Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Based on the book Computer Networking: A Top Down Approach, Jim Kurose,

Slides:



Advertisements
Similar presentations
Introduction 2 1: Introduction.
Advertisements

Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
CS 381 Introduction to computer networks Lecture 2 1/29/2015.
Introduction 1-1 Chapter 1: Introduction Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet as example.
Introduction to Security Computer Networks Computer Networks Term B10.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
CS 381 Introduction to computer networks Chapter 1 - Lecture 3 2/5/2015.
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
Lecture 2 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Lecture Internet Overview: roadmap 1.1 What is the Internet? (A simple overview last week) Today, A closer look at the Internet structure! 1.2 Network.
Lets begin…. Introduction1-2 Access networks and physical media Q: How to connect end systems to edge router? residential access nets institutional access.
1: Introduction1 Part I: Introduction Chapter goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
What’s the Internet: “nuts and bolts” view
Introduction 1 Lecture 3 Networking Concepts slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Introduction A closer look at network structure: network edge: – hosts: clients and servers – servers often in data centers  access networks, physical.
1: Introduction 1 Chapter I: Introduction Course on Computer Communication and Networks, EDA343/DIT 420, CTH/GU The slides are based on adaptations of.
Ch 1. Computer Networks and the Internet Myungchul Kim
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April Reading.
Introduction1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note.
CS 3830 Day 2 Introduction 1-1. Announcements  Program 1 posted on the course web  Project folder must be in 1DropBox on S drive by: 9/14 at 3pm  Must.
Introduction 1-1 Lecture 3 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516: These slides.
1: Introduction1 Packet switching versus circuit switching r Great for bursty data m resource sharing m no call setup r Excessive congestion: packet delay.
CENG4430 (Spring 2011) 1-1 Lecture 1: Introduction  What to learn?  What is the Internet  Network edge End systems, TCP/UDP  Network core circuit switching,
Computer Networking Introduction, Part I. Lecture #1: Part I: Introduction Chapter goal: get context, overview, “feel” of networking.
Introduction1-1 Chapter 1: Introduction Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet as example.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
2-1 Last time  Course mechanics  What is the Internet?  hosts, routers, communication links  communications services, protocols  Network Edge  client-server,
Slides originally from Professor Williamson at U Calgary1-1 Introduction Part II  Network Core  Delay & Loss in Packet-switched Networks  Structure.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Networking Networking 101 Notes are adapted from chapter-1 in the textbook Multimedia Streaming {week-2} Mohamed Abdel-Maguid Computer Networking:
Introduction1-1 Course Code:EE/TE533 Instructor: Muddathir Qamar.
How do loss and delay occur?
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Introduction Switches and Access. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 5 rd edition. Jim.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Wireless access networks  shared wireless access network connects end system to router  via base station aka “access point”  wireless LANs:  b/g.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Introduction Chapter 1: roadmap 1.1 what is the Internet? 1.2 network edge  end systems, access networks, links 1.3 network core  packet switching, circuit.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April A note.
Computer Networks CS1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved.
Computer Networks Performance Metrics
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
Introduction 1-1 Chapter 1 Part 3 Delay, loss and throughput These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose,
CS 3830 Day 4 Introduction 1-1. Announcements  No office hour 12pm-1pm today only  Quiz on Friday  Program 1 due on Friday (put in DropBox on S drive)
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
DELAYS, LAYERED NETWORK MODEL AND NETWORK SECURITY.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
EEC-484/584 Computer Networks
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
Network Behaviour & Impairments
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Computer Networks Performance Metrics Computer Networks Spring 2013.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 3 Omar Meqdadi Department of Computer Science and Software Engineering.
What’s the Internet: “nuts and bolts” view
Introduction (2) Overview: access net, physical media
Chapter 1 Introduction Computer Networking: A Top Down Approach
Presentation transcript:

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley. Course on Computer Communication and Networks Lecture 2 Chapter 1: Introduction: Part B: Network structure, performance, security prelude CTH EDA344/GU DIT 420 1

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core A closer look at network structure: mobile network global ISP regional ISP home network institutional network 2 network edge: hosts: run application programs e.g. Web, , … … based on network services available access networks: connect end-hosts to the Internet (edge routers) through physical media: wired, wireless links network core: interconnected routers network of networks

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 3 application transport network link physical application transport network link physical network link physical link physical router switch network edge: hosts: run application programs e.g. Web, , … … based on network services available access networks: connect end-hosts to the Internet (edge routers) through physical media: wired, wireless links network core: interconnected routers network of networks Types of communication service available by the transport Internet: connection-oriented: reliable, in-order data delivery (TCP) connectionless: “best effort”, arbitrary order data-delivery (UDP) Q: How & based on what “core” functionality? (…main Q for the course….) A closer look at network structure: UDP TCP

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-4 1.Zooming into core – Ways of data transfer – Routing – Performance: delays (& loss) – …. throughput 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-5 The Network Core mesh of interconnected routers fundamental question: how is data transferred through net? packet-switching: data sent thru net in discrete “chunks”

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 6 Network Core: Packet Switching A B C 10 Mbs Ethernet 1.5 Mbs 45 Mbs D E queue of packets waiting for output link Application messages divided into packets packets share network resources resources used as needed store and forward: packets move one hop at a time – transmit over link; wait turn at next link

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-7 Alternative Core: Circuit Switching (analogue telephony) End-end resources dedicated for “call” dedicated resources (link bandwidth, switch capacity): no sharing circuit-like (guaranteed) performance call setup required Example video for Circuit vs packet switching DN9k4&feature=related

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 8 Packet switching versus circuit switching 1 Mbit link each user/connection: – 100Kbps when “active” – active 10% of time (bursty behaviour) circuit-switching how many users/connections?: – 10 packet switching with n= 35 users: P( k > 10 active) <  almost all of the time, same queuing behaviour as in circuit switching) Packet switching allows more users to use the network! n users 1 Mbps link Hint: The probability of k out of n users active (p=0.1 in our example) Q: what happens with > 35 users? Still circuit-like behavior? utilization

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-9 1.Zooming into core – Ways of data transfer – Routing – Performance: delays, (& loss) … – …. throughput 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 10 (Can we combine the benefits of CS & PS?) Routing and network-core main design issue What is routing’s role? find routes from source to destination 1.path selection algorithms 2.Important design issue/type of service offered at network layer: – datagram network: destination address determines next hop routes may change during session – virtual circuit network: path determined at call setup, remains fixed thru session “bridging” packet-switching with circuit switching routers can prioritize, must maintain per-session state Simple to implement & maintain (Internet approach) Expensive, but better to build reliability

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-11 1.Zooming into core – Ways of data transfer – Routing – Performance: delays, (& loss) … – …. throughput 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 12 Delay in packet-switched networks 1. nodal processing: – check bit errors – determine output link 2. queuing – time waiting at output link for transmission – depends on congestion level of router A B propagation transmission nodal processing queueing 3. Transmission delay: R=link bandwidth (bps) L=packet length (bits) time to send bits into link = L/R 4. Propagation delay: d = length of physical link s = propagation speed in medium (~2x10 8 m/sec) propagation delay = d/s

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1: Introduction 13 Visualize delays: Circuit, packet switching store and forward behavior + other delays’ visualization (fig. from “Computer Networks” by A. Tanenbaum)

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Queueing delay (revisited) … 14 R=link bandwidth (bps) L=packet length (bits) a=average packet arrival rate traffic intensity = La/R r La/R ~ 0: average queueing delay small r La/R -> 1: delays become large r La/R > 1: more “work” arriving than can be serviced, average delay infinite! Queues may grow unlimited, packets can be lost

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-15 Delays and packet loss Link queue (aka buffer) has finite capacity packet arriving to full queue dropped (aka lost) A B packet being transmitted packet arriving to full buffer is lost buffer (waiting area)

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 16 Connecting to “Packet switching vs Circuit switching” PS: Good: Great for bursty data – resource sharing – no call setup PS: Not so good? Excessive congestion: packet delay and loss – protocols needed for reliable data transfer, congestion control Q: How to provide circuit-like behavior? – bandwidth guarantees are needed for some apps – Some routing policy can help??? Cf virtual circuit

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-17 1.Zooming into core – Ways of data transfer – Routing – Performance: delays, (& loss)… – …. throughput 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-18 Throughput throughput: rate (bits/time unit) at which bits transferred between sender/receiver – instantaneous: rate at given point in time – average: rate over longer period of time server, with file of F bits to send to client link capacity R s bits/sec link capacity R c bits/sec pipe that can carry fluid at rate R s bits/sec) pipe that can carry fluid at rate R c bits/sec) server sends bits (fluid) into pipe

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-19 Throughput (more) R s < R c What is average end-end throughput? R s bits/sec R c bits/sec  R s > R c What is average end-end throughput? R s bits/sec R c bits/sec link on end-end path that constrains end-end throughput bottleneck link

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 20 … “Real” Internet delays and routes (1)… What do “real” Internet delay & loss look like? Traceroute program: provides delay measurement from source to router along end-end Internet path towards destination. For all i: – sends three packets that will reach router i on path towards destination – router i will return packets to sender – sender times interval between transmission and reply. 3 probes

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 21 …“Real” Internet delays and routes (2)… 1 cs-gw ( ) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu ( ) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu ( ) 6 ms 5 ms 5 ms 4 jn1-at wor.vbns.net ( ) 16 ms 11 ms 13 ms 5 jn1-so wae.vbns.net ( ) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu ( ) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu ( ) 22 ms 22 ms 22 ms ( ) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net ( ) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net ( ) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net ( ) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr ( ) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr ( ) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr ( ) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net ( ) 135 ms 128 ms 133 ms ( ) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr ( ) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu * means no reponse (probe lost, router not replying) trans-oceanic link

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-22 1.Zooming into core – Ways of data transfer – Routing – Performance: delays, (& loss) … – …. throughput 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Access networks and physical media Q: How to connect end systems to edge router? residential access nets institutional access networks (school, company) mobile access networks keep in mind: bandwidth (bits per second) of access network? shared or dedicated? 23

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Access net: digital subscriber line (DSL) central office ISP telephone network DSLAM voice, data transmitted at different frequencies over dedicated line to central office  use existing telephone line to central office DSLAM  data over DSL phone line goes to Internet  voice over DSL phone line goes to telephone net  < 2.5 Mbps upstream transmission rate (typically < 1 Mbps)  < 24 Mbps downstream transmission rate (typically < 10 Mbps) DSL modem splitter DSL access multiplexer 24

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core data, TV transmitted at different frequencies over shared cable distribution network cable modem splitter … cable headend CMTS ISP cable modem termination system HFC: hybrid fiber coax asymmetric: up to 30Mbps downstream transmission rate, 2 Mbps upstream transmission rate network of cables, attaches homes to ISP router homes share access network to cable headend unlike DSL, which has dedicated access to central office Access net: cable network 1-25

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Access net: home network to/from headend or central office cable or DSL modem router, firewall, NAT wired Ethernet (100 Mbps) wireless access point (54 Mbps) wireless devices often combined in single box 26

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Enterprise access networks (Ethernet) typically used in companies, universities, etc  10 Mbps, 100Mbps, 1Gbps, 10Gbps transmission rates Ethernet switch institutional mail, web servers institutional router institutional link to ISP (Internet) 1-27

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 28- Wireless access networks shared wireless access network connects end system to router – “adhoc” or via base station aka “access point” wireless LANs (10’s m) – b/g (WiFi): 11 or 54 Mbps wider-area wireless access (10’s km) – provided by telco operator – ~1-10 Mbps over cellular system – 3G, 4G: LTE base station mobile hosts router

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 29 Physical Media physical link: transmitted data bit propagates across link – guided media: signals propagate in solid media: copper, fiber – unguided media: signals propagate freely e.g., radio R: link transmission rate host 1 2 packets, e.g. L bits each aka link capacity, aka link bandwidth

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 30 Guided physical Media: coax, fiber, twisted pair Coaxial cable: wire (signal carrier) within a wire (shield) broadband: multiple channels multiplexed on cable (HFC, cable TV) Fiber optic cable: low attenuation: fewer repeaters low error rate: light pulses immune to electromagnetic noise high-speed operation: e.g., Gps Twisted Pair (TP) two insulated copper wires – Category 3: traditional phone wires, 10 Mbps Ethernet – Category 5/6: more twists, higher insulation: Mbps/10 Gbps

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Signal can fade with distance, can get obstructed, can take many different paths between sender and receiver due to reflection, scattering, diffraction Unguided Physical media: Radio Properties: Attenuation, Multipath propagation signal at sender signal at receiver radio links (Mbps): terrestrial microwave, LAN/WiFi, wide-area/cellular, satellite

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-32 1.Zooming into core – Ways of data transfer – Routing – Performance: delays, (& loss)… – …. throughput 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 33 Internet structure: network of networks roughly hierarchical national/international backbone providers (NBPs)- tier 1 providers – e.g. BBN/GTE, Sprint, AT&T, IBM, UUNet/Verizon, TeliaSonera – interconnect (peer) with each other privately, or at public Network Access Point (NAPs: routers or NWs of routers) regional ISPs, tier 2 providers – connect into NBPs; e.g. Tele2 local ISP, company – connect into regional ISPs NBP A NBP B NAP regional ISP local ISP local ISP

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-34 Internet structure: network of networks “Tier-2” ISPs: smaller (often regional) ISPs – Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs Tier 1 ISP Tier-2 ISP Tier-2 ISP pays tier- 1 ISP for connectivity to rest of Internet  tier-2 ISP is customer of tier-1 provider Tier-2 ISPs also peer privately with each other.

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-35 Internet structure: network of networks “Tier-3” ISPs and local ISPs – last hop (“access”) network (closest to end systems) Tier 1 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-36 Internet structure: network of networks a packet passes through many networks Tier 1 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Roadmap 3a-37 1.Zooming into core – Ways of data transfer – Routing – Performance: delays, … – …. throughput, loss 2.Network/Internet structure complemented: – access net, physical media – backbones, NAPs, ISPs 3.Security prelude

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-38 Network Security Prelude The field of network security is about: – how adversaries can attack computer networks – how we can defend networks against attacks – how to design architectures that are immune to attacks Internet not originally designed with (much) security in mind – original vision: “a group of mutually trusting users attached to a transparent network” – Internet protocol designers playing “catch-up” – Security considerations in all layers!

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-39 Bad guys can put malware into hosts via Internet Malware can get in host from a virus, worm, or trojan horse. Spyware malware can record keystrokes, web sites visited, upload info to collection site. Infected host can be enrolled in a botnet, used for spam and DDoS attacks. Malware is often self-replicating: from an infected host, seeks entry into other hosts

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-40 Bad guys can attack servers and network infrastructure Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets toward target from compromised hosts target

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-41 The bad guys can sniff packets Packet sniffing: – Shared/broadcast medium (shared Ethernet, wireless) – promiscuous network interface reads/records all packets passing by A B C src:B dest:A payload  Wireshark software used for end-of-chapter labs is a (free) packet- sniffer  NOTE: be aware that it is inappropriate to use outside the lab

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-42 The bad guys can use false source addresses IP spoofing: send packet with false source address A B C src:B dest:A payload

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-43 The bad guys can record and playback record-and-playback : sniff sensitive info (e.g., password), and use later – password holder is that user from system point of view A B C src:B dest:A user: B; password: foo

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 44 Chapter 1: Summary Covered a “ton” of material! what’s the Internet what’s a protocol? protocol layers, service models network edge (types of service) network core (ways of transfer, routing) performance, delays, loss access net, physical media backbones, NAPs, ISPs Security concerns (history: read more corresponding section, interesting & fun ) In order to have: context, overview, “feel” of networking A point of reference for context in the focused discussions to come

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Reading instructions CarefulQuick 4/e,5/e,6/e: 1.3, 1.4, 1.54/e,5/e,6/e: the rest Kurose Ross book Extra Reading (optional) Computer and Network Organization: An Introduction, by Maarten van Steen and Henk Sips, Prentice Hall (very good introductory book for non-CSE students

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Review questions Review questions from Kurose-Ross book, chapter 1 (for basic study) R11, R12, R13, R16, 17, R18, R19, R20, R21, R22, R23, R24, R25, R28. Extra questions, for further study: delay analysis in packet switched networks: SimpleAnalysis.pdfhttp:// SimpleAnalysis.pdf 46

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 47 Review: Network Taxonomy Communication networks Circuit-switched networks Packet-switched networks Networks with VCs Datagram Networks Datagram network (eg Internet) cannot be characterized either connection-oriented or connectionless. Internet provides both connection-oriented (TCP) and connectionless services (UDP), at the network edge, to apps.

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core 1-48 Review questions: Throughput: Internet scenario 10 connections (fairly) share backbone bottleneck link of R bits/sec RsRs RsRs RsRs RcRc RcRc RcRc R per-connection end-end throughput: min(R c,R s,R/10 (if fair)) in practice: R c or R s is often bottleneck

Marina Papatriantafilou – Introduction to computer communication, partB –edge&core Introduction 1-49 Example types of malware Trojan horse – Hidden part of some otherwise useful software – Today often on a Web page (Active-X, plugin) Virus – infection by receiving object (e.g., attachment), actively executing – self-replicating: propagate itself to other hosts, users  Worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)