0% found this document useful (0 votes)
26 views19 pages

Chapter 1

Uploaded by

chienphan852003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views19 pages

Chapter 1

Uploaded by

chienphan852003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Chapter 1: introduction

Chapter 1
our goal: overview:
Introduction v get “feel” and v what’s the Internet?
terminology v what’s a protocol?
v network edge; hosts, access net,
v more depth, detail
physical media
A note on the use of these ppt slides: later in course v network core: packet/circuit
Computer
v approach:
We’re making these slides freely available to all (faculty, students, readers).
switching, Internet structure
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs. Networking: A Top
§ use Internet as v performance: loss, delay,
They obviously represent a lot of work on our part. In return for use, we only
ask the following: Down Approach throughput
v If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
6th edition example
v If you post any slides on a www site, that you note that they are adapted Jim Kurose, Keith Ross v security
from (or perhaps identical to) our slides, and note our copyright of this Addison-Wesley v protocol layers, service models
material.
March 2012
Thanks and enjoy! JFK/KWR v history
All material copyright 1996-2012
J.F Kurose and K.W. Ross, All Rights Reserved

Introduction 1-1 Introduction 1-2

Chapter 1: roadmap What’s the Internet: “nuts and bolts” view

1.1 what is the Internet? PC


v millions of connected mobile network

1.2 network edge


server computing devices:
wireless § hosts = end systems global ISP
laptop
§ end systems, access networks, links smartphone § running network apps
1.3 network core home
v communication links network
§ packet switching, circuit switching, network structure regional ISP
wireless § fiber, copper, radio,
1.4 delay, loss, throughput in networks links satellite
wired
1.5 protocol layers, service models links § transmission rate:
bandwidth
1.6 networks under attack: security
1.7 history
v Packetswitches: forward
router packets (chunks of data) institutional
network
§ routers and switches
Introduction 1-3 Introduction 1-4
“Fun” internet appliances What’s the Internet: “nuts and bolts” view
mobile network
v Internet: “network of networks”
Web-enabled toaster + § Interconnected ISPs
global ISP
weather forecaster v protocols control sending,
receiving of msgs
IP picture frame
http://www.ceiva.com/
§ e.g., TCP, IP, HTTP, Skype, 802.11 home
network
v Internet standards regional ISP
§ RFC: Request for comments
Tweet-a-watt: § IETF: Internet Engineering Task
monitor energy use
Force

Slingbox: watch,
control cable TV remotely
institutional
Internet network
refrigerator Internet phones

Introduction 1-5 Introduction 1-6

What’s the Internet: a service view What’s a protocol?


mobile network human protocols: network protocols:
v Infrastructure that provides v “what’s the time?” v machines rather than
services to applications: global ISP
v “I have a question” humans
§ Web, VoIP, email, games, e- v introductions v all communication activity
commerce, social nets, … home in Internet governed by
v provides programming network protocols
regional ISP … specific msgs sent
interface to apps … specific actions taken
§ hooks that allow sending when msgs received, or protocols define format, order
and receiving app programs other events
to “connect” to Internet of msgs sent and received
§ provides service options, among network entities,
analogous to postal service and actions taken on msg
institutional
network transmission, receipt
Introduction 1-7 Introduction 1-8
What’s a protocol? Chapter 1: roadmap
a human protocol and a computer network protocol: 1.1 what is the Internet?
1.2 network edge
Hi § end systems, access networks, links
TCP connection
request 1.3 network core
Hi TCP connection § packet switching, circuit switching, network structure
response
Got the 1.4 delay, loss, throughput in networks
time? Get http://www.awl.com/kurose-ross
1.5 protocol layers, service models
2:00
<file> 1.6 networks under attack: security
time 1.7 history

Q: other human protocols?


Introduction 1-9 Introduction 1-10

A closer look at network structure: Access networks and physical media

v network edge: mobile network Q: How to connect end


§ hosts: clients and servers systems to edge router?
global ISP
§ servers often in data v residential access nets
centers v institutional access
home networks (school,
v access networks, physical network
regional ISP company)
media: wired, wireless v mobile access networks
communication links
keep in mind:
v bandwidth (bits per second)
v network core: of access network?
§ interconnected routers v shared or dedicated?
§ network of networks institutional
network

Introduction 1-11 Introduction 1-12


Access net: digital subscriber line (DSL) Access net: cable network
cable headend
central office telephone
network …

cable splitter
DSL splitter modem
modem DSLAM

ISP
voice, data transmitted
at different frequencies over DSL access
dedicated line to central office multiplexer C
O
V V V V V V N
I I I I I I D D T
D D D D D D A A R
v use existing telephone line to central office DSLAM E
O
E
O
E
O
E
O
E
O
E
O
T
A
T
A
O
L

§ data over DSL phone line goes to Internet 1 2 3 4 5 6 7 8 9

Channels
§ voice over DSL phone line goes to telephone net
v < 2.5 Mbps upstream transmission rate (typically < 1 Mbps) frequency division multiplexing: different channels transmitted
v < 24 Mbps downstream transmission rate (typically < 10 Mbps) in different frequency bands
Introduction 1-13 Introduction 1-14

Access net: cable network Access net: home network


cable headend
wireless
… devices

cable splitter cable modem


modem CMTS termination system

data, TV transmitted at different


frequencies over shared cable ISP to/from headend or
distribution network central office
often combined
in single box
v HFC: hybrid fiber coax
§ asymmetric: up to 30Mbps downstream transmission rate, 2 cable or DSL modem
Mbps upstream transmission rate router, firewall, NAT
wireless access
v network of cable, fiber attaches homes to ISP router point (54 Mbps)
wired Ethernet (100 Mbps)
§ homes share access network to cable headend
§ unlike DSL, which has dedicated access to central office
Introduction 1-15 Introduction 1-16
Enterprise access networks (Ethernet) Wireless access networks
v shared wireless access network connects end system to router
§ via base station aka “access point”

institutional link to wireless LANs: wide-area wireless access


ISP (Internet) § within building (100 ft) § provided by telco (cellular)
§ 802.11b/g (WiFi): 11, 54 Mbps operator, 10’s km
institutional router
transmission rate § between 1 and 10 Mbps
Ethernet institutional mail, § 3G, 4G: LTE
switch web servers

v typically used in companies, universities, etc


v 10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates to Internet
v today, end systems typically connect into Ethernet switch
to Internet

Introduction 1-17 Introduction 1-18

Host: sends packets of data Physical media


host sending function:
v bit: propagates between
v takes application message
transmitter/receiver pairs
v breaks into smaller two packets,
L bits each v physical link: what lies twisted pair (TP)
chunks, known as packets, between transmitter & v two insulated copper
of length L bits receiver wires
v transmits packet into
2 1
v guided media: § Category 5: 100 Mbps, 1
access network at Gpbs Ethernet
transmission rate R § signals propagate in solid Category 6: 10Gbps
R: link transmission rate §
host media: copper, fiber, coax
§ link transmission rate,
aka link capacity, aka v unguided media:
link bandwidth § signals propagate freely,
e.g., radio
packet time needed to L (bits)
transmission = transmit L-bit =
delay packet into link R (bits/sec)
1-19 Introduction 1-20
Physical media: coax, fiber Physical media: radio

coaxial cable: fiber optic cable: v signal carried in radio link types:
v two concentric copper v glass fiber carrying light electromagnetic spectrum v terrestrial microwave
conductors pulses, each pulse a bit v no physical “wire” § e.g. up to 45 Mbps channels
v bidirectional v high-speed operation: v bidirectional v LAN (e.g., WiFi)
v broadband: § high-speed point-to-point v propagation environment § 11Mbps, 54 Mbps
§ multiple channels on cable transmission (e.g., 10’s-100’s effects: v wide-area (e.g., cellular)
Gpbs transmission rate) § 3G cellular: ~ few Mbps
§ HFC § reflection
v low error rate: satellite
§ obstruction by objects v
§ repeaters spaced far apart § Kbps to 45Mbps channel (or
§ immune to electromagnetic § interference multiple smaller channels)
noise § 270 msec end-end delay
§ geosynchronous versus low
altitude

Introduction 1-21 Introduction 1-22

Chapter 1: roadmap The network core


1.1 what is the Internet? v mesh of interconnected
1.2 network edge routers
§ end systems, access networks, links v packet-switching: hosts
1.3 network core break application-layer
§ packet switching, circuit switching, network structure messages into packets
§ forward packets from one
1.4 delay, loss, throughput in networks router to the next, across
1.5 protocol layers, service models links on path from source
to destination
1.6 networks under attack: security § each packet transmitted at
1.7 history full link capacity

Introduction 1-23 Introduction 1-24


Packet-switching: store-and-forward Packet Switching: queueing delay, loss

R = 100 Mb/s C
L bits
A
per packet
D
3 2 1 R = 1.5 Mb/s
source destination B
R bps R bps queue of packets E
waiting for output link
v takes L/R seconds to one-hop numerical example:
transmit (push out) L-bit
packet into link at R bps § L = 7.5 Mbits queuing and loss:
v store and forward: entire § R = 1.5 Mbps v If arrival rate (in bits) to link exceeds transmission rate of
packet must arrive at router § one-hop transmission link for a period of time:
before it can be transmitted delay = 5 sec § packets will queue, wait to be transmitted on link
on next link § packets can be dropped (lost) if memory (buffer) fills up
v end-end delay = 2L/R (assuming
zero propagation delay) more on delay shortly …
Introduction 1-25 Introduction 1-26

Two key network-core functions Alternative core: circuit switching


routing: determines source- forwarding: move packets from end-end resources allocated
destination route taken by router’s input to appropriate to, reserved for “call”
packets router output between source & dest:
§ routing algorithms v In diagram, each link has four
circuits.
§ call gets 2nd circuit in top
routing algorithm
link and 1st circuit in right
link.
local forwarding table
header value output link
v dedicated resources: no sharing
0100 3 1 § circuit-like (guaranteed)
0101
0111
2
2 3 2
performance
1001 1
011
1 v circuit segment idle if not used
by call (no sharing)
dest address in arriving
v Commonly used in traditional
packet’s header telephone networks
Network Layer 4-27 Introduction 1-28
Circuit switching: FDM versus TDM Packet switching versus circuit switching
Example: packet switching allows more users to use network!
FDM
4 users
example:
§ 1 Mb/s link
frequency § each user: N

…..
users
• 100 kb/s when “active”
• active 10% of time 1 Mbps link
time
TDM
v circuit-switching:
§ 10 users
v packet switching: Q: how did we get value 0.0004?
frequency
§ with 35 users, probability >
10 active at same time is less Q: what happens if > 35 users ?
than .0004 *
time
Introduction 1-29 * Check out the online interactive exercises for more examples Introduction 1-30

Packet switching versus circuit switching Internet structure: network of networks


is packet switching a “slam dunk winner?” v End systems connect to Internet via access ISPs (Internet
v great for bursty data Service Providers)
§ resource sharing § Residential, company and university ISPs
§ simpler, no call setup v Access ISPs in turn must be interconnected.
v So that any two hosts can send packets to each other
v excessive congestion possible: packet delay and loss
§ protocols needed for reliable data transfer, congestion v Resulting network of networks is very complex
control v Evolution was driven by economics and national policies

v Q: How to provide circuit-like behavior? v Let’s take a stepwise approach to describe current Internet
§ bandwidth guarantees needed for audio/video apps structure
§ still an unsolved problem (chapter 7)

Q: human analogies of reserved resources (circuit switching)


versus on-demand allocation (packet-switching)?
Introduction 1-31
Internet structure: network of networks Internet structure: network of networks
Question: given millions of access ISPs, how to connect them Option: connect each access ISP to every other access ISP?
together?
… access
net
access
net … … access
net
access
net …
access access
net net
access access
access
net
net access
net
… … net

access access
access net access net
net net

connecting each access ISP




to each other directly doesn’t


access access access access

scale: O(N2) connections.


net net net net

access access
net net
access access
net net

access access
net net
access access


net net
… access
net access
access
net
… … access
net access
access
net

net net

Internet structure: network of networks Internet structure: network of networks


Option: connect each access ISP to a global transit ISP? Customer But if one global ISP is viable business, there will be
and provider ISPs have economic agreement. competitors ….
… access
net
access
net … … access
net
access
net …
access access
net net
access access
access net access net
net net
access access
access net access net
net net
ISP A



global
access
net
ISP access
net
access
net ISP B
access
net

access access
ISP C
net net
access access
net net

access access
net net
access access
net net
… access
net access
access
net
… … access
net access
access
net

net net
Internet structure: network of networks Internet structure: network of networks
But if one global ISP is viable business, there will be … and regional networks may arise to connect access nets to
competitors …. which must be interconnected ISPS
Internet exchange point

access access
net net … … access
net
access
net …
access access
net net
access access
access net access net
net net

access
IXP access
access
IXP access
net net
net
ISP A net
ISP A



access IXP access access IXP access
net ISP B net net ISP B net

access
ISP C access
ISP C
net net
access access
net net

access peering link access


regional net
net net
access access
net net
… access
net access
access
net
… … access
net access
access
net

net net

Internet structure: network of networks Internet structure: network of networks


… and content provider networks (e.g., Google, Microsoft,
Akamai ) may run their own network, to bring services, content
Tier 1 ISP Tier 1 ISP Google
close to end users
… access
net
access
net …
access
net

access
access
net IXP IXP IXP
net

access
IXP access
net
net
ISP A
Regional ISP Regional ISP
Content provider network

access IXP access


net ISP B net

access access access access access access access access


access
ISP B ISP ISP ISP ISP ISP ISP ISP ISP
net
access
net
v at center: small # of well-connected large networks
access
net regional net
access
net
§ “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national &
… access
net access
access
net
… international coverage
net
§ content provider network (e.g, Google): private network that connects
it data centers to Internet, often bypassing tier-1, regional ISPs Introduction 1-40
Tier-1 ISP: e.g., Sprint Chapter 1: roadmap
POP: point-of-presence
1.1 what is the Internet?
1.2 network edge
to/from backbone
§ end systems, access networks, links
peering
… … 1.3 network core
§ packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks

to/from customers 1.5 protocol layers, service models


1.6 networks under attack: security
1.7 history

Introduction 1-41 Introduction 1-42

How do loss and delay occur? Four sources of packet delay


transmission
packets queue in router buffers A propagation
v packet arrival rate to link (temporarily) exceeds output link
capacity
v packets queue, wait for turn B
nodal
packet being transmitted (delay) processing queueing

dnodal = dproc + dqueue + dtrans + dprop


A

dproc: nodal processing dqueue: queueing delay


B § check bit errors § time waiting at output link
packets queueing (delay) § determine output link for transmission
free (available) buffers: arriving packets § typically < msec § depends on congestion
dropped (loss) if no free buffers level of router
Introduction 1-43 Introduction 1-44
Four sources of packet delay Caravan analogy
transmission
100 km 100 km
A propagation
ten-car toll toll
caravan booth booth
B
nodal
processing queueing v cars “propagate” at § time to “push” entire
100 km/hr caravan through toll
dnodal = dproc + dqueue + dtrans + dprop v toll booth takes 12 sec to booth onto highway =
service car (bit transmission 12*10 = 120 sec
time) § time for last car to
dtrans: transmission delay: dprop: propagation delay: propagate from 1st to
v car~bit; caravan ~ packet
§ L: packet length (bits) § d: length of physical link 2nd toll both:
§ R: link bandwidth (bps) § s: propagation speed in medium v Q: How long until caravan is
lined up before 2nd toll 100km/(100km/hr)= 1
§ dtrans = L/R (~2x108 m/sec)
booth? hr
dtrans and dprop § dprop = d/s
very different § A: 62 minutes
* Check out the Java applet for an interactive animation on trans vs. prop delay Introduction 1-45 Introduction 1-46

Caravan analogy (more) Queueing delay (revisited)


100 km 100 km

average queueing
ten-car toll toll v R: link bandwidth (bps)

delay
caravan booth booth v L: packet length (bits)
v a: average packet arrival
v suppose cars now “propagate” at 1000 km/hr rate
v and suppose toll booth now takes one min to service a car
traffic intensity
v Q: Will cars arrive to 2nd booth before all cars serviced at first = La/R
booth?
v La/R ~ 0: avg. queueing delay small La/R ~ 0
§ A: Yes! after 7 min, 1st car arrives at second booth; three v La/R -> 1: avg. queueing delay large
cars still at 1st booth.
v La/R > 1: more “work” arriving
than can be serviced, average delay infinite!

* Check out the Java applet for an interactive animation on queuing and loss La/R -> 1
Introduction 1-47 Introduction 1-48
“Real” Internet delays and routes “Real” Internet delays, routes
v what do “real” Internet delay & loss look like? traceroute: gaia.cs.umass.edu to www.eurecom.fr
v traceroute program: provides delay 3 delay measurements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
measurement from source to router along end- 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
end Internet path towards destination. For all i: 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
§ sends three packets that will reach router i on path 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
towards destination 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic
§ router i will return packets to sender 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms link
§ sender times interval between transmission and reply. 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
3 probes 3 probes 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
3 probes 18 * * * * means no response (probe lost, router not replying)
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms

* Do some traceroutes from exotic countries at www.traceroute.org


Introduction 1-49 Introduction 1-50

Packet loss Throughput


v queue (aka buffer) preceding link in buffer has finite v throughput: rate (bits/time unit) at which bits
capacity transferred between sender/receiver
v packet arriving to full queue dropped (aka lost) § instantaneous: rate at given point in time
v lost packet may be retransmitted by previous node, § average: rate over longer period of time
by source end system, or not at all

buffer
packet being transmitted
A (waiting area)

server,
server withbits
sends linkpipe
capacity
that can carry linkpipe
capacity
that can carry
B file of F
(fluid) intobitspipe Rs bits/sec
fluid at rate Rc bits/sec
fluid at rate
packet arriving to to send to client Rs bits/sec) Rc bits/sec)
full buffer is lost
* Check out the Java applet for an interactive animation on queuing and loss Introduction 1-51 Introduction 1-52
Throughput (more) Throughput: Internet scenario

v Rs < Rc What is average end-end throughput? v per-connection end-


end throughput: Rs
min(Rc,Rs,R/10) Rs Rs
Rs bits/sec Rc bits/sec
v in practice: Rc or Rs
is often bottleneck R
v Rs > Rc What is average end-end throughput?
Rc Rc
Rs bits/sec Rc bits/sec Rc

bottleneck link
link on end-end path that constrains end-end throughput 10 connections (fairly) share
backbone bottleneck link R bits/sec
Introduction 1-53 Introduction 1-54

Chapter 1: roadmap Protocol “layers”


1.1 what is the Internet? Networks are complex,
1.2 network edge with many “pieces”:
§ end systems, access networks, links § hosts Question:
§ routers is there any hope of
1.3 network core
§ links of various organizing structure of
§ packet switching, circuit switching, network structure media network?
1.4 delay, loss, throughput in networks § applications
1.5 protocol layers, service models § protocols …. or at least our
1.6 networks under attack: security § hardware, discussion of networks?
1.7 history software

Introduction 1-55 Introduction 1-56


Organization of air travel Layering of airline functionality
ticket (purchase) ticket (complain)
ticket (purchase) ticket (complain) ticket

baggage (check) baggage (claim) baggage (check) baggage (claim baggage

gates (load) gates (unload) gate

gates (load) gates (unload) runway (takeoff) runway (land) takeoff/landing

airplane routing airplane routing airplane routing airplane routing airplane routing
runway takeoff runway landing
departure intermediate air-traffic arrival
airport control centers airport
airplane routing airplane routing
airplane routing layers: each layer implements a service
§ via its own internal-layer actions
v a series of steps § relying on services provided by layer below

Introduction 1-57 Introduction 1-58

Why layering? Internet protocol stack


dealing with complex systems: v application: supporting network
applications
v explicit structure allows identification, § FTP, SMTP, HTTP application
relationship of complex system’s pieces v transport: process-process data
§ layered reference model for discussion transfer transport
v modularization eases maintenance, updating of § TCP, UDP
system network
v network: routing of datagrams from
§ change of implementation of layer’s service source to destination
transparent to rest of system link
§ IP, routing protocols
§ e.g., change in gate procedure doesn’t affect rest of v link: data transfer between
system physical
neighboring network elements
v layering considered harmful? § Ethernet, 802.111 (WiFi), PPP
v physical: bits “on the wire”
Introduction 1-59 Introduction 1-60
ISO/OSI reference model message M
source
application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
v presentation: allow applications frame Hl Hn Ht M link
to interpret meaning of data, application physical
e.g., encryption, compression, link
machine-specific conventions presentation
physical
v session: synchronization, session switch
checkpointing, recovery of data transport
exchange
network
v Internet stack “missing” these destination Hn Ht M network
layers! link M application
Hl Hn Ht M link Hn Ht M
Ht transport physical
§ these services, if needed, must be physical M
Hn Ht network
implemented in application M
router
Hl Hn Ht M link
§ needed?
physical

Introduction 1-61 Introduction 1-62

Chapter 1: roadmap Network security


1.1 what is the Internet? v field of network security:
1.2 network edge § how bad guys can attack computer networks
§ how we can defend networks against attacks
§ end systems, access networks, links § how to design architectures that are immune to
1.3 network core attacks
§ packet switching, circuit switching, network structure v Internet not originally designed with (much)
1.4 delay, loss, throughput in networks security in mind
1.5 protocol layers, service models § original vision: “a group of mutually trusting users
attached to a transparent network” 
1.6 networks under attack: security § Internet protocol designers playing “catch-up”
1.7 history § security considerations in all layers!

Introduction 1-63 Introduction 1-64


Bad guys: put malware into hosts via Internet Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources
v malware can get in host from: (server, bandwidth) unavailable to legitimate traffic
§ virus: self-replicating infection by receiving/executing by overwhelming resource with bogus traffic
object (e.g., e-mail attachment)
§ worm: self-replicating infection by passively receiving 1. select target
object that gets itself executed 2. break into hosts around
v spyware malware can record keystrokes, web the network (see botnet)
sites visited, upload info to collection site 3. send packets to target from
v infected host can be enrolled in botnet, used for compromised hosts
target
spam. DDoS attacks

Introduction 1-65 Introduction 1-66

Bad guys can sniff packets Bad guys can use fake addresses
packet “sniffing”:
§ broadcast media (shared ethernet, wireless) IP spoofing: send packet with false source address
§ promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by A C

A C src:B dest:A payload

src:B dest:A payload


B

v wireshark software used for end-of-chapter labs is a … lots more on security (throughout, Chapter 8)
(free) packet-sniffer
Introduction 1-67 Introduction 1-68
Chapter 1: roadmap Internet history
1961-1972: Early packet-switching principles
1.1 what is the Internet?
v 1961: Kleinrock - v 1972:
1.2 network edge queueing theory shows § ARPAnet public demo
§ end systems, access networks, links effectiveness of packet- § NCP (Network Control
switching Protocol) first host-host
1.3 network core
v 1964: Baran - packet- protocol
§ packet switching, circuit switching, network structure switching in military nets § first e-mail program
1.4 delay, loss, throughput in networks v 1967: ARPAnet § ARPAnet has 15 nodes
conceived by Advanced
1.5 protocol layers, service models Research Projects
1.6 networks under attack: security Agency
1.7 history v 1969: first ARPAnet
node operational

Introduction 1-69 Introduction 1-70

Internet history Internet history


1972-1980: Internetworking, new and proprietary nets 1980-1990: new protocols, a proliferation of networks

v 1970: ALOHAnet satellite v 1983: deployment of v new national networks:


network in Hawaii Cerf and Kahn’s TCP/IP Csnet, BITnet, NSFnet,
v 1974: Cerf and Kahn - internetworking principles: v 1982: smtp e-mail Minitel
architecture for interconnecting § minimalism, autonomy - no protocol defined v 100,000 hosts connected
networks internal changes required to v 1983: DNS defined for to confederation of
v 1976: Ethernet at Xerox PARC interconnect networks name-to-IP-address networks
§ best effort service model translation
v late70’s: proprietary
architectures: DECnet, SNA, § stateless routers
v 1985: ftp protocol defined
XNA § decentralized control
v 1988: TCP congestion
v late 70’s: switching fixed length define today’s Internet control
packets (ATM precursor) architecture
v 1979: ARPAnet has 200 nodes

Introduction 1-71 Introduction 1-72


Internet history Internet history
1990, 2000’s: commercialization, the Web, new apps 2005-present
v early 1990’s: ARPAnet v ~750 million hosts
late 1990’s – 2000’s:
decommissioned § Smartphones and tablets
v more killer apps: instant
v 1991: NSF lifts restrictions on messaging, P2P file sharing v Aggressive deployment of broadband access
commercial use of NSFnet v network security to
v Increasing ubiquity of high-speed wireless access
(decommissioned, 1995) forefront v Emergence of online social networks:
v early 1990s: Web v est. 50 million host, 100
§ Facebook: soon one billion users
§ hypertext [Bush 1945, million+ users v Service providers (Google, Microsoft) create their own
Nelson 1960’s] v backbone links running at
networks
§ HTML, HTTP: Berners-Lee Gbps § Bypass Internet, providing “instantaneous” access
§ 1994: Mosaic, later Netscape to search, emai, etc.
§ late 1990’s: v E-commerce, universities, enterprises running their
commercialization of the Web services in “cloud” (eg, Amazon EC2)

Introduction 1-73 Introduction 1-74

Introduction: summary
covered a “ton” of material! you now have:
v Internet overview v context, overview, “feel”
v what’s a protocol? of networking
v network edge, core, access v more depth, detail to
network follow!
§ packet-switching versus
circuit-switching
§ Internet structure
v performance: loss, delay,
throughput
v layering, service models
v security
v history

Introduction 1-75

You might also like