2.intro Networks2
2.intro Networks2
Introduction: roadmap
1.1 what is the Internet?
1.2 network edge
▪ end systems, access networks, links
1.3 network core
▪ packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models Self study
1.6 networks under attack: security
1.7 history
1
Quiz: Circuit Switching
A. 100 Mbps
B. 20 Mbps
C. 200 Mbps
D. 50 Mbps
E. 500 Mbps
A. 100 Mbps
B. 20 Mbps
C. 200 Mbps
D. 50 Mbps
E. 500 Mbps
A R1 R2 B
5
Tasks in Networking
❖ What does it take to send packets across?
This is decomposition…
Now, how do we organize these tasks?
Let us have an example
6
Inspiration…
Dear John,
--Grace
7
The Path of the Letter
“Peers” on each side understand the same things
No one else needs to (abstraction)
Lowest level has most packaging
Location FedEx
FedEx
Fedex Envelope (FE)
8
The Path Through FedEx
Higher “Stack”
at Ends
Partial “Stack”
Truck During Transit Truck
FE FE FE
Sorting Sorting Sorting
Office Office Office
Crate Crate New
Crate
Crate
Airport Airport Airport
Deepest Packaging (Envelope+FE+Crate)
at the Lowest Level of Transport 9
In the context of the Internet
Applications
…built on…
Reliable (or unreliable) transport
…built on…
Best-effort global packet delivery
…built on…
Best-effort local packet delivery
…built on…
Physical transfer of bits
10
Internet protocol stack
❖ application: supporting network applications
▪ FTP, SMTP, HTTP, Skype, ..
❖ transport: process-process data transfer
▪ TCP, UDP
❖ network: routing of datagrams from source to
destination
▪ IP, routing protocols
❖ link: data transfer between neighboring network
elements
▪ Ethernet, 802.11(WiFi), PPP
❖ physical: bits “on the wire”
11
Three Observations
12
An Example: No Layering
13
An Example: Benefit of Layering
❖ Introducing an intermediate layer provides a common
abstraction for various network technologies
Transport
& Network
Transmission
Media
Ethernet Fiber Wireless
optic
14
Is Layering Harmful?
❖ Layer N may duplicate lower-level functionality
▪ E.g., error recovery to retransmit lost data
❖ Information hiding may hurt performance
▪ E.g., packet loss due to corruption vs. congestion
❖ Headers start to get large
▪ E.g., typically, TCP + IP + Ethernet headers add up to 54 bytes
❖ Layer violations when the gains too great to resist
▪ E.g., Network Address Translation (NAT – to be covered in Network Layer)
❖ Layer violations when network doesn’t trust ends
▪ E.g., Firewalls (Security)
15
Distributing Layers Across Network
16
What Gets Implemented on Host?
❖ Hosts have applications that generate data/messages that are
eventually put out on wire
17
What Gets Implemented on Router?
18
Internet Layered Architecture
host host
HTTP message
HTTP HTTP
TCP segment
TCP TCP
router router
19
Logical Communication
❖ Layers interacts with peer’s corresponding layer
Application Application
Transport Transport
Network Network Network
Datalink Datalink Datalink
Physical Physical Physical
Application Application
Transport Transport
Network Network Network
Datalink Datalink Datalink
Physical Physical Physical
21
Encapsulation source
message M application
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
22
Quiz: Layering
What are two benefits of using a layered network model ? (Choose two)
F. It reminds me of cake
24