W1 F24 CSE300CSC322 Introduction - Comms Protocols W1 Part W2
W1 F24 CSE300CSC322 Introduction - Comms Protocols W1 Part W2
In the client-server model, a client explicitly requests information from a server that
hosts that information.
Access to Information (3 of 4)
Communication takes the form of the client process sending a message over the network
to the server process. The client process then waits for a reply message.
Access to Information (4 of 4)
Some forms of e-commerce have acquired little tags based on the fact that ‘‘to’’ and
‘‘2’’ are pronounced the same.
Entertainment
• IPTV (IP Television) systems
– TV shows based on IP technology instead of cable TV or radio
transmissions
• Power-line networks
– Send information throughout the house over the electric wires
Types of Computer Networks
• Not exclusive!
• Mobile and broadband access networks
– Networks used to access the Internet
• Data-center networks
– Networks that house data and applications
• Transit networks
– Networks that connect access networks to data centers
• Enterprise networks
– Networks used on campuses, in office buildings, or at other
organizations
Broadband Access Networks
• Home network use
– Listen to, look at, and create music, photos, and videos
– Access information, communicate with other people, buy
products and services
• Metcalfe’s law
– Explains how tremendous Internet popularity comes from its size
Although wireless networking and mobile computing are often related, they are not
identical.
Mobile and Wireless Access Networks
(3 of 3)
• Two trends
– Consolidation of content in a handful of large content providers
– Expansion of the footprint of individual access ISP networks
Enterprise Networks
• Allows resource sharing for devices and information
• VPNs (Virtual Private Networks)
– Connect individual networks at different sites into one logical
network
– Act as a communication medium among employees
PANs (Personal Area Networks) let devices communicate over the range of a person.
Bluetooth is a short-range wireless network used to connect components without wires.
Local Area Networks
The configuration on the left represents a wireless 802.11 network. The configuration on
the right represents a wired switched Ethernet network.
Home Networks
• Home network LAN
– Broad, diverse range of Internet-connected devices
– Characteristics: manageable, dependable, and secure
• Internet of things
– Allows almost any device to connect
A MAN (metropolitan area network) where both television signals and the Internet are
being fed into the centralized cable head-end (or cable modem termination system) for
subsequent distribution to people’s homes.
Wide Area Networks (1 of 3)
This wide area network illustrates how hosts in Perth, Brisbane, and
Melbourne can communicate using leased lines.
Wide Area Networks (2 of 3)
This wide area network illustrates how hosts in Perth, Brisbane, and
Melbourne can communicate via the Internet.
Wide Area Networks (3 of 3)
This wide area network illustrates how hosts in Perth, Brisbane, and Melbourne
can communicate via an ISP.
Internetworks: Networks of networks!
• Internetwork or internet
– A collection of interconnected networks
• An internet
– Interconnection of distinct, independently operated networks
– Connecting a LAN and a WAN or connecting two LANs
– Gateway device makes a connection between two or more
networks
Examples of Networks (1 of 9)
• The Internet
– The ARPANET
– NSFNET
– The Internet architecture
• Mobile networks
– Mobile network architecture
– Packet switching and circuit switching
– Early generation mobile networks: 1G, 2G, and 3G
– Modern mobile networks: 4G and 5G
Figure (a) represents an unsecure network with little redundancy. Figure (b)
illustrates a more secure packet-switched network that was initially dismissed as a
solution.
Examples of Networks (3 of 9)
The original ARPANET software was split into two parts: subnet and host. The subnet
software consisted of the IMP end of the host-IMP connection, the IMP-IMP protocol, and
a source IMP to destination IMP protocol designed to improve reliability.
Examples of Networks (4 of 9)
Growth of the number of nodes on ARPANET. (a) December 1969. (b) July 1970.
(c) March 1971. (d) April 1972. (e) September 1972.
Examples of Networks (5 of 9)
A common method for connecting to the Internet from your home is to send
signals over the cable television infrastructure.
Examples of Networks (8 of 9)
Over the past decade, the conventional hierarchy has evolved and ‘‘flattened’’
dramatically.
Mobile Networks (1 of 6)
When a user moves out of the range of one cellular base station and into the range of
another one, the flow of data must be re-routed from the old to the new cell base
station.
Mobile Networks (3 of 6)
• Packet switching comes from the Internet community
– Connectionless networks
– Every packet is routed independently
– If some routers go down during a session, no harm will be done
as long as the system can dynamically reconfigure itself
• 802.11 security
– WEP (Wired Equivalent Privacy)
– WEP replaced by WiFi Protected Access (initially called WPA)
– WiFi Protected Access (WPA) replaced by WPA2 and 802.1X
Wireless Networks (WiFi) (4 of 6)
Access points connect to the wired network, and all communication between clients goes
through the access point. In an ad hoc network, clients that are in radio range talk directly
without an access point.
Wireless Networks (WiFi) (5 of 6)
At the frequencies used for 802.11, radio signals can be reflected off solid objects so
that multiple echoes of a transmission may reach a receiver along different paths. The
echoes can cancel or reinforce each other, causing the received signal to fluctuate
greatly – a phenomenon known as multipath fading.
Wireless Networks (WiFi) (6 of 6)
The range of a single radio may not cover the entire system.
Network Protocols: Coms Language!
• Design goals
– Reliability (ability to recover from errors, faults, or failures)
– Resource allocation (sharing access to a common, limited
resource)
– Evolvability (allowing for incremental deployment of protocol
improvements over time)
– Security (defending the network against various types of attacks)
• Congestion problem
– Occurs when too many computers want to send too much traffic,
and the network cannot deliver it all
• Connectionless systems
– Reliable message stream (electronic junk mail)
– Reliable byte stream (text messaging)
– Unreliable connection (database query)
Connections and Reliability (4 of 4)
A minimal example of the service primitives that might provide a reliable byte stream.
Service Primitives (3 of 4)
Figure 1-30 briefly summarizes how client-server communication might work with
acknowledged datagrams so that we can ignore lost packets.
Service Primitives (4 of 4)
The relation of IP, TCP, and UDP protocols are illustrated. We will study these.
A Critique of the OSI Model and Protocols
(1 of 2)
• Bad timing
– Competing TCP/IP protocols were already in widespread use
• Bad design
– Both the model and the protocols are flawed
• Bad implementations
– Initial implementations were huge, unwieldy, and slow
• Bad politics
– Widely thought to be the creature of the European
telecommunication ministries, the European Community, and
later the U.S. Government
A Critique of the OSI Model and Protocols
(2 of 2)
To prevent bad timing, it is essential that the standards be written in the trough in
between the tops of the waves known as the two ‘‘elephants."
A Critique of the TCP/IP Reference Model
and Protocols
• Model does not clearly distinguish the concepts of
services, interfaces, and protocols
• Model is not at all general
– Poorly suited to describing any other protocol stack
This model has five layers, running from the physical layer up through the
link, network and transport layers to the application layer.
Standardization
• Standardization and open source
• Who’s who in the telecommunications world
• Who’s who in the international standards world
• Who’s who in the Internet standards world
Standardization and Open Source
• Standards define what is needed for interoperability
– No more, no less
• WiFi Alliance
– Interoperability within the 802.11 standard
The important ones are marked with *. The ones marked with † gave up and stopped.
Who’s Who in the Internet Standards
World
• IAB (Internet Activities Board) oversaw ARPANET
– Renamed Internet Architecture Board
– Communicated with RFCs (Request For Comments)
– IRTF (Internet Research Task Force) subsidiary to IAB
– IETF (Internet Engineering Task Force) subsidiary to IAB
– More formal standardization process was adopted
• Internet Society
– Created, populated by people interested in the Internet
• Net neutrality
– ISPs should provide equal quality of service to a given type of
application traffic, regardless of who is sending that content
– No blocking, no throttling, no paid prioritization, transparency
– Does not prevent an ISP from prioritizing any traffic
– Zero rating: ISP might charge its subscribers according to data
usage but grant an exemption for a particular service
Policy, Legal, and Social Issues (2 of 3)
• Security
– DDoS (Distributed Denial of Service) attack
– Botnets
– Spam email
– Phishing
• Privacy
– Profiling and tracking users by collecting data about their
network behavior over time
– Storing cookies in Web browser
– Browser fingerprinting
– Mobile services location privacy
Policy, Legal, and Social Issues (3 of 3)
• Disinformation
– Ill-considered, misleading, or downright wrong information
– Fake news
– Challenges
▪How does one define disinformation in the first place?
▪Can disinformation be reliably detected?
▪What should a network or platform operator do about it once it is detected?
Metric Units