IP and Networking Basics

Slides:



Advertisements
Similar presentations
CS 4244: Internet Programming Dr. Eli Tilevich
Advertisements

Introduction 2 1: Introduction.
TA: Xifan Zheng Welcome to CPSC 441!
IP and Networking Basics Scalable Infrastructure Workshop AfNOG 2011.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security Lecture.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
Introduction1-1 Communication Systems Lecturer Dr. Marina Kopeetsky Lecture 1: Introduction Computer Networking: A Top Down Approach Featuring the Internet,
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.
What’s the Internet: “nuts and bolts” view
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Computer Networking Introduction, Part II.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
CS 381 Introduction to computer networks Chapter 1 - Lecture 4 2/10/2015.
1: Introduction1 Internet History r 1961: Kleinrock - queueing theory shows effectiveness of packet- switching r 1964: Baran - packet- switching in military.
Course info1 1 st Semester 2007 MI305 Computer Networks  Instructor: Jen-Liang Cheng   Office: H501-1( 福田樓 )  Lectures:
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware, software Question:
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
Protocols 1 Objective: Build a protocol foundation for Client / Server programming in an Internet Environment Note: RFCs available from
CPSC 411 Tutorial TA: Fang Wang. Fang Wang 9:00am-5:00pm, Mon-Fri.
TCP/IP Network.
1 End-user Protocols, Services and QoS. 2 Layering: logical communication application transport network link physical application transport network link.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Internet History CS 4244: Internet Programming Dr. Eli Tilevich.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
1: Introduction1 Protocol “Layers” Networks are complex! r many “pieces”: m hosts m routers m links of various media m applications m protocols m hardware,
Lecture 1: Facts of network technologies developments
1: Introduction1 Internet Services and Protocols Adapted from “Computer Networking: A Top Down Approach Featuring the Internet” Kurose and Ross, Addison.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
IP and Networking Basics Selection of slides taken from Internet Society Workshop Resource Centre:
1 Ram Dantu University of North Texas, Practical Networking.
IP and Networking Basics Scalable Infrastructure Workshop AfNOG 2012.
Roadmap  Introduction to Basics  Computer Network – Components | Classification  Internet  Clients and Servers  Network Models  Protocol Layers.
CS 5565 Network Architecture and Protocols
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 5 Network and Transport Layers
Graciela Perera Introduction Graciela Perera
CS 3214 Computer Systems Networking.
Day 01 - The Internet.
Part 0: Networking Review
Slides taken from: Computer Networking by Kurose and Ross
CS 3214 Computer Systems Lecture 21 Godmar Back.
Chapter 5 Network and Transport Layers
An Aleksandar,   Accounts have been created for any students in EECS 340 who did not already have one.  Physical access to the labs has.
Introduction Computer Networks
OSI Protocol Stack Given the post man exemple.
CS 3214 Computer Systems Networking.
Introduction 1 1: Introduction.
CS 5565 Network Architecture and Protocols
Networking for Home and Small Businesses – Chapter 6
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
CSE 3461/5461 Reading: Chapter 1, Kurose and Ross
Chapter 1: Introduction
Lecture 1: Facts of network technologies developments
Review of Important Networking Concepts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Protocol “Layers” Question: Networks are complex! many “pieces”: hosts
Computer Networking.
Lecture 1: Facts of network technologies developments
Lecture 1: Facts of network technologies developments
Presentation transcript:

IP and Networking Basics Scalable Infrastructure Workshop AfNOG 2015 1

Internet History 1961-1972: Early packet-switching principles 2 1961: Kleinrock - queueing theory shows effectiveness of packet-switching 1964: Baran - packet- switching in military nets 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1972: ARPAnet demonstrated publicly NCP (Network Control Protocol) first host-host protocol first e-mail program ARPAnet has 15 nodes 1.8.1 2 2

Internet History 1972-1980: Internetworking, new and proprietary nets 1970: ALOHAnet satellite network in Hawaii 1973: Metcalfe’s PhD thesis proposes Ethernet 1974: Cerf and Kahn - architecture for interconnecting networks Late 70’s: proprietary architectures: DECnet, SNA, XNA late 70’s: switching fixed length packets (ATM precursor) 1979: ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles: minimalism, autonomy - no internal changes required to interconnect networks best effort service model stateless routers decentralized control define today’s Internet architecture 1.8.2 3 3

Internet History 1980-1990: new protocols, a proliferation of networks 1983: deployment of TCP/IP 1982: SMTP e-mail protocol defined 1983: DNS defined for name-to-IP-address translation 1985: FTP protocol defined 1988: TCP congestion control New national networks: Csnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks 1.8.3 4 4

Internet History 1990, 2000’s: commercialisation, the Web, new apps 5 Early 1990’s: ARPAnet decommissioned 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: Web hypertext [Bush 1945, Nelson 1960’s] HTML, HTTP: Berners-Lee 1994: Mosaic, later Netscape late 1990’s: commercialization of the Web Late 1990’s – 2000’s: more killer apps: instant messaging, peer2peer file sharing (e.g., Napster) network security to forefront est. 50 million host, 100 million+ users backbone links running at Gbps now: 40-100 Gbps youtube, social networking depletion of Ipv4 address space 1.8.4 5 5

The Internet – or how we see it

A more accurate representation…

‘I’nternet vs ‘i’nternet

The (capital “I”) Internet The world-wide network of TCP/IP networks Different people or organisations own different parts Different parts use different technologies (at the “lower layers”) Interconnections between the parts (all use IP) Interconnections require agreements sale/purchase of service contracts “peering” agreements No central control or management 9

A small internetwork or (small “i”) “internet” 10

The principle of “Internetworking” We have lots of little networks Many different owners/operators Many different types Ethernet, dedicated leased lines, dialup, optical, broadband, wireless, ... Each type has its own idea of low level addressing and protocols We want to connect them all together and provide a unified view of the whole lot (treat the collection of networks as a single large internetwork)‏ 11

What is the Internet: “nuts and bolts” view millions of connected computing devices: hosts, end-systems PC’s workstations, servers PDA’s phones, toasters running network apps communication links fiber, copper, radio, satellite routers: forward packets (chunks) of data through network router workstation server mobile local ISP regional ISP company network 12

What is the Internet: “nuts and bolts” view protocols: control sending, receiving of messages e.g., TCP, IP, HTTP, FTP, PPP Internet: “network of networks” loosely hierarchical public Internet versus private intranet Internet standards RFC: Request for comments IETF: Internet Engineering Task Force router workstation server mobile local ISP regional ISP company network 13

What is the Internet: a service view communication infrastructure enables distributed applications: WWW, email, games, e-commerce, database, e-voting, more? communication services provided: connectionless connection-oriented router workstation server mobile local ISP regional ISP company network 14

Principles of the Internet Edge vs. core (end-systems vs. routers) Dumb network Intelligence at the end-systems Different communication paradigms Connection-oriented vs. connectionless Circuit switching vs. packet switching Layered System Network of collaborating networks 15

Connectionless Paradigm There is no “connection” in IP Packets can be delivered out-of-order Each packet can take a different path to the destination No error detection or correction in payload No congestion control (beyond “drop”) TCP mitigates these for connection- oriented applications There is a “connection” in TCP Error recovery is by retransmission Packet drops as congestion signalling 16

The network edge end systems (hosts): client/server model: run application programs e.g., WWW, email at “edge of network” client/server model: client host requests, receives service from server e.g., WWW client (browser)/server; email client/server peer to peer model: host interaction symmetric e.g.: teleconferencing 17

Network edge: connection-oriented service Goal: data transfer between end sys. handshaking: setup (prepare for) data transfer ahead of time Hello, hello back human protocol set up “state” in two communicating hosts TCP - Transmission Control Protocol Internet’s connection-oriented service TCP service [RFC 793] reliable, in-order byte-stream data transfer loss: acknowledgments and retransmissions flow control: sender won’t overwhelm receiver congestion control: senders “slow down sending rate” when network congested 18

Network edge: connectionless service Goal: easy/fast data transfer between end systems without need for state checking. UDP - User Datagram Protocol [RFC 768]: Internet’s connectionless service unreliable data transfer no flow control no congestion control 19

Protocol “Layers” Networks are complex! many “pieces”: hosts routers links of various media applications protocols hardware, software 20

The unifying effect of the network layer Define a protocol that works in the same way with any underlying network Call it the network layer (e.g. IP)‏ IP routers operate at the network layer IP over anything Ethernet, WiFi, ADSL, fibre, ... Anything over IP Mail, web, chat, ... 21

Why layering? Dealing with complex systems: explicit structure allows identification, relationship of complex system’s pieces layered reference model for discussion Modularisation eases maintenance, updating of system change of implementation of layer’s service transparent to rest of system e.g., change in gate procedure does not affect rest of system 22

The OSI Model Application 7 Presentation 6 Session 5 Transport 4 Network Data Link Physical 1 3 2 4 5 6 7 Upper Layers Application oriented “End-to-End”-Layers Lower Layers Network oriented “Hop-by-hop” layers 23

OSI Model and the Internet Internet protocols are not directly based on the OSI model However, we do often use the OSI numbering system. You should at least remember these: Layer 7: Application Layer 4: Transport (e.g. TCP, UDP) Layer 3: Network (IP) Layer 2: Data link Layer 1: Physical 24

The IP Hourglass Model Anything over IP Application layer SMTP HTTP FTP Telnet DNS Audio Video TCP UDP RTP Transport layer IP Network layer Ethernet PPP ATM Optics ADSL Satellite 3G IP over anything Physical and Data link layer 25

Layer Interaction: TCP/IP Model End to end Application Application TCP or UDP TCP or UDP IP IP IP IP Hop by hop Link Link Link Link Link Link Physical Physical Physical Router Host Host Router 26

End-to-end layers Upper layers are “end-to-end” Applications at the two ends behave as if they can talk directly to each other They do not concern themselves with the details of what happens in between 27

Hop-by-hop layers At the lower layers, devices share access to the same physical medium Devices communicate directly with each other The network layer (IP) has some knowledge of how many small networks are interconnected to make a large internet Information moves one hop at a time, getting closer to the destination at each hop 28

Layer Interaction: TCP/IP Model Applications behave as if they can talk to each other. Let’s look at what really happens. Application Application TCP or UDP TCP or UDP IP IP IP IP Link Link Link Link Link Link Physical Physical Physical Router Host Host Router 29

Layer Interaction: The Application Layer Applications behave as if they can talk to each other, but in reality the application at each side talks to the TCP or UDP service below it. Application Application TCP or UDP TCP or UDP The application layer doesn't care about what happens at the lower layers, provided the transport layer carries the application's data safely from end to end. IP IP IP IP Link Link Link Link Link Link Physical Physical Physical Router Host Host Router 30

Layer Interaction: The Transport Layer The transport layer instances at the two ends act as if they are talking to each other, but in reality they are each talking to the IP layer below it. The transport layer doesn't care about what the application layer is doing above it. Application Application TCP or UDP TCP or UDP IP IP IP IP The transport layer doesn't care what happens in the IP layer or below, as long as the IP layer can move datagrams from one side to the other. Link Link Link Link Link Link Physical Physical Physical Router Host Host Router 31

Layer Interaction: The Network Layer (IP) The IP layer has to know a lot about the topology of the network (which host is connected to which router, which routers are connected to each other), but it doesn't care about what happens at the upper layers. Application Application TCP or UDP TCP or UDP IP IP IP IP The IP layer works forwards messages hop by hop from one side to the other side. Link Link Link Link Link Link Physical Physical Physical Router Host Host Router 32

Layer Interaction: Link and Physical Layers The link layer doesn't care what happens above it, but it is very closely tied to the physical layer below it. All links are independent of each other, and have no way of communicating with each other. Application Application TCP or UDP TCP or UDP IP IP IP IP Link Link Link Link Link Link Physical Physical Physical Router Host Host Router 33

Layering: physical communication data application transport network link physical network link physical application transport network link physical data application transport network link physical application transport network link physical 34

Frame, Datagram, Segment, Packet Different names for packets at different layers Ethernet (link layer) frame IP (network layer) datagram TCP (transport layer) segment Terminology is not strictly followed we often just use the term “packet” at any layer 35

Encapsulation & Decapsulation Lower layers add headers (and sometimes trailers) to data from higher layers Application Data Transport Header Transport Layer Data Network Header Network Layer Data Network Header Header Data Data Link Header Link Layer Data Trailer Data Link Header Header Header Data Trailer 36

Layer 2 - Ethernet frame Destination and source are 48-bit MAC addresses (e.g., 00:26:4a:18:f6:aa) Type 0x0800 means that the “data” portion of the Ethernet frame contains an IPv4 datagram. Type 0x0806 for ARP. Type 0x86DD for IPv6. “Data” part of layer 2 frame contains a layer 3 datagram. Preamble Dest Source Type Data CRC 6 bytes 6 bytes 2 bytes 46 to 1500 bytes 4 bytes 37

Layer 3 - IPv4 datagram Version = 4 If no options, IHL = 5 Source and Destination are 32-bit IPv4 addresses IHL Diff Services Total Length Version Fragment Offset Identification Flags Time to Live Protocol Header Checksum Source Address (32-bit IPv4 address) Destination Address (32-bit IPv4 address) Data (contains layer 4 segment)‏ Padding Options Protocol = 6 means data portion contains a TCP segment. Protocol = 17 means UDP. 38

Layer 4 - TCP segment Source and Destination are 16-bit TCP port numbers (IP addresses are implied by the IP header)‏ If no options, Data Offset = 5 (which means 20 octets)‏ Source Port Destination Port Sequence Number Acknowledgement Number Data Offset Reserved U R G A C K E O L R S T S Y N F I N Window Checksum Urgent Pointer Options Padding Data (contains application data)‏ 39