Internet Protocol Stack: Application: Transport: Network: Link: Physical
Internet Protocol Stack: Application: Transport: Network: Link: Physical
Internet Protocol Stack: Application: Transport: Network: Link: Physical
Introduction 1-77
message M
source
application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction 1-78
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
§ end systems, access networks, links
1.3 network core
§ packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-79
Network security
§ field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
§ Internet not originally designed with (much)
security in mind
• original vision: “a group of mutually trusting users
attached to a transparent network” J
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Introduction 1-80
Bad guys: put malware into hosts via Internet
§ malware can get in host from:
• virus: self-replicating infection by receiving/executing
object (e.g., e-mail attachment)
• worm: self-replicating infection by passively receiving
object that gets itself executed
§ spyware malware can record keystrokes, web
sites visited, upload info to collection site
§ infected host can be enrolled in botnet, used for
spam. DDoS attacks
Introduction 1-81
Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic
1. select target
2. break into hosts around
the network (see botnet)
3. send packets to target from
compromised hosts
target
Introduction 1-82
The Mirai Botnet (2016)
• Malware scans and infects IoT devices (with default factory
credentials) and turn them into bots
• Large scale attacks (SYN Flood) à inaccessibility of several high-
profile websites such as GitHub,Twitter, Reddit, Netflix,Airbnb and
many others
83
Introduction 1-83
Other notable cyber attacks
§ Ukraine power grid hack
• Caused power outages for roughly
230,000 consumers in Ukraine for 1-6
hours. - attributed to a Russian advanced
persistent threat group known as
"Sandworm". the first publicly
acknowledged successful cyberattack on a
power grid.
84
Introduction 1-84
Other notable cyber attacks
§ Stuxnet
• Stuxnet is a malicious computer worm first
uncovered in 2010 and thought to have
been in development since at least 2005.
Introduction 1-85
Other notable cyber attacks
§ Ransomware
• ransomware cyberattack that
impacted computerized
equipment managing the
pipeline
• vulnerability of infrastructure
(including critical infrastructure)
• Company shuts down service to
contain attack
• Paid $4.4M
86
Introduction 1-86
Bad guys can sniff packets
packet “sniffing”:
§ broadcast media (shared Ethernet, wireless)
§ promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by
A C
Introduction 1-88
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
§ end systems, access networks, links
1.3 network core
§ packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
1.7 history
Introduction 1-89
Internet history
1961-1972: Early packet-switching principles
§ 1961: Kleinrock - § 1972:
queueing theory shows • ARPAnet public demo
effectiveness of packet- • NCP (Network Control
switching Protocol) first host-host
§ 1964: Baran - packet- protocol
switching in military nets • first e-mail program
§ 1967: ARPAnet • ARPAnet has 15 nodes
conceived by Advanced
Research Projects
Agency
§ 1969: first ARPAnet node
operational
Introduction 1-90
Internet history
1972-1980: Internetworking, new and proprietary nets
§ 1970: ALOHAnet satellite
network in Hawaii Cerf and Kahn’s
§ 1974: Cerf and Kahn - internetworking principles:
architecture for interconnecting • minimalism, autonomy - no
networks internal changes required to
§ 1976: Ethernet at Xerox PARC interconnect networks
• best effort service model
§ late70’s: proprietary
architectures: DECnet, SNA, • stateless routers
XNA • decentralized control
§ late 70’s: switching fixed length define today’s Internet
packets (ATM precursor) architecture
§ 1979: ARPAnet has 200 nodes
Introduction 1-91
Internet history
1980-1990: new protocols, a proliferation of networks
§ 1983: deployment of § new national networks:
TCP/IP CSnet, BITnet, NSFnet,
§ 1982: smtp e-mail Minitel
protocol defined § 100,000 hosts connected
§ 1983: DNS defined for to confederation of
name-to-IP-address networks
translation
§ 1985: ftp protocol defined
§ 1988: TCP congestion
control
Introduction 1-92
Internet history
1990, 2000’s: commercialization, the Web, new apps
§ early 1990’s: ARPAnet late 1990’s – 2000’s:
decommissioned § more killer apps: instant
§ 1991: NSF lifts restrictions on messaging, P2P file sharing
commercial use of NSFnet § network security to
(decommissioned, 1995) forefront
§ early 1990s: Web § est. 50 million host, 100
• hypertext [Bush 1945, million+ users
Nelson 1960’s] § backbone links running at
• HTML, HTTP: Berners-Lee Gbps
• 1994: Mosaic, later Netscape
• late 1990’s:
commercialization of the Web
Introduction 1-93
Internet history
2005-present
§ ~5B devices attached to Internet (2016)
• smartphones and tablets
§ aggressive deployment of broadband access
§ increasing ubiquity of high-speed wireless access
§ emergence of online social networks:
• Facebook: ~ one billion users
§ service providers (Google, Microsoft) create their own
networks
• bypass Internet, providing “instantaneous” access to
search, video content, email, etc.
§ e-commerce, universities, enterprises running their
services in “cloud” (e.g., Amazon EC2)
Introduction 1-94
Introduction: summary
covered a “ton” of material! you now have:
§ Internet overview § context, overview, “feel”
§ what’s a protocol? of networking
§ network edge, core, access § more depth, detail to
network follow!
• packet-switching versus
circuit-switching
• Internet structure
§ performance: loss, delay,
throughput
§ layering, service models
§ security
§ history
Introduction 1-95
Chapter 1
Additional Slides
Introduction 1-96
application
(www browser,
packet
email client)
analyzer
application
OS
packet Transport (TCP/UDP)
capture copy of all Network (IP)
Ethernet Link (Ethernet)
(pcap) frames
sent/receive Physical
d
Chapter 3
Transport Layer
Computer
They obviously represent a lot of work on our part. In return for use, we only
ask the following:
§ If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
Networking: A Top
§ If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this Down Approach
material.
7th edition
Thanks and enjoy! JFK/KWR
Jim Kurose, Keith Ross
All material copyright 1996-2016 Pearson/Addison Wesley
J.F Kurose and K.W. Ross, All Rights Reserved April 2016
Transport Layer 2-1
Chapter 3: Transport Layer
our goals:
§ understand principles § learn about Internet
behind transport transport layer protocols:
layer services: • UDP: connectionless
• multiplexing, transport
demultiplexing • TCP: connection-oriented
• reliable data transfer reliable transport
• flow control • TCP congestion control
• congestion control
lo
§ transport protocols run in
g
ica
end systems
le
nd
-e
• send side: breaks app
nd
messages into segments,
tra
ns
passes to network layer
po
rt
• rcv side: reassembles application
segments into messages, transport
network
passes to app layer data link
physical
lo
data link physical
g
physical
ica
• flow control network
le
data link
nd
• connection setup physical
-e
nd
network
tra
physical
ns
delivery: UDP
po
network
data link
rt
physical
• no-frills extension of network
data link application
“best-effort” IP physical
network
data link
transport
network
data link
§ services not available: physical
physical
• delay guarantees
• bandwidth guarantees
application
application
application P4 P5 P6 application
P3 P2 P3
transport
transport transport
network
network link network
link physical link
physical server: IP physical
address B
length checksum
why is there a UDP?
§ no connection
application establishment (which can
data add delay)
(payload) § simple: no connection
state at sender, receiver
§ small header size
UDP segment format § no congestion control:
UDP can blast away as fast
as desired
wraparound 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 1 1
sum 1 1 0 1 1 1 0 1 1 1 0 1 1 1 1 0 0
checksum 1 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 1