Chapter 1: Introduction Our goal: Overview: get feel and whats - - PDF document

chapter 1 introduction
SMART_READER_LITE
LIVE PREVIEW

Chapter 1: Introduction Our goal: Overview: get feel and whats - - PDF document

Chapter 1: Introduction Our goal: Overview: get feel and whats the Internet? t terminology i l whats a protocol? more depth, detail network edge: hosts, access later in course nets, physical media approach:


slide-1
SLIDE 1

1

Chapter 1: Introduction

Our goal:

 get “feel” and

t i l

Overview:

 what’s the Internet?

terminology

 more depth, detail

later in course

 approach:

 use Internet as

example

 what’s a protocol?  network edge: hosts, access

nets, physical media

 network core: packet/circuit

switching, Internet structure

 performance: loss delay  performance: loss, delay,

throughput

 protocol layers, service models  security  history

9/16/2013 Introduction (SSL) 1-1

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

9/16/2013 Introduction (SSL) 1-2

slide-2
SLIDE 2

2

What’s the Internet: “nuts and bolts” view

 billions of connected

computing devices: hosts = end systems

Mobile network Global ISP

PC server

hosts = end systems

 running network apps

Home network Institutional network Regional ISP

wireless laptop cellular handheld wired access points

 communication links

 fiber, copper,

radio, satellite

9/16/2013 Introduction (SSL) 1-3

router wired links

 transmission

rate = bandwidth

 Packet switches forward

packets

 routers and switches

What’s the Internet: architecture & protocols

 Internet: “network of

networks”

l l hi hi l

Mobile network Global ISP

 loosely hierarchical  public Internet versus

private intranet  protocols control sending,

receiving of msgs

 e.g., TCP, IP, HTTP, Skype,

Ethernet

Home network Institutional network Regional ISP

Ethernet  Internet standards

 RFC: Request for comments  IETF: Internet Engineering

Task Force

9/16/2013 Introduction (SSL) 1-4

slide-3
SLIDE 3

3

What’s the Internet: a service view

 communication

infrastructure enables distributed applications: distributed applications

 Web, VoIP, email, games,

e-commerce, file sharing

 communication services

provided to apps:

 reliable data delivery

from source to from source to destination

 “best effort” (unreliable)

data delivery

9/16/2013 Introduction (SSL) 1-5

What’s a protocol?

human protocols:

 “what’s the time?”

network protocols:

 machines rather than

h

 “I have a question”  introductions

humans

 all communication

activity in Internet governed by protocols protocols define format,

  • rder of msgs sent and

9/16/2013 Introduction (SSL) 1-6

  • rder of msgs sent and

received among network entities, and actions taken

  • n msg transmission,

receipt, or timeout

slide-4
SLIDE 4

4

What’s a protocol?

a human protocol and a computer network protocol: Hi Hi

Got the time?

2:00

Get http://www.awl.com/kurose-ross

TCP connection request TCP connection response

9/16/2013 Introduction (SSL) 1-7

Q: Other human protocols? 2:00 <file> time

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

9/16/2013 Introduction (SSL) 1-8

slide-5
SLIDE 5

5

A closer look at network structure:

 network edge:  hosts: clients and servers  servers often in data

mobile network global ISP

 servers often in data

centers

access networks, physical media: wired, wireless communication links

global ISP regional ISP home network

Introduction (SSL)

 network core:

 interconnected routers  network of networks

institutional network

1-9

9/16/2013

Access networks and physical media

Q: How to connect end systems to edge router?

 residential access nets  residential access nets  institutional access

networks (school, company)

 mobile access networks

Keep in mind: p

 bandwidth (bits per

second) of access network?

 shared or dedicated?

9/16/2013 Introduction (SSL) 1-10

slide-6
SLIDE 6

6

From physical media to From physical media to communication channels—basic concepts

9/16/2013 Introduction (SSL) 1-11

Modulation and Demodulation

 Common

examples: radio, television channels for analog signals

 Can also be used

for digital signals (encoding binary data)

9/16/2013 Introduction (SSL) 1-12

) 2 cos(    t f A

slide-7
SLIDE 7

7

Shannon’s Theorem

C = B log (1 + S/N) where C max capacity in bits/sec B bandwidth in hertz S/N si l t is ti C = B log2 (1 + S/N)

9/16/2013 Introduction (SSL) 1-13

S/N signal to noise ratio

FDM vs. TDM

9/16/2013 Introduction (SSL) 1-14

Duration of frame (or superframe) is 125 µsec in digital telephone networks

slide-8
SLIDE 8

8

TDM in Telephone Networks

 Why 125 sec for

frame duration?

 Sampling rate for

voice = 8000 f m

 Sampling Theorem:

An analog signal can be reconstructed from samples taken at a rate equal to twice the signal bandwidth samples/sec or one voice sample every 125 sec

 Digital voice channel

(uncompressed), 8 bits x 8000/sec = g

 Bandwidth for voice

signals is 4 Khz; for hi fidelity music, 22.05 Khz 64 Kbps

9/16/2013 Introduction (SSL) 1-15

Other Multiplexing Techniques

 Space division

multiplex

 Same frequency used in

 Wavelength division

multiplex

 Light pulses sent at  Same frequency used in

different cables

 Same frequency used in

different (nonadjacent) cells

 Light pulses sent at

different wavelengths in optical fiber  Code division multiplex

(in chapter 6 of text)

d G A r A A

9/16/2013 Introduction (SSL) 1-16

F E A G A D B C F E G A D A B C

slide-9
SLIDE 9

9

Now back to access networks

9/16/2013 Introduction (SSL) 1-17

Access net: digital subscriber line (DSL)

central office telephone network DSLAM

DSL modem splitter

 use FDM in telephone line to central office DSLAM

  • data over DSL line goes to Internet

ISP

DSLAM voice, data transmitted at different frequencies over dedicated line to central office

modem

DSL access multiplexer

Introduction (SSL)

  • voice over DSL line goes to telephone net

 < 2.5 Mbps upstream transmission rate (typically < 1

Mbps)

 < 24 Mbps downstream transmission rate (typically < 10

Mbps)

1-18

9/16/2013

slide-10
SLIDE 10

10

Access net: cable network

cable headend

cable modem splitter

V I D V I D V I D V I D V I D V I D D A D A C O N T R

Introduction (SSL)

Channels

E O E O E O E O E O E O T A T A O L 1 2 3 4 5 6 7 8 9

frequency division multiplexing: different channels transmitted in different frequency bands

1-19

9/16/2013

Access net: cable and fiber

cable d splitter

cable headend CMTS cable modem

 HFC: hybrid fiber coax

  • cable and fiber network attaches homes to ISP router
  • asymmetric: up to 30 Mbps downstream transmission rate 2 Mbps

data, TV transmitted at different frequencies over shared cable distribution network

modem

CMTS

ISP

termination system

Introduction (SSL)

  • asymmetric: up to 30 Mbps downstream transmission rate, 2 Mbps

upstream transmission rate

  • homes share access network to cable headend

(unlike DSL, which has dedicated access to central office)

 Fiber to the home (Verizon, Google) - optical switches

1-20

9/16/2013

slide-11
SLIDE 11

11

Access net: home network

wireless devices to/from headend or central office

  • ften combined

in single box

Introduction (SSL)

cable or DSL modem router, firewall, NAT wired Ethernet (100 Mbps) wireless access point (54 Mbps)

1-21

9/16/2013

Enterprise access networks (Ethernet)

Ethernet switch institutional mail, web servers institutional router institutional link to ISP (Internet)

Introduction (SSL)

 today, end systems typically connect into Ethernet

switch

  • 10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates

 A large enterprise network is connected to multiple ISPs

1-22

9/16/2013

slide-12
SLIDE 12

12

Wireless access networks

 shared wireless access network connects end system

to router

 via base station aka “access point”

id i l wireless LANs:

  • within building (100 ft)
  • 802.11b/g/n (WiFi)

wide-area wireless access

  • provided by telco (cellular)
  • perator, 10’s km
  • between 1 and 10 Mbps
  • 3G, 4G: LTE

Introduction (SSL)

to Internet to Internet

1-23

9/16/2013

Physical Media

 Bit: propagates between

transmitter & receiver Twisted Pair (TP)

 two insulated copper

wires

 Category 3: traditional

transmitter & receiver

 physical link: what lies

between transmitter & receiver

 guided media:

 signals propagate inside

solid media: copper fiber phone wires, 10 Mbps Ethernet

 Category 5:

100Mbps Ethernet

 Category 6: 10Gbps

solid media: copper, fiber, coax  unguided media:

 signals propagate freely,

e.g., radio

9/16/2013 Introduction (SSL) 1-24

slide-13
SLIDE 13

13

Physical Media: coax, fiber

Coaxial cable: Fiber optic cable:

 two concentric copper

conductors

 baseband:

 single channel in cable  legacy Ethernet

 broadband: lti l h l i  glass fiber carrying light

pulses

 high-speed point-to-point

transmission, e.g., 10’s-100’s

Gps  low error rate:

9/16/2013 Introduction (SSL) 1-25  multiple channels in

cable

 HFC

 bidirectional

  • > broadcast

 repeaters spaced far apart 

immune to electromagnetic noise

Physical media: radio

 signal carried in

electromagnetic waves

Radio link types:

 LAN (e.g., Wi Fi)

 11Mbps, 54 Mbps

 wide area (e g cellular)  can be omnidirectional

  • r as a directional beam

 propagation

environment effects:

 wide-area (e.g., cellular)

 3G cellular: ~ a few Mbps

 terrestrial microwave

 e.g. up to 45 Mbps channels

 satellite

 45Mbps channel (or multiple

sm ll h nn ls)

m ff

 reflection  obstruction by objects  interference 9/16/2013 Introduction (SSL) 1-26

smaller channels)

 geosynchronous vs. low

altitude

 270 msec end-end delay for

geosynchronous

slide-14
SLIDE 14

14

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

9/16/2013 Introduction (SSL) 1-27

The Network Core

 mesh of interconnected

routers

 th

f d t l

 the fundamental

question: how is data transferred through net?

 circuit switching:

dedicated circuit per call: telephone net k h d

 packet-switching: data

sent thru net in discrete “chunks”

9/16/2013 Introduction (SSL) 1-28

slide-15
SLIDE 15

15

Network Core: Circuit Switching

End-to-end resources reserved for each reserved for each “call”

 E.g., link bandwidth

 FDM, TDM

 end-to-end circuit-like

(guaranteed) performance

 call setup required

 resource piece idle if not

used by the call (no sharing)

9/16/2013 Introduction (SSL) 1-29

Numerical example

 How long does it take to send a file of

640 000 bits from host A to host B over a 640,000 bits from host A to host B over a circuit-switched network?

 all links are 1.536 Mbps  each link uses TDM with 24 slots/sec (i.e., one

slot per circuit)

 500 msec to establish end-to-end circuit

Let’s work it out!

9/16/2013 Introduction (SSL) 1-30

slide-16
SLIDE 16

16

Packet Switching: Statistical Multiplexing

A C

100 Mb/s Ethernet statistical multiplexing

B

1.5 Mb/s

D E

queue of packets waiting for output link  Sequence of A & B packets does not have fixed pattern

bandwidth shared on demand  statistical multiplexing

 queueing delay, packet loss  also called asynchronous time division multiplexing (ATDM)

9/16/2013 Introduction (SSL) 1-31

E

Network Core: Packet Switching

each end-end data stream divided into packets k f d ff resource contention:

 aggregate resource

d d d

 packets of different users

share network resources

 each packet uses full link

bandwidth

 resources used as needed

demand can exceed amount available

 congestion: packets

queue, wait for link use

 store and forward:

packets move one hop

9/16/2013 Introduction (SSL) 1-32

p p at a time

 Each node receives the

complete packet before forwarding

Bandwidth division into “pieces” Dedicated allocation Resource reservation

slide-17
SLIDE 17

17

Disadvantage of store-and-forward

R R R L  takes L/R seconds to

transmit (push out) a message of L bits on to link at R bps

 store and forward:

entire message must

Example:

 L = 7.5 Mbits  R = 1.5 Mbps  End-to-end delay more

than 15 seconds

 A fil /m

l m g m arrive at router before it can be transmitted

  • n next link

 A file/message larger

than maximum packet size is transmitted as multiple packets

9/16/2013 Introduction (SSL) 1-33

Circuit

  • vs. Message
  • vs. Packet

Switching

violates store- and-forward?

9/16/2013 Introduction (SSL) 1-34

slide-18
SLIDE 18

18

Packet Switching versus Message Switching Advantages of packet switching

 Smaller end-to-end delay from pipelining  Less data loss from transmission errors

Disadvantages of packet switching

9/16/2013 Introduction (SSL) 1-35

 More header bits  Additional work to do segmentation

and reassembly

Packet switching versus circuit switching

 1 Mb/s link  each user:

 100 kb/s when “active”  100 kb/s when active  active 10% of time (a

“bursty” user)  circuit-switching:

 10 users

 packet switching:

N users 1 Mbps link

 with 35 users,

probability > 10 active at same time is less than .0004

9/16/2013 Introduction (SSL) 1-36

Q: how did we get value 0.0004?

slide-19
SLIDE 19

19

Packet switching versus circuit switching

 great for bursty data

Is packet switching a “slam dunk winner?”

 great for bursty data

 resource sharing  simpler, no call setup

 excessive congestion -> packet delay and loss

 protocols needed for reliable data transfer,

congestion control

 Q: How to provide circuit-like behavior?

 bandwidth guarantees needed for interactive

audio/video apps

 solution may impact network neutrality

9/16/2013 Introduction (SSL) 1-37

Network Taxonomy

Telecommunication networks Circuit-switched networks FDM/WDM TDM Packet-switched networks Networks with VCs Datagram Networks

9/16/2013 Introduction (SSL) 1-38

Aside - Internet’s transport layer provides both connection-

  • riented (TCP) and connectionless services (UDP).

Any technology can be used in link layer of Internet under IP

Internet won!

slide-20
SLIDE 20

20

Internet structure: network of networks

 End systems connect to Internet via access

ISPs (Internet Service Providers)

l  Residential, company, and university ISPs

 Access ISPs in turn must be interconnected

 so that any two hosts can send packets to each other

 Resulting network of networks is very complex

 Evolution was driven by economics and national

policies

9/16/2013 Introduction (SSL) 1-39

Internet structure: network of networks

Question: given millions of access ISPs, how to connect them together?

access net access net access net access net access net access net access net net access net access net access net access net access net access net access net access net access net

9/16/2013 Introduction (SSL) 1-40

slide-21
SLIDE 21

21

Internet structure: network of networks

Option: connect each access ISP to every other access ISP?

access net access net access net access net access net access net access net net access net access net

connecting each access ISP to each other directly doesn’t scale: O(N2) connections.

access net access net access net access net access net access net access net

9/16/2013 Introduction (SSL) 1-41

Internet structure: network of networks

access net access net

Option: connect each access ISP to a global transit ISP? Customer and provider ISPs have economic agreement.

access net access net access net access net access net net access net access net

global ISP

access net access net access net access net access net access net access net

9/16/2013 Introduction (SSL) 1-42

slide-22
SLIDE 22

22

Internet structure: network of networks

access net access net

But if one global ISP is viable business, there will be competitors ….

access net access net access net access net access net net access net access net

ISP B ISP A

access net access net access net access net access net access net access net

ISP C

9/16/2013 Introduction (SSL) 1-43

Internet structure: network of networks

access net access net

But if one global ISP is viable business, there will be competitors …. which must be interconnected Internet exchange point

access net access net access net access net access net net access net access net

ISP B ISP A

IXP IXP

access net access net access net access net access net access net access net

ISP C

peering link

9/16/2013 Introduction (SSL) 1-44

slide-23
SLIDE 23

23

Tier-1 ISP: e.g., Sprint

t /f b kb POP: point-of-presence

to/from customers peering to/from backbone

… … … …

Introduction (SSL) 1-45

9/16/2013

Internet structure: network of networks

access net access net

… and regional networks may arise to connect access nets to ISPS

access net access net access net access net access net net access net access net

ISP B ISP A

IXP IXP

access net access net access net access net access net access net access net

ISP C regional net

9/16/2013 Introduction (SSL) 1-46

slide-24
SLIDE 24

24

Internet structure: network of networks

access net access net

… and a content provider network (e.g., Akamai, Google, Microsoft) may run its own network to bring services, content close to end users

access net access net access net access net access net net access net access net

ISP B ISP A

IXP IXP

Content provider network

access net access net access net access net access net access net access net

ISP B regional net

9/16/2013 Introduction (SSL) 1-47

Internet structure: network of networks

IXP

Tier 1 ISP Tier 1 ISP Google

access ISP access ISP access ISP access ISP access ISP access ISP access ISP access ISP

Regional ISP Regional ISP

IXP IXP IXP

Introduction (SSL)

 at center: small # of well-connected large networks

 “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT),

national & international coverage

 content provider networks (e.g., Google): private network that

connects it data centers to Internet, often bypassing tier-1 and regional ISPs

1-48

9/16/2013

slide-25
SLIDE 25

25

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

9/16/2013 Introduction (SSL) 1-49

How do loss and delay occur?

 packet arrival rate to link temporarily

exceeds output link capacity exceeds output link capacity

 packets queue, wait for turn A

packet being transmitted (delay)

9/16/2013 Introduction (SSL) 1-50

B

packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers

slide-26
SLIDE 26

26

Four sources of packet delay

 1. nodal processing:

 check bit errors

 2. queueing

 time waiting at output  check bit errors  determine output link

A

propagation transmission

 time waiting at output

link for transmission

 depends on congestion

level of router

9/16/2013 Introduction (SSL) 1-51

B

propagation nodal processing queueing

Delay in packet-switched networks

  • 3. Transmission delay:

 R: link bandwidth (bps)

  • 4. Propagation delay:

 d: length of physical link  L: packet length (bits)  time to send bits into

link = L/R

 s: propagation speed in

medium (~2x108 m/sec)

 propagation delay = d/s

t smissi

Note: s and R are very different quantities!

9/16/2013 Introduction (SSL) 1-52

A B

propagation transmission nodal processing queueing

slide-27
SLIDE 27

27

End-to-End Delay

 Nodal delay (from when last bit of packet arrives at this node

to when last bit arrives at next node)

dnodal = dproc + dqueue + dtrans + dprop dnodal dproc dqueue dtrans dprop

 End-to-end delay over N identical nodes/links

from client c to server s (from when last bit of packet

leaves client to when last bit arrives at server)

dc-s = dprop + Ndnodal

 Round trip time (RTT)

RTT = dc-s + ds-c + tserver where tserver is server processing time

9/16/2013 Introduction (SSL) 1-53

“Real” Internet delays and routes

 What do “real” Internet delay & loss look like?  traceroute program: provides delay measurement

from source to router along end end Internet path from source to router along end-end Internet path towards destination. For all i:

 sends three packets that will reach router i on path

towards destination

 router i will return packets to sender  sender times interval between transmission and reply  sender times interval between transmission and reply. 9/16/2013 Introduction (SSL) 1-54

3 probes 3 probes 3 probes

slide-28
SLIDE 28

28

“Real” Internet delays and routes

traceroute: gaia.cs.umass.edu to www.eurecom.fr

Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu

1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio n2 cssi renater fr (193 51 206 13) 111 ms 114 ms 116 ms

g m g m

trans-oceanic link different k

9/16/2013 Introduction (SSL) 1-55

12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms

* means no response (probe lost, router not replying)

packets

Queueing delay (waiting time)

 R: link bandwidth (bps)  L: packet length (bits)

 s

i t R/L (pkts/s )

average queueing delay

 service rate = R/L (pkts/sec)

 : average packet arrival rate

traffic intensity = arrival rate/service rate = L/R

 L/R ~ 0: average queueing delay small

1 L/R

9/16/2013 Introduction (SSL) 1-56

 L/R 0: average queueing delay small  L/R -> 1: delays become large  L/R > 1: more “work” arriving than can be

served, average delay infinite!

 In reality, buffer overflow when L/R -> 1

slide-29
SLIDE 29

29

Packet loss

 buffer in router for each link has finite

capacity capacity

 lost packet may be retransmitted by previous

node, by source end system, or not at all

A

packet being transmitted buffer (waiting area)

9/16/2013 Introduction (SSL) 1-57

A B

packet arriving to full buffer is lost ( g )

Throughput - rate at which bits are

transferred from source to destination (in bits/sec.)  Rs < Rc end-end throughput less than ___ ?

Rs bits/sec Rc bits/sec

 Rs > Rc end-end throughput less than ___ ?

R bits/s R bit /

9/16/2013 Introduction (SSL) 1-58

Rs bits/sec Rc bits/sec

link on end-end path that constrains end-end throughput bottleneck link

slide-30
SLIDE 30

30

Throughput: Internet scenario

 per-connection end-to-

end throughput is approximately

Rs

pp y min(Rc, Rs, R/10)

 Actually sharing a

bottleneck equally is ideal but unrealistic

 In practice: Rc or Rs is Rs Rs Rs Rc Rc R

p

c s

  • ften the bottleneck

 or the server is the

bottleneck

9/16/2013 Introduction (SSL) 1-59

10 connections (fairly) share backbone bottleneck link R bits/sec Rc

Little’s law and a useful queueing delay formula

9/16/2013 Introduction (SSL) 1-60

slide-31
SLIDE 31

31

Little’s Law

Average population

  

where N is number of departures

N

1 average delay delayi N i 1

g p p = (average delay) x (throughput rate)

where N is number of departures

where T is duration of experiment

throughput rate N/T

9/16/2013 Introduction (SSL) 1-61

average population (to be defined) in system n(t) Time t Number

1

9/16/2013 Introduction (SSL) 1-62

where is duration of the experiment

1 average population ( ) n t dt

 

slide-32
SLIDE 32

32

1 2 i=1

random variable samples , ,..., 1 mean (average) 1

n n i n

x x x x x x n 

2 2 2 1

1 second moment ( ) ( )

n i i

x x x n

 

constant a is : case Special x

2

mean residual life 2 2 x x x  

9/16/2013 Introduction (SSL) 1-63

2 2 ) ( life residual mean ) ( constant a is : case Special

2 2 2

x x x x x x    random variable x with discrete values x1, x2, … , xm let pi = probability [x = xi] for i = 1, 2, …, m by definition mean

m i i m i

p x x  

 1

9/16/2013 Introduction (SSL) 1-64

second moment

2 2 1 m i i i

x x p

 

(Aside: For a continuous random variable, use integration instead of summation.)

slide-33
SLIDE 33

33

Single-Server Queue  

queue server queue server average service time, in seconds service rate, in jobs/second ( = 1/ ) arrival rate, in jobs/second utilization of server x x    

9/16/2013 Introduction (SSL) 1-65

Conservation of flow x         

M/G/1 queue

 Single server

 does not idle when there is work, no overhead, i.e.,

it performs 1 second of work per second

 FIFO service

 Arrivals according to a Poisson process at

rate jobs/second

 Service times of arrivals are x1, x2, …, xi …

which are independent, identically di t ib t d ( ith l di t ib ti ) distributed (with a general distribution)

 Average service time is , average wait is W,

average delay is T = W +

9/16/2013 Introduction (SSL) 1-66

x

x

slide-34
SLIDE 34

34

Let be the unfinished work at time t ( ) U t

( ) U t

2 1

1 2 x

2 2

1 x

2 3

1 x

2 2

x w

3 3

x w

9/16/2013 Introduction (SSL) 1-67

1 2 3 1 2 3 4 5 arrivals and departures time

2

2

2 x

3

2 x

Derivation of W

Time average of unfinished work is

( )

1

U

U t dt

 

2 1 1

1 2

1

n n i i i i i

x x w

 

 

         

xi and wi are independent

2

1 where 2

i i i i

i i i

x w x w

n

x x w

        

For Poisson arrivals, the average wait is equal to from the Poisson arrivals see time average (PASTA) Theorem

U

68 Introduction (SSL)

 

9/16/2013

slide-35
SLIDE 35

35

Derivation of W (cont.)

 The average wait is

2 2

1 x   

2 2 2

1 2 2 (1 ) 2 x W x xW xW x W                  

P ll k Khi hi (P K)

9/16/2013 Introduction (SSL) 1-69

2(1 ) x W    

Pollaczek-Khinchin (P-K) mean value formula P i M/G/1 queue Markovian General T Poisson

1.0

 x

2

( ) x T x W x     

Average delay is

9/16/2013 Introduction (SSL) 1-70

2(1 )  

Also called Pollaczek-Khinchin (P-K) mean value formula

slide-36
SLIDE 36

36

Special Cases

  • 1. Service times have an

exponential distribution (M/M/1). We then have       10 10

T decreases as  increases

2 2

(2)( ) ( ) ( ) 2(1 ) 1 1 x x x W T W x x x x x                  

      10 10 T

2 2

2( ) x x 

9/16/2013 Introduction (SSL) 1-71

1 1 1 1 1 x x x x x x                    



1.0

x

0.1x

  • 2. Service times are constant (deterministic)

M/D/1

2 2

( ) x x 

2

( ) 2(1 ) 2(1 ) (2 ) 1 x x W T W x            

T decreases as 

9/16/2013 Introduction (SSL) 1-72

(2 ) 1 2(1 ) T       

T decreases as increases 

slide-37
SLIDE 37

37

60 jobs/sec 100 jobs/sec

Two Servers and Two Queues:

100 jobs/sec 60 jobs/sec 100 jobs/sec

Single Higher Speed Server:

9/16/2013 Introduction (SSL) 1-73

120 jobs/sec 200 jobs/sec

g g p

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History

9/16/2013 Introduction (SSL) 1-74

slide-38
SLIDE 38

38

Protocol “Layers”

Networks are complex!

 many “pieces”:

 hosts  routers  links of various

media

 applications  protocols

Question:

How to organize network structure?

 protocols  hardware,

software

9/16/2013 Introduction (SSL) 1-75

Layered architecture

 Use abstraction to hide

complexity E h l

Application programs Process-to-process channels  Each layer

  • provides a service via its
  • wn internal actions as

well as relying on service provided by layer below

  • is a network of processes

 Can have alternative p Host-to-host connectivity Hardware Application programs Request/reply h nn l Message st m h nn l  Can have alternative

abstractions at each layer (resulting in protocol graph rather than protocol stack)

9/16/2013 Introduction (SSL) 1-76

channel stream channel Host-to-host connectivity Hardware

slide-39
SLIDE 39

39

Why layering?

 layered architecture as reference model for

protocol design by community effort

  • decompose a large system into smaller pieces

decompose a large system into smaller pieces which can be designed and implemented by different people/teams

 modularity eases maintenance and evolution of

system

  • allows changes in implementation method so

long as API remains the same e g different long as API remains the same, e.g., different Ethernets

 strict layering often violated for efficient

protocol implementation

  • cross-layer design

9/16/2013 Introduction (SSL) 1-77

Each protocol

 involves two or more peers  two kinds of specifications

  • service interface: operations

r c nt rfac p rat n a local user can perform on a protocol entity and get results

  • peer-peer protocol: format

and meaning of messages exchanged by protocol entities (also called peers) to

High-level entity High-level entity Protocol entity Protocol entity

Service interface Peer-to-

Host 1 Host 2

provide protocol service

 The term “protocol”

generally refers to peer- peer spec

9/16/2013 Introduction (SSL) 1-78

peer protocol

slide-40
SLIDE 40

40

Internet protocol stack

 application: supporting network

applications

 FTP, SMTP, HTTP

application

 transport: process-process data

transfer

 TCP, UDP

 network: routing of datagrams from

source to destination

 IP, routing protocols

pp transport network link

 IP, routing protocols

 link: data transfer between

neighboring network elements

 PPP, Ethernet, 802.11 (WiFi)

 physical: bits “on the wire”

9/16/2013 Introduction (SSL) 1-79

physical

ISO/OSI reference model

 presentation: allow applications to

interpret meaning of data, e.g., ti i hi application encryption, compression, machine- specific conventions

 session: synchronization,

checkpointing, recovery of data exchanged

 Internet stack “missing” these layers!

presentation session transport network link

 these services, if needed, must be

implemented in application (or application protocol)

 needed?

9/16/2013 Introduction (SSL) 1-80

link physical

slide-41
SLIDE 41

41

Internet Architecture

 Internet Engineering

Task Force (IETF)

 application protocols

li i

FTP HTTP NV TFTP TCP UDP

support applications

 multiplexing and

demultiplexing

 hourglass shape (only IP

in network layer)

 best effort service

=> any delivery

IP NET1 NET2 NETn . . . Application

=> any delivery service can be used by IP

 limitation of hourglass

9/16/2013 Introduction (SSL) 1-81

TCP UDP IP Network Application

Encapsulation

 Protocol peers provide

a data delivery service

Host 2 User Data User Host 1 Data

 How do protocol peers

in different machines exchange protocol messages between themselves?

 In protocol header

Upper layer Lower layer Data Upper layer Lower layer HU Data HU

 In protocol header

encapsulated and de-encapsulated

9/16/2013 Introduction (SSL) 1-82

HL HU Data

slide-42
SLIDE 42

42

Logical communication between peers

E.g.: transport

 accept data

from application

application transport network data

transport

application

 add addressing,

reliability check info to form a message

 send message

to peer via a

link physical application transport network link physical application application network link physical data ack data

to peer via a delivery service

 wait for peer’s

reply (ack)

9/16/2013 Introduction (SSL) 1-83

application transport network link physical application transport network link physical

transport

Physical path of data

Each layer takes data (service data unit) from above

 adds header to create its own protocol data unit  passes protocol data unit to layer below  passes protocol data unit to layer below

network link physical network link physical application transport network link physical

message segment datagram frame M M H 4 M H 4 H 3 M H 4 H 3 H 2 T2 bits

application transport network link physical ...

9/16/2013 Introduction (SSL) 1-84

p y p y source host destination host

bits

p y router router protocol data units Note: In the past, a switch implements only two layers (physical and link). Nowadays many switches function as routers

slide-43
SLIDE 43

43

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security (read on your own) 1.7 History

9/16/2013 Introduction (SSL) 1-85

Network Security

 The field of network security is about:

 how bad guys can attack computer networks

y p

 how we can defend hosts and networks against

attacks

 how to design architectures that are immune to

attacks  Internet not originally designed with

(much) security in mind (much) security in mind

 original vision: “a group of mutually trusting

users attached to a transparent network” 

 needs security considerations in each layer

9/16/2013 Introduction (SSL) 1-86

slide-44
SLIDE 44

44

Bad guys: put malware into hosts via Internet

 malware can get in host from:

 virus: self-replicating infection from  virus: self-replicating infection from

receiving/executing object (e.g., e-mail attachment)

 worm: self-replicating infection from passively

receiving object that gets itself executed

 spyware can record keystrokes web sites

Introduction (SSL)

 spyware can record keystrokes, web sites

visited, upload info to collection site

 infected host can be enrolled in a botnet,

used for spam, DDoS attacks

1-87

9/16/2013

Distributed Denial of service (DDoS) attacks

 attackers overwhelm resources with bogus traffic

 make resources (server, bandwidth) unavailable to legitimate

g traffic 1.

select target

  • 2. break into hosts

around the network (see botnet)

9/16/2013 Introduction (SSL) 1-88

(see botnet)

  • 3. send packets toward

target from compromised hosts

target

slide-45
SLIDE 45

45

The bad guys can sniff packets

Packet sniffing:

 broadcast media (shared Ethernet, wireless)  promiscuous network interface reads/records all

packets (e.g., including passwords!) passing by A C

9/16/2013 Introduction (SSL) 1-89

B

src:B dest:A payload

 Wireshark software is a (free) packet-sniffer

The bad guys can use false source addresses

 IP spoofing: send packet with false source address A B C

src:B dest:A payload

9/16/2013 Introduction (SSL) 1-90

More on security in Chapter 8

slide-46
SLIDE 46

46

Chapter 1: roadmap

1.1 What is the Internet? 1 2 Network edge 1.2 Network edge

 end systems, access networks, links

1.3 Network core

 circuit switching, packet switching, network structure

1.4 Delay, loss and throughput in packet-switched networks 1 5 P l l i d l 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History – please read on your own

9/16/2013 Introduction (SSL) 1-91

End of Chapter 1

9/16/2013 Introduction (SSL) 1-92