introduction1-1 reti di calcolatori e sicurezza -- overview --- part of these slides are adapted...

108
Introduction 1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top Down Approach Featuring the Internet , 2nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002. (copyright 1996-2002 J.F Kurose and K.W. Ross, All Rights Reserved)

Upload: nicomedo-mariotti

Post on 02-May-2015

219 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-1

Reti di calcolatori e Sicurezza-- Overview ---

Part of these slides are adapted from the slides of the book:Computer Networking: A Top Down Approach Featuring the Internet,

2nd edition. Jim Kurose, Keith Ross

Addison-Wesley, July 2002. (copyright 1996-2002

J.F Kurose and K.W. Ross, All Rights Reserved)

Page 2: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-2

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 3: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-3

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 4: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-4

Reti e Sistemi Distribuiti

Cosa e’ una rete: Un insieme

interconnesso di computer autonomi

Differenza tra Reti e Sistemi Distribuiti L’esistenza di più

computer è trasparente

Page 5: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-5

Reti e Sistemi Distribuiti

Cosa e’ una rete: Un insieme

interconnesso di computer autonomi

Differenza tra Reti e Sistemi Distribuiti L’esistenza di più

computer è trasparente

Page 6: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-6

Mainframe + terminali

Page 7: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-7

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 8: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-8

Internet: l’HW

Milioni di dispositivi computazionali connessi in rete: hosts, end-systems Pc, workstation, server PDA, cellulari, frigoriferi

Collegamenti Fibre ottiche, ponti radio,

satellite

router: compito di inoltrare pezzi di dati (pacchetti) lungo la rete

ISP: Milano

Rete di Ateneo

ISP: Catania

router workstation

servermobile

Page 9: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-9

Internet: SW

Protocolli di comunicazione: meccanismi per la trasmissione dei messaggi TCP, IP, HTTP, FTP, PPP

Internet: “network of networks” gerarchica

Internet: standard RFC: Request for comments IETF: Internet Engineering

Task Force

ISP Milano

Rete diAteneoPisa

ISP Catania

router workstation

servermobile

Page 10: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-10

Cos’è un protocollo?Protocolli umani: “pronto..” “pronto, sono Pippo,

come stai?”

… regole che governano la condotta delle persone (azioni - reazioni) nello scambio dei messaggi

Protocolli di rete: calcolatori invece che persone tutte le attività di comunicazione

in Internet sono governate da protocolli

I protocolli definiscono il formato e l’ordine, dei messaggi inviati e ricevuti tra entità della rete e le azioni che vengono fatte

per la trasmissione e ricezione dei messaggi

Page 11: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-11

Cos’è un protocollo?Un protocollo umano e protocollo di rete di calcolatori

ciao

ciao

Sai l’ora?

Sono le 2

Connessione TCP richiesta

Connessione TCPrisposta

Get http://gaia.cs.umass.edu/index.htm

<file>tempo

Page 12: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-12

Internet: una visione a servizi

Infrastruttura di comunicazione che permette l’esecuzione di applicazioni distribuite: WWW, email, e-

commerce, Information Retrieval, GIS,

altro?

Servizi: connectionless connection-oriented

Nessuna garanzia sul tempo richiesto (ancora)

Page 13: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-13

Internet: Sezione accesso alla rete

hosts: Applicazioni e servizi di rete e.g., WWW, email

Modello client/server Host (client) host rinvia una

richiesta di servizio, host (server) fornisce il servizio

e.g., WWW client (browser)/ server; email client/server

peer2peer: Non ci sono server dedicati Interazione è simmetrica e.g.: FreeNet, GNUTELLA

Page 14: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-14

Servizi orientati alla connessione

Obiettivo: trasferimento di dati tra host

handshaking: fase iniziale di inizializzazione “set up” dello stato

TCP - Transmission Control Protocol Servizio orientato alla

connessione di Internet

TCP [RFC 793] Trasferimento di dati

affidabile Ack+Ritrasmissione

Controllo del flusso: Sender non deve

trasmettere troppo velocemente (da affogare il receiver!)

Controllo della congestione control: Sender non deve

congestionare il traffico di rete (anche se il mittente riceverebbe pacchetti la rete (I router) non ce la fa)

Page 15: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-15

Servizi non orientati alla connessione

Obiettivo: trasferimento di dati tra host

UDP - User Datagram Protocol [RFC 768]: Trasferimento non

affidabile Non sono previsti

meccanismi per il controllo del flusso e della congestione

TCP: HTTP (WWW), FTP

(file transfer), Telnet (remote login), SMTP (email)

UDP: Apps video/Audio,

teleconferenze, telefonia su Internet

Page 16: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-16

Esercizio divertente

2004:Chi conosce progetto SETIatHome?

2004: Trovare una descrizione del protocollo di comunicazione su rete di seti e descriverlo

Page 17: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-17

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 18: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-18

Nucleo della rete

Ragnatela di router La domanda fondamentale:

Come avviene il trasferimento dei dati nelle reti? Commutazione di

circuito: circuito dedicato per ogni chiamata (rete telefonica)

Commutazione di pacchetto: i dati sono inviati in rete scomponendoli in “pezzi”

Page 19: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-19

Commutazione di circuito Commutazione di pacchetto

Page 20: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-20

Commutazione di circuito

Allocazione delle risorse per la gestione della chiamata

Banda di trasmissione

Risorse dedicate Performance elevata Fase di

inizializzazione Creazione circuito

Page 21: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-21

Commutazione di circuito

Le risorse di comunicazione di rete (bandwidth) sono suddivise in “parti” allocate alle chiamate

Una parte della risorsa rimane inattiva (idle) se non viene utilizzata (no sharing)

Due soluzioni possibili frequency division

(FDM) time division (TDM)

Page 22: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-22

Circuit Switching: TDMA and TDMA

FDMA

frequency

time

TDMA

frequency

time

4 users

Example:

Page 23: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-23

Packet SwitchingDati sono suddivisi in packets Packet degli utenti A e B

condividono le risorse di rete ogni packet utilizza la banda

al massimo della sua capacità

“resources used as needed” . Non è necessaria una allocazione iniziale di tutte le risorse

Problematiche: Richiesta di risorse

può essere superiore della disponibilità

congestione: code “store and forward”:

packet fanno un passo alla volta Trasmissione su un

link Attesa al link

successivo

Page 24: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-24

Statistical Multiplexing

Le sequenze di pacchetti di A e B non hanno un pattern fisso statistical multiplexing.

A

B

C10 MbsEthernet

1.5 Mbs

D E

statistical multiplexing

queue of packetswaiting for output

link

Page 25: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-25

Packet-switching: store-and-forward

Takes L/R seconds to transmit (push out) packet of L bits on to link or R bps

Entire packet must arrive at router before it can be transmitted on next link: store and forward

delay = 3L/R

Example: L = 7.5 Mbits R = 1.5 Mbps delay = 15 sec

R R RL

Page 26: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-26

Commutazione di pacchetto Vs Commutazione di messaggio

Page 27: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-27

V alutazione

Collegamento ad 1 Mbit Utente generico:

100Kbps se “attivo” Attivo solo 10% del

tempo

Commutazione di circuito: 10 utenti

Commutazione di pacchetto: 35 utenti, probabilità di

avere un numero di utenti attivi maggiore di 10 è minore di .004

Commutazione di pacchetto permette di avere un maggior numero di utenti

N utenti

1 Mbps link

Page 28: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-28

Packet Switching: Message Segmenting

Now break up the message into 5000 packets

Each packet 1,500 bits 1 msec to transmit packet on one link pipelining: each link works in parallel Delay reduced from 15 sec to 5.002 sec

Page 29: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-29

Datagram Vs Virtual circuit

Page 30: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-30

Packet-switched networks: forwarding Goal: move packets through routers from source to

destination we’ll study several path selection (i.e. routing)algorithms

(chapter 4)

datagram network: 1. destination address in packet determines next hop routes may change during session analogy: driving, asking directions

virtual circuit network: 1. each packet carries tag (virtual circuit ID), tag determines

next hop fixed path determined at call setup time, remains fixed thru

call routers maintain per-call state

Page 31: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-31

Network Taxonomy

Telecommunicationnetworks

Circuit-switchednetworks

FDM TDM

Packet-switchednetworks

Networkswith VCs

DatagramNetworks

• Datagram network is not either connection-oriented or connectionless.• Internet provides both connection-oriented (TCP) and connectionless services (UDP) to apps.

Page 32: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-32

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 33: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-33

How do loss and delay occur?packets queue in router buffers packet arrival rate to link exceeds output link

capacity packets queue, wait for turn

A

B

packet being transmitted (delay)

packets queueing (delay)

free (available) buffers: arriving packets dropped (loss) if no free buffers

Page 34: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-34

Four sources of packet delay

1. nodal processing: check bit errors determine output link

A

B

propagation

transmission

nodalprocessing queueing

2. queueing time waiting at output

link for transmission depends on congestion

level of router

Page 35: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-35

Delay in packet-switched networks3. Transmission delay: R=link bandwidth

(bps) L=packet length (bits) time to send bits into

link = L/R

4. Propagation delay: d = length of physical

link s = propagation speed in

medium (~2x108 m/sec) propagation delay = d/s

A

B

propagation

transmission

nodalprocessing queueing

Note: s and R are very different quantities!

Page 36: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-36

Nodal delay

dproc = processing delay typically a few microsecs or less

dqueue = queuing delay depends on congestion

dtrans = transmission delay = L/R, significant for low-speed links

dprop = propagation delay a few microsecs to hundreds of msecs

proptransqueueprocnodal ddddd

Page 37: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-37

Queueing delay (revisited)

R=link bandwidth (bps) L=packet length (bits) a=average packet

arrival rate

traffic intensity = La/R

La/R ~ 0: average queueing delay small La/R -> 1: delays become large La/R > 1: more “work” arriving than can

be serviced, average delay infinite!

Page 38: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-38

“Real” Internet delays and routes What do “real” Internet delay & loss look like? Traceroute program: provides delay

measurement from source to router along end-end Internet path towards destination. For all i: sends three packets that will reach router i on path

towards destination router i will return packets to sender sender times interval between transmission and reply.

3 probes

3 probes

3 probes

Page 39: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-39

“Real” Internet delays and routes

1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms17 * * *18 * * *19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms

traceroute: gaia.cs.umass.edu to www.eurecom.frThree delay measements from gaia.cs.umass.edu to cs-gw.cs.umass.edu

* means no reponse (probe lost, router not replying)

trans-oceaniclink

Page 40: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-40

Packet loss

queue (aka buffer) preceding link in buffer has finite capacity

when packet arrives to full queue, packet is dropped (aka lost)

lost packet may be retransmitted by previous node, by source end system, or not retransmitted at all

Page 41: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-41

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 42: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-42

Protocol “Layers”Networks are

complex! many “pieces”:

hosts routers links of various

media applications protocols hardware,

software

Question: Is there any hope of organizing structure of

network?

Or at least our discussion of networks?

Page 43: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-43

Why layering?

Dealing with complex systems: explicit structure allows identification,

relationship of complex system’s pieces layered reference model for discussion

modularization eases maintenance, updating of system change of implementation of layer’s service

transparent to rest of system e.g., change in gate procedure doesn’t

affect rest of system layering considered harmful?

Page 44: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-44

Internet protocol stack application: supporting network

applications FTP, SMTP, STTP

transport: host-host data transfer TCP, UDP

network: routing of datagrams from source to destination IP, routing protocols

link: data transfer between neighboring network elements PPP, Ethernet

physical: bits “on the wire”

application

transport

network

link

physical

Page 45: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-45

Layering: logical communication

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

networklink

physical

Each layer: distributed “entities”

implement layer functions at each node

entities perform actions, exchange messages with peers

Page 46: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-46

Layering: logical communication

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

networklink

physical

data

data

E.g.: transport take data from

app add addressing,

reliability check info to form “datagram”

send datagram to peer

wait for peer to ack receipt

analogy: post office

data

transport

transport

ack

Page 47: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-47

Layering: physical communication

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

networklink

physical

data

data

Page 48: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-48

Protocol layering and data

Each layer takes data from above adds header information to create new data unit passes new data unit to layer below

applicationtransportnetwork

linkphysical

applicationtransportnetwork

linkphysical

source destination

M

M

M

M

Ht

HtHn

HtHnHl

M

M

M

M

Ht

HtHn

HtHnHl

message

segment

datagram

frame

Page 49: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-49

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 50: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-50

Internet structure: network of networks

roughly hierarchical at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity,

Sprint, AT&T), national/international coverage treat each other as equals

Tier 1 ISP

Tier 1 ISP

Tier 1 ISP

Tier-1 providers interconnect (peer) privately

NAP

Tier-1 providers also interconnect at public network access points (NAPs)

Page 51: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-51

Internet structure: network of networks

“Tier-2” ISPs: smaller (often regional) ISPs Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs

Tier 1 ISP

Tier 1 ISP

Tier 1 ISP

NAP

Tier-2 ISPTier-2 ISP

Tier-2 ISP Tier-2 ISP

Tier-2 ISP

Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet tier-2 ISP is customer oftier-1 provider

Tier-2 ISPs also peer privately with each other, interconnect at NAP

Page 52: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-52

Internet structure: network of networks

“Tier-3” ISPs and local ISPs last hop (“access”) network (closest to end systems)

Tier 1 ISP

Tier 1 ISP

Tier 1 ISP

NAP

Tier-2 ISPTier-2 ISP

Tier-2 ISP Tier-2 ISP

Tier-2 ISP

localISPlocal

ISPlocalISP

localISP

localISP Tier 3

ISP

localISP

localISP

localISP

Local and tier- 3 ISPs are customers ofhigher tier ISPsconnecting them to rest of Internet

Page 53: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-53

Internet structure: network of networks

a packet passes through many networks!

Tier 1 ISP

Tier 1 ISP

Tier 1 ISP

NAP

Tier-2 ISPTier-2 ISP

Tier-2 ISP Tier-2 ISP

Tier-2 ISP

localISPlocal

ISPlocalISP

localISP

localISP Tier 3

ISP

localISP

localISP

localISP

Page 54: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-54

Situazione attuale in Italia?

Eunet, primo fornitore di accessi in Italia Definizione di un backbone per le reti verso

la fine degli anni ‘80

Page 55: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-55

La rete Garr-B•Back bone

•linee blu a 2.5 Gbps •Linee rosse a 155 Mbps

•Back bone •linee blu a 2.5 Gbps •Linee rosse a 155 Mbps

•Collegamenti Internazionali•MI-GEANT 2.5 Gbps •MI-GX 2.5 Gbps •RM-KQ 622 Mbps (in attivazione)

•Collegamenti Internazionali•MI-GEANT 2.5 Gbps •MI-GX 2.5 Gbps •RM-KQ 622 Mbps (in attivazione)

•Collegamenti tra Backbone e POP di accesso

•RM-AQ 2 x 34 Mbps

•Collegamenti tra Backbone e POP di accesso

•RM-AQ 2 x 34 Mbps

Page 56: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-56

Collegamenti con la rete GARR

Chieti-L’Aquila 4Mbps (ora di piu!)Chieti-L’Aquila 4Mbps (ora di piu!)

L’Aquila-Roma 64MbpsL’Aquila-Roma 64Mbps

Page 57: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-57

Che cosa è Internet oggi Una vasta metarete (una rete di reti) di computer (hosts) Un insieme di oltre 100,000 reti capaci di trasportare dati

utilizzando il protocollo TCP/IP Un servizio utilizzato da istituzioni di ogni tipo - commerciali,

accademiche e governative per collaborare con colleghi per coordinare rapidamente complesse attività di livello mondiale per raccogliere e offrire informazione

Un servizio utilizzato da professionisti di ogni tipo - specialmente nel campo della ricerca e sviluppo

Un servizio utilizzato da organizzazioni specializzate nella raccolta e fornitura di informazioni

Page 58: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-58

Come è organizzata

Non ha proprietari È governata dalla Internet Society,

ISOC (Internet SOCiety)• 7000 soci individuali (100 italiani) • 250 soci organizational (3 italiani)

un gruppo di volontari che Promuove lo sviluppo armonico Pianifica l’evoluzione Mantiene gli standard

Page 59: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-59

Internet Governance ICANN - Internet Corporation for Assigned

Names and Numbers (si chiamava IANA) Organizzazione americana con sede in

California Protocolli Indirizzi IP Nomi a Dominio Root Server System

Page 60: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-60

Le “Supporting Organizations” di ICANN Protocol SO

IAB (Internet Architecture Board) IETF (Internet Engineering Task Force)

Address SO RIPE-NCC (Reseaux IP Europeenne - Network

Control Center) ARIN (American Registry for Internet Numbers) APNIC (Asian Pacific Network Information

Center)

Page 61: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-61

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 62: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-62

Netiquette Spirito collaborativo e regole di comportamento

(netiquette) Non sprecare risorse (es. la banda di trasmissione) Non fare niente che possa danneggiare la rete (es.

Virus) Rispetto della privatezza, della proprietà Non inviare propaganda non richiesta (spamming) Intercettare le comunicazioni (sniffing) Uso non autorizzato di risorse protette (cracking) Agire sotto mentite spoglie (spoofing)

Page 63: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-63

Access networks and physical media

Q: How to connection end systems to edge router?

residential access nets institutional access

networks (school, company)

mobile access networks

Keep in mind: bandwidth (bits per

second) of access network?

shared or dedicated?

Page 64: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-64

Residential access: point to point access

Dialup via modem up to 56Kbps direct access

to router (often less) Can’t surf and phone at

same time: can’t be “always on” ADSL: asymmetric digital subscriber line

up to 1 Mbps upstream (today typically < 256 kbps) up to 8 Mbps downstream (today typically < 1 Mbps) FDM: 50 kHz - 1 MHz for downstream 4 kHz - 50 kHz for upstream 0 kHz - 4 kHz for ordinary telephone

Page 65: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-65

Residential access: cable modems

HFC: hybrid fiber coax asymmetric: up to 10Mbps upstream, 1

Mbps downstream network of cable and fiber attaches homes

to ISP router shared access to router among home issues: congestion, dimensioning

deployment: available via cable companies, e.g., MediaOne

Page 66: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-66

Residential access: cable modems

Diagram: http://www.cabledatacomnews.com/cmic/diagram.html

Page 67: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-67

Cable Network Architecture: Overview

home

cable headend

cable distributionnetwork (simplified)

Typically 500 to 5,000 homes

Page 68: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-68

Cable Network Architecture: Overview

home

cable headend

cable distributionnetwork (simplified)

Page 69: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-69

Cable Network Architecture: Overview

home

cable headend

cable distributionnetwork

server(s)

Page 70: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-70

Cable Network Architecture: Overview

home

cable headend

cable distributionnetwork

Channels

VIDEO

VIDEO

VIDEO

VIDEO

VIDEO

VIDEO

DATA

DATA

CONTROL

1 2 3 4 5 6 7 8 9

FDM:

Page 71: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-71

Company access: local area networks

company/univ local area network (LAN) connects end system to edge router

Ethernet: shared or dedicated

link connects end system and router

10 Mbs, 100Mbps, Gigabit Ethernet

deployment: institutions, home LANs happening now

LANs: chapter 5

Page 72: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-72

Wireless access networks

shared wireless access network connects end system to router via base station aka “access

point”

wireless LANs: 802.11b (WiFi): 11 Mbps

wider-area wireless access provided by telco operator 3G ~ 384 kbps

• Will it happen?? WAP/GPRS in Europe

basestation

mobilehosts

router

Page 73: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-73

Home networks

Typical home network components: ADSL or cable modem router/firewall/NAT Ethernet wireless access point

wirelessaccess point

wirelesslaptops

router/firewall

cablemodem

to/fromcable

headend

Ethernet(switched)

Page 74: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-74

Physical Media

Bit: propagates betweentransmitter/rcvr pairs

physical link: what lies between transmitter & receiver

guided media: signals propagate in solid

media: copper, fiber, coax

unguided media: signals propagate freely,

e.g., radio

Twisted Pair (TP) two insulated copper

wires Category 3: traditional

phone wires, 10 Mbps Ethernet

Category 5 TP: 100Mbps Ethernet

Page 75: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-75

Physical Media: coax, fiber

Coaxial cable: two concentric copper

conductors bidirectional baseband:

single channel on cable legacy Ethernet

broadband: multiple channel on

cable HFC

Fiber optic cable: glass fiber carrying light

pulses, each pulse a bit high-speed operation:

high-speed point-to-point transmission (e.g., 5 Gps)

low error rate: repeaters spaced far apart ; immune to electromagnetic noise

Page 76: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-76

Physical media: radio

signal carried in electromagnetic spectrum

no physical “wire” bidirectional propagation

environment effects: reflection obstruction by objects interference

Radio link types: terrestrial microwave

e.g. up to 45 Mbps channels

LAN (e.g., WaveLAN) 2Mbps, 11Mbps

wide-area (e.g., cellular) e.g. 3G: hundreds of kbps

satellite up to 50Mbps channel (or multiple

smaller channels) 270 msec end-end delay geosynchronous versus LEOS

Page 77: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-77

Overview Cosa è una rete Cosa è Internet

Componenti • Cosa è un protocollo

Servizi• Client/server e peer-to-peer• Connectionless e connection-oriented

Network core Circuit/packet switching

• TDM/FDM• packet network e VC

Perdite e ritardi in packet-switched network Struttura a livelli Internet structure and ISPs Accessi alla rete e mezzi fisici (self study) Storia di Internet (self study)

Page 78: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-78

Internet History

1961: Kleinrock - queueing theory shows effectiveness of packet-switching

1964: Baran - packet-switching in military nets

1967: ARPAnet conceived by Advanced Research Projects Agency

1969: first ARPAnet node operational

1972: ARPAnet

demonstrated publicly NCP (Network Control

Protocol) first host-host protocol

first e-mail program ARPAnet has 15 nodes

1961-1972: Early packet-switching principles

Page 79: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-79

Internet History

1970: ALOHAnet satellite network in Hawaii

1973: Metcalfe’s PhD thesis proposes Ethernet

1974: Cerf and Kahn - architecture for interconnecting networks

late70’s: proprietary architectures: DECnet, SNA, XNA

late 70’s: switching fixed length packets (ATM precursor)

1979: ARPAnet has 200 nodes

Cerf and Kahn’s internetworking principles: minimalism, autonomy

- no internal changes required to interconnect networks

best effort service model

stateless routers decentralized control

define today’s Internet architecture

1972-1980: Internetworking, new and proprietary nets

Page 80: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-80

Internet History

1983: deployment of TCP/IP

1982: SMTP e-mail protocol defined

1983: DNS defined for name-to-IP-address translation

1985: FTP protocol defined

1988: TCP congestion control

new national networks: Csnet, BITnet, NSFnet, Minitel

100,000 hosts connected to confederation of networks

1980-1990: new protocols, a proliferation of networks

Page 81: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-81

Internet History

Early 1990’s: ARPAnet decommissioned

1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)

early 1990s: Web hypertext [Bush 1945,

Nelson 1960’s] HTML, HTTP: Berners-Lee 1994: Mosaic, later

Netscape late 1990’s:

commercialization of the Web

Late 1990’s – 2000’s:

more killer apps: instant messaging, peer2peer file sharing (e.g., Naptser)

network security to forefront

est. 50 million host, 100 million+ users

backbone links running at Gbps

1990, 2000’s: commercialization, the Web, new apps

Page 82: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-82

Sommario

Internet: un po’ di Storia

Page 83: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-83

L’evoluzione di Internetrete sperimentale rete per la ricerca infrastruttura

Darpa - ArpanetNSF - Internet

(National Science Foundation) Internet globale

1967 1984 1991

Page 84: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-84

Il 4 Ottobre 1957 Il 4 Ottobre 1957, viene messo in orbita

dall’Unione Sovietica lo Sputnik, il primo satellite artificiale della storia, battendo sul tempo gli U.S.A

Gli Stati Uniti creano l’ARPA, Advanced Research Project Agency, per ristabilire il primato scientifico nel campo militare

Nasce una scommessa bellica, che quasi inevitabilmente rivoluziona il modo di comunicare: Internet

Page 85: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-85

L’inizio e motivi della nascita Il DOD, Department of Defense, incarica l’ARPA

di costruire una rete telematica tra le basi militari dislocate sul territorio nazionale

L'impianto diviene attivo il L'impianto diviene attivo il 2 settembre 19692 settembre 1969 e nasce così e nasce così ARPANETARPANET

Tra il 1968 ed il 1969 l’ARPA collega 4 università diverse, ognuna con un IMP, cioè con un Interface Message Processor, usando la linea telefonica

Page 86: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-86

ARPANET

comunicazione tra città e basi militari dopo un conflitto nucleare

funzionamento anche dopo la scomparsa di alcuni nodi

nessun nodo di controllo possibile obiettivo di un attacco

Commutazione di pacchetto o packet switching tutti i nodi della rete con pari importanza e capacità di inviare,

smistare e ricevere messaggi messaggi suddivisi in pacchetti di lunghezza fissa ogni pacchetto contiene il mittente, il destinatario ed il

messaggio, con un percorso non predeterminato

Page 87: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-87

Funzionamento di ARPANET Ogni singolo pacchetto è

un’entità a se stante, dotata di una serie di informazioni

Dopo una serie di passaggi tra i vari nodi, tutti i pacchetti inviati da A giungono al nodo G, e ricomposti nel messaggio originale

Qualunque sia lo stato della rete, c’è una via alternativa per giungere alla propria destinazione

Page 88: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-88

All’inizio ... Settembre 1969:

University of California Los Angeles (UCLA),

Dicembre 1969: University of California

Santa Barbara (UCSB),

University of Utah

Stanford Research Institute (SRI).

ARPANET (Advanced Research Projects Agency)

Page 89: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-89

ARPANET

Settembre 1971

Ottobre 1980

Page 90: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-90

Miriade di *net ... usenet (1979) 1981,

NSF costruisce CSNET, Computer Science Network rete del Department of Energy rete della NASA, National Aeronautics and Space

Administration HEPNET, High Energy Physics Network che riuniva i

ricercatori della fisica delle alte energie MFNET, Magnetic Fusion Energy Network BITNET, Because It's Time Network, una rete con

tecnologia IBM per lo scambio di messaggi tra le università

Page 91: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-91

Miriade di *net ... eunet (1982) milnet, earnet, Fidonet (1983) junet, janet (1984) nsfnet = Internet Backbone (1986)

Page 92: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-92

Connessioni con l’Europa Dorsale comune, con allacciate diverse reti regionali identificate

in seguito come Regional Network Provider

JANET, JANET, Joint Joint Academic Academic NetworkNetwork

NORDUNENORDUNETT

JVNCNETJVNCNET,, John von John von Neumann Center Neumann Center NetworkNetwork

1987:1987: 64 kbps 64 kbps1989:1989: 128 128 kbpskbps

Nel Nel 19871987 connessione connessione diretta con diretta con ARPANET con ARPANET con protocolli comuniprotocolli comuni 15 giugno 1987 NSF pubblica un bando d’appalto per la

realizzazione di una nuova dorsale con i protocolli TCP/IP

Gli anni ‘80: Nascita di NSFNET, la prima vera grande dorsale di InternetGli anni ‘80: Nascita di NSFNET, la prima vera grande dorsale di Internet

Page 93: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-93

La prima vera grande dorsale Appalto quinquennale di 57,9 milioni di dollari concesso a: IBM,

MCI e Merit Network Nuova dorsale o backbone con nome NSFNET, linee ad alta

velocità T1 (1,5 Mbit per secondo)

Preclusa al traffico commerciale, come definito nel documento AUP, Accetable User Policy

La rete entra fisicamente in funzione nel luglio 1988 e resta attiva fino al luglio 1989, rimpiazzata da una nuova dorsale

1990, DOD dichiara ARPANET obsoleta e ufficialmente smantellata

Gli anni ‘80: Nascita di NSFNET, la prima vera grande dorsale di InternetGli anni ‘80: Nascita di NSFNET, la prima vera grande dorsale di Internet

Page 94: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-94

NSFNet 1988: CA, DK, FI, FR, IS, NO, SE 1989: AU, DE, IL, IT, JP, MX, NL, NZ, PR, UK 1990: AR, AT, BE, BR, CL, GR, IN, IE, KR, ES, CH 1991: HR, CZ, HK, HU, OL, PT, SG, ZA, TW, TN 1992: AQ, CM, CY, EC, EE, KW, LV, LU, MY, SK, SI, TH,

VE 1993: BG, CR, EG, FJ, GH, GU, ID, KZ, KE, LI, PE, RO,

RU, TR, UA, AE, VI 1994: ...

Page 95: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-95

Dal 1991 ...

Page 96: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-96

… al 1997

Page 97: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-97

Un po’ di numeri ...

Page 98: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-98

… e gli hosts ...

Page 99: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-99

Il World Wide Web 1992 istituita l’Internet Society con presidente Vinton Cerf Il CERN di Ginevra, ovvero il Consiglio Europeo per la Ricerca

Nucleare introduce il WWW, il world wide web

1992, il NCSA, presso la University of Illinois, rilascia l’interfaccia utente Mosaic

Il linguaggio HTML e il protocollo HTTP

A partire dal 1994 il web trasforma Internet in un fenomeno di massa non più accessibile esclusivamente ad università ed enti di ricerca

Gli anni ‘90: il World Wide WebGli anni ‘90: il World Wide Web

Page 100: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-100

NCSA Mosaic

Page 101: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-101

Il www ...

Page 102: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-102

navigatori internet nel mondo

Page 103: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-103

Lingua della popolazione on-line

Page 104: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-104

Penetrazione Internet in Europa

Page 105: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-105

Accessi Internet in Italia 1999-2004

Page 106: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-106

Quota di web buyers nei paesi europei

Page 107: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-107

L'E-commerce in Italia

Page 108: Introduction1-1 Reti di calcolatori e Sicurezza -- Overview --- Part of these slides are adapted from the slides of the book: Computer Networking: A Top

Introduction 1-108

Introduction: Summary

Covered a “ton” of material! Internet overview what’s a protocol? network edge, core,

access network packet-switching

versus circuit-switching Internet/ISP structure performance: loss, delay layering and service

models history

You now have: context, overview,

“feel” of networking more depth, detail

to follow!