Introduction. General requirements

Similar documents
Introduction to Computer Networking II. Abdusy Syarif Informatics Department Faculty of Computer Science Universitas Mercu Buana

Network and Mobile Compu4ng in the 20 th Century and Beyond. COMP 1400 Memorial University Winter 2015

Slides are an edited mashup of two books

Computer Networks. Lecture 1: Introduction. Computer Networking: A Top Down Approach. Dr. Yaoqing Liu

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

CSEE 4119 Computer Networks. Chapter 1 Introduction (4/4) Introduction 1-1

Module 2 Overview of Computer Networks

Module 2 Overview of. Computer Networks

Computer Networking Introduction

Introduction to Data Communication

L1: Introduction. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Agententechnologien in der Telekommunikation

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Computer Networks. Instructor: Niklas Carlsson Office: B:476 Office Hours: TBA

end systems, access networks, links circuit switching, packet switching, network structure

CS 428/528 Computer Networks Lecture 01. Yan Wang

EEC-484/584 Computer Networks

Goal Give an overview of the topic Approach Descriptive Use Internet as example. Content. What is the Internet?

CSE3213 Computer Network I

Data Networks. Lecture 1: Introduction. September 4, 2008

Introduction to computer networking

CMPE 344 Computer Networks Spring Foundations. Reading: Peterson and Davie,

Announcements. CS 5565 Network Architecture and Protocols. Outline for today. The Internet: nuts and bolts view. The Internet: nuts and bolts view

Chapter 1 Introduction

Computer Communication Networks

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

CSC 4900 Computer Networks: Introduction

2. Modelling of telecommunication systems (part 1)

Outline. TCP/IP Internet

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

Digital Communication Networks

Part 1: Introduction. Goal: Review of how the Internet works Overview

Introduction to Networks

Need For Protocol Architecture

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Need For Protocol Architecture

Lecture 2 Communication services The Trasport Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

A Whirlwind Introduction to the Internet. A Whirlwind Introduction to the Internet Overview

Networks Overview. Dr. Yingwu Zhu

Computer Networking. Introduction. Quintin jean-noël Grenoble university

TDTS06: Computer Networks

ECE 650 Systems Programming & Engineering. Spring 2018

Computer Networks. Text Book By Larry L Peterson & Bruce S. Davie

Introduction and Layered Network Architecture. EEE 538 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Overview of Networks

Networking and Internetworking 1

Internet A Brief Tutorial. Jean Walrand EECS U.C. Berkeley

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Teletraffic theory (for beginners)

Data & Computer Communication

Islamic University of Gaza Faculty of Engineering Department of Computer Engineering ECOM 4021: Networks Discussion. Chapter 1.

Networking and Internetworking 1

Lecture 2: Internet Structure

416 Distributed Systems. Networks review; Day 1 of 2 Jan 5 + 8, 2018

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CSCI Computer Networks

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.

Web Protocols and Practice

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Suprakash Datta. Office: LAS 3043 Phone: ext Course page:

CSCD 433/533 Advanced Networks

Part I: Introduction. 1: Introduction 1

Chapter 1. Computer Networks and the Internet

Welcome to CS 340 Introduction to Computer Networking

Communication Networks

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

Network Protocols and Architectures

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Chapter 1: Introduction

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Lecture 3 Protocol Stacks and Layering

Internet Design Principles and Architecture

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Basics (cont.) Characteristics of data communication technologies OSI-Model

A closer look at network structure:

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

CS3600 SYSTEMS AND NETWORKS

Announcements Computer Networking. What is the Objective of the Internet? Today s Lecture

Introduction to Networking

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Computer Networks

CMSC 611: Advanced. Interconnection Networks

Computer Networks (Introduction to TCP/IP Protocols)

EE228a - Lecture 2 - Spring 2006 Internet

CSEN 503 Introduction to Communication Networks

WAN Technologies CCNA 4

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

Operating Systems CS 571

Chapter 11: Wide-Area Networks and the Internet

Basics of datacommunication

PLEASE READ CAREFULLY BEFORE YOU START

M242 COMPUTER NETWORS AND SECURITY

Week 7: Traffic Models and QoS

TCP/IP THE TCP/IP ARCHITECTURE

Chapter I: Introduction

Computer Networks and the internet. Daniel Graham Ph.D

COMPONENTS OF DATA COMMUNICATION

Transcription:

Introduction 188lecture1.ppt Pasi Lassila 1 General requirements So, you want to build a network... First you need to know the requirements the network must satisfy The requirements vary depending on who you ask (different views) Requirements from different views: Application programmer: service specific needs, e.g., packets sent should not get lost and should arrive in the same order Network designer: cost effective design, efficient and fair usage of network resources Network provider: easy management, reliable, fault isolation Users expect services: e-mail, tele- and videoconferencing, e-commerce, video-on-demand,... 2

Computer network characteristics Typically communications networks optimized for some service telephone network television/radio broadcast network user terminals special purpose devices Modern computer networks are more general: terminals general purpose PCs/workstations networks able to carry essentially any kind of data support many different applications Topics in this lecture ow computer networks provide connectivity (Requirement 1) ow efficient resource sharing is achieved (Requirement 2) ow applications talk to each other (Requirement 3) ow network perfomance affects the system (Requirement 4) Requirements are reflected in network architectures Basically, we get a snap shot of the issues covered in this course 3 Outline Achieving connectivity Methods for resource sharing Enabling application level communication Performance issues Network architecture istorical background 4

Basic building blocks A network, in principle, consists of nodes and links connecting the nodes. Network nodes: PCs, servers, special purpose hardware Internet terminology hosts, end-systems: PCs and servers running network applications routers (switches): store and forward packets through the network Links: optical fiber, coaxial cable, twisted pair copper, radio, etc. point-to-point hosts directly connected multiple access (LANs, etc.) hosts share the common transmission medium 5 Building larger networks Large networks can not be built based on point-to-point connectivity use routers (switches) to interconnect hosts to each other Nodes connected together through switches to form connected networks Networks connected together through gateway routers to form bigger entities Network 1 Network 2 Network 3 6

Network edge vs. core network in the Internet Access network customers are connected to the core network by the access network link speeds comparably low access technologies: dial up (modem over twisted pair), xdsl, cable modem,... may contain billing functionality, traffic management for each access tree topology Core network no end users directly connected to the core high link speeds SD/SONET over fiber based technologies simple functionality (forwards packets) mesh topology 7 Internet 1 1 Jim Kurose, lecture notes for the course MPSCI 591E Computer Networking, http://www-net.cs.umass.edu/cs591/ Consists of millions of hosts (end systems) connected by links and routers osts exchange messages by using protocols offering e.g. reliable transfer packet sequence integrity Routers forward data based on best effort service no guarantees on loss or timeliness Network of networks loosely hierarchical public Internet vs. private Intranets Internet access provided by ISPs (Internet Service Providers) router server local ISP company Intranet workstation mobile regional ISP firewall 8

Issues of scale Easy to build and manage a network supporting 100 users, but what if the number of users is 100 million... A system allowing unlimited growth in size is said to scale. Scalability a very desirable property for networking technologies Scalability of networks is often influenced very much by the nature of the guarantees regarding service quality the amount of information that the network has about the users One reason for the success of Internet technology is its scalability The networking paradigm is based on best-effort service (no guarantees are made about the service quality) and the network is connectionless The nodes of the network do not store any state information of the users/connections New nodes and users can be added to the network (almost) without any complexity increases Only the routing is affected by the increase in the number of nodes (route computation complexity grows with the number of nodes) 9 Switching modes Circuit switching telephone networks mobile telephone networks ATM technology is also based on circuit switching fast packet switching with fixed length packets (cells): ATM integration of different traffic types (voice, data, video) multiservice networks Packet switching data networks two possibilities connectionless: e.g. Internet (IP), SS7 (MTP) (connection oriented: e.g. X.25, Frame Relay) 10

Circuit switching Connection oriented: connections set up end-to-end before information transfer resources reserved for the whole duration of connection Information transfer as a continuous stream Before information transfer delay (to set up the connection) During information transfer A B no overhead no extra delays 11 (Connectionless) packet switching Connectionless: no connection set-up no resource reservation B Information transfer by using discrete packets B varying length global address (of the destination) Before information transfer no delays During information transfer A B B B overhead (header bytes) packet processing delays queuing delays (since packets compete for shared resources) routers store-and-forward 12

Addressing and routing osts need to distinguish each other when wishing to communicate Each host is assigned a unique byte-string known as address When a sender communicates with some destination B, in a packet switched network the address of the destination (B) is attached to each packet, and each router determines how to forward the packet based on the destination address routing is the systematic process of determining where a packet is sent (which output port) based on the destination address Different addressing and routing scenarios unicast: between a single sender and destination pair broadcast: from a single user to all other users (e.g. network control messages) multicast: from a single user to a subset of all users (e.g. distribution of files) 13 Outline Achieving connectivity Methods for resource sharing Enabling application level communication Performance issues Network architecture istorical background 14

Multiplexing Multiplexing mechanism for achieving resource sharing, i.e., sharing of link bandwidth Problem: ow can the link bandwidth be shared among n different senders 1st approach: partition the bandwidth strictly for all users FDM and TDM multiplexer demultiplexer S1 S2 + -? R1 R2 S3 R3 15 Frequency Division Multiplexing (FDM) FDM oldest multiplexing technique used e.g. in analogue circuit switched systems fixed portion (frequency band) of the link bandwidth reserved for each channel FDM multiplexer is lossless input: n 1-channel physical connections output: 1 n-channel physical connection S1 multiplexer 10-20 Mz S2 + 20-30Mz 30-40Mz S3 16

Time Division Multiplexing (TDM) TDM used in digital circuit switched systems and digital transmission systems information conveyed on a link transferred in frames of fixed length fixed portion (time slot) of each frame reserved for each channel TDM multiplexer is lossless input: n 1-channel physical connections output: 1 n-channel physical connection S1 multiplexer frame1 frame2 frame3 S2 + 1 2 3 1 2 3 1 2 3 S3 time slot 17 Statistical multiplexing (1) FDM and TDM are inefficient If a sender has no data to transmit, the bandwidth allocated to the sender can not be used by others statistical multiplexing In statistical multiplexing basic transmission unit is called a packet physical link is shared over time (cf. TDM) but on-demand (per each packet) simultaneous packet arrivals are buffered (contention) as a result, packets from multiple senders are interleaved at the output buffer space is finite, thus buffer overflow is possible (congestion) S1 multiplexer S2 S3 18

Statistical multiplexing (2) Statistical multiplexer is (typically) lossy input: n physical connections with link speeds R i (i = 1,,n) output: 1 physical connection with link speed C R 1 +... + R n owever, the loss probability can be decreased by enlarging the buffer with an infinite buffer enough that C exceeds average aggregated input rate possible to dimension the size of the buffer such that a given loss probability is achieved (under some assumptions regarding the traffic) Statistical multiplexer and QoS (Quality of Service) determining which packet to transmit from the buffer is called scheduling FIFO: packets are served in the arrival order Round robin: each connection (class) has own queue and they are served cyclically according to some weights Many more exist by using different scheduling mechanisms, some connections can be given preferential treatment (e.g., weighted round-robin) QoS enabled networks 19 Outline Achieving connectivity Methods for resource sharing Enabling application level communication Performance issues Network architecture istorical background 20

Communication needs of applications Applications (processes) running on hosts need to communicate different applications have different needs Typical application considerations reliability? packet sequence order? security? Network design challenge identify the set of common services that the applications need hide the complexity of the network without imposing too many constraints on the applications Network provides logical channels IPC = Inter Process Communication fills in the logical gap ost ost Appl. Appl. ost ost Appl. Appl. 21 Application requirement classification 1 Client/server applications (request/reply applications) client process makes a request and the server process replies strict requirements on packet loss (no loss), may have security requirements Examples: file transfer (FTP), file systems (NFS), TML documents on the web, digital libraries 2 Streaming applications sender generates a continuous stream of packets the stream can correspond to, e.g., digitized audio or video applications have relatively tight requirements on the timeliness of packet delivery, but they can tolerate packet loss to some degree videoconferencing has tighter demands than video on-demand Security? Conferencing may require, e.g., encrypted transmission Question 1: Are only 2 categories enough? Question 2: Where is the functionality of each service implemented? 22

Reliable transfer - what can go wrong? Reliable transfer: one of the most important service properties network hides certain failures to make the network seem more reliable Error types Bit errors: bit or burst of bits is corrupted Error correction detection may be able to fix the problem Packet errors: complete packet is lost Due to unrecoverable bit errors, congestion (most likely reason), software errors (misplaced packets, relatively rare) Problem: Not easy to distinguish between packets that are excessively late (due to e.g. severe overload) and actually lost packets. Node/link failures: A physical link is damaged/cut, router crashes... Can cause massive service disruptions In Internet routing protocols can recover from link failures Problem: Not easy to determine if a router is e.g. completely down or just congested. 23 Outline Achieving connectivity Methods for resource sharing Enabling application level communication Performance issues Network architecture istorical background 24

Performance measures (1): bandwidth Bandwidth = throughput nof bits that can be transmitted over the network in a given time unit: bits per second (bps), e.g. 10 Mbps (cf. MB = megabytes = 8 Mb) Link bandwidth and end-to-end bandwidth bandwidth of a physical link has a deterministic value, e.g. 155 Mbps link bandwidths are constantly improving: link bandwidths in the backbone 1980 s: 2 Mbps, 1990 s: 155 Mbps, 2000: 1 Gbps end-to-end the received bandwidth of an application depends on other traffic in the network (congestion) application limitations (CPU speed of the computer) protocol overhead (each bit sent by the application is wrapped in possibly several envelopes until the bit is transmitted on a physical link) 25 Performance measures (2): latency Latency = delay ow long it takes a message to travel from one end of the nw to another Measured in units of time, e.g., latency across US continent 24 ms RTT (round trip time): time it takes a message to reach its destination and come back to the sender Components: propagation delay, transmission delay, queuing delay Latency Propagation Transmit = = = Propagation + Transmit + Queue Distance/SpeedOfLight Size/Bandwidth Speed of Light: 2.3 x 10^8 m/s in cable, 2.0 x 10^8 m/s in fiber Applications can be either bandwidth or latency bound Telnet sessions are latency bound but large FTP transfers are bw bound 26

Delay x bandwidth product The product of RTT and bandwidth determines the amount of information transmitted by the user before any feed-back from the destination can be received In broadband wide-area-networks (WAN) this product can be very large the sender can overload the receiver if the sender does not fill in the pipe, the network utilization may be low Example: Assume that distance is 1500 km transmission rate C = 100 Mbps delay The two-way propagation delay is 2*1500/300,000 s = 0.01 s Thus, the product of RTT and C is 0.01*100,000,000 bits = 1,000,000 bits = 1 Mbit bandwidth 27 Delay x bandwidth product in high speed networks Assume RTT = 100 ms, we aim to transmit a file of size 1 MB 1 Mbps network: time to transmit = 80 x RTT 80 pipes full of data (stream of data to send) clearly, the network design problem would be to increase the bandwidth 1 Gbps network: time to transmit = 0.08 x RTT only 8 % of the pipe is filled (the file has become a single packet ) now, the latency dominates the network design Thus, coping with the delay seems like the main design issue in future high speed networks Applications have other performance requirements than delay and bandwidth Applications may have an upper bound on required bandwidth Real time applications have requirements on delay variation (jitter) caused by queuing in the network routers 28

Performance of a statistical multiplexer (1) Internet is based on the use of statistical multiplexing the output port of a router operates as a statistical multiplexer A statistical multiplexer can be modeled as a waiting system (= queue) Traffic consists of packets each packet is transmitted with the full link speed C packets arrive at a rate λ and let L denote the average packet length packet service rate µ will be µ = C/L let ρ = λ / µ, stability requirement: packet arrival rate λ < µ ρ < 1 λ C/L 29 Performance of a statistical multiplexer (2) Assume Poisson packet arrivals with exponentially distributed sizes M/M/1 queuing system Load vs. mean queue length mean queue length (and delay) rises sharply as load approaches 1 Reasonable to design the network s.t. load < 0.9 link utilization always < 100% congestion control needed Mean queu elengt h 200 175 150 125 100 75 50 25 0.2 0.4 0.6 0.8 1 r The results are qualitatively the same regardless of the assumptions of the traffic 30

Outline Achieving connectivity Methods for resource sharing Enabling application level communication Performance issues Network architecture istorical background 31 Layered architectures A computer network must provide for a large number of hosts cost effective, fair, robust and high performance connectivity, and it must be easily able to accommodate new network technologies Network architecture to guide the design and implementation of networks abstractions used to hide complexities In networks, abstractions lead to layered designs services offered at higher layers are implemented in terms of services provided by lower layers often multiple abstractions (services) are provided to serve the varying requirements of above layers (multiplexing of upper layer protocols) Benefits of layering decomposes the implementation problem into manageable components modular design (adding new functionality may only affect one layer) Application programs Process-to-process channels ost-to-host connectivity ardware 32

Protocols Each layer implemented by a protocol protocols offer communication services to higher level objects A protocol offers two interfaces: Service interface: offered to higher level objects on the same host Peer interface: offered to peer protocol objects existing on other hosts ost 1 ost 2 igher level object uses Protocol entity Service interface Peer interface igher level object uses Protocol entity 33 Encapsulation At the sender side, each lower layer protocol adds a header (L3, L2) thus encapsulating the upper layer packet simple transformations (compression, encryption) of the packet possible At the receiver side, each layer removes the corresponding header and forwards the packet to the higher layer protocol entity ost 1 ost 2 Application Application Data message payload Data L3 (Process-to-process) Protocol L3 (Process-to-process) Protocol L3 Data L3 message L3 Data L2 (ost-to-host) Protocol L2 (ost-to-host) Protocol L2 L3 Data L2 message 34

OSI (Open Systems Interconnect) architecture The classic 7-layer reference model (late 70 s) protocols following the model defined in conjunction with ISO and ITU-T End host 1 End host 2 E-mail, video conference, ordinary telephony Application Application format of data Presentation Presentation synchronization of different transport streams belonging to same session Session Session end-to-end error correction, congestion control Transport Transport routing of packets, addressing Network Network Network Network collection of bits into frames, possibly error detection Data link Data link Data link Data link transmission of raw bits (bit encoding, signal levels, etc.) Physical Physical Physical Physical One or more nodes within the network 35 Internet architecture Internet architecture has only 4 layers L4: range of application protocols (FTP, ) L3: TCP (reliable byte transfer) and UDP (unreliable datagram delivery) provide logical channels to applications L2: IP protocol interconnects multiple networks into a single logical network L1: wide variety of network protocols hour glass shape FTP TTP RealAudio TFTP L4 TCP UDP L3 IP L2 NET 1 NET 2 NET n L1 36

Outline Achieving connectivity Methods for resource sharing Enabling application level communication Performance issues Network architecture istorical background 37 Brief Internet history (1) 1 Jim Kurose, lecture notes for the course MPSCI 591E Computer Networking, http://www-net.cs.umass.edu/cs591/ 1961-1972: Early packet-switching principles 1961: Kleinrock - queuing theory shows effectiveness of packetswitching 1964: Baran - packet-switching in military nets 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1972: ARPAnet demonstrated publicly NCP (Network Control Protocol) first host-host protocol first e-mail program ARPAnet has 15 nodes 38

Brief Internet history (2) 1 Jim Kurose, lecture notes for the course MPSCI 591E Computer Networking, http://www-net.cs.umass.edu/cs591/ 1972-1980: Internetworking, new and proprietary nets 1970: ALOAnet satellite network in awaii 1973: Metcalfe s Ph.D. thesis proposes Ethernet 1974: Cerf and Kahn - architecture for interconnecting networks still determine largely the development of today s Internet late70 s: proprietary architectures: DECnet, SNA, XNA late 70 s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes 39 Brief Internet history (3) 1 Jim Kurose, lecture notes for the course MPSCI 591E Computer Networking, http://www-net.cs.umass.edu/cs591/ 1980-1990: new protocols, a proliferation of networks 1983: deployment of TCP/IP 1982: smtp e-mail protocol defined 1983: DNS defined for name-to-ipaddress translation 1985: ftp protocol defined 1988: TCP congestion control new national networks: Csnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks 40

Brief Internet history (4) 1 Jim Kurose, lecture notes for the course MPSCI 591E Computer Networking, http://www-net.cs.umass.edu/cs591/ 1990 s: commercialization, the WWW Early 1990 s: ARPAnet decommissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: WWW hypertext [Bush 1945, Nelson 1960 s] TML, http: Berners-Lee 1994: Mosaic, later Netscape late 1990 s: commercialization of the WWW Late 1990 s: estimated 50 million computers on Internet estimated 100 million+ users backbone links running at 1 Gbps 41