Ilovepdf Merged-Compressed
Ilovepdf Merged-Compressed
Introduction
A note on the use of these Powerpoint slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs.
They obviously represent a lot of work on our part. In return for use, we only
ask the following: Computer
▪ If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!) Networking: A Top
▪ If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this
material.
Down Approach
Thanks and enjoy! JFK/KWR 7th edition
Jim Kurose, Keith Ross
All material copyright 1996-2016
Pearson/Addison Wesley
J.F Kurose and K.W. Ross, All Rights Reserved
April 2016
wireless
–hosts = end global ISP
laptop
smartphone
systems
–running network home
network
apps regional ISP
wireless
links ▪ communication links
wired
links • fiber, copper, radio,
satellite
• transmission rate:
bandwidth
router
▪ packet switches: forward institutional
packets (chunks of data) network
Web-enabled toaster +
weather forecaster
IP picture frame
http://www.ceiva.com/
Tweet-a-watt:
Slingbox: watch, monitor energy use
control cable TV remotely
sensorized,
bed
mattress
Internet
refrigerator Internet phones
institutional
network
institutional
network
keep in mind:
▪ bandwidth (bits per second)
of access network?
▪ shared or dedicated?
DSL splitter
modem DSLAM
ISP
voice, data transmitted
at different frequencies over DSL access
dedicated line to central office multiplexer
cable splitter
modem
C
O
V V V V V V N
I I I I I I D D T
D D D D D D A A R
E E E E E E T T O
O O O O O O A A L
1 2 3 4 5 6 7 8 9
Channels
wireless
devices
to/from headend or
central office
often combined
in single box
institutional link to
ISP (Internet)
institutional router
to Internet
to Internet
• mesh of interconnected
routers
• packet-switching: hosts
break application-layer
messages into packets
– forward packets from
one router to the next,
across links on path
from source to
destination
– each packet transmitted
at full link capacity
L bits
per packet
3 2 1
source destination
R bps R bps
routing algorithm
frequency
time
TDM
frequency
time
example:
• 1 Mb/s link
• each user: N
users
• 100 kb/s when “active”
1 Mbps link
• active 10% of time
• circuit-switching:
– 10 users
• packet switching: Q: how did we get value 0.0004?
– with 35 users, probability > Q: what happens if > 35 users ?
10 active at same time is
less than .0004 *
* Check out the online interactive exercises for more examples: http://gaia.cs.umass.edu/kurose_ross/interactive/
access access
net net
access
net
access
net
access
net
access
net
access access
net access net
net
access
net
access
net
access
net
access
net
access access
net access net
net
global
access
net
ISP access
net
access
net
access
net
access
net
access
net
access access
net access net
net
access
net ISP B access
net
access
net
ISP C
access
net
access
net
access
net
access access
net access net
net
access
IXP access
net
net
ISP A
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
IXP access
net
net
ISP A
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net regional net
access
net
access access
net access net
net
access
IXP access
net
net
ISP A
Content provider network
access
net
IXP ISP B access
net
access
net
ISP C
access
net
access
net regional net
access
net
access access
net access net
net
IX IX IX
P P P
Regional ISP Regional ISP
POP: point-of-presence
to/from backbone
peering
… … …
…
to/from customers
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
B
nodal
processing queueing
B
nodal
processing queueing
average queueing
• R: link bandwidth (bps)
delay
• L: packet length (bits)
• a: average packet arrival
rate
traffic intensity
= La/R
▪ La/R ~ 0: avg. queueing delay small La/R ~ 0
3 probes 3 probes
3 probes
B
packet arriving to
full buffer is lost
* Check out the Java applet for an interactive animation on queuing and loss
© Department of Networked Systems and Services 51
Throughput
server,
server withbits
sends linkpipe
capacity
that can carry linkpipe
capacity
that can carry
file of into
(fluid) F bitspipe Rs bits/sec
fluid at rate Rc bits/sec
fluid at rate
to send to client Rs bits/sec) Rc bits/sec)
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
• per-connection
Rs
end-end
Rs Rs
throughput:
min(Rc,Rs,R/10) R
• in practice: Rc or
Rc Rc
Rs is often
Rc
bottleneck
• a series of steps
airplane routing airplane routing airplane routing airplane routing airplane routing
• presentation: allow
applications to interpret application
meaning of data, e.g.,
encryption, compression, presentation
machine-specific conventions
session
• session: synchronization,
checkpointing, recovery of transport
data exchange network
• Internet stack “missing” these
layers! link
– these services, if needed, must physical
be implemented in application
– needed?
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
1. select target
2. break into hosts around
the network (see botnet)
3. send packets to target from
compromised hosts
target
packet “sniffing”:
▪ broadcast media (shared Ethernet, wireless)
▪ promiscuous network interface reads/records
all packets (e.g., including passwords!)
passing
A by C
application
(www browser,
packet
email client)
analyzer
application
OS
packet Transport (TCP/UDP)
Network (IP)
capture copy of all
Ethernet Link (Ethernet)
(pcap) frames
sent/receive Physical
d
clients:
• communicate with server
• may be intermittently
client/server connected
• may have dynamic IP
addresses
• do not communicate directly
with each other
transport transport
network network controlled
link by OS
link Internet
physical physical
HTTP: hypertext
transfer protocol
• Web’s application layer
protocol PC running
Firefox browser
• client/server model
– client: browser that
requests, receives,
(using HTTP server
protocol) and running
“displays” Web Apache Web
objects server
– server: Web server
sends (using HTTP iPhone running
protocol) objects in Safari browser
response to requests
transmission time
~
~ entity body ~
~ body
HTTP/1.0: HTTP/1.1:
• GET • GET, POST, HEAD
• POST • PUT
• HEAD – uploads file in entity
– asks server to leave body to path
requested object out specified in URL field
of response • DELETE
– deletes file specified
in the URL field
ebay 8734
usual http request msg Amazon server
cookie file creates ID
usual http response
1678 for user create backend
ebay 8734
set-cookie: 1678 entry database
amazon 1678
usual http request msg
cookie: 1678 cookie- access
specific
usual http response msg action
mail server
© Department of Networked Systems and Services 46
Electronic Mail: SMTP [RFC 2821]
• telnet servername 25
• see 220 reply from server
• enter HELO, MAIL FROM, RCPT TO, DATA, QUIT
commands
… …
gaia.cs.umass.edu
gaia.cs.umass.edu
type=A type=CNAME
▪ name is hostname ▪ name is alias name for some
▪ value is IP address “canonical” (the real) name
▪ www.ibm.com is really
type=NS servereast.backup2.ibm.com
– name is domain (e.g.,
▪ value is canonical name
foo.com)
– value is hostname of type=MX
authoritative name
▪ value is name of mailserver
server for this domain
associated with name
2 bytes 2 bytes
identification flags
time to distribute F
to N clients using Dc-s > max{NF/us,,F/dmin}
client-server approach
increases linearly in N
time to distribute F
to N clients using DP2P > max{F/us,,F/dmin,,NF/(us + Sui)}
P2P approach
increases linearly in N …
… but so does this, as each peer brings service capacity
© Department of Networked Systems and Services 75
Client-server vs. P2P: example
3.5
P2P
Minimum Distribution Time
3
Client-Server
2.5
1.5
0.5
0
0 5 10 15 20 25 30 35
Alice arrives …
… obtains list
of peers from tracker
… and begins exchanging
file chunks with peers in torrent
simple scenario:
Internet
manifest file
where’s Madmen?
Content Distribution Networks (CDNs)
1. Bob manages
Netflix account CDN
server
4. DASH
streaming
Chapter 2: summary
our study of network apps now complete!
▪ application architectures ▪ specific protocols:
• client-server • HTTP
• P2P • SMTP, POP, IMAP
▪ application service • DNS
requirements: • P2P: BitTorrent
• reliability, bandwidth, delay ▪ video streaming, CDNs
▪ Internet transport service
model
• connection-oriented,
reliable: TCP
• unreliable, datagrams: UDP
© Department of Networked Systems and Services 94
Chapter 2: summary
most importantly: learned about protocols!
Computer
They obviously represent a lot of work on our part. In return for use, we only
ask the following:
▪ If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
Networking: A Top
▪ If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this Down Approach
material.
7th edition
Thanks and enjoy! JFK/KWR
Jim Kurose, Keith Ross
All material copyright 1996-2016 Pearson/Addison Wesley
J.F Kurose and K.W. Ross, All Rights Reserved April 2016
our goals:
▪ understand ▪ learn about Internet
principles behind transport layer
transport layer protocols:
services: • UDP: connectionless
• multiplexing, transport
demultiplexing • TCP: connection-
• reliable data oriented reliable
transfer transport
• flow control • TCP congestion control
• congestion control
© Department of Networked Systems and Services 2
Chapter 3 outline
network
– flow control data link
physical
multiplexing at sender:
handle data from multiple demultiplexing at receiver:
sockets, add transport header use header info to deliver
(later used for demultiplexing) received segments to correct
socket
application
application
application application
P4 P5 P6
P3 P2 P3
transport
transport transport
network
network link network
link physical link
physical server: IP physical
address B
length checksum
why is there a UDP?
▪ no connection
application establishment (which can
data add delay)
(payload) ▪ simple: no connection
state at sender, receiver
▪ small header size
▪ no congestion control:
UDP segment format UDP can blast away as
fast as desired
wraparound 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1
sum 1 1 0 1 1 1 0 1 1 1 0 1 1 1 1 0 0
checksum 1 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1
send receive
side side
sender receiver
rdt_rcv(rcvpkt) &&
notcorrupt(rcvpkt)
extract(rcvpkt,data)
deliver_data(data)
udt_send(ACK)
rdt_rcv(rcvpkt) &&
notcorrupt(rcvpkt)
extract(rcvpkt,data)
deliver_data(data)
udt_send(ACK)
rdt_rcv(rcvpkt) &&
notcorrupt(rcvpkt)
extract(rcvpkt,data)
deliver_data(data)
udt_send(ACK)
extract(rcvpkt,data)
deliver_data(data)
sndpkt = make_pkt(ACK, chksum)
udt_send(sndpkt)
sender: receiver:
• seq # added to pkt ▪ must check if
• two seq. #’s (0,1) will received packet is
suffice. Why? duplicate
• state indicates
• must check if received whether 0 or 1 is
ACK/NAK corrupted expected pkt seq #
• twice as many states ▪ note: receiver can
– state must not know if its last
“remember” whether ACK/NAK received
“expected” pkt should OK at sender
have seq # of 0 or 1
U L/R .008
sender = = = 0.00027
RTT + L / R 30.008
sender receiver
first packet bit transmitted, t = 0
last packet bit transmitted, t = L / R
U L/R .008
sender = = = 0.00027
RTT + L / R 30.008
U 3L / R .0024
sender = = = 0.00081
RTT + L / R 30.008
Host A Host B
User
types
‘C’ Seq=42, ACK=79, data = ‘C’
host ACKs
receipt of
‘C’, echoes
Seq=79, ACK=43, data = ‘C’ back ‘C’
host ACKs
receipt
of echoed
‘C’ Seq=43, ACK=80
350
300
250
RTT (milliseconds)
200
sampleRTT
150
EstimatedRTT
100
1 8 15 22 29 36 43 50 57 64 71 78 85 92 99 106
time (seconnds)
time (seconds)
© Department of Networked Systems and Services SampleRTT Estimated RTT 62
TCP round trip time, timeout
SendBase=92
Seq=92, 8 bytes of data Seq=92, 8 bytes of data
timeout
ACK=100
X
ACK=100
ACK=120
SendBase=120
ACK=100
X
ACK=120
cumulative ACK
ACK=100
timeout
ACK=100
ACK=100
ACK=100
Seq=100, 20 bytes of data
IP
flow control code
receiver controls sender, so
sender won’t overflow
receiver’s buffer by transmitting from sender
too much, too fast
receiver protocol stack
application application
network network
choose x choose x
req_conn(x) req_conn(x)
ESTAB ESTAB
retransmit acc_conn(x) retransmit acc_conn(x)
req_conn(x) req_conn(x)
ESTAB ESTAB
data(x+1) accept
req_conn(x)
retransmit data(x+1)
data(x+1)
connection connection
client x completes server x completes server
client
terminates forgets x terminates forgets x
req_conn(x)
ESTAB ESTAB
data(x+1) accept
half open connection! data(x+1)
(no client!)
© Department of Networked Systems and Services 79
TCP 3-way handshake
Socket connectionSocket =
welcomeSocket.accept();
L Socket clientSocket =
SYN(x) newSocket("hostname","port
number");
SYNACK(seq=y,ACKnum=x+1)
create new socket for SYN(seq=x)
communication back to client listen
SYN SYN
rcvd sent
SYNACK(seq=y,ACKnum=x+1)
ESTAB ACK(ACKnum=y+1)
ACK(ACKnum=y+1)
L
LAST_ACK
FINbit=1, seq=y
TIMED_WAIT can no longer
send data
ACKbit=1; ACKnum=y+1
timed wait
for 2*max CLOSED
segment lifetime
CLOSED
congestion:
• informally: “too many sources sending too
much data too fast for network to handle”
• different from flow control!
• manifestations:
– lost packets (buffer overflow at routers)
– long delays (queueing in router buffers)
• a top-10 problem!
R/2
delay
lout
Host A
lout
▪ sender sends only
when router buffers
available lin R/2
A
no buffer space!
Host B
lout
retransmissions but
▪ sender only resends if asymptotic goodput
packet known to be lost is still R/2 (why?)
lin R/2
A
free buffer space!
Host B
lout
▪ sender times out prematurely, retransmissions
lin
timeout
copy l'in lout
A
free buffer space!
Host B
lout
▪ sender times out prematurely, retransmissions
“costs” of congestion:
▪ more work (retrans) for given “goodput”
▪ unneeded retransmissions: link carries multiple copies of pkt
• decreasing goodput
Host D
Host C
lin’ C/2
time
© Department of Networked Systems and Services 96
TCP Congestion Control: details
RTT
loss event:
• initially cwnd = 1 MSS
• double cwnd every RTT
• done by incrementing
cwnd for every ACK
received
▪ summary: initial rate is time
slow but ramps up
exponentially fast
© Department of Networked Systems and Services 98
TCP: detecting, reacting to loss
Implementation:
▪ variable ssthresh
▪ on loss event, ssthresh
is set to 1/2 of cwnd just
before loss event
* Check out the online interactive exercises for more
examples: http://gaia.cs.umass.edu/kurose_ross/interactive/
W/2
bottleneck
router
capacity R
TCP connection 2
Connection 1 throughput R
ECN=00 ECN=11
IP datagram
© Department of Networked Systems and Services 105
Chapter 3: summary
▪ principles behind transport
layer services:
• multiplexing, next:
demultiplexing • leaving the
• reliable data transfer network “edge”
• flow control (application,
• congestion control transport layers)
▪ instantiation, implementation • into the network
in the Internet “core”
• UDP
• TCP • two network layer
chapters:
– data plane
– control plane
BMEVIHIAB01-COMNET
Adrian Pekar
[email protected]
https://fiberbit.com.tw/tcpip-model-vs-osi-model/
https://networkencyclopedia.com/encapsulation/
https://encyclopedia2.thefreedictionary.com/Network+stack
https://parkerhill.me/optimizing/
Chapter 4
Network Layer:
The Data Plane
A note on the use of these Powerpoint slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs.
They obviously represent a lot of work on our part. In return for use, we only
ask the following: Computer
§ If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
Networking: A Top
§ If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this Down Approach
material.
7th edition
Thanks and enjoy! JFK/KWR
Jim Kurose, Keith Ross
All material copyright 1996-2016 Pearson/Addison Wesley
J.F Kurose and K.W. Ross, All Rights Reserved April 2016
application
• transport segment from transport
network
layer physical
application
network transport
• network layer protocols in network
data link
physical
network
data link
network
data link
every host, router data link
physical
physical physical
https://ccnacompletecourse.blogspot.com/2019/08/data-encapsulation-in-computer-networks.html
Routing
Algorithm
Routing algorithm control
Control plane plane
Data plane
Values in arriving
values in arriving
packet’s header
1
packet header 1101
2
3
0111 1
2
3
© Department
tables. of Networked
In this example, Systems and Services
a routing algorithm runs in each and every router and both 12
Logically centralized control
www.hit.bme.hu
plane
A distinct (typically remote) controller interacts with local
control agents (CAs)
Remote Controller
control
plane
data
plane
CA
CA CA CA CA
values in arriving
packet header
0111 1
2
3
https://www.sdxcentral.com/5g/definitions/5g-sdn/
lookup,
link forwarding
line layer switch
termination protocol fabric
(receive)
queueing
physical layer:
bit-level reception
data link layer: decentralized switching:
e.g., Ethernet • using header field values, lookup output
port using forwarding table in input port
memory (“match plus action”)
• goal: complete input port processing at
‘line speed’
• queuing: if datagrams arrive faster than
forwarding rate into switch fabric
© Department of Networked Systems and Services 17
Destination-based
www.hit.bme.hu
forwarding
destination-based forwarding: forward based only on
destination IP address (traditional) forwarding table
Destination Address Range Link Interface
examples:
DA: 11001000 00010111 00010110 10100001 which interface?
DA: 11001000 00010111 00011000 10101010 which interface?
© Department of Networked Systems and Services 19
Actions Summary
www.hit.bme.hu
memory
datagram
switch buffer link
fabric layer line
protocol termination
queueing (send)
physical layer:
decentralized switching: bit-level reception
data link layer:
• goal: complete output port
e.g., Ethernet
processing at ‘line speed’
• queuing: when arrival at
output port exceeds output
line speed
Queuing
switch switch
fabric fabric
switch
switch
fabric
fabric
packet packet
arrivals queue link departures
(waiting area) (server)
priority scheduling:
• multiple classes,
with different
priorities high priority queue
(waiting area)
• send highest
priority queued arrivals departures
packet
• class may depend on classify link
src/dst, port
numbers, etc.
Internet Protocol
link layer
physical layer
IP fragmentation
…
in: one large datagram
– different link types, out: 3 smaller datagrams
different MTUs
• large IP datagram divided
(“fragmented”) within net
reassembly
– one datagram becomes
several datagrams
– “reassembled” only at …
final destination
– IP header bits used to
identify, order related
fragments
© Department of Networked Systems and Services 34
IP fragmentation, reassembly
www.hit.bme.hu
IP addressing
https://labs.ripe.net/Members/olafur_gudmundsson/what-do-we-know-about-an-ip-address
223.1.1.1
• interface: connection
between host/router and 223.1.1.3
223.1.3.27
http://www.highteck.net/EN/Network/Addressing_the_N
etwork-IPv4.html
223.1.1.1
223.1.3.27
223.1.1.3
223.1.2.2
subnets, detach
223.1.2.2
each interface from 223.1.1.3 223.1.3.27
its host or router, subnet
creating islands of
223.1.3.2
isolated networks 223.1.3.1
§ each isolated
network is called a 223.1.3.0/24
subnet
subnet mask: /24
223.1.1.1
how many? 223.1.1.4
223.1.1.3
6
223.1.9.2 223.1.7.0
223.1.9.1 223.1.7.1
223.1.8.1 223.1.8.0
223.1.2.6 223.1.3.27
• An IP address is a hierarchical address that is made up of two parts: a network portion and
a host portion.
• The bits within the network portion of the address must be identical for all devices that
reside in the same network.
• The subnet mask is compared to the IP address from left to right, bit for bit.
• The subnet mask is represented in dotted decimal format for ease of use.
• The subnet mask is configured on a host device, in conjunction with the IPv4 address, and
is required so the host can determine which network it belongs to.
http://sclabs.blogspot.com/
© Department of Networked Systems and Services 44
Classful vs Classless
www.hit.bme.hu
Addressing
subnet host
part part
11001000 00010111 00010000 00000000
200.23.16.0/23
http://www.highteck.net/EN/Network/Addressing_the_N
etwork-IPv4.html
DHCP
223.1.1.0/24
server
223.1.1.1 223.1.2.1
223.1.2.0/24
223.1.3.1 223.1.3.2
223.1.3.0/24
DHCP offer
src: 223.1.2.5, 67
Broadcast: I’m a DHCP
dest: 255.255.255.255, 68
server! Here’s an IP
yiaddrr: 223.1.2.4
transaction
address youID:can
654 use
lifetime: 3600 secs
DHCP request
src: 0.0.0.0, 68
dest:: 255.255.255.255, 67
Broadcast: OK. I’ll take
yiaddrr: 223.1.2.4
that IP address!
transaction ID: 655
lifetime: 3600 secs
DHCP ACK
src: 223.1.2.5, 67
dest: 255.255.255.255,
Broadcast: 68
OK. You’ve
yiaddrr: 223.1.2.4
got that IPID:
transaction address!
655
lifetime: 3600 secs
§ encapsulation of DHCP
DHCP DHCP server, frame forwarded
DHCP UDP to client, demuxing up to
DHCP IP DHCP at client
DHCP Eth router with DHCP
DHCP
Phy server built into § client now knows its IP
router address, name and IP
address of DSN server, IP
address of its first-hop
router
Organization 0
200.23.16.0/23
Organization 1
“Send me anything
200.23.18.0/23 with addresses
Organization 2 beginning
200.23.20.0/23 . Fly-By-Night-ISP 200.23.16.0/20”
.
. . Internet
.
Organization 7 .
200.23.30.0/23
“Send me anything
ISPs-R-Us
with addresses
beginning
199.31.0.0/16”
Organization 0
200.23.16.0/23
“Send me anything
with addresses
Organization 2 beginning
200.23.20.0/23 . Fly-By-Night-ISP 200.23.16.0/20”
.
. . Internet
.
Organization 7 .
200.23.30.0/23
“Send me anything
ISPs-R-Us Longest
with addresses
beginning 199.31.0.0/16 prefix match
Organization 1 determines
(255.255.0.0)
200.23.18.0/23 or 200.23.18.0/23 the route
(255.255.254.0)”
© Department of Networked Systems and Services 58
www.hit.bme.hu
https://hbeducationservices.blogspot.com/2018/11/publi
c-and-private-ip-addresses.html
© Department of Networked Systems and Services 62
NAT: network address
www.hit.bme.hu
translation
10.0.0.4
10.0.0.2
138.76.29.7
10.0.0.3
IPv6
data
32 bits
© Department of Networked Systems and Services 70
Other changes from IPv4
www.hit.bme.hu
IPv6 datagram
IPv4 datagram
A B IPv4 tunnel E F
connecting IPv6 routers
logical view:
IPv6 IPv6 IPv6 IPv6
A B C D E F
physical view:
IPv6 IPv6 IPv4 IPv4 IPv6 IPv6
A B IPv4 tunnel E F
connecting IPv6 routers
logical view:
IPv6 IPv6 IPv6 IPv6
A B C D E F
physical view:
IPv6 IPv6 IPv4 IPv4 IPv6 IPv6
data data
A-to-B: E-to-F:
IPv6 B-to-C: B-to-C: IPv6
IPv6 inside IPv6 inside
IPv4 IPv4
© Department of Networked Systems and Services 74