Kick starting science ... Computer networking (TDDD63): Part 1 - - PDF document

kick starting science
SMART_READER_LITE
LIVE PREVIEW

Kick starting science ... Computer networking (TDDD63): Part 1 - - PDF document

2015-09-20 Kick starting science ... Computer networking (TDDD63): Part 1 Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? well, cable into wall How


slide-1
SLIDE 1

2015-09-20 1

Computer networking (TDDD63): Part 1 …

Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/

Kick starting science ... What do you have in the future? What do you have in the future? How does it keep going? … well, cable into wall …

slide-2
SLIDE 2

2015-09-20 2

What happens there? What happens there?

Or maybe more realistically …

  • Work at company …

How do we build services that are …

Efficient Secure Reliable

Important problem faced every day by many companies, including …

1-12

slide-3
SLIDE 3

2015-09-20 3 In the computer network part we will look at things such as … How do we build scalable, efficient, secure, and reliable services? How do we communicate with a machine across the world?

How do we find out who to talk to? How do we find a path? How do we avoid sending too much for the receiver and network to handle?

slide-4
SLIDE 4

2015-09-20 4

What happens at our machine? Inside the network? Along the path? What happens at our machine? Inside the network? Along the path?

So let’s start the lecture … Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History

Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History

What’s the Internet: “Nuts and Bolts View”

slide-5
SLIDE 5

2015-09-20 5

What’s the Internet: “Nuts and Bolts View” What’s the Internet: “Service View”

Today’s service/company landscape include ...

1-27

Today’s service/company landscape include ...

1-28

Today’s service/company landscape include ...

1-29

Equipment manufacturers (also sell services and help Operate networks)

Today’s service/company landscape include ...

1-30

Network operators Equipment manufacturers (also sell services and help Operate networks)

slide-6
SLIDE 6

2015-09-20 6

Today’s service/company landscape include ...

1-31

Enterprise solutions and network service (e.g., data center solutions and cloud providers)

Today’s service/company landscape include ...

1-32

Enterprise solutions and network service (e.g., data center solutions and cloud providers) Content delivery networks

Today’s service/company landscape include ...

1-33

End user services (e.g., web-based social networks, search, communication, and streaming)

Some common applications today …

  • World Wide Web (WWW)
  • Remote login (telnet, rlogin, ssh)
  • File transfer
  • Peer-to-peer file sharing
  • Cloud computing/services
  • Instant messaging (chat, text messaging, etc.)
  • Live and video-on-demand streaming
  • Internet phone (Voice-Over-IP)
  • Distributed games

34

… and tomorrow

35

The 2020 vision  Everything that can be connected will be connected

 50B devices (perhaps more like 500B ...)

 IoT and smart cities

 Machine-to-machine

 High-definition 3D streaming to heterogeneous clients

Today’s end hosts …

slide-7
SLIDE 7

2015-09-20 7

… and tomorrow’s Internet of Things!

Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History

A Closer Look at Network Structure Access Networks and Physical Media

Access Net: Digital Subscriber Line (DSL)

slide-8
SLIDE 8

2015-09-20 8

Access Net: Cable Network Access Net: Home Network

Enterprise Access Networks (Ethernet)

Wireless Access Networks Host: Sends Packets of Data Physical Media

slide-9
SLIDE 9

2015-09-20 9

Physical Media: Radio Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History

The Network Core

Packet-Switching: Store-and-forward Packet Switching: Queueing Delay, Loss

Two Key Network Functions

slide-10
SLIDE 10

2015-09-20 10

Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks

Tier 1 ISPs

Internet Structure: Network of Networks

Peering Link - all traffic between two ISPs travels through one direct connection IXP- 3rd party company sets up an exchange point where multiple ISPs can peer together (about 300 IXPs)

slide-11
SLIDE 11

2015-09-20 11

Internet Structure: Network of Networks Internet Structure: Network of Networks Internet Structure: Network of Networks

Google private network bypasses upper tiers by peering with lower tiers directly Google has over 50 data centers some with

  • ver 100,000 servers, all interconnected via

Googles private TCP/IP network

Tier-1 ISP: Sprint

POP: ISP to ISP connections

Sets of routers in the provider’s network where customer ISPs can connect into provider ISP

Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History

What’s a Protocol?

slide-12
SLIDE 12

2015-09-20 12

What’s a Protocol?

A Human Protocol

What’s a Protocol?

A Human Protocol A Computer Network Protocol

What's a Protocol? Protocol “Layers” Problem Scenario

Web Email Bittorrent Ethernet 802.11 Bluetooth VoIP Cellular

  • This is a nightmare scenario
  • Huge amounts of work to add new apps or media
  • Limits growth and adoption

More Problems

Bittorrent Ethernet 802.11 Bittorrent

Application endpoints may not be on the same media

slide-13
SLIDE 13

2015-09-20 13

Solution: Use Indirection

Web Email Bittorrent Ethernet 802.11 Bluetooth VoIP Cellular

Magical Network Abstraction Layer

  • O(1) work to add new apps, media
  • Few limits on new technology

API API API API

Layers, Protocols, Interfaces

  • Networks organized as a stack of layers
  • Offer services to the layer above it using a well-

defined interface (programming language analogy: libraries hide details while providing a service)

  • Reduces design complexity
  • Protocols: Logical “horizontal” conversations at any

layer (between peers)

  • Data Transfer: each layer passes data & control

information over the interfaces (between neighboring layers)

Internet Protocol Stack The Hourglass

76

IPv4 TCP, UDP, ICMP HTTP, FTP, RTP, IMAP, Jabber, … Ethernet, 802.11x, DOCSIS, … Fiber, Coax, Twisted Pair, Radio, …

Layering: logical communication

application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical

Layering: logical communication

application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data data transport transport ack

slide-14
SLIDE 14

2015-09-20 14

Layering: physical communication

application transport network link physical application transport network link physical application transport network link physical application transport network link physical network link physical data data

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M message

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M H

t

message segment

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M H

t

H

t

H

n

message segment datagram

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H

t

H

t

H

n

H

t

H

n

H

l

message segment datagram frame

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H

t

H

t

H

n

H

t

H

n

H

l

M H

t

H

n

H

l

message segment datagram frame

slide-15
SLIDE 15

2015-09-20 15

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H

t

H

t

H

n

H

t

H

n

H

l

M M H

t

H

n

H

t

H

n

H

l

message segment datagram frame

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H

t

H

t

H

n

H

t

H

n

H

l

M M M H

t

H

t

H

n

H

t

H

n

H

l

message segment datagram frame

Encapsulation: Layering and data

Each layer takes data from above

  • adds header information to create new data unit
  • passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H

t

H

t

H

n

H

t

H

n

H

l

M M M M H

t

H

t

H

n

H

t

H

n

H

l

message segment datagram frame

Encapsulation

Each layer takes data from above

  • adds header information to create

new data unit

  • passes new data unit to layer below

Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History

Network Security

 field of network security

  • how bad “entities” can attack computer networks
  • how we can defend networks against attacks
  • how to design architectures that are immune to

attacks

 Internet not originally designed with (much) security

in mind

  • riginal vision: “a group of mutually trusting users

attached to a transparent network” 

  • Internet protocol designers playing “catch-up”
  • security considerations in all layers!

Introduction 1-90

slide-16
SLIDE 16

2015-09-20 16

Bad guys/girls/organizations (“entities”): can put malware into hosts via Internet

 malware can get in host from a virus, worm, or

Trojan horse.

 spyware malware can record keystrokes, web sites

visited, upload info to collection site.

 infected host can be enrolled in botnet, used for

spam and DDoS attacks.

 malware often self-replicating: from one infected

host, seeks entry into other hosts

Introduction 1-91

Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by

  • verwhelming resource with bogus traffic
  • 1. select target
  • 2. break into hosts around the

network (see botnet)

  • 3. send packets to target from

compromised hosts

target

Introduction 1-92

Bad “entities” can attack servers and network infrastructure

Bad “entities” can “sniff”

A B C src:B dest:A payload

Introduction 1-93

Broadcast medium allow packet sniffers (in promiscuous mode) to listen to packets to others

Bad “entities” can use false source addresses

IP spoofing: send packet with false source address

A B C src:B dest:A payload

Introduction 1-94

Bad “entities” can record and playback

record-and-playback: sniff sensitive info (e.g.,

password), and use later

A B C src:B dest:A user: B; password: foo

Introduction 1-95

… AND lots more …

Roadmap

  • What is the Internet?
  • Network Edge
  • End systems, access networks, links
  • Network Core
  • Packet switching, network structure
  • Protocol Layers, service models
  • Network Security
  • History
slide-17
SLIDE 17

2015-09-20 17

Internet History Internet History Internet History

DNS - Domain Name Server

Internet History Internet History

1.11 billion users March 2013 2,7 billion users 2013 2,9 billion users 2014 ?? 1.23 billion users2014

Internet History

1.11 billion users March 2013 2,7 billion users 2013 2,9 billion users 2014 ?? 1.23 billion users2014

slide-18
SLIDE 18

2015-09-20 18

Extra slides ... Internet Hosts 1981-2013

July 2012: 908,585,739 July 2013: 996,230,757 July 2014: 1,028,544,414

Number of hosts advertised in the DNS

Sweden: Host #

2004 2005 2006 2008 2010 2012 Sweden 945 221 2 701 456 2 958 000 3 579 000 5 727 000

Sweden: 5,727,000 2011 Country Rank: 18

2014: 9,723,809 users Rank: 44+ 2014: 5,891,385

94,8% penetration!