Download CSCI 3421 Data communications and Networking

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Net neutrality law wikipedia , lookup

RapidIO wikipedia , lookup

Internet protocol suite wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Network tap wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Serial digital interface wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Net bias wikipedia , lookup

Packet switching wikipedia , lookup

Deep packet inspection wikipedia , lookup

IEEE 1355 wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
Chapter 1
Computer Networks and the Internet
Tami Meredith



Hosts (a.k.a. End Systems): Various end user
devices, e.g., computer, cell phone, ipad
Communications Links: Connectors such as
copper wire, fibre optics, coaxial cable
Packet Switches: Routers or Link-Layer
Switches (for network access points)





Transmission Rate: number of bits / second that
are communicated
Packets: discrete "segments" of data along with
transmission control data (e.g., packet header)
ISP: Internet Service Provider – Internet access
provider
RFC: Request For Comments – IETF (Internet
Engineering Task Force) standards for protocols
and network design
API: Application Programming Interface – Set of
procedures to link (interface) to some other system
(i.e., the Internet)
1.
2.
3.
A protocol defines the format and order of
messages exchanged between two or more
communicating entities as wall as the actions
taken on the transmission and/or receipt of a
message or other event
A system of (digital) message formats and the
rules for exchanging those messages between
(2) communicating entities
The syntax, semantics, and synchronisation of
communication





Termination points for a network
May or may not interact with a human (e.g.,
may activate hardware)
Traditionally, some kind of computer
Two categories of hosts: Clients and Servers
Now more varied: Cell phones, video game
consoles, televisions, picture frames,
appliances, cameras, GPS devices, biomedical
sensors



DSL: Digital Subscriber Line – Telco provided
frequency based communication to a DSLAM
(Digital Subscribe Line Access Multiplexer)
Cable: Cable TV provided HFC (Hybrid Fibre
and Coaxial) communication to a CMTS (Cable
Modem Termination System)
FTTH (Fibre to the Home) – Fibre optic
connection based on either active or passive
optical networks (type of router – powered vs.
unpowered)

Local



Ethernet
WiFi (Wireless Access – IEEE 802.11)
Wide Area


3G (Cellular 3rd Generation)
LTE – Cellular Long Term Evolution




Twisted Pair Copper – Shielded or Unshielded
Coaxial – concentric copper wires
Fibre Optic
Radio


Terrestrial: Short, Medium, Long distance
Satellite: Geostationary or LEO (Low Earth Orbit)








Ignore the content of the data
Break into small uniform pieces
Send pieces separately and then reassemble data at the
other end
Pieces may get lost, go different routes, get garbled,
possibly duplicated
Store and Forward: Receive a packet in its entirety
before forwarding it to the next destination
Queuing Delay: Time spent after reception while
sitting in switches output queue before forwarding
Packet Loss: Discarded packets when buffers full
Forwarding Table: Map that determines which output
link to use for specific address ranges

Circuit Switching: Connection Oriented



FDM – Frequency Division Multiplexing
TDM – Time Division Multiplexing
Packet Switching: Connectionless



More efficient, faster
Becoming most prevalent
More difficult to ensure specific QoS (Quality of
Service)


A "network of networks"
Network Structure 5
Access ISPs, e.g., Eastlink
2. Regional ISPs, e.g., Rogers
3. Tier 1 ISPs, e.g., AT&T, Sprint
4. IXPs, Internet Exchange Points – 3rd Party ISP
connectors
5. Content Providers – e.g., Google, Amazon
1.
Processing Delay: Forming packet, adding header,
putting into output queue
 Queuing Delay: Sitting in the output queue
 Transmission Delay: Putting the packet onto the
access medium
 Propagation Delay: Time to get to the destination
 End-to-End Delay: (Latency, Ping Time), sum of all
delays from source to destination
Run traceroute and ping to explore delay
Other delay can occur (e.g., SMTP congestion control)




Size of Transmission / Time to Receive
Measured in bits/second
Also known as the data transfer rate


Instantaneous: Current rate at which data is being
received
Average throughput: Overall (averaged) rate at
which data is being received





Graph-based model for the network topology
Typically a layered model within the hardware
(i.e., end systems, routers)
Service oriented: Each layer provides specific
services
Layers spread across applications, O/S,
hardware
Layers are ideally independent, but this tends
to lead to redundancy

Application: HTTP, SMTP, FTP






Presentation – encryption, compression
Session – data delimitation and synchronisation
Transport: TCP, UDP
Network: IP
Link: Ethernet, WiFi, DOCSIS
Physical: Hardware dependent
1.
2.
3.
4.
5.
Application: message to another application
Transport: segments of the message
Network: datagrams (packets) of the segment
Link: frames of the packet
Physical: bits of the frame
At each layer, we have two fields:
A. Header: administrative information
B. Payload: the data





Botnet – Network of cooperating (hijacked) hosts
Viruses – require user interaction
Worms – require no interaction
Trojans – look like something else (IP Spoofing)
DoS ( Denial of Service)
Vulnerability Attack
 Bandwidth Flooding
 Connection Flooding


Packet Sniffing – reading data not addressed to
you






1961-1972: Independent research on packet
switching
1967: ARPAnet plan produced
1969: UCLA, SRI (Stanford), UCSB, U.of Utah
linked with packet switches
TCP/IP developed in the 70s and used to link
multiple independent networks
Addition of new application layers over time:
HTTP/HTML, Facebook
Services now include processing (i.e., Google’s
Appengine) and storage (i.e., AWS cloud).