Lecture Notes PDF
Lecture Notes PDF
Purdue University
http://www.cs.purdue.edu/people/comer
Copyright 2014 by Douglas Comer And Pearson Education. All rights reserved.
MODULE I
d Professor
d TAs
d Students
d Fundamental principles
d Concepts
d Terminology (lots of it)
d Key aspects of networking
d Commercial aspects
Vendors
Products
Prices
Markets and marketing
d How to engineer network equipment
d How to configure/operate networks
d How to design new protocols
d Closed networks
Vertical approach
Each vendor designs/ builds their own
Given technology owned by vendor
Vendor may license technology to other groups
d Open networks
Competitive approach
Multiple groups collaborate to define a technology
To insure interoperability, specifications written in
standards documents that are available to everyone
Companies build products according to standards
d Syntax
Format of each message
Representation of data items
Encoding of bits in electromagnetic signals
d Semantics
Meaning of each message
Procedures used to exchange messages
Actions to take when an error occurs
Application
LAYER 5
Transport
LAYER 4
Internet
LAYER 3
Network Interface
LAYER 2
Physical
LAYER 1
Computer 1 Computer 2
Application Application
Transport Transport
Internet Internet
Physical Network
3: Internet header
4: Transport header
Application Application
identical message
Transport Transport
identical packet
Internet Internet
identical datagram
identical frame
Physical Network
No!
d Facts
A transport protocol selects amount of data to send in
each packet
To optimize performance, ensure packets are full
d Unfortunately
To find maximum packet size, transport protocol must
interact with a lower layer
Host A Host B
application application
router
transport transport
net 1 net 2
d Cross-layer functions
Routing protocols operate at layer 5 but change layer 3
forwarding tables
Address resolution maps layer 3 addresses to layer 2
addresses
d Layer circularities
Tunneling can be used to send IPv6 (a layer 3 protocol)
over IPv4 (another layer 3 protocol)
Virtual Private Networks (VPNs) send IP over IP
appl1 appl2
transport
Internet Internet
Physical net
Application
LAYER 7
Presentation
LAYER 6
Session
LAYER 5
Transport
LAYER 4
Network
LAYER 3
Data Link
LAYER 2
Physical
LAYER 1
Hire really, really smart people and have them design a single,
large protocol that handles all aspects of communication
without dividing the problem into smaller subproblems
d Consequence
Every Internet communication, including voice and
video teleconferencing, involves communication among
application programs
d Possibilities
Send exactly one message followed by end of file (EOF)
Send multiple messages with an integer length before
each message
Send multiple messages with a termination character (or
sequence) following each message
d Notes
Any technique can be used as long as both sides agree
If sending a multi-byte length value or multi-byte
termination sequence, remember that the application may
need multiple calls receive all bytes
d In a realistic setting
Is division of a message likely to occur?
Is aggregation of multiple messages likely to occur?
d In a realistic setting
Is division of a message likely to occur?
Is aggregation of multiple messages likely to occur?
d Answers
d In a realistic setting
Is division of a message likely to occur?
Is aggregation of multiple messages likely to occur?
d Answers yes! (depending on the size of the messages)
Messages larger than 1400 characters are usually divided
into multiple packets for transmission, and may be
delivered together or separately
The stream service is designed to aggregate small
messages before making them available to a receiving
application
connection Internet
2222222222222222222222222222222222222222222222222222222222222222222222
1 Server Application 1 Client Application 1
21 222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 Starts first 1 Starts second 1
21 222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 Does not need to know which client 1 Must know which server to 1
1 1 1
will contact it
12222222222222222222222222222222222222222222222222222222222222222222222
1 contact 1
1 1 1
1 Waits passively and arbitrarily long 1 Initiates a contact whenever 1
1 for contact from a client 1 communication is needed 1
21 2222222222222222222222222222222222222222222222222222222222222222222221 1
1 Communicates with a client by 1 Communicates with a server by 1
1 sending and receiving data 1 sending and receiving data 1
12222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 1 1
1 Stays running after servicing one 1 May terminate after interacting 1
1 client, and waits for another 1 with a server 1
12222222222222222222222222222222222222222222222222222222222222222222222 1 1
d Broadcast
Sender broadcasts message and all stations receive it
Does not scale well (becomes inefficient)
Difficult to restrict data access
d Broadcast
Sender broadcasts message and all stations receive it
Does not scale well (becomes inefficient)
Difficult to restrict data access
d Rendezvous point
Intermediary connects communicating applications
In essence, there are two clients and a server
Rendezvous point becomes a bottleneck
d Peer-To-Peer Interaction
Designed to avoid central server bottleneck
Data divided among N computers
Each computer acts as a server for its data and as a
client for other data
Given computer receives 1 / N of the traffic
1/ N of all traffic
Internet
Server Client
await_contact make_contact
recv send
send recv
send_eof send_eof
socket
bind
socket listen
connect accept
send recv
recv send
close close
d Web browsing
d Email
d File transfer
d Remote login and remote desktop
d Domain Name System (name lookup)
d Web browsing
d Email
d File transfer
d Remote login and remote desktop
d Domain Name System (name lookup)
2222222222222222222222222222222222222222222222222222222222222222222222
1 Standard 1 Purpose 1
21 222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 HyperText Markup 1 A representation standard used to specify the 1
1 Language (HTML) 1 contents and layout of a web page 1
12222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 Uniform Resource 1 A representation standard that specifies the 1
12222222222222222222222222222222222222222222222222222222222222222222222
Locator (URL) 1 format and meaning of a web page identifier 1
1 1 1
1 HyperText Transfer 1 A transfer protocol that specifies how a browser 1
1 Protocol (HTTP) 1 interacts with a web server to transfer data 1
12222222222222222222222222222222222222222222222222222222222222222222222
1 1
d Representation standard
d A text string with punctuation characters separating the
string into (optional) subfields
d General form is:
2 22222222222222222222222222222222222222222222222222222222222222222222222
1 Request 1 Description 1
2
1 22222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 Requests a document; server responds by sending status 1
1 GET 1 information followed by a copy of the document 1
12 22222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 HEAD 1 Requests status information; server responds by sending 1
12 22222222222222222222222222222222222222222222222222222222222222222222222
1 status information, but does not send a copy of the document 1
1 1 1
1 1 Sends data to a server; the server appends the data to a 1
1 POST 1 specified item (e.g., a message is appended to a list) 1
12 22222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 Sends data to a server; the server uses the data to completely 1
1 PUT 1 1
replace the specified item (i.e., overwrites
112 22222222222222222222222222222222222222222222222222222222222222222222222
11 the previous data) 11
d General form
$ telnet www.cs.purdue.edu 80
Trying 128.10.19.20...
Connected to lucan.cs.purdue.edu.
Escape character is ^].
GET /homes/comer/ HTTP/1.0
HTTP/1.1 200 OK
Date: Sun, 10 Nov 2013 11:38:27 GMT
Server: Apache/2.2.11 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.8r
Last-Modified: Mon, 17 Oct 2011 22:21:41 GMT
ETag: "bafb0-a50-4af8607f7c740"
Accept-Ranges: bytes
Content-Length: 2640
Connection: close
Content-Type: text/html
...data from the web page follows here
Computer Networks and Internets -- Module 2 49 Spring, 2014
d Web browsing
d Email
d File transfer
d Remote login and remote desktop
d Domain Name System (name lookup)
Keyword: information
d Observe
Email was standardized when computers only had
character-oriented (textual) interfaces
SMTP is limited to transferring plain text messages
Users want to email photos, spreadsheets, messages with
special fonts and color
d Observe
Email was standardized when computers only had
character-oriented (textual) interfaces
SMTP is limited to transferring plain text messages
Users want to email photos, spreadsheets, messages with
special fonts and color
d Question: can SMTP be used to transfer such email?
d Observe
Email was standardized when computers only had
character-oriented (textual) interfaces
SMTP is limited to transferring plain text messages
Users want to email photos, spreadsheets, messages with
special fonts and color
d Question: can SMTP be used to transfer such email?
d Answer: it is possible because one can encode arbitrary
binary items in plain text (think of a hex dump)
MIME-Version: 1.0
Content-Type: Multipart/Mixed; Boundary=xyz123
--xyz123
Content-Type: image/jpeg
blank line ends header
d Web browsing
d Email
d File transfer
d Remote login and remote desktop
d Domain Name System (name lookup)
d Web browsing
d Email
d File transfer
d Remote login and remote desktop
d Domain Name System (name lookup)
d Remote login
Intended for systems with command-line interface
Internet standard is TELNET
Secure shell (ssh) encrypts transfers
To appreciate the complexity of application protocols
look at the TELNET standard
d Remote login
Intended for systems with command-line interface
Internet standard is TELNET
Secure shell (ssh) encrypts transfers
To appreciate the complexity of application protocols
look at the TELNET standard
d Remote desktop
Intended for systems that have a Graphical User
Interface (GUI)
No Internet standards
Move to thin client has revived interest
Computer Networks and Internets -- Module 2 65 Spring, 2014
d Web browsing
d Email
d File transfer
d Remote login and remote desktop
d Domain Name System (name lookup)
d Organization
Applies under a specific top-level domain
Can choose an internal hierarchy
Assigns each computer a name
d Geographic registration is possible
cnri . reston . va . us
ac . uk
(a) (b)
d Resolver
Acts as a client
Is configured with address of local DNS server
Contacts local server first
Socket library resolver is gethostbyname
d Caching
Follows locality of reference principle
Each DNS server caches results
Cached item never kept when stale
Modulator
Physical Channel
(noise & interference)
Demodulator
Demultiplexor
Channel Decoder Channel Decoder
Destination 1 Destination N
1
1 sec
2 sec
0 t
-1
1 1 0.5 sec
1 sec
2 sec 2 sec
0 t 0 t
-1 -1
1 1 0.5 sec
1 sec
2 sec 2 sec
0 t 0 t
-1 -1
1 sec 2 sec
0 t
-1
1 1 0.5 sec
1 sec
2 sec 2 sec
0 t 0 t
-1 -1
1 1
-1 -1
amplitude
bandwidth
1
0
1 2 3 4 5 6
1 1 1 1
+5
0 0 0 0
0
time
8 bits sent
1 1 1 1 11 11
+5 +5
10 10
+2
0 0 0 0
0
time 01 01 time
-2
00 00
-5
8 bits sent 16 bits sent
1 1 1 1 11 11
+5 +5
10 10
+2
0 0 0 0
0
time 01 01 time
-2
00 00
-5
8 bits sent 16 bits sent
...................... ......................
... ... ... ...
.... ...
... .... ...
...
... ... ... ... ... ...
... ... ... ... ... ...
... . ... ... . ...
.................. . .
................... .................. . .
...................
analog digital
signal sampling quantization encoding data
time
analog digital
signal sampling quantization encoding data
time
analog digital
signal sampling quantization encoding data
quanta
7 .....................................................................................................................................................
6 .....................................................................................................................................................
5 .....................................................................................................................................................
4 .....................................................................................................................................................
3 .....................................................................................................................................................
2 .....................................................................................................................................................
1 .....................................................................................................................................................
0 .....................................................................................................................................................
time
samples
3 333333 3 bits
333333 3 bits
33333
data rate = 8000 8 = 64,000
second sample second
sent
.. .. .. .. .. .. .. .. .. ..
1 .. 0 .. 0 .. 0 .. 1 .. 1 .. 0 .. 1 .. 1 .. 0 ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. .. .. ..
... ... ... ... ... ... ... ... ... ...
received
.. .. .. .. .. .. .. ..
0 .. 1 .. 0 .. 0 .. 1 .. 1 .. 1 .. 0 ..
... ... ... ... ... ... ... ...
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
... ... ... ... ... ... ... ...
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
.. .. .. .. .. .. .. ..
. . . . . . . .
(b)
Twisted Pair
Electrical
Coaxial Cable
Optical Fiber
Laser
Terrestrial
Radio
Electromagnetic
(Radio)
Satellite
d Is anything omitted?
Computer Networks and Internets -- Module 3 22 Spring, 2014
+5 +5 +5 +5
difference +8
+3 +3 +3 +3
+5 +5 +5 +5
difference +8
+3 +3 +3 +3
+5 +5 +5 +5
difference 0
+3 +3 +3 +3
2 222222222222222222222222222222222222222222222222222222222222222222222
1 Category 1 Description 1 Data Rate 1
1 1 1 1
12 222222222222222222222222222222222222222222222222222222222222222222222
1 1 (in Mbps) 1
12CAT 1 1 Unshielded twisted pair used for telephones
222222222222222222222222222222222222222222222222222222222222222222222 1 < 0.1 1
1 1 1 1
21 CAT 2 Unshielded twisted pair used for
222222222222222222222222222222222222222222222222222222222222222222222
1 T1 data 1 2 1
12CAT 3 1 Improved CAT2 used for computer networks
222222222222222222222222222222222222222222222222222222222222222222222 1 10 1
1 1 1 1
CAT 4 Improved CAT3 used
12 222222222222222222222222222222222222222222222222222222222222222222222
1 for Token Ring networks 1 20 1
12CAT 5 1 Unshielded twisted pair used for networks
222222222222222222222222222222222222222222222222222222222222222222222 1 100 1
1 1 1 1
CAT 5E Extended CAT5 for more
12 222222222222222222222222222222222222222222222222222222222222222222222
1 noise immunity 1 125 1
1 CAT 6 1 Unshielded twisted pair tested for 200 Mbps 1 200 1
21 222222222222222222222222222222222222222222222222222222222222222222222
1 1 1
1 CAT 7 1 Shielded twisted pair with a foil shield 1 600 1
1 1 around the entire cable plus a shield around 1 1
1 1 each twisted pair 1 1
12 222222222222222222222222222222222222222222222222222222222222222222222
1 1 1
high
critical
density angle
100 102 104 106 108 1010 1012 1014 1016 1018 1020 1022 1024
Low Radio & TV Micro- InfraRed UV X ray Gamma
frequencies wave ray
2222222222222222222222222222222222222222222222222222222222222222222222
1 Classification 1 Range 1 Type Of Propagation 1
21 222222222222222222222222222222222222222222222222222222222222222222222
1 1 1
1 Low 1 1 Wave follows earths curvature, but 1
1 Frequency 1 < 2 MHz 1 can be blocked by unlevel terrain 1
12222222222222222222222222222222222222222222222222222222222222222222222
1 1 1
1 Medium 1 1 Wave can reflect from layers of the 1
1 1 2 to 30 MHz 1 1
Frequency atmosphere,
12222222222222222222222222222222222222222222222222222222222222222222222
1 1 especially the ionosphere 1
1 1 1 1
1 High 1 > 30 MHz 1 Wave travels in a direct line, and will 1
112222222222222222222222222222222222222222222222222222222222222222222222
Frequency 11 11 be blocked by obstructions 11
atmosphere
Earth
2 35.8 10 6 meters
Round trip time = 33333333333333333333 = 0.238 sec
3 10 meters/sec
8
D = 2 B log2 K
C = B log2 ( 1 + S/N)
encoder decoder
d Examples:
Single parity bit
Row And Column (RAC)
Cyclic Redundancy Check (CRC)
Computer Networks and Internets -- Module 3 40 Spring, 2014
1 0 1 1 1
bits from parity for
dataword 0 0 1 0 1 each row
1 0 1 0 0
parity for
0 0 1 1 0 each column
1 0 1 1 1
bits from parity for
dataword 0 0 1 0 1 each row
1 0 1 0 0
parity for
0 0 1 1 0 each column
Transmission Mode
Parallel Serial
x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x
2 1
4 3 11 10 9 17
6 5 13 12 20 19 18 27 26
25
8 7 14 21 28
16 15 24 23
22 30 29
32 31
send receive
(a) simplex
send receive
receive send
(b) full-duplex
send receive
receive send
(c) half-duplex
carrier
carrier
signal
carrier
signal
modulated carrier
signal
modulated carrier
carrier
0 1 0 0 1 1 0
digital signal
sender 2 receiver 2
. .
. .
. .
sender N receiver N
sender 2 receiver 2
. .
. .
. .
sender N receiver N
d Types:
Frequency division multiplexing
Wavelength division multiplexing
Time division multiplexing
Code division multiplexing
filter 2
..
.
filter N
guard band
1 2 3 4 5 6 KHz
optical fiber
prism carrying a beam of light
1 1
2 2
k k
sender 2 . . . 3 2 1 N . . . 3 2 1 receiver 2
. .
. .
. .
sender N receiver N
d Synchronous TDM
Each sender assigned a slot (typically round-robin)
Used by the telephone company
d Statistical TDM
Sender only transmits when ready (e.g., Ethernet)
Computer Networks and Internets -- Module 3 63 Spring, 2014
d Access technologies
d Interconnection technologies
d Local area network packets, frames, and topologies
d Media access mechanisms and the IEEE MAC sub-layer
d Wired LAN technologies (Ethernet and 802.3)
d Wireless Networking Technologies
d LAN Extensions
d Switches and switched networks
subscribers
location
upstream
KHz
0 4 26 138 1100
d Wireless
Wi-Fi
WIMAX
Satellite
3G and 4G cellular services
d Leased point-to-point circuits (e.g., T1 or fractional T1)
d Packet switching
packet-switched network
... 3 2 1 2 1
... 3 2 1 2 1
Application
Transport
TRANSPORT
APPLICATION
DATA LINK
Internet
INTERNET
Data Link
PHYSICAL
Physical
Bus Ring
Star Mesh
3 bytes 3 bytes
d Address types
222222222222222222222222222222222222222222222222222222222222222222222
1 Address Type 1 Meaning And Packet Delivery 1
1 222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 unicast 1 Destination is a single computer; only that computer 1
1 1 should receive a copy of the packet 1
1222222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 broadcast 1 Destination is all computers on a network; they 1
1222222222222222222222222222222222222222222222222222222222222222222222
1 should each receive a copy of the packet 1
1 1 1
1 multicast 1 A subset of the computers on a network should 1
1 1 receive a copy of the packet 1
1222222222222222222222222222222222222222222222222222222222222222222222
1 1
HEADER PAYLOAD
d Use SOH and EOT characters to mark the start and end of a
frame
d Use SOH and EOT characters to mark the start and end of a
frame
original data
stuffed data
Reservation
Token passing
ALOHA
CSMA / CA
FDMA
Channelization TDMA
Protocols
CDMA
222222222222222222222222222222222222222222222
1 Protocol 1 Expansion 1
222222222222222222222222222222222222222222222
1 1 1
1 FDMA 1 Frequency Division Multi-Access 1
1222222222222222222222222222222222222222222222
1 1
1 TDMA 1 Time Division Multi-Access 1
1222222222222222222222222222222222222222222222
1 1
1 CDMA 1 Code Division Multi-Access 1
1222222222222222222222222222222222222222222222
1 1
22222222222222222222222222222222222222222222222222222222222222222
1 Type 1 Description 1
21 2222222222222222222222222222222222222222222222222222222222222222
1 1
1 Polling 1 Centralized controller repeatedly polls stations 1
1 1 and allows each to transmit one packet 1
122222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 Reservation 1 Stations submit a request for the next round of 1
122222222222222222222222222222222222222222222222222222222222222222
1 data transmission 1
1 1 1
1 Token Passing 1 Stations circulate a token; each time it receives 1
1 1 the token, a station transmits one packet 1
122222222222222222222222222222222222222222222222222222222222222222
1 1
22222222222222222222222222222222222222222222222222222222
1 1
1 Purpose: 1
1 1
Control transmission of packets through polling 1
1
1 Method: 1
1 1
1 Controller repeats forever { 1
1 Select a station, S, and send a polling message to S; 1
1 Wait for S to respond by sending a packet or passing; 1
1 1
}
1 1
21 22222222222222222222222222222222222222222222222222222221
22222222222222222222222222222222222222222222222222222222222222222222
1 Type 1 Description 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1
1 ALOHA 1 Historic protocol used in an early radio network in 1
1 1 Hawaii; popular in textbooks and easy to analyze, 1
1 1 1
but not used in real
122222222222222222222222222222222222222222222222222222222222222222222
1 networks 1
1 1 1
1 CSMA / CD 1 Carrier Sense Multi-Access with Collision Detection 1
1 1 The basis for the original Ethernet, and the most widely 1
1 1 used random access protocol 1
122222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 CSMA / CA 1 Carrier Sense Multi-Access with Collision Avoidance 1
1122222222222222222222222222222222222222222222222222222222222222222222
11 The basis for Wi-Fi wireless networks 11
outbound frequency
inbound frequency
central
transmitter
outlying station
d Alternative to CSMA / CD
d Used in wireless networks (Wi-Fi)
d Needed because signals have limited distance,
d Example: computer 1 cannot receive transmission when
computers 2 and 3 communicate
3: packet transmission
Ethernet
4-byte CRC
IPv4 IPv6
module module
0800 86DD
frame
demultiplexing arrives
4-byte CRC
terminator
transceiver thick Ethernet cable
AUI cable
hub
22222222222222222222222222222222222222222222222222222222
1 Designation 1 Name 1 Data Rate 1 Cable Used 1
21 2222222222222222222222222222222222222222222222222222222
1 1 1 1
1 1 Twisted Pair 1 1 1
1 10BaseT 1 Ethernet 1 10 Mbps 1 Category 5 1
122222222222222222222222222222222222222222222222222222222
1 1 1 1
1 1 1 1 1
1 100BaseT 1 Fast 1 100 Mbps 1 Category 5E 1
122222222222222222222222222222222222222222222222222222222
1 Ethernet 1 1 1
1 1 1 1 1
1 1 Gigabit 1 1 1
1 1000BaseT 1 Ethernet 1 1 Gbps 1 Category 6 1
122222222222222222222222222222222222222222222222222222222
1 1 1 1
Wireless Networks
AP AP AP
computer
in range
of two APs
AP AP AP
22 MHz
22 MHz
d Coordinated approach
Initial design
Similar to cellular telephone
APs communicate to achieve smooth handoff
d Uncoordinated approach
Later alternative
APs do not communicate
Wireless device changes association when communication
with an AP lost
Lower overall cost
DIFS
RTS
SIFS
CTS
SIFS
data
SIFS
ACK
time time
service
provider
NLOS access
LOS
backhaul wired connection
Wi-Fi region
2 22222222222222222222222222222222222222222222222222222222222222222222
1 Standard 1 Purpose 1
21 22222222222222222222222222222222222222222222222222222222222222222222
1 1
1 802.15.1a 1 Bluetooth technology (1 Mbps; 2.4 GHz) 1
21 22222222222222222222222222222222222222222222222222222222222222222222
1 1
1 802.15.2 1 Coexistence among PANs (noninterference) 1
21 22222222222222222222222222222222222222222222222222222222222222222222
1 1
1 802.15.3 1 High rate PAN (55 Mbps; 2.4 GHz) 1
12 22222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
802.15.3a Ultra Wideband (UWB) high rate PAN
12 22222222222222222222222222222222222222222222222222222222222222222222
1 (110 Mbps; 2.4 GHz) 1
1 1 1
12 22222222222222222222222222222222222222222222222222222222222222222222
802.15.4 1 ZigBee technology low data rate PAN for remote control 1
1 1 1
1 802.15.4a 1 Alternative low data rate PAN that uses low power 1
12 22222222222222222222222222222222222222222222222222222222222222222222
1 1
Mobile
Switching
Centers cell
wired connection
... ...
theoretical
theoretical actual
A
A F B
A F B G
F B G E C
G E C D
E C D A
D A F B
A F B G
F B G E C
G E C D
E C D A
D A F B
A F B G
F B G E C
G E C D
E C D
D
EARTH
satellite
coverage
(footprint)
satellites
receiver
d 24 satellites
d 24 satellites
d Arranged in 6 orbital planes
d 24 satellites
d Arranged in 6 orbital planes
d Civilian version has accuracy between 20 and 2 meters
d 24 satellites
d Arranged in 6 orbital planes
d Civilian version has accuracy between 20 and 2 meters
d Relevance to data networking
d 24 satellites
d Arranged in 6 orbital planes
d Civilian version has accuracy between 20 and 2 meters
d Relevance to data networking
Provides accurate time
Can be used to synchronize remote points in a data
network (needed by some protocols)
d Enabling technologies
Tunable analog filters to select frequencies and control
power
Multiple antenna management to select direction
d Needed because
No single antenna handles all frequencies
Directional signals important in focusing communication
d Multiple-Input Multiple-Output (MIMO) technology can aim
transmission or reception
connection to
cable box extended connection
remote
Cable box sensor
repeater
A B C X Y Z
A B C X Y Z
A B C X Y Z
A B C X Y Z
A B C X Y Z
A B C X Y Z
A B C X Y Z
A B C X Y Z
A B C X Y Z
Bridge 4
Bridge 4
Bridge 4
d Executed at startup
d Distributed algorithm
Each bridge runs it independently
No central coordination
d Algorithm guaranteed to converge quickly
d No data packets forwarded until STP finishes
port on
computers the switch switch
simulated
bridge
interfaces
computers switch
fabric
(interconnect)
d Physically
Similar to a conventional Layer 2 switch
Has ports to which computer can connect
d Logically
Manager can configure one or more broadcast domains
Each port assigned to one broadcast domain
d Frame sent to broadcast or multicast address only propagated
to ports in the same broadcast domain
d LAN technologies
Token ring (esp., IBM Token Ring)
FDDI/ CDDI
d LAN technologies
Token ring (esp., IBM Token Ring)
FDDI/ CDDI
d WAN technologies
X.25
Frame Relay
ATM
ISDN
MPLS
d See Chapter 19 for a longer list
Computer Networks and Internets -- Module 4 121 Spring, 2014
d QoS in ATM
Specified for each transfer (i.e., each TCP connection)
Required setup time
Meant each switch maintained state
Was difficult/impossible to enforce at high speed
d Despite the failure of ATM, proponents still argue that
Internet needs QoS
Internetworking:
Concepts, Addressing, Architecture,
Protocols, Datagram Processing,
Transport-Layer Protocols, And
End-To-End Services
1000M
.
..
.. .
.
900M ..
.. .
.
..
.. .
800M ..
.
.. .
.
..
700M .. .
.
..
.. .
.
600M ..
.. .
.
..
.. .
.
500M ..
.. .
..
..
. ..
400M ..
.. .
..
..
300M .. .
.
..
.. .
.
200M ..
...
...
...
. ..
..
100M ..
.
..
...
. . ..
.. .....
0M ...............................................................
10 10
10 9 ............
.... ........
........
.....
.....
.. . . . .
10 8 .....
....
.. ...
....
...
.. ...
10 7 . ...
.. ...
.. ...
.. ...
10 6 ....
...
. ....
...
..
..
10 5 .
.. .
..
...
.
..
.. .
10 4 ..
.
. . .
.
.... ...
...
10 3 . ...
.
. .. .
..
. . . . ..
10 2
d Key principles
Internet is designed to accommodate extant services plus
new services that will be invented
Internet is designed to accommodate any network
technology, allowing each technology to be used where
appropriate
d Infrastructure
Provides a packet communication service
Treats all attached endpoints as equal (any endpoint can
send a packet to any other endpoint)
Does not restrict or dictate packet contents
Does not restrict or dictate underlying network
technologies
d Attached endpoints
Run applications that use the network to communicate
with applications on other endpoints
Control all content and provide all services
routers
host
computers
net 2
net 1
net 4
net 3
net 5 host
router computers
physical net
IP
d In the current Internet, both IPv4 and IPv6 are relevant and
important
d Throughout the course, we will
Discuss general concepts
See how IPv4 and IPv6 implement the concepts
d Identity
Unique number assigned to each endpoint
Analogous to Ethernet address
d Locator
Endpoint address encodes location information, such as
* Geographic location
* Location relative to a service provider
* Computer on a given physical network
d Now historic
d Explains IPv4 multicast range
Bits 0 1 2 3 4 8 16 24 31
Class A 0 prefix suffix
/26
d Consequence
router 1
Wi-Fi Net
223.240.129.0 / 24
131.108.99.5 223.240.129.2
223.240.129.17
router 2
78.0.0.17
WAN 78.0.0.0 / 8
d Like IPv4
Binary value
Divided into locator prefix and unique ID suffix
Identifies a connection to a network
d Unlike IPv4
128 bits long
Suffix can be derived from MAC address
3-level address hierarchy
22222222222222222222222222222222222222222222222222222222222222222
1 Type 1 Purpose 1
22222222222222222222222222222222222222222222222222222222222222222
1 1 1
1 1 1
1 unicast 1 The address corresponds to a single computer. A 1
1 1 datagram sent to the address is routed along a 1
1 1 shortest path to the computer. 1
122222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 multicast 1 The address corresponds to a set of computers, and 1
1 1 membership in the set can change at any time. IPv6 1
1 1 delivers one copy of the datagram to each member of 1
1 1 1
122222222222222222222222222222222222222222222222222222222222222222
1 the set. 1
1 1 1
1 anycast 1 The address corresponds to a set of computers that 1
1 1 1
1 1 share a common prefix. A datagram sent to the 1
1 1 address is delivered to exactly one of the computers 1
1 1 (e.g., the computer closest to the sender). 1
122222222222222222222222222222222222222222222222222222222222222222
1 1
105.220.136.100.255.255.255.255.0.0.18.
128.140.10.255.255
becomes
69DC:8864:FFFF:FFFF:0:1280:8C0A:FFFF
FF0C:0:0:0:0:0:0:B1
can be written:
FF0C::B1
d More addresses
d More addresses
Eventually, IPv4 addresses will be depleted
d More addresses
Eventually, IPv4 addresses will be depleted
IPv6 provides more addresses than we will ever need
340,282,366,920,938,463,463,374,607,431,768,211,456
d More addresses
Eventually, IPv4 addresses will be depleted
IPv6 provides more addresses than we will ever need
340,282,366,920,938,463,463,374,607,431,768,211,456
1024 addresses per square meter of the Earths surface!
d More addresses
Eventually, IPv4 addresses will be depleted
IPv6 provides more addresses than we will ever need
340,282,366,920,938,463,463,374,607,431,768,211,456
1024 addresses per square meter of the Earths surface!
d Hype and excitement
d More addresses
Eventually, IPv4 addresses will be depleted
IPv6 provides more addresses than we will ever need
340,282,366,920,938,463,463,374,607,431,768,211,456
1024 addresses per square meter of the Earths surface!
d Hype and excitement
Researchers view IPv6 as an opportunity to be part of
the action
d More addresses
Eventually, IPv4 addresses will be depleted
IPv6 provides more addresses than we will ever need
340,282,366,920,938,463,463,374,607,431,768,211,456
1024 addresses per square meter of the Earths surface!
d Hype and excitement
Researchers view IPv6 as an opportunity to be part of
the action
Industries view IPv6 as an opportunity for revenue
enhancement
0 4 8 16 19 24 31
SOURCE IP ADDRESS
DESTINATION IP ADDRESS
optional
SOURCE ADDRESS
DESTINATION ADDRESS
Base Header
TCP Data
NEXT=TCP
(a)
(b)
d Forwarding paradigm
Use network prefix when forwarding
Use host when delivering
d Conceptual forwarding step
Compare destination in each forwarding table entry with
datagrams destination address, D
During comparison, only examine network prefix
d Note: mask in forwarding table makes comparison efficient
IP Header IP Payload
Router 1 datagram
Router 2 datagram
(a)
Unfragmentable Frag. 1
P1
Part Header
(b)
Unfragmentable Frag. 2
P2
Part Header
(c)
Unfragmentable Frag. 3
P3
Part Header
(d)
d Suppose
A vendor sells a network security appliance that fits
between a computer and an Ethernet switch
The appliance encrypts each IP datagram that the
computer sends
Encryption adds only three bytes of extra data to the
payload
d Measurements show that throughput decreases dramatically
whenever the appliance is enabled
d Explain the lower throughput
No!
X B Y
R1 R2
A C D
R1 R2
d How can a host or router find the MAC address of the next
hop?
d Assume
Four computers attached to an Ethernet
Computer B has a datagram to send
d Computer B
Uses forwarding table to find next-hop address IC
Broadcasts an ARP request: Im looking for a computer
with IP address IC
d Computer C
Receives the request and replies; Im the computer with
IP address IC
W X Y Z W X Y Z
(a) (a)
ARP MESSAGE
FRAME
HEADER FRAME PAYLOAD CRC
Application
IP addresses Transport
used
conceptual
Internet boundary
address resolution
Network Interface
MAC addresses
used
Physical
22222222222222222222222222222222222222222222222222222222222222222222
122222222222222222222222222222222222222222222222222222222222222222222
Number 1 Type 1 Purpose 1
1 1 1 1
1 0 1 Echo Reply 1 Used by the ping program 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1
1 3 1 Dest. Unreachable 1 Datagram could not be delivered 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1
1 5 1 Redirect 1 Host must change a route 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1
1 8 1 Echo Request 1 Used by the ping program 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1
1 11 1 Time Exceeded 1 TTL expired or fragments timed out 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1
1 12 1 Parameter Problem 1 IP header is incorrect 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1
1 30 1 Traceroute 1 Used by the traceroute program 1
122222222222222222222222222222222222222222222222222222222222222222222
1 1 1
IP Header IP Payload
TRANSACTION IDENTIFIER
CLIENT IP ADDRESS
YOUR IP ADDRESS
SERVER IP ADDRESS
ROUTER IP ADDRESS
OPTIONS (VARIABLE)
.
.
.
d DHCP server
Owns a set of IP addresses
Chooses an address from the set when a request arrives
Issues a lease for the address for specified time, T
d Client
Obtains an address and starts a timer for T time units
Uses the address to communicate
When the timer expires, requests the server renew the
lease
Either receives a renewal and restarts timer or stops
using the address
Computer Networks and Internets -- Module 5 106 Spring, 2014
NAT Device
Internet
d Basic NAT
Only translates IP addresses
Seldom used in practice
d NAPT
Translates IP address and transport-layer port numbers
Most widely-used type of NAT
d Twice NAT
Works with DNS server
Provides NAPT plus ability to accept incoming
communication
d Suppose
NAT box has globally-valid IP address of 128.210.24.6
Computer at a site has private address 192.168.0.1
Computer contacts Internet site 198.133.219.25
d Resulting translation is:
SRC = 128 . 210 . 24 . 6 SRC = 192 . 168 . 0 . 1
DST = 198 . 133 . 219 . 25 DST = 198 . 133 . 219 . 25
NAT
to the
Internet
d Suppose
Computers at site have private addresses assigned from
private address block 192.168 / 16
Two computers at the site each contact TCP port 30000
on computer 128 210.19.20
d NAPT chooses a new port number for each and translates
22222222222222222222222222222222222222222222222222222222222222222222
1 Dir. 1 Fields 1 Old Value 1 New Value 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1
1 out 1 IP SRC:TCP SRC 1 192.168.0.1 :30000 1 128.10.24.6 :40001 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1
1 out 1 IP SRC:TCP SRC 1 192.168.0.2 :30000 1 128.10.24.6 :40002 1
22222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1
1 in 1 IP DEST:TCP DEST 1 128.10.24.6 :40001 1 192.168.0.1 :30000 1
1 1 1
22222222222222222222222222222222222222222222222222222222222222222222 1 1
1 1 1 1 1
in IP DEST:TCP DEST 128.10.24.6 :40002
1122222222222222222222222222222222222222222222222222222222222222222222
11 11 11 192.168.0.2 :30000 11
Application
LAYER 5
Transport
LAYER 4
Internet
LAYER 3
Network Interface
LAYER 2
Physical
LAYER 1
d Application demultiplexing
Sender places a value in each outgoing packet that
identifies an application on the receiving host
Receiver uses the value to determine which application
should receive the packet
d Application demultiplexing
Sender places a value in each outgoing packet that
identifies an application on the receiving host
Receiver uses the value to determine which application
should receive the packet
d Flow-control mechanisms
Receiver informs sender of acceptable data rate
Sender limits rate to prevent overrunning the receiver
d Used
During startup
For VoIP and some video applications
d Accounts for less than 10% of Internet traffic
d Blocked by some ISPs
d End-to-end
d Connectionless communication
d Message-oriented interface
d Best-effort semantics
d Arbitrary interaction
d Operating system independence
d No congestion or flow control
d UDP
Accepts and delivers messages (blocks of data)
Does not require all messages to be the same size, but
does define a maximum message size
Places each outgoing User Datagram in a single IP
datagram for transmission
Always delivers a complete message to receiving
application
d Sending application must divide outgoing data into
messages; UDP sends what it is given (or reports an error if
the message is too large)
IP Fragmentation!
IP Fragmentation!
IP Fragmentation!
Inefficiency!
d Questions
Do best-effort semantics make any sense for
applications?
Why would a programmer choose UDP?
d Questions
Do best-effort semantics make any sense for
applications?
Why would a programmer choose UDP?
d Answers
Retransmitting a lost message does not make sense for
real-time audio and video applications because a
retransmitted packet arrives too late to be used
Additional real-time protocols can be added to UDP to
handle out-of-order delivery (we will cover later in the
course)
...
IP SOURCE ADDRESS
IP DESTINATION ADDRESS
IP Header IP Payload
d End-to-end communication
d Connection-oriented paradigm
d Point-to-point connections
d Complete reliability
d Full-duplex communication
d Stream interface
d Reliable connection startup
d Graceful connection shutdown
TCP TCP
IP router IP
net 1 net 2
TCP TCP
IP router IP
net 1 net 2
TCP TCP
IP router IP
net 1 net 2
d Uses timeout-and-retransmission
d Receiver returns an acknowledgement (ACK) to sender
when data arrives
d Sender waits for acknowledgement and retransmits data if
no acknowledgement arrives
send message 1
receive message 1
send ack 1
receive ack 1
send message 2
receive message 2
send ack 2
receive ack 2
send message 3
packet lost
retransmission timer expires
retransmit message 3
receive message 3
send ack 3
est 1 .
.
.
est 1
est 2
est 2
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
timeout
. . . . . . . . . . . . . . . . . . . . . . . . .
packet lost
timeout
packet lost
. . . . . . . . . . . . . . . . . . . . . . . . .
window
12 11 10 9 8 7 6 5 4 3 2 1
initial position
window
12 11 10 9 8 7 6 5 4 3 2 1
intermediate position
window moves as
acknowledgements arrive
window
12 11 10 9 8 7 6 5 4 3 2 1
final position
host 1 host 2
send
packet
send
ack
send
packet
send
ack
send
packet
send
ack
send
packet
send
ack
done
stop-and-go
send
packet send
four
send packets
send
ack four
send acks
packet
done
send
ack
send
packet
send
ack
send
packet
send
ack
done
advertise window=2500
d Difficult problem
d Packets can be
Lost
Duplicated
Delayed
Delivered out-of-order
d Either end can crash and reboot
d Need to know that both sides have agreed to start/ terminate
the connection
send SYN
receive SYN
send SYN + ACK
receive ACK
receive ACK
SEQUENCE NUMBER
ACKNOWLEDGEMENT NUMBER
BEGINNING OF DATA
.
.
.
processor
memory
packet packet
switch switch
at at
site 1 site 2
digital circuits
between switches
each computer
connects to a
packet switch
packet packet
switch switch
at site 3 at site 4
1 1 address is [2,1]
address is [1,2] 2 2
packet packet 3
3
switch switch 4
4 1 2
address is [1,5] 5 5
6 6 address is [2,6]
interface 1
interface 4
[1,2] [3,2]
packet packet
switch switch
1 3 [3,5] to reach send to
[1,5]
switch 1 interface 1
packet
switch 2 switch 2 local delivery
switch 3 interface 4
[2,1] [2,6]
Example WAN with three packet switches Forwarding table for switch 2
d Uses IP technology
d Router at site has
Local connections to networks at the site
Long-distance connections to routers at other sites
d Typical use: connect all sites of an organization
connections
to other sites
local computers
d Routing Software
Runs on each packet switch or router
Computes shortest paths and installs entries in local
forwarding table
d Models the network as a graph
3 4 3 4
1 2
3 4
d Goals
Consistent, optimal routes
Automatic route change to accommodate failures
d Each node (packet switch or router) participates
d Routing software on a node exchanges information with
routing software on other nodes
d Distributed computation
d Two basic algorithms employed
Distance-Vector (DV)
Link-State Routing (LSR)
d Possible measures
Hops
Delay
Throughput
Economic or administrative cost
d Many protocols use hops, but routing software often permits
a manager to assign administrative hop counts
d Each node
Collects incoming broadcast messages and creates a
graph
Uses Dijkstras SPF algorithm to compute a forwarding
table (see text for details and example)
Computer Networks and Internets -- Module 5 207 Spring, 2014
d Hosts
Use static routing
Entries placed in forwarding table when system boots
and remain unchanged
d Routers
Use dynamic routing
Initial entries placed in forwarding table when system
boots and routing software updates entries continually
Ethernet 128.10.0.0 / 16
Router R1
router address
128.10.0.100 to rest of
Internet
hosts on a network
d Router
Only has direct connections to a few networks
Must know how to forward datagram to arbitrary
destination
d Example
network 3
R1 R2
network 1 network 2
R2 R5
EGP used
.....
..... .........
..... .
..... ........
..... ....
..... R1 R4 .......
..... .
........
IGP1 used
........ ..... IGP2 used
..... .....
.... .....
R3 ........ .....
..... R6
..... .....
..... ..
Autonomous Autonomous
System 1 System 2
R1 R2
ISP1 ISP2
Data to customers
of ISP1
IP ADDRESS OF NET 1
DISTANCE TO NET 1
IP ADDRESS OF NET 2
DISTANCE TO NET 2
...
R1 R2
R1 R2
R3 R3
R4
R4
R5 R6 R5 R6
d Routing loop
Circular routes
Can be caused if good news flows backward
d Slow convergence (count to infinity) problem arises
Routes fail to converge after a change
Can cause a routing loop to persist
network N A B C
network N A B C
network N A B C
network N A B C
network N A B C
network N A B C
network N A B C
network N A B C
d Black hole
Routing system sends packets for a set of destinations to
a location where they are silently discarded
Can be caused if routing update packets are lost
d Route flapping (lack of convergence)
Routes continue to oscillate
Can be caused by equal-length paths
d Internet
Consists of a network of heterogeneous networks
Separates communication from content and services
Accommodates arbitrary network technologies and
applications
d IPv4 uses 32-bit addresses; IPv6 uses 128-bit addresses
d Internet packet is known as an IP datagram
d Datagram is encapsulated for transmission
d Fragmentation and reassembly accommodate heterogeneous
MTUs
Other Topics
d Optimization
d Planning (anticipating future needs)
d Assessing and understanding traffic
Trends in applications and network use
Detecting anomalous traffic patterns
d Contract (SLA) enforcement
d Bragging rights
IT staff in an organization
Marketing department in an equipment vendor
d Short-term variation
Packets tend to arrive in clumps called bursts
d Long-term variation
Diurnal and annual patterns exist
d Short-term variation
Packets tend to arrive in clumps called bursts
d Long-term variation
Diurnal and annual patterns exist
d Interestingly, data traffic is unlike voice traffic
Aggregate of voice telephone calls is smooth average
Aggregate of data traffic is bursty
2222222222222222222222222222222222222222222222222222222222222222222
1 Measure 1 Description 1
2222222222222222222222222222222222222222222222222222222222222222222
1 1 1
1 Latency (delay) 1 The time required to transfer a bit across 1
1 1 1
a network
12222222222222222222222222222222222222222222222222222222222222222222
1 from one end to another 1
1 1 1
1 Throughput (capacity) 1 The amount of data that can be transferred 1
1 1 over a network per unit time 1
12222222222222222222222222222222222222222222222222222222222222222222
1 1
1 1 1
1 Jitter (variability) 1 The changes in delay that occur and the 1
1 1 duration of the changes 1
12222222222222222222222222222222222222222222222222222222222222222222
1 1
d An analogy
Think of a network as a road between two locations
Propagation delay determines how long it takes a single
car to traverse the road
Throughput determines how many cars can enter the
road per unit time
d Observe
Adding a lane doubles the throughput (i.e., capacity), but
leaves the delay unchanged
It is possible to have arbitrarily high throughput, even if
the delay is long (imagine a long road with hundreds of
lanes)
Computer Networks and Internets -- Module 6 22 Spring, 2014
You can always buy more throughput, but you cannot buy
lower delay.
d Ethernet
Although it has high throughput, the short delay limits
the delay-throughput product
d Satellite link
Usually has a high delay-throughput product because
delay is long and throughput is high
d Informally, we use an analogy
A network with a long delay is called a long pipe
A network with high throughput is called a fat pipe
A satellite is known as a long, fat pipe
output (1 Gbps)
input 2 (1 Gbps)
D0
D = 3333333
(1 U)
d Where
D 0 is delay when the network is idle
U is current utilization between 0 and 1
idle delay
1
d Motivation
Make it possible to run applications such as streaming
video with no interruptions
Allow service providers to charge (much) more for
better service
d Three approaches have been proposed and studied
Priority
Fine-grain QoS
Coarse-grain QoS
A C
R4
A B
H1 A
H2
B B
A B A C A
R1 R2 R3
12 3 C
A C
R4
A B
H1 A
H2
send to label 4
receive from
B B label 3
A B A C A
R1 R2 R3
4 32 B 32 12 B
d Source
Samples information at regular intervals
Generates data continuously
Prepares data for transmission
d Ideal transmission channel
Accepts input at rate source produces
Delivers output at same rate as input
d Must handle
Lost packets
Duplicated packets
Packets delivered out of order
Variance in delay (jitter)
d Key facts
Conventional retransmission is useless
Jitter is unavoidable
d Timestamps
Provided by sender
Assigned to each piece of data
Allow receiver to know when data should be played
Use relative values to avoid need for clock
synchronization
d Jitter buffer
Used by receiver
Accommodates small variance in delay
jitter buffer
playback display
d process
connection
to Internet
d Marking
Permits differential encoding with a full frame followed
by incremental changes
Example use: video I-frame followed by B-frames
d Separation of timestamp and packet sequence
Means timestamps do not need to be linearly related to
packets
Allows compression schemes that vary the rate at which
data is sent
0 1 3 8 16 31
TIMESTAMP
...
IP Header IP Payload
d Standard is H.323
d Differs substantially from terminology used by SIP
d Terminal provides IP telephone functions and may also
include facilities for video and data transmission
d Gatekeeper provides location and signaling functions, and
establishes connections to the PSTN
d Gateway interconnects the IP phone system and PSTN, and
handles both signaling and media translation
d Multipoint Control Unit (MCU) provides services such as
multipoint conferencing
RTP, RTCP
4.3.2.1.5.5.5.0.0.8.1.e164.arpa
attacker commandeers
multiple computers
and streams packets
aggregate traffic to target
overwhelms server
Internet
d Extreme vulnerability
d Can be exploited for many attacks
d Permits man-in-the-middle attacks
d Example attacks
2 222222222222222222222222222222222222222222222222222222222222222222222
1 Technique 1 Purpose 1
21 222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 Hashing 1 Data integrity 1
21 222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 Encryption 1 Confidentiality 1
21 222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 Digital Signatures 1 Message authentication 1
21 222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 1 1
Digital Certificates
12 222222222222222222222222222222222222222222222222222222222222222222222 1 Sender authentication 1
1 1 1
12 222222222222222222222222222222222222222222222222222222222222222222222
Firewalls 1 Site integrity 1
1 1 1
1 Intrusion Detection Systems 1 Site integrity 1
21 222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 Deep Packet Inspection & Content Scanning 1 Site integrity 1
21 222222222222222222222222222222222222222222222222222222222222222222222 1 1
1 1 1
1 Virtual Private Networks (VPNs) 1 Data confidentiality and 1
1 1 trusted access 1
12 222222222222222222222222222222222222222222222222222222222222222222222 1 1
C = encrypt ( K1 , M )
M = decrypt ( K2 , C )
M = decrypt ( K2 , encrypt ( K1 , M ) )
M = decrypt ( K , encrypt ( K , M ) )
firewall in switch
email sever
( 192.5.48.2 )
Internet
DNS sever
( 192.5.48.3 )
22222222222222222222222222222222222222222222222222222222222222222222222222222
1 Dir 1 Frame Type 1 IP Src 1 IP Dest 1 IP Type 1 Src Port 1 Dst Port 1
2
1 2222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1 1 1
1 in 1 0800 1 * 1 192.5.48.1 1 TCP 1 * 1 80 1
2
1 2222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1 1 1
1 in 1 0800 1 * 1 192.5.48.2 1 TCP 1 * 1 25 1
2
1 2222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1 1 1
122222222222222222222222222222222222222222222222222222222222222222222222222222
in 1 0800 1 * 1 192.5.48.3 1 TCP 1 * 1 53 1
1 1 1 1 1 1 1 1
in 1 0800
122222222222222222222222222222222222222222222222222222222222222222222222222222
1 * 1 192.5.48.3 1 UDP 1 * 1 53 1
1 1 1 1 1 1 1 1
out 0800 192.5.48.1
122222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 * 1 TCP 1 80 1 * 1
1 out 1 0800 1 192.5.48.2 1 * 1 TCP 1 25 1 * 1
122222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1 1 1
1 out 1 0800 1 192.5.48.3 1 * 1 TCP 1 53 1 * 1
2
1 2222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1 1 1
1 out 1 0800 1 192.5.48.3 1 * 1 UDP 1 53 1 * 1
122222222222222222222222222222222222222222222222222222222222222222222222222222
1 1 1 1 1 1 1
src = X
Original (Unencrypted) Payload
dst = Y
encrypt
src = R1
Encrypted Datagram Encapsulated For Transmission
dst = R2
d Some possibilities
Use a parallel physical network
Use a parallel logical network
Use a special link-layer protocol
Use the same links, equipment, and protocols as data
d Surprise: modern network management follows the last
approach
d Internet standard
d Allows software in a managers computer (manager) to interact
with software that runs in an element (agent)
d Specifies format and meaning of messages exchanged
d Runs as an application protocol over TCP or UDP
d Uses fetch-store paradigm
d Are hierarchical
d Begin with standard prefix
d Identify a specific protocol and variable
d Example: counter for IP packets received has name
iso.org.dod.internet.mgmt.mib.ip.ipInReceives
1.3.6.1.2.1.4.3
standard-prefix.ip.ipRoutingTable
standard-prefix.ip.ipRoutingTable.ipRouteEntry.field.IPdestaddr
d Initially
One MIB
Defined variables for IP, TCP, UDP, ICMP
d Now
Many MIBs
Variables for routers, switches, modems, printers, hosts,
and other network elements
Emerging Technologies
control plane
(software)
data plane passes control plane loads
management packets new configuration
up to control plane into the hardware
PC running Linux
common interface (internal)
controller
to element
controller
to controller
d Where
Pattern is a pattern that is matched against packets
Action specifies steps to be taken if the match succeeds
packet to be matched
pattern 1 action 1
pattern 2 action 2
pattern 3 action 3
.. ..
. .
pattern N (default that matches any packet) action N
d The challenge
A frame arrives
What is the minimum number of steps needed to
determine whether the frame carries an IPv4 datagram
destined for a web server?
d The answer
Check whether the frame type field specifies IPv4
(0x0800)
Check whether the IP protocol field specifies TCP (6)
Check whether the TCP destination port specifies a web
server (80)
d Low power
Energy harvesting (e.g., door latch)
Multi-year battery life
d Wireless communication
Necessary in many situations
Enables mobility
d ZigBee IP
Created by ZigBee Alliance
Uses IEEE 802.15.4 wireless radios
Intended for smart grid
d ZigBee protocol stack
Goal is to run IPv6, TCP, and HTTP
Includes many other protocols
Internet
B1 B2
d IPv6 can only run over networks that offer an MTU of 1280
or higher, but 802.15.4 has an MTU of 102
d Solution
Additional protocol named 6LoWPAN
Shim layer between IP and device driver
d Sending side
Divides datagram into series of blocks
Transmits each block in a packet
d Receiving side
Joins blocks into a datagram
Delivers entire datagram to IPv6
d Notes
Division into block does not use IP fragmentation
Unlike fragmentation, division and regrouping is
performed at each hop
d All nodes run Routing Protocol for lossy and Low power
networks (RPL)
d Each node reports its parent to the border router
d RPL code on border router creates a Destination Oriented
Directed Acyclic Graph (DODAG)
d DODAG is used to compute source routes
Border router
3 4
2
5 7
6
9
8
Application Protocols
6LoWPAN adaptation
IEEE 802.15.4
d Content Caching
d Peer-To-Peer Communication
d Universal Representation (XML)
d Wireless networks that support mobility
d Higher-speed access technologies (1 Gbps)
d Cloud computing and cloud data centers
shared
database
Internet
connection
..
.
load balancer
C C
B D B D
A E A E
Internet
I F I F
H G H G
(a) (b)