Computer Network and Data Communication 2 Meeting: Mohammad Hafiz Hersyah Budi Rahmadya Dodon Yendri
Computer Network and Data Communication 2 Meeting: Mohammad Hafiz Hersyah Budi Rahmadya Dodon Yendri
Computer Network and Data Communication 2 Meeting: Mohammad Hafiz Hersyah Budi Rahmadya Dodon Yendri
Introduction 1-2
The Network Core
mesh of interconnected
routers
How is data transferred
through net?
Circuit switching:
dedicated circuit per call:
telephone net
Packet switching: data
sent thru net in discrete
“chunks”
1-3
Network Core: Circuit Switching
End-end resources reserved
for “call”
link bandwidth, switch
capacity
dedicated resources: no
sharing
circuit-like (guaranteed)
performance
call setup required
1-4
Network Core: Circuit Switching
network resources (e.g., dividing link bandwidth into
bandwidth) divided into “pieces”
“pieces” frequency division
pieces allocated to calls time division
resource piece idle if not
used by owning call (no
sharing)
1-5
Circuit Switching: FDM and TDM
Example:
FDM
4 users
frequency
time
TDM
frequency
time
1-6
Numerical example
How long does it take to send a file of 640,000 bits from host A to
host B over a circuit-switched network?
All links are 1.536 Mbps
Each link uses TDM with 24 slots/sec
500 msec to establish end-to-end circuit
Get a calculator!
(1.536 * 1,000,000) / 24 = 64,000
1-7
Network Core: Packet Switching
each end-end data stream divided resource contention:
into packets aggregate resource
user A, B packets share demand can exceed
network resources amount available
each packet uses full link congestion: packets
bandwidth queue, wait for link use
resources used as needed store and forward:
packets move one hop at
a time
Bandwidth division into “pieces”
Node receives complete packet
before forwarding
Dedicated allocation
Resource reservation
1-8
Packet-switching: store-and-forward
L
R R R
1.5 Mb/s
B
queue of packets
waiting for output
link
D E
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction 1-18
Four sources of packet delay
1. nodal processing: 2. queueing
time waiting at output link
check bit errors
for transmission
determine output link
depends on congestion level
of router
transmission
A propagation
B
nodal
processing queueing
Introduction 1-19
Delay in packet-switched networks
3. Transmission delay: 4. Propagation delay:
R=link bandwidth (bps) d = length of physical link
B
nodal
processing queueing
Introduction 1-20
Nodal delay
3 probes
Introduction 1-25
Packet loss
queues (aka buffers) have finite capacity
packets arriving to full queue dropped (aka lost)
lost packet may be retransmitted by previous
node, by source end system, or not at all
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
full buffer is lost
Introduction 1-27
Throughput
throughput: rate (bits/time unit) at which
bits transferred between sender/receiver
instantaneous: rate at given point in time
average: rate over longer period of time
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-28
Throughput: Internet scenario
per-connection end- Rs
end throughput: Rs Rs
min(Rc,Rs,R/10)
in practice: Rc or Rs R
is often bottleneck
Rc Rc
Rc
Introduction 1-31
Protocol “Layers”
Networks are complex!
many “pieces”:
hosts Question:
routers Is there any hope of
links of various organizing structure of
media network?
applications
protocols Or at least our discussion
of networks?
hardware,
software
Introduction 1-32
Internet protocol stack
application: supporting network
applications
FTP, SMTP, HTTP
Application
transport: process-process data
transfer Transport
TCP, UDP
network: routing of datagrams from Network
source to destination
IP, routing protocols
Link
link: data transfer between neighboring
network elements
PPP, Ethernet Physical
physical: bits “on the wire”
Introduction 1-33
ISO/OSI reference model
presentation: allow applications to
interpret meaning of data, e.g., Application
encryption, compression, machine-
specific conventions Presentation
session: synchronization, Session
checkpointing, recovery of data
exchange Transport
Internet stack “missing” these Network
layers!
these services, if needed, must Link
be implemented in application Physical
needed?
Introduction 1-35
source
message M application
Encapsulation
segment Ht M Transport
datagram Hn Ht M Network
frame Hl Hn Ht M Link
Physical
link
physical
switch
destination Hn Ht M network
M Application Hl Hn Ht M Link
Ht M Transport Physical
Hn Ht M Network
Hl Hn Ht M Link
router
Physical
Introduction 1-36
Chapter1 Summary
Covered a “ton” of material! You now have:
Internet overview context, overview,
what’s a protocol? “feel” of networking
network edge, core, more depth, detail to
access network follow!
packet-switching versus
circuit-switching
Internet structure
performance: loss, delay,
throughput
layering, service models
history
Introduction 1-45
Network Security
The field of network security is about:
how bad guys can attack computer networks
how we can defend networks against attacks
how to design architectures that are immune to
attacks
Internet not originally designed with (much)
security in mind
original vision: “a group of mutually trusting users
attached to a transparent network”
Internet protocol designers playing “catch-up”
Security considerations in all layers!
Introduction 1-37
Bad guys can put malware into
hosts via Internet
Malware can get in host from a virus, worm, or
trojan horse.
Introduction 1-38
Bad guys can put malware into
hosts via Internet
Trojan horse Worm:
Hidden part of some infection by passively receiving
otherwise useful software object that gets itself executed
Today often on a Web self- replicating: propagates to
page (Active-X, plugin) other hosts, users
Virus
infection by receiving Sapphire Worm: aggregate scans/sec
object (e.g., e-mail in first 5 minutes of outbreak (CAIDA, UWisc data)
attachment), actively
executing
self-replicating: propagate
itself to other hosts,
users
Introduction 1-39
Bad guys can attack servers and
network infrastructure
Denial of service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets toward
target from target
compromised hosts
Introduction 1-40
The bad guys can sniff packets
Packet sniffing:
broadcast media (shared Ethernet, wireless)
promiscuous network interface reads/records all
packets (e.g., including passwords!) passing by
A C
Introduction 1-41
The bad guys can use false source
addresses
IP spoofing: send packet with false source
address
A C
Introduction 1-42
The bad guys can record and playback
Introduction 1-43
Network Security
more throughout this course
chapter 8: focus on security
crypographic techniques: obvious uses and
not so obvious uses
History(1.7) is for self-study
Introduction 1-44
Caravan analogy
100 km 100 km
ten-car toll toll
caravan booth booth
Introduction 1-26
Throughput (more)
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
Introduction 1-29
Layered architecture
Dealing with complex systems:
Each layer implements a service
Via its own internal-layer actions
Relying on services provided by layer below
Introduction 1-34