full link capacity hop-by-hop 3 Packet-switching: Store-and-Forward L bits per packet source 3 2 1 R bps R bps destination takes L/R seconds to transmit (push out) L-bit packet into link at R bps store and forward: entire packet must arrive at router before it can be transmitted on next link end-end delay = 2L/R (assuming zero propagation delay) one-hop numerical example: L = 7.5 Mbits R = 1.5 Mbps one-hop transmission delay = 5 sec more on delay shortly 4 2

Packet Switching: Queueing Delay, Loss R = 100 Mb/s C queue of packets waiting for output link R = 1.5 Mb/s D E queuing and loss: If arrival rate (in bits) to link exceeds transmission rate of link for a period of time: packets will queue, wait to be transmitted on link packets can be dropped (lost) if memory (buffer) fills up 5 How do Loss and Delay Occur? packets queue in router buffers packet arrival rate to link (temporarily) exceeds output link capacity packets queue, wait for turn packet being transmitted (delay) packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers 6 3

Four Sources of Packet Delay transmission propagation nodal processing queueing d nodal = d proc + d queue + d trans + d prop d proc : nodal processing check bit errors determine output link typically < msec d queue : queueing delay time waiting at output link for transmission depends on congestion level of router 7 Four Sources of Packet Delay cont d transmission propagation nodal processing queueing d nodal = d proc + d queue + d trans + d prop d trans : transmission delay: L: packet length (bits) R: link bandwidth (bps) d trans = L/R d trans and d prop very different d prop : propagation delay: d: length of physical link s: propagation speed in medium (~2x10 8 m/sec) d prop = d/s 8 4

Caravan nalogy ten-car caravan toll booth 100 km 100 km toll booth cars propagate at 100 km/hr toll booth takes 12 sec to service car (bit transmission time) car~bit; caravan ~ packet Q: How long until caravan is lined up before 2nd toll booth? time to push entire caravan through toll booth onto highway = 12*10 = 120 sec time for last car to propagate from 1st to 2nd toll both: 100km/(100km/hr)= 1 hr : 62 minutes 9 Caravan nalogy cont d ten-car caravan toll booth 100 km 100 km toll booth suppose cars now propagate at 1000 km/hr and suppose toll booth now takes one min to service a car Q: Will cars arrive to 2nd booth before all cars serviced at first booth? : Yes! after 7 min, 1st car arrives at second booth; three cars still at 1st booth. 10 5

Queueing Delay Revisited R: link bandwidth (bps) L: packet length (bits) a: average packet arrival rate average queueing delay traffic intensity = La/R La/R ~ 0: avg. queueing delay small La/R -> 1: avg. queueing delay large La/R > 1: more work arriving than can be serviced, average delay infinite! La/R ~ 0 La/R -> 1 11 Real Internet Delays and Routes what do real Internet delay & loss look like? traceroute program: provides delay measurement from source to router along end-end Internet path towards destination. For all i: sends three packets that will reach router i on path towards destination router i will return packets to sender sender times interval between transmission and reply. 3 probes 3 probes 3 probes 12 6

Real Internet Delays and Routes traceroute: gaia.cs.umass.edu to www.eurecom.fr 3 delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms trans-oceanic link * means no response (probe lost, router not replying) * Do some traceroutes from exotic countries at www.traceroute.org 13 Packet Loss queue (aka buffer) preceding link in buffer has finite capacity packet arriving to full queue dropped (aka lost) lost packet may be retransmitted by previous node, by source end system, or not at all buffer (waiting area) packet being transmitted packet arriving to full buffer is lost 14 7

Throughput throughput: rate (bits/time unit) at which bits transferred between sender/receiver instantaneous: rate at given point in time average: rate over longer period of time server, sends with bits file (fluid) of F into bits pipe to send to client link capacity pipe that can carry R s bits/sec fluid at rate R s bits/sec) link capacity pipe that can carry R c bits/sec fluid at rate R c bits/sec) 15 Throughput cont d R s < R c What is average end-end throughput? R s bits/sec R c bits/sec R s > R c What is average end-end throughput? R s bits/sec R c bits/sec bottleneck link link on end-end path that constrains end-end throughput (assume sender sends traffic at a high enough rate) 16 8

Throughput: Internet Scenario per-connection endend throughput: min(r c,r s,r/10) in practice: R c or R s is often bottleneck assume sender sends traffic at a high enough rate R s R s R s R R c R c R c 10 connections (fairly) share backbone bottleneck link R bits/sec 17 Checkpoint 4-2 Consider the network below, where the only traffic is sending packets to C. If buffers at R1 and R2 are never empty, what can we say about the throughput? (a) Throughput will be as high as can be achieved (b) Throughput will not be as high as can be achieved (c) Cannot conclude (d) It depends on the circumstances R1 R2 C queue of packets waiting for output link D E 18 9

Network Security Overview field of network security: how bad guys can attack computer networks how we can defend networks against attacks how to design architectures that are immune to attacks Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Internet protocol designers playing catch-up security considerations in all layers! 19 ad guys: put Malware into Hosts via Internet Malware can get in host from: virus: self-replicating infection by receiving/executing object (e.g., e-mail attachment) worm: self-replicating infection by passively receiving object that gets itself executed Malware can record keystrokes, web sites visited, upload info to collection site access user s sensitive info encrypt user files and ask for ransom etc. Infected host can be enrolled in botnet, used for DDoS attacks 20 10

ad guys: attack Server, Network Infrastructure Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets to target from compromised hosts target 21 ad Guys Can Sniff Packets packet sniffing : broadcast media (shared ethernet, wireless) promiscuous network interface reads/records all packets (e.g., including passwords!) passing by C src: dest: payload wireshark is a (free) packet-sniffer 22 11

ad Guys Can Use Fake ddresses IP spoofing: send packet with false source address C src: dest: payload 23 12