www.ischool.drexel.edu info 330chapter 11 info 330 computer networking technology i chapter 1...

85
www.ischool.drexel.edu INFO 330 Chapter 1 1 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

Upload: gordon-melton

Post on 11-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 1

INFO 330Computer Networking

Technology I Chapter 1

Networking Overview

Jennifer Booker

Page 2: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 2

Computer Networks

• A network is the structure that allows computer applications to communicate with each other– The applications could be executed by the

user, or part of the operating system

• Not every computer system is designed to allow networking – Microsoft DOS had no native networking

ability; it was added after the need arose

Page 3: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 3

The Internet

• The Internet is the primary model for understanding networking concepts because, well, nearly every computer and many other things could be connected to it

Page 4: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 4

The Internet

• Key parts of any network include– Hosts or end systems, which are the

computers and other things with which most people interact

• End user computers, workstations, and servers are

all considered hosts• As of July 2008 there were about 600 million hosts

on the Internet, and about 850 million as of July 2011

Page 5: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 5

The Internet

– Communication links, which are the wired or wireless means used to connect to the network

– Packet switches, which help guide information between hosts

• Routers and link-layer switches are the primary types of packet switches

Graphics are taken from the text’s lecture notes

Page 6: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 6

The Internet

• The network sends chunks of information called packets along a route or path to get from one host to another– The speed at which it does so is the

transmission rate, typically in bits per second (bps)

Page 7: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 7

The Internet

• The control over choosing the path is known as packet switching

• End systems connect to the Internet through an Internet Service Provider (ISP)

• ISPs provide many levels of service– Residential or business service, typically from

56kb dialup to DSL, FIOS, or cable modems

Page 8: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 8

The Internet

• The packets are defined and handled according to protocols, most notably the Transmission Control Protocol (TCP) and Internet Protocol (IP)

• A protocol is a language for communication

Page 9: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 9

Protocols

• In order for it to work, both parties (e.g. hosts, switches, etc.) need to speak the same language oder Sie werden einander nicht verstehen or they won’t understand each other

• Some protocols use a handshake concept– Like saying Hi as a greeting, special

messages are defined that request a connection, and reply to accept the connection

Page 10: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 10

Protocols

• More formally, then, protocols define – The format of messages (like the spelling

of words)– The order of messages (the syntax of

sentences, or else your messages like Yoda will sound)

• Much of understanding networking is understanding how these protocols work

Page 11: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 11

Source of Protocols

• Internet protocols are defined by the Internet Engineering Task Force (IETF)– The IETF was created by the Internet

Architecture Board (IAB) and also reports to the Internet Society (ISOC)

• The Request For Comments (RFCs) define the actual protocols– The first RFC was dated April 1969– As of December 2014, there are over

7400 RFCs (see RFC Index)

Page 12: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 12

Internet vs Intranet

• The Internet (a proper noun, hence is capitalized) is the public network of zillions of computers, toasters, etc.

• An intranet (not a proper noun) is the generic term for a local private network that uses the same protocols as the Internet

Page 13: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 13

Type of Internet Service

• The Internet runs distributed applications– The World Wide Web, instant messaging,

distributed games, etc. are all distributed applications

– These applications are developed using an Application Programming Interface (API) to connect to the Internet

Page 14: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 14

Type of Internet Service

• There are two choices for the type of service provided by an Internet connection– A connection-oriented, reliable service– A connection-less, unreliable service

• Neither guarantees how fast a message will get from host A to host B

Page 15: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 15

Connection-oriented, Reliable Service

• This establishes a loose connection between client and server, but not to the switches between them

• Key traits needed from this are– Reliable data transfer – every little bit counts– Flow control to keep from overwhelming hosts– Congestion control to avoid Internet gridlock

• TCP provides this service (RFC 793)

Page 16: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 16

Connection-less, Unreliable Service

• This service has no handshaking – it just sends packets of data– Don’t know if packets ever got there– No flow or congestion control

• Handled by the User Datagram Protocol (UDP), RFC 768

• Use when speed is critical, such as video conferencing or Internet telephone

Page 17: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 17

The Edge of the Network

• Now we’ll examine the contents of the Internet from the outside in – from the “edge” to the “core”

• Hosts (end systems) can be divided into clients and servers– Clients are computers that request services

from Servers– One computer (host) can be multiple clients

and servers at once (esp. in peer-to-peer applications)

Page 18: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 18

Access Networks

• To get from a host to a distant part of the Internet, you need to pass through the access network

• Access networks get residential, business, and wireless users connected

• Types of connections include– 56 kbps dial-up modem, an analog connection

over a voice phone line• Typically get 40-42 kbps due to line noise

Page 19: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 19

Access Networks

• Digital subscriber line (DSL) gives a dedicated connection, with different upstream and downstream rates– DSL uses FDM– Downstream/upstream rates are typically

values like 768k/128k, 3.0M/768k, etc.

• Business connections may use dedicated T1 lines (1.536 Mbps), ISDN connections, and other options

Page 20: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 20

Access Networks

• Cable modems use hybrid fiber-coaxial cable (HFC) to connect to special cable modems– HFC is a variant on the same cable used for

cable TV service

– HFC is a shared medium – if all your neighbors are online, your connection speed will suffer!

• Dial-up connections are only present when needed; DSL and cable modems are always on (we hope)

Page 21: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.edu

Access Networks

• Fiber to the home (FTTH) is fiber optic Internet connection for residential use

• There are two kinds of FTTH– Active optical networks (AONs) are switched

Ethernet– Passive optical networks (PONs) are used by

Verizon’s FIOS service• Typically about 100 homes share a connection

from the provider’s central office (CO)

INFO 320 week 1 21

Page 22: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.edu

Wired access

• Local area networks (LANs) generally use Ethernet for wired connections

• Ethernet speeds of 10-1000 Mbps are common, up to 10 Gbps for servers and routers

INFO 320 week 1 22

Page 23: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 23

Wireless Access

• Wireless devices connect through wireless access points (base station) on a LAN – Then the LAN uses some other access

connection to get to the Internet

• Wireless devices use the IEEE 802.11 family of technologies– 802.11a supports up to 54 Mbps @ 5 GHz

– 802.11b supports 5.5 and 11 Mbps @ 2.4 GHz

– 802.11g supports up to 54 Mbps @ 2.4 GHz

Page 24: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 24

Why Does Frequency Matter?

• Wireless signals can be interfered with by other devices; when that occurs, they detune their speed– 802.11a has seven (48, 36, 24, 18, 12, 9, and 6 Mbps)– 802.11b has three lower data rates (5.5, 2, and 1 Mbps)– 802.11g has a range of lower speeds

• The 802.11b and 802.11g standards use the 2.4 GHz (gigahertz) frequency range– This frequency range is used by other networking

technologies, microwave ovens, 2.4GHz cordless phones (a huge market), and Bluetooth devices

• The 5 GHz frequency range for 802.11a is relatively clear, so it’s less likely to have interference (so far)

Page 25: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 25

Wireless Network Example

DSL ModemGateway /

DHCP serverHub

Computer 1

Computer 2

Computer 3

Phoneline

Wireless Access Point

Laptop 1

Wireless Repeater Laptop 2

Cable Modem

CoaxCable

Or could have

Page 26: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.edu

WiMAX

• The next generations of wireless communication are a battle between advanced cell technologies (3G and 4G protocols) and WiMAX

• WiMAX is IEEE 802.16, and promises 5-10 Mbps speed over ranges of tens of km

INFO 320 week 1 26

Page 27: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 27

Physical Media

• Physical media used for connecting networks can be guided or unguided– Guided media use something solid – wires,

coaxial cable, fiber-optic cable, etc.– Unguided media use electromagnetic waves

of some kind – wireless LAN signals, satellite channels, etc.

Page 28: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 28

Physical Media

• Specific kinds of physical media include– Twisted pair copper wire– Coaxial cable– Fiber optics– Terrestrial radio channels– Satellite radio channels

Page 29: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 29

Twisted pair copper wire

• Most common physical medium, has multiple coated wires wrapped around each other– Includes phone lines, which have four thin

wires with RJ-11 plugs on the end– Ethernet cables have eight wires, and RJ-45

plugs on the end, so they’re wider than phone plugs

• Can handle Gbps speeds over distances of about a hundred yards

Page 30: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 30

Coaxial cable

• Coaxial (coax) cable has a copper wire core, and a copper cylinder around it – they share the same axis of rotation, hence the name

• Handles multiple Mbps speeds for miles

• There are only two conductors, which is why it’s a shared medium – everyone shares the same resources

Copper wire and cylinder

Insulation

Page 31: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 31

Fiber optics

• Fiber optics use hollow fibers to guide light pulses

• Handles hundreds of Gbps speeds up to 100 km

• Most international phone lines, and the Internet backbone, are fiber optic cables

• Used on high speed LANs – 1 to 10 Gbps

Page 32: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 32

Terrestrial radio channels

• These include the wireless network channels discussed previously, plus radio signals used to beam networks between buildings

• Can reach long distances with the latter, but signals can be intercepted, bounce, fade, and have interference from other signals

Page 33: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 33

Satellite radio channels

• Consist of geostationary satellites and low-altitude satellites– Geostationary satellites hover 24,000 miles

above the Earth’s surface, and are used to relay TV channels and parts of the Internet backbone

– Low altitude satellites (LEO, low-Earth orbiting) orbit much faster, so you need several to be able to find one at any given time; are not used for networks

Page 34: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 34

Psst – what Internet Backbone?

• The Internet is a network of many networks– It was designed that way to be redundant in the

event of war – if one part of it was no longer usable (nice euphemism!), the rest of the network would still work

• At its heart are many Tier-1 ISPs– Sprint, MCI, WorldCom, AT&T, etc. are all Tier-1

– They run extremely fast “backbone” connections (622 Mbps to 10 Gbps)

Page 35: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 35

Internet Backbone

• The Tier-2 ISPs are regional or national in scope, and connect to Tier-1 and Tier-2 ISPs

• Points where ISPs connect to each other are Points Of Presence (POPs)– Don’t confuse with Post Office Protocol (POP)

• They may also connect at Network Access Points (NAPs) to local telecom companies or Tier 1 ISPs

Page 36: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 36

Internet Backbone

• There are thousands of lower level ISPs, Tier-3, probably including your local ISP

• For a packet to get from one host to another, it may pass through a variety of Tier-1, Tier-2, and Tier-3 ISPs, NAPs, POPs, etc.

Page 37: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 37

Circuit vs Packet Switching

• In order to get a packet from host A to host B, two major approaches could be used– Both approaches send packets over

communication lines– Circuit switching is what a traditional

telephone system does• Reserve a path from A to B which is the circuit

messages will follow, until the connection is closed– Packet switching is used by the Internet

• Dump packets into the network with no reserved path, and make a best effort to get packet to destination

Page 38: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 38

Circuit Switching

• To link host A and host B, each link between switches along the way must be reserved for the duration of that connection or circuit

• There are two ways to share links with many circuits: – Frequency-division multiplexing (FDM)– Time-division multiplexing (TDM)

Page 39: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 39

FDM and TDM

• FDM acts like FM radio – it divides the link by frequency ranges, and assigns a frequency range to each circuit– Typical frequency range, or bandwidth, is 4 kHz– This way one link can handle many circuits

• TDM breaks the link into some number (n) of slots in a frame– Each slot is dedicated to one circuit, so that

circuit has full attention of the link 100/n percent of the time

Page 40: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 40

Bits and Bytes

• To review basic computer units– A bit is a binary digit – a 0 or 1– Typically eight bits are a byte, the shortest

word• Old ASCII text files may use seven bits per byte,

so there are 27 = 128 ASCII characters– Transmission rate of data is given in bits per

second (bps), or thousands or millions or billions of bits per second (kbps, Mbps, Gbps)

– Data transfer = rate * time• Which has units of: bits = bits/sec * sec

Page 41: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.edu

Key conversion point

• In dealing with prefixes k, M, G, etc., in computer science they represent 2^(n*10)– k = 2^10, M = 2^20, G = 2^30, etc.

• For our purposes, treat prefixes as their base 10 equivalents– k = 1000, M = 1,000,000, G = 1 billion

INFO 320 week 1 41

Page 42: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 42

TDM Example

• Suppose you have a 1.536 Mbps TDM connection, and want to send a 1 Mb (megabit) file; the connection has 12 links

• How long does it take?– Your transmission speed is 1/12 of the

1.536 Mbps, or 0.128 Mbps– Time = data / rate = 1 Mb / 0.128 Mbps =

7.8125 seconds– This doesn’t include time to make the

connection

Page 43: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 43

Packet Switching

• Messages are divided into packets before going into the network

• Most packet switches must receive an entire packet before forwarding it to the next switch– This store-and-forward transmission

introduces delays while the switch waits for the entire packet to get there

• If a packet size is L, and the transmission rate is R, the delay to receive one full packet is L/R

Page 44: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 44

Store and Forward Delay

• Assume 1) no queuing delay, 2) no time to make a connection, and 3) no delay to propagate packets

• Send a packet of L bits across a packet-switched network with Q links, all of which have a transmission rate of R bps– For each link, the store and forward delay of

L/R seconds; this occurs Q times, for a total delay of Q*L/R seconds

Page 45: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 45

Packet Switching

• Each switch typically connects to many links

• For each link, there is an output buffer (or output queue) to hold packets waiting to go on that link– This introduces queuing delays, while a

packet waits its turn– If the buffer is full, the packet can be lost –

packet loss isn’t good!

Page 46: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 46

Statistical Multiplexing

• Compare circuit to packet switching

• Suppose users are active 10% of the time, sending 100 kbps of data, and not using the connection the other 90% of the time

• If there’s a 1 Mbps connection available:– TDM circuit switching would need 10 slots to

allow each user 100 kbps

Page 47: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 47

Statistical Multiplexing

– Packet switching could handle 35 users total because the total number of active users will be 11 or more only 0.04% of the time (look up the binomial distribution for details)

• The remaining 99.96% of the time, the total data rate is less than the 1 Mbps capacity of the connection

• Hence sharing resources on demand (which is statistical multiplexing) allows the same performance 99.96% of the time, for over three times the number of users!

Page 48: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 48

Packet-Switched Networks

• There are two major kinds of packet-switched networks – datagram networks and virtual-circuit networks

• A datagram network forwards packets according to the host destination address– Hence the Internet is a datagram network– Routers forward packets to make a best effort

to get them to the destination address

Page 49: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 49

Virtual Circuit Networks

• A virtual circuit network forwards packets according to virtual circuit numbers– A virtual circuit (VC) is an imaginary connection

between the source and destination hosts• Examples are X.25, frame relay, and asynchronous

transfer mode (ATM)

– Each packet has a VC identifier (VC ID)

– Each packet switch indexes its VC translation table, and forwards the packet to the right outbound link

Page 50: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 50

Virtual Circuit Networks

– A key difference between datagram and VC networks is that VC networks have to maintain state information about connections

• Each new VC means a new entry has to be added to the VC translation table, and then is removed when the connection is ended

– It also needs to keep a table to map VC numbers to output interface numbers

Page 51: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 51

Datagram Networks

• Datagram networks are like the post office

• The contents of a message (like a letter or box) are only seen by the sender and recipient (we hope), and in between them, the postal service only looks at the recipient’s address, e.g. my address is:– 306 Rush Hall

3141 Chestnut StPhiladelphia, PA 19104 USA

Page 52: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 52

Datagram Networks

– If a letter is mailed to me from outside the USA, the first thing they need to know is that the letter needs to go to America

– Then a machine reader finds the zip code, and knows the letter needs to go to Philadelphia, since 19104 is entirely within Philly

– The local letter carrier recognizes 3141 Chestnut St as the central location for all Drexel mail

– Someone within Drexel knows where 306 Rush Hall is, and carries the letter there

Page 53: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 53

Datagram Networks

– And the receptionist in 306 Rush Hall knows that I’m full time faculty, and puts the letter in my mailbox

• Each step along the way, the letter is routed essentially by reading the address backward (USA - 19104 – Philadelphia, PA – 3141 Chestnut St – 306 Rush Hall – Jennifer Booker)

• Datagram networks do the same thing – a packet of data is wrapped in layers of addresses, which are used by routers

Page 54: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 54

Datagram Networks

• Notice that datagram networks do not maintain state information about any packet – they only read the address and decide where to send it based on that address

• Traceroute (in Windows, tracert; see also RFC 1393) is an application that shows you the details of how a packet gets from one host to another

Page 55: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 55

Traceroute Output• FROM www.adelphiacom.net TO www.nero.com. • traceroute to www.nero.com (62.93.192.11), 64 hops max, 44 byte packets• 1 i0.chi75.adelphiacom.net (66.109.10.17) 0.554 ms 0.420 ms 0.360 ms• 2 g1-01-02-00.a0.chi75.adelphiacom.net (66.109.3.17) 0.561 ms 0.873 ms 0.313 ms• 3 a1-00-00-00.c0.chi75.adelphiacom.net (66.109.3.1) 0.372 ms 0.355 ms 0.317 ms• 4 so-00-01-00.c1.dca91.adelphiacom.net (66.109.0.82) 16.992 ms 16.940 ms 16.925

ms• 5 p3-05-00-00.p0.dca90.adelphiacom.net (66.109.1.142) 17.748 ms 17.743 ms 17.740

ms• 6 so-4-0-0.mpr2.iad5.us.above.net (64.124.11.225) 17.817 ms 17.812 ms 20.384 ms• 7 so-7-0-0.mpr2.iad1.us.above.net (64.125.28.13) 17.832 ms 17.917 ms 17.798 ms• 8 so-6-0-0.cr2.dca2.us.above.net (64.125.27.210) 18.178 ms 18.202 ms 18.211 ms• 9 so-6-0-0.cr2.lhr3.uk.above.net (64.125.27.166) 90.064 ms 90.101 ms 97.132 ms• 10 64.125.27.221.available.above.net (64.125.27.221) 107.404 ms 107.474 ms 107.519

ms• 11 pos-9-1.mpr2.fra1.de.above.net (64.125.23.253) 113.379 ms 113.830 ms 113.340

ms• 12 ge-9-7.er2a.fra1.de.above.net (64.125.23.186) 154.871 ms 117.584 ms 117.607 ms• 13 62.93.192.11.insoft.fra2.de.mfnx.net (62.93.192.11) 113.757 ms 113.659 ms

113.576 ms

Page 56: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 56

Traceroute Output

• Each line of output gives you– The hop number (1, 2, …)

– The name of the server it’s passing through

– The IP address of that server (e.g. 66.109.1.142)

– And times of three attempts to “ping” that server (say Hi to it), given in milliseconds (ms)

• Notice the example goes through servers in the UK and Germany (uk, de), and the ping times go over a hundred milliseconds

Page 57: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 57

Summary of Network TypesTelecommunication

Networks

Circuit-switched networks

Packet-switched networks

Datagram Networks(Internet)

FDM TDM

Virtual-circuit Networks

(X.25, frame relay, ATM)

Page 58: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 58

Delays and Losses

• We’ve hinted at several kinds of things that can delay a packet or make it get lost; now we’ll examine those concepts in more detail

• After a packet leaves the host, it typically passes through several routers before getting to its destination

• Each router examines the packet’s header to determine which outbound link it needs to follow, and puts it in a queue for that link

Page 59: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 59

Delays and Losses

• Four main causes of delay at each router:– Nodal processing delay– Queuing delay– Transmission delay– Propagation delay

A

B

propagation

transmission

nodalprocessing queueing

A

B

propagation

transmission

nodalprocessing queueing

Page 60: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 60

Delays and Losses

– Nodal processing delay is the time needed for the router to examine the packet’s header and choose the right outbound link

• Also may include time for error checking the packet

• Typically in microseconds for good routers

– Queuing delay is the time for a packet waiting to be transmitted across the outbound link

• Depends mostly on how much traffic got to the router which is waiting for the same link

• Could be microseconds or milliseconds in duration

Page 61: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 61

Delays and Losses

– Transmission delay is like the store-and-forward delay mentioned earlier; it’s the time to transmit the packet onto the link

• The entire packet has to be pushed onto the link by the router, so the transmission delay is L/R, or (packet size)/(transmission speed)

– Propagation delay is the time for the packet to get to the next router

• Distance = speed * time, so the propagation delay is distance/speed, where speed is 2 or 3x108 m/sec (the speed of light is 3x108 m/s)

Page 62: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 62

Delays and Losses

• You might think of Transmission delay and Propagation delay as being like leaving for a trip – transmission delay is the time to pack the car (time to get out of the house), and propagation delay is the time to drive to your destination (travel time)

• Or ignore this analogy if it doesn’t help

Page 63: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 63

Delays and Losses

• So the delay at one node, the nodal delay, is given bydnodal = dproc + dqueue + dtrans + dprop

– Where dproc = Nodal processing delaydqueue = Queuing delaydtrans = Transmission delaydprop = Propagation delay

– The relative magnitude of these terms can vary widely, depending on the circumstances

Page 64: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 64

Traffic Intensity

• Consider if all packets were the same size L bits, and arrive at a router at a rate of ‘a’ packets per second – The rate of data arriving at the router is L*a

bits per second

• The output rate from the router is its transmission rate, R bits per second

• The traffic intensity is L*a/R– Want traffic intensity < 1 – why?

Page 65: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 65

Traffic Intensity

• Average queuing delay grows exponentially as traffic intensity approaches one– This is the router equivalent of gridlock!

• It was assumed that the router could hold an infinite amount of packets in its queue– A dropped or lost packet occurs when a packet

arrives at a router with its outbound link queue full

– Fraction of lost packets is a key measure

Page 66: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 66

End-to-end Delay

• So far we focused on one router

• Now consider the total delays getting from host to host – the end-to-end delay

• If we assume – 1) there are N-1 routers between hosts,

– 2) queuing delays are negligible, and

– 3) processing delays are the same for each router and the source host,

– 4) transmission rates are all R bits/sec, and

– 5) propagation delays are all equal

Page 67: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 67

End-to-end Delay

• Then the total delay from source host to destination host isdend-end = N*(dproc + dtrans + dprop)

– And dtrans is L/R, with L the packet size

• So why is it N instead of (N-1)?

Page 68: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 68

Internet Throughput

• Much of the Internet core has more capacity than currently needed (it is over-provisioned)

• As a result, the limit of getting data through the Internet is the speed of your access link (ISP connection) and your destination’s access link

Page 69: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 69

Layered Architecture

• As hinted at in the syllabus, the layers of networking are a key concept– Why use layers?

• To solve a big problem, break it into little problems• Each layer has a small, focused amount of work it

needs to accomplish; each layer provides services to the layer above it

• Disadvantages are: possible duplication of work (error recovery on multiple layers), and violating the scope of a layer’s services

Page 70: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 70

Layered Architecture

• The layers are seen at right– The application layer is where

user-visible software exists – HTTP, SMTP, FTP, etc. protocols

– The transport layer is home to the TCP and UDP protocols

– The network layer is home to the Internet Protocol, IP, and the protocols used by routers

application

transport

network

link

physical

application

transport

network

link

physical

Page 71: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 71

Layered Architecture

• The link layer is key for local routing; includes Ethernet and Point-to-Point Protocol (PPP)

• The physical layer moves the bits of data (frames, as we’ll see shortly) across the guided or unguided media discussed earlier– Each medium has protocols for how data

is encoded and decoded

Page 72: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 72

But Wait Professor Booker!

• Aren’t we missing the Presentation and Session layers?!?– Yes, the OSI reference model has them between

the application and transport layers, but they aren’t directly relevant here

• The presentation layer includes coding and conversion functions that are applied to application layer data – such as MPEG, QuickTime, JPG, GIF, TIFF

• The session layer opens and closes communication sessions; AppleTalk is a familiar protocol here

Page 73: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 73

Layered Architecture

• To make it more confusing, the packet we’ve been discussing has different names as it descends the layers– Terms may vary from vendor to vendor

• A packet becomes– A message in the application layer

– A segment in the transport layer

– A dataframe (or datagram) in the network layer

– A frame in the link and physical layers

Page 74: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 74

Layered Architecture

• With each layer, headers are added to the message to describe the address information needed by that layer

• This process is called encapsulation, as we put the message in bigger and bigger boxes

• Routers and switches typically look at the link or network layer information– Like a letter carrier, they don’t read your mail

Page 75: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 75

Layered Architecturesource

applicationtransportnetworklink

physical

HtHn M

segment Ht

datagram

destination

applicationtransportnetworklink

physical

HtHnHl M

HtHn M

Ht M

M

networklink

physical

linkphysical

HtHnHl M

HtHn M

HtHn M

HtHnHl M

router

switch

message M

Ht M

Hnf rame

sourceapplicationtransportnetworklink

physical

HtHn MHtHn M

segment HtHt

datagram

destination

applicationtransportnetworklink

physical

HtHnHl MHtHnHl M

HtHn MHtHn M

Ht MHt M

MM

networklink

physical

networklink

physical

linkphysicallink

physical

HtHnHl MHtHnHl M

HtHn MHtHn M

HtHn MHtHn M

HtHnHl MHtHnHl M

router

switch

message MM

Ht MHtHt MM

HnHnf rame

Page 76: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 76

Network Security

• While security is covered in detail in INFO 331, we’ll mention a couple of key concepts

• Malware is a generic term for software that does harm (malicious software)– It could enroll your computer in a botnet,

where it helps distribute spam or help attack other computers

– Much malware is self-replicating, so it can spread very quickly

Page 77: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 77

Network Security

• Viruses are malware that require the user to activate it somehow, but it could be disguised as a web link

• Worms can enter your computer without user activation

• Trojan horses enter via a legitimate application, such as a simple game

Page 78: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 78

Network Security

• Threats can keep a host from getting legitimate network traffic – this is a denial of service (DoS) attack– Types of DoS attacks include exploiting a

vulnerability in the OS or an application, flooding the bandwidth leading to the host, or making the host establish phony network connections

• Herds of computers can participate in a distributed DoS attack (DDoS)

Page 79: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 79

Network Security

• Network data can be read using packet sniffers– We’ll use one for our labs, WireShark

• Or people can fake who they are on the network, and impersonate you (IP spoofing) or intercept a network connection (man in the middle attack)

Page 80: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 80

A Little History

• The concept of packet switching was developed in the early 1960’s by MIT and the Rand Institute, in order to make it possible to share really expensive computer time efficiently

• The first packet switches were called interface message processors (IMPs)

• ARPAnet, the Internet predecessor, was proposed in 1967

Page 81: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 81

A Little History

• By 1969, four computers were on ARPAnet, and RFCs were being published

• By 1972 there were 15 nodes on ARPAnet, and it was first seen publicly

• The first email program was written in 1972

• A microwave network was developed in Hawaii, and various packet switching networks were developed by the mid 1970’s

Page 82: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 82

A Little History

• As the number of similar networks grew, connecting them to aid researchers became an obvious direction

• Vint Cerf helped establish the core Internet protocols by the end of the 1970’s – TCP, IP, and UDP

• Robert Metcalfe defined Ethernet in 1976

• By 1983, ARPAnet switched to TCP/IP

Page 83: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 83

A Little History

• The French installed Minitel, a public packet-switched network, in the early 1980’s, a decade before the US caught on to the Internet

• DNS wasn’t invented until the late 1980’s (RFC 1034)

• The World Wide Web was invented between 1989 and 1991 by Tim Berners-Lee, based on work as far back as 1945

Page 84: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 84

A Little History

• At the end of 1992 there were ~200 web servers in the world

• In 1994 Mosaic was formed, later known as Netscape, and much of the world was introduced to the Internet

• By the late 1990’s, peer-to-peer file sharing, instant messaging, email, and the Web formed the ‘killer apps’ that launched the world we see today

Page 85: Www.ischool.drexel.edu INFO 330Chapter 11 INFO 330 Computer Networking Technology I Chapter 1 Networking Overview Jennifer Booker

www.ischool.drexel.eduINFO 330 Chapter 1 85

A Little History

• The dot-Com bubble burst by 2001, but a few companies survived

• Through the 1990’s, issues such as security and handling of streaming video became urgent, as e-commerce became as common as a 7-11

• Now more devices are connected – phones, PDAs – and we can’t imagine not having the Internet at our disposal