IS 450/650, Fall 2013, Computer Networks and the Internet
Today:
• Roster
• Syllabus Overview (Syllabus on Blackboard)
• Chapter 1
Announcements & Reminders:
• 450-1 Homework 1 Due Tuesday 9/17 at 23:59.
• 450-1 (TR) Test 1 Tuesday 10/1
• 450-1 (TR) Test 2 Thursday 11/7
• 450-1 (TR) Final Exam Thursday 12/19 8-10 a.m.
• Suggestion: start homeworks early and send e-mail if you get stuck.
Cell phones & laptops off.
Reminder: if printing the notes, consider printing 4-up (4 pages per side) or
2-up or 6-up or some such.
Generated September 16, 2013.
2
Mathematics
Look at the math review at the course web site. This will give everyone some idea of the expected background for this course.
• Positional number systems: binary, decimal, hexadecimal
• Counting: how many values can be represented in n bits? How many bits are needed to represent m different values?
• Logarithms and exponentiation
3
Motivation
Computer networks are ubiquitous:
• The Internet
• Smart Phones
• LAN Clients and Servers
• Wireless LANs supporting laptops, tablets, e-readers, etc. – CTIA reports that there are now more wireless devices than people in the US: http://goo.gl/yU8fi
• DTV, GPS, HD radio, etc.
• Satellite Radio
• Satellite Phones
• OS Structure
4
More Motivation
• Growth of Computer Networking
• Complexity in Network Systems
• Mastering the Complexity layering locality
• Resource Sharing
5
Growth
So a recent estimate shows about 900M hosts on the Internet.
Implications?
The plot is from http://www.isc.org/solutions/survey, accessed 2012-06-25.
6
What is the Internet?
What level of abstraction should we consider first?
• The Internet is an interconnected collection of networks.
• The Internet is a set of nodes and links.
• The Internet is an emergent phenomenon.
– Individual nodes, links, switches, and networks are designed. – The Internet was not.
Consider a traffic jam.
– Cars and highways are engineered.
– Traffic jams emerge.
– Cars move forward, ideally.
– Traffic jams move backward, often.
Next page: What was the Internet?
7
What was the Internet, or Arpanet?
1969–1971:
Next page, 1982.
8
9
Revolutionizing Communications??
Before the Internet we had a variety of one-to-one and one-to-many communications mechanisms.
• Name some.
• Many-to-one was rudimentary.
– Such as?
The Internet brought us convenient many-to-many and many to one.
• 1-1
• 1-many
• many-1
• many-many
10
Building Blocks
Nodes: PCs, special-purpose hardware, etc.
• hosts or end systems
• switches (broadly speaking: LAN switches, routers, phone switches, PBXes, etc.)
• communications links
The Internet provides paths or routes between various end systems.
• Each path consists of one or more hops along communication links from node-to-node.
11
Getting Building Blocks to Talk Among
Themselves
• protocols control sending, receiving of messages
– e.g., TCP, IP, HTTP, Skype, Ethernet, 802.11
• Internet: “network of networks”
– loosely hierarchical
– public Internet versus private intranet
• Internet standards
– RFC: Request for comments
– IETF: Internet Engineering Task Force
– IANA: Internet Assigned Numbers Authority
Aside: About all these Abbreviations
• A typical discussion of networks involves many abbreviations and acronyms.
• Largely for tests and quizzes you do not have to memorize these.
• If I use too many in class, raise your hand and ask for a clarification. Please.
• Pay attention, do the reading and homeworks, review the slides, and most will stop seeming foreign.
12
A Service View
The Internet provides a communications infrastructure.
• The infrastructure allows distributed applications
• Web, VoIP, e-mail, games, e-commerce, file sharing, etc. Communications services are provided to applications:
• reliable end-to-end (sender to receiver, source to destination) data delivery
• best effort (unreliable) data delivery
13
Support for Common Services
Why do we want to have networks? What good are they?
What do we use networks for?
More specifically, what do we use the Internet for?
Many different sorts of services.
How can one “thing,” the Internet, be good for so many different kinds of services?
• Since many applications perform similar operations, it makes sense to factor out the common behavior—just as programmers avoid multiple copies of the same code by using functions or methods.
• In networks, this is generally done in a layered fashion, in which lower layers provide a foundation for higher layers. • A neat thing about the Internet is that many of these layers were essentially designed ca. 1970, and are still chugging along fine.
• In a sense, the network provides channels that connect two endpoints. Each endpoint is a process on a computer. 14
Channels
When not worried specifically about implementation, we can represent a channel with a cloud diagram:
Often we are unconcerned about implementation at some level or another of a system at any given time. In general, we prefer to concentrate on just a few details at a time.
Programming languages provide APIs for and applications use various sorts of channels.
Different APIs support different protocols.
15
Protocols
From the text: A protocol defines the format and order of messages exchanged between two or more communicating entities, as well as actions taken on the the transmission or receipt of a message or other event.
In particular a protocol defines the syntax and semantics of a way of communicating.
• Syntax: the structure of each message.
• Semantics: the meaning of each message and each part of each message.
16
Section 1.2: The Network Edge
This is also referred to as the last mile.
Considerations:
• Capacity in bits per second, usually b/s or bps.
• Shared or dedicated access?
• Are the systems at a particular location primarily clients or servers?
Some definitions:
• Server:
• Client:
• Host: an end system, a computer, PC, smart phone, etc., used as a client or server.
17
Plugging into the Internet
Last mile links vary greatly in capacity (b/s) and technology.
• Dialup: optimistically, 56kb/s
• Satellite: a few hundred kb/s
• DSL a few Mb/s
• Cable, fiber, wireless: several Mb/s and up
18
Physical Media
We can categorize media generically into guided (with wires, cables, whatever) vs. unguided (without wires).
• twisted-pair copper wires
– Why a pair of wires?
• optical fiber
• coaxial cable
Also, hybrid fiber cable (HFC), which is coax in neighborhoods and fiber to the cable head end
• radio—terrestrial or satellite
19
1.3: The Network Core
• ISP: Internet service provider
• Tier 1 ISP: a top-level ISP. Tier 1 ISP typically don’t pay other providers to carry their traffic.
• Tier 2 ISP: an ISP that peers with some ISPs and must buy transit through others. These are labeled as regional ISPs in this diagram.
• Access ISP, or tier 3 network is one that purchases access to the Internet and generally does not peer with other ISPs.
• IXP: Internet Exchange Point, where two or more networks peer.
Let’s look at a major tier 1 provider’s network: http://maps.level3.com/default/ 20
Backbones
Related to trunking is the concept of a backbone.
A backbone is a portion of the network that connects other parts of the network.
• Often the capacity of the backbone is relatively high.
In the Internet, the tier-1 providers operate the largest backbones, interconnected at IXPs.
21
Store-and-Forward
Generally a router will receive a packet and then forward it along its way.
• Each link has a capacity, measured in bits per second: b/s or bps. This is a rate, so the text abbreviates it
R.
• Packet lengths are also measured in bits (or bytes).
The text abbreviates this length L.
How long does it take to place a packet on a link? L/R seconds. If a path is n similar hops long, then the time to traverse the path will be nL/R seconds.
There are other delays, but we will defer discussion of those for now.
22
Circuit Switching
In circuit switched networks,
1. a path (a virtual circuit) from the sender to receiver is created.
2. communications occur, and, finally,
3. the circuit is torn down.
These are used for point-to-point communications, and ideally give the illusion of a dedicated line between the two endpoints.
If capacity is allocated when the circuit is set up, then other traffic has little or no effect on traffic on an existing circuit. The PSTN (Publicly-Switched Telephone Network) is circuit switched.
23
Analogous to Circuit Switching
Analogy: think of a train. Each switch is set properly before the train reaches the switch.
Each train car can be thought of as an individual packet of data.
• The switch is set.
• Then one or more trains of packets follow the circuit.
24
Packet Switching
In a packet switched network, packets are forwarded independently.
• Note: many call this datagram switching.
Each packet has to have complete addressing information for its sender and receiver.
Packets often compete for network resources.
There is no setup time for the connection: senders just send. Analogy: think of the automobile. Routing decisions are made on-the-fly.
25
Packet vs. Circuit Switching
• With circuit switching, no communications occur before the circuit is set up—advantage, packet switching.
• With circuit switching, a packet needs only a circuit identifier rather than complete source and destination addresses—advantage, circuit switching.
• With circuit switching, switch capacity can be reserved end-to-end through the network—advantage, circuit switching. A key difference:
• In circuit switching, the path is set up end-to-end before each individual data packet is sent.
• In packet (or datagram) switching, the path is decided upon hop-by-hop.
26
How to Multiplex
How do we share?
Two common ways of multiplexing are (synchronous) time-division multiplexing (TDM) and frequency-division multiplexing (FDM).
In TDM, we divide time into quanta, and assign each customer one or more quanta.
27
For example, if multiple hosts share a switch to access a network, time slot t1 might be reserved for host h1, t2 might be reserved for h2, and so forth, until each host has had a turn. The we start back with h1 and t1.
This is similar to round-robin scheduling which is widely used in operating systems.
28
Frequency Division Multiplexing
In FDM, we allow each host to transmit at a different frequency, e.g., different radio and TV stations transmit at different frequencies.
The problem with each scheme is that we waste resources when a host has nothing to send: an idle workstation, a silent pause in a phone conversation, etc.
When FDM is used in optical fiber, it is called wavelength division multiplexing.
29
30
TDM Example: T1 (or T3, etc.)
• A T1 line can be used to carry 24 digital voice channels.
• A T3 line is equivalent to 28 T1 lines.
• For the duration of a call, 1/24 of a T1 is allocated, which is just over 4% of the link’s capacity.
• This capacity is tied up even if the two parties on the connection are silent.
31
Statistical Multiplexing
A third form of multiplexing is statistical multiplexing, where we allow each host to transmit on demand.
• So, a host with something to send does not have to wait for its turn.
• A host with nothing to send uses no resources.
• But, if multiple hosts try to send at the same time, we need a scheme for resolving conflicts.
32
Trunking
Trunking refers to multiple channels, flows, or connections sharing the same wire or bundle of wires.
• So this is related to multiplexing.
Examples of trunking:
•
•
•
•
•
33
Interconnecting Networks
Networks are roughly hierarchical, with tier-1 ISPs at the highest levels (center) and regional ISP paying them to carry traffic. peering 34
Taming Complexity: Adding Levels to the
Hierarchy
Tier 1 ISPs are often referred to as NSPs, network service providers. 35
Traffic May Traverse Many ISPs
36
1.4: Delay
Latency (delay) is the time to get from one host to another.
Round-trip time (RTT) is the time to get a message from one host to another, and back again.
Latency has four components:
1. speed of light
2. transmission time of a piece of data, say, a packet
(L/R)
3. queuing delays within the network (hard to model)
4. processing delays (typically at most a few µs)
Speed of Light
• The signal propagation speed depends on the medium, and ranges from
– 3.0 × 108 m/s in a vacuum and
– around 2.3 × 108 m/s in copper to
– around 2.0 × 108 m/s in fiber.
Just for simplicity well generally assume 3.0 × 108 m/s
37
Overall Delay
• Delay = Propagation + Transmit + Queue + Proc.
• Propagation = Distance / SpeedOfLight
• Transmit = Size / (Transmission Rate)
In the text, p. 37:
• transmission delay is L/R
• propagation delay is d/s
• speed of light is c = 3.0 × 108 m/s
For our purposes, for now,
• Delay = Propagation + Transmit
• Delay = d/s + L/R where propagation and transmit delays are defined as above. 38
An Example
The mean distance between the Earth
Mars is approximately 225 million km
and
(see
http://www.universetoday.com/14824/distance-from-earth-to-mars/).
Suppose it is necessary to send a 50MB file to Mars and that the transfer must complete in at most 30 minutes.
What is the minimum throughput needed (in bits / second) to accomplish this? Note that by “accomplish,” I mean that the file must be both sent from the Earth station and received on Mars.
NB:
8b = 1B (eight bits in a byte)
M = 106 m = 10−3
• Pay attention to units.
• Carry the units through the calculation.
• An answer without units is wrong.
How much does it cost to leave Guatemala? ¿Veinte?
• This is a case where we can’t do much about propagation delay. Are there cases where we can reduce propagation delay?
39
Congestion
Congestion occurs when bits flow into a region faster than they can flow out.
This causes lost packets and generally slows things down
(a node may have to wait before transmitting).
40
Latency Effects
For smaller files or higher throughput, propagation time gains importance.
If the transmission time is large, propagation time fades in importance.
• When is transmit delay large?
Recall: transmit delay is L/R
• When is propagation delay a large fraction of perceived latency? Recall: propagation delay d/c
41
High-Speed Networks
As throughput increases, propagation delay becomes more important.
• Consider the problem of transmitting an 8.4 Mb file across the US on a 1 Mb/s link vs. a 1 Gb/s link w/100 ms one-way delay.
• Could we transmit a file of this size faster on a 4 Gb/s link than on the 1 Gb/s link?
• How about a bigger file?
42
On Queueing Delay
Consider a packet arrival rate of a (measured in packets per second), average packet length of L (bits), and a link capacity of R (bits per second).
• La/R ≈ 0: average queueing delay very low
• La/R approaching 1: delays become large
• La/R > 1: more traffic than the link can handle, causing delay to be (theoretically) infinite
43
Seeing End-to-End Delay
Visit http://www.speakeasy.net/speedtest/
Use traceroute (tracert on Windows) to see the number of nodes from here to yon. Example: traceroute www.example.com
Note traceroute also gives some delay estimates.
How does this manifest itself in web browsing?
NB: the end-to-end throughput is limited by the throughput of the slowest link.
• This is true in any pipelined system
44
traceroute
> traceroute www.washingtonpost.com traceroute to www.washingtonpost.com (12.129.147.65), 30 hops max, 60 byte packets
1 130.85.90.129 (130.85.90.129) 27.008 ms 27.188 ms 27.403 ms
2 130.85.19.4 (130.85.19.4) 0.294 ms 0.377 ms 0.408 ms
3 130.85.17.169 (130.85.17.169) 0.324 ms 0.316 ms 0.305 ms
4 130.85.17.161 (130.85.17.161) 0.622 ms 0.615 ms 0.690 ms
5 gig0-2.umbc-core.net.ums.edu (136.160.255.181) 0.569 ms 0.565 ms
0.639 ms
6 ten1-1.umcp-core.net.ums.edu (131.118.255.237) 3.776 ms 3.677 ms
3.602 ms
7 206.196.177.36 (206.196.177.36) 1.183 ms 1.262 ms 1.253 ms
8 dca-edge-18.inet.qwest.net (65.120.78.45) 3.297 ms 3.275 ms
3.305 ms
9 dcp-edge-01.inet.qwest.net (67.14.28.42) 3.700 ms 3.637 ms 3.825 ms 10 65.120.84.126 (65.120.84.126) 3.815 ms 3.474 ms 3.379 ms
11 12.129.144.13 (12.129.144.13) 5.784 ms 5.679 ms 5.710 ms
12 washingtonpost.com (12.129.147.65) 4.071 ms 4.032 ms 4.022 ms
On Windows the command is tracert.
45
Performance
Example
Suppose a 1.536 Mb/s link uses TDM with 24 time slots.
Further suppose it takes 500 ms to establish a circuit.
How long would it take a host to send 640 kb using just one of the time slots?
Remember:
• b is bits
• B is bytes
Example II
What if the connection is packet switched and there is no contention? • There is no need to set up circuit in a packet-switched network. 46
1.5: Protocols and Layering
Just like we no longer program using zeros and ones, we rarely think of networking using raw hardware.
We want uniformity: networking should work about the same regardless of the hardware used.
This suggests that we have a layer of software “above” the hardware that provides a uniform interface to other software. This sort of thing has long been done in computing.
47
Layering in Operating Systems
One or more layers could be added via virtualization.
48
Layering Of Network Protocols
We do the same sort of layering in network software: some layers are apparent to users or application programmers, and some are hidden, closer to the hardware.
Motivations for layering:
• Division of responsibilities: no one layer is overly complex.
• Portability: if the hardware changes, only the bottom layer(s) have to change.
• Portability II: the same upper layers suffice on a wide variety of hardware platforms.
A protocol is an agreed-upon way of communicating, e.g., among computers.
49
TLAs
• ISO: International Organization for Standards, or
L’Organisation internationale de normalisation
• OSI: Open Systems Interconnect
TLA: three letter abbreviation (or acronym)
50
The OSI Model
This is a reference model rather than a protocol graph.
Reference models are often more appropriate as things to refer to as opposed to being things to implement.
51
The OSI Architecture, from the Bottom
The OSI model has seven layers. From the bottom up:
1. The physical layer transmits unstructured bits across a link via, typically, electromagnetically.
Here we are interested in things like hardware, wires, hardware, airwaves, fiber, etc.
2. The data link layer groups the bits into frames and delivers each frame to a particular node on a local area network. Layer 2 often does NIC-to-NIC error checking. NIC is network interface controller
3. The network layer provides forwarding across interconnected networks.
Example: The Internet Protocol (IP)
The network layer focuses on host-to-host communications, perhaps across several interconnected networks.
52
The OSI Model, Layers Four & Five,
Transport & Session
4. The transport layer provides (perhaps) reliable (perhaps) FIFO communications.
• The transport layer focuses on process-to-process communications. • A connection-oriented transport protocol is the
Transmission Control Protocol, TCP. TCP usually resides on top of IP, a connectionless network layer. • A connectionless transport protocol is the User
Datagram Protocol, UDP, which is also widelyused on the Internet.
5. The session layer adds support for user sessions, e.g., opening, closing, and managing sessions.
53
The OSI Model, Layers Six & Seven
6. The presentation layer provides for structuring of messages into fields (as in object or struct data members).
• The presentation layer also performs the conversions between different data formats of disparate machines. • Encryption can also be performed in this layer.
7. The application layer implements protocols designed to meet communication requirements of specific applications. The interface of a service is often specified at this layer. Examples: ftp, telnet, SMTP, HTTP.
In practice, encryption is done in the network layer
(IPsec), the transport layer (TLS/SSL), or the presentation layer.
• In the Internet model, the presentation and application layers are conflated, so presentation-layer encryption is referred to as application-layer encryption.
54
Primary Responsibilities, Layers 2–4
2. Link layer: NIC-to-NIC
3. Network layer: host-to-host
4. Transport layer: process-to-process
NIC: network interface controller
On most systems, these three layers are in the OS.
55
Protocol Stacks
Together, these layers are referred to as a protocol stack.
Communications are at a layer: conceptually, layer 7 of the sender talks to layer 7 of the receiver, and so forth.
Think of...
• the link layer frame as an envelope for the network layer packet.
• the network layer packet as an envelope for the transport layer segment or packet.
• the transport layer segment as an envelope for the application layer packet.
56
Layering Mechanics
An upper layer invoking a lower layer works very much like a procedure/function/method call in programming, which is part of the reason we say “protocol stack.”
On the sender, layer i “calls” layer i−1 to send a message to layer i on the receiver.
Each layer places its header information before the message (and before any higher-layer headers) before contacting the lower layer to transmit.
Penguin time!
57
Another View
58
A de Facto Standard
The Internet’s TCP/IP protocols have become the de facto standard for open system interconnection.
The main tasks of the network layer (Internet Protocol,
IP) is to pack messages into packets and the forwarding of the packets to destination machines.
IP makes a “best-effort” to forward packets to the next destination, but forwarding is not guaranteed.
• If a router is overrun with packets, it discards them.
• If a router fails, other routers attempt to send packets along alternate paths.
Thus, packets could be duplicated, arrive out of sequence, or take a relatively long time to arrive.
Above IP is the transport layer, where the Transmission Control Protocol (TCP) eliminates duplicates and reassembles the packets in the correct order.
59
OSI vs. IP Models Compared
60
The Internet Protocol Stack application transport network link physical The application layer is in user space. The other layers are within the OS.
Another view:
Note the hourglass.
• IP can run on any LAN technology.
• Any transport technology can sit atop IP.
61
Lower Layers Encapsulate Upper Layers
The link layer carries the network layer which carries the transport layer which carries the application layer.
The application layer packet is inside the transport layer packet, which is inside the network layer packet, which is inside the link layer frame.
You May Also Find These Documents Helpful
-
One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…
- 1212 Words
- 5 Pages
Better Essays -
The factors that contributed to the growth of trade along the Silk Road is that it was located along the threshold of central Asia. All of the traders share customs with the steppe nomads farther to the East (202). The Chinese were eager to buy western products (203) which were another contributing factor for trade to be in one central area, because merchants would flock to that area. Cooperative relations between caravan traders and pastoral nomads in Central Asia grasslands increased. Parthian rulers from Iran were nomadic in origin and helped trade flourish. The spread of products and cultures along the silk road caused the spread of lifestyles and the bringing of people together. It was considered a social system in which different peoples could come together, communicate, and share their natural wealth with the world. The silk trade continued to grow for these reasons. (page 201)…
- 873 Words
- 3 Pages
Good Essays -
3. Figure 3 shows screen shot of entire contents of the file properties dialog box.…
- 664 Words
- 3 Pages
Better Essays -
Which IEEE wireless networking protocol was ratified in 2009 and has a maximum defined data rate of 600 Mb/sec?…
- 778 Words
- 5 Pages
Satisfactory Essays -
4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…
- 3425 Words
- 14 Pages
Good Essays -
1.What’s a routing table? Keeps track of the routes to use for forwarding datat to its destination…
- 1575 Words
- 7 Pages
Powerful Essays -
Telecommunication Industry have gone through a huge changes and its market has expanded globally. Since 2008, this industry has increased from 84 million to about 182 million in 2013 in wireless phone and related devices operating in the United States with some 162-million mobile-phone users in the United States alone.…
- 259 Words
- 2 Pages
Satisfactory Essays -
Describe what is meant by soft skills and explain why they are important in networking projects…
- 519 Words
- 3 Pages
Satisfactory Essays -
The Athletes Shack (TAS) is a chain of sporting goods stores that is looking into adding a wireless network (WLAN) to their current network. TAS has 10 retail distribution stores in the area and would like all the stores to be able to see live inventory suing mobile devices. The management team at Athletes Shack has realized that their success depends on exceptional customer service and efficiency on the floors of the store. To take the next step the company is looking to go wireless and use that technology to separate themselves from other sporting good chains. To continue to have an edge over Foot Locker, Champs Sports and other Athletes Shack feel this is a necessary step. Once the WLAN is installed in each of the 10 locations this will allow remote log in via the internet and VPN connection.…
- 2917 Words
- 12 Pages
Better Essays -
The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.…
- 327 Words
- 2 Pages
Satisfactory Essays -
Also, after completing the lab, you must show your work by copying and pasting a screenshot of the following configurations/verification:…
- 260 Words
- 2 Pages
Satisfactory Essays -
The standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol are :…
- 923 Words
- 4 Pages
Good Essays -
According to Aging in Place, around two million smartphones are sold every single day. Individuals are also able to access internet from their cellular phone, which is just one of the qualities that makes the smartphone so desirable. A new found study by International Telecommunication Union in 2015 found that more than 3.2 billion people are using the Internet, I’m comparison to the 783 million in 2000. (Money, “Here’s How Many Internet Users There Are”) http://time.com/money/3896219/internet-users-worldwide/ .…
- 1293 Words
- 6 Pages
Powerful Essays -
Cited: Cavazos, E. (1994) Cyberspace and the law: Your rights and duties in the on-line…
- 1781 Words
- 8 Pages
Good Essays -
1. Identify the key environmental forces that should be considered by music producers in evaluating strategies for channel design.…
- 486 Words
- 2 Pages
Satisfactory Essays