Chapter 1
Chapter 1
Faculty of Engineering
Computer Engineering Department
Summer 2023-2024
Computer Networks
Instructor: Dr. Khaled Matrouk
Introduction 1-1
Chapter 1
Introduction
Computer Networking: A
Top-Down Approach
7th Edition, Global Edition
Jim Kurose, Keith Ross
Pearson
April 2017
Introduction 1-2
1
2
What’s the Internet:
PC
billions of connected mobile network
server computing devices:
wireless
laptop
• hosts = end systems global ISP
Introduction 1-3
institutional
network
Introduction 1-4
2
4
What’s the Internet: a service view
mobile network
infrastructure that provides
services to applications: global ISP
Introduction 1-5
What’s a protocol?
human protocols: network protocols:
“what’s the time?” machines rather than
“I have a question” humans
introductions all communication activity
in Internet governed by
protocols
… specific messages sent
… specific actions taken
when messages protocols define format, order of
received, or other
events messages sent and received
among network entities, and
actions taken on message
transmission, receipt
Introduction 1-6
3
6
What’s a protocol?
a human protocol and a computer network protocol:
Hi TCP connection
request
Hi TCP connection
response
Got the
time? Get http://www.awl.com/kurose-ross
2:00
<file>
time
Introduction 1-7
network core:
• interconnected routers
• network of networks institutional
network
Introduction 1-8
4
8
Access networks and physical media
Introduction 1-9
institutional link to
ISP (Internet)
institutional router
Introduction 1-10
5
10
Wireless access networks
shared wireless access network connects end system to router
• via base station aka “access point”
to Internet
to Internet
Introduction 1-11
11
Introduction 1-13
13
Introduction 1-14
7
14
Physical media: radio
signal carried in radio link types:
electromagnetic spectrum terrestrial microwave
no physical “wire” • e.g. up to 45 Mbps channels
bidirectional LAN (e.g., WiFi)
propagation environment • 54 Mbps
effects: wide-area (e.g., cellular)
• reflection • 4G cellular: ~ 10 Mbps
• obstruction by objects satellite
• interference • Kbps to 45Mbps channel (or
multiple smaller channels)
• 270 msec end-end delay
• geosynchronous versus low
altitude
Introduction 1-15
15
Introduction 1-16
8
16
Packet-switching: store-and-forward
L bits
per packet
3 2 1
source destination
R bps R bps
17
R = 100 Mb/s C
A
D
R = 1.5 Mb/s
B
queue of packets E
waiting for output link
Introduction 1-18
9
18
Two key network-core functions
routing: determines source-
destination route taken by forwarding: move packets from
packets router’s input to appropriate
routing algorithms router output
routing algorithm
19
frequency
time
TDM
frequency
time
Introduction 1-21
21
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction 1-22
11
22
Four sources of packet delay
transmission
A propagation
B
nodal
processing queueing
23
B
nodal
processing queueing
Introduction 1-24
12
24
Caravan analogy
100 km 100 km
ten-car toll toll
caravan booth booth
25
La/R -> 1
Introduction 1-26
13
26
“Real” Internet delays and routes
what do “real” Internet delay & loss look like?
traceroute program: provides delay
measurement from source to router along end-
end Internet path towards destination. For all i:
• sends three packets that will reach router i on path
towards destination
• router i will return packets to sender
• sender times interval between transmission and reply.
3 probes 3 probes
3 probes
Introduction 1-27
27
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
full buffer is lost
Introduction 1-29
29
Throughput
throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
server,
server withbits
sends linkpipe
capacity
that can carry linkpipe
capacity
that can carry
file of into
(fluid) F bitspipe Rs bits/sec
fluid at rate Rc bits/sec
fluid at rate
to send to client Rs bits/sec) Rc bits/sec)
Introduction 1-30
15
30
Throughput (more)
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction 1-31
31
per-connection end-
end throughput: Rs
min(Rc,Rs,R/10) Rs Rs
in practice: Rc or Rs
is often bottleneck
R
Rc Rc
Rc
Introduction 1-33
33
Why layering?
dealing with complex systems:
explicit structure allows identification,
relationship of complex system’s pieces
• layered reference model for discussion
modularization eases maintenance, updating of
system
• change of implementation of layer’s service
transparent to rest of system
• e.g., change in gate procedure doesn’t affect rest of
system
layering considered harmful?
Introduction 1-34
17
34
Internet protocol stack
application: supporting network
applications
• FTP, SMTP, HTTP application
transport: process-process data
transfer transport
• TCP, UDP
network
network: routing of datagrams from
source to destination
link
• IP, routing protocols
link: data transfer between physical
neighboring network elements
• Ethernet, 802.11 (WiFi), PPP
physical: bits “on the wire”
Introduction 1-35
35
Introduction 1-36
18
36
message M
source
application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl H n Ht M link router
physical
Introduction 1-37
37
Network security
field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
Internet not originally designed with (much)
security in mind
• original vision: “a group of mutually trusting users
attached to a transparent network”
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Introduction 1-38
19
38
Bad guys: put malware into hosts via Internet
malware can get in host from:
• virus: self-replicating infection by receiving/executing
object (e.g., e-mail attachment)
• worm: self-replicating infection by passively receiving
object that gets itself executed
spyware malware can record keystrokes, web
sites visited, upload info to collection site
infected host can be enrolled in botnet, used for
spam. DDoS attacks
Introduction 1-39
39
1. select target
2. break into hosts around
the network (see botnet)
3. send packets to target from
compromised hosts
target
Introduction 1-40
20
40
Bad guys can sniff packets
packet “sniffing”:
broadcast media (shared Ethernet, wireless)
promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by
A C
Introduction 1-41
41
Introduction 1-42
21
42