Early technology: Communications and networking. The Internet. Telephone system (Alexander Graham Bell, 1876) Local Area Networks



Similar documents
architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Protocols. Packets. What's in an IP packet

Communications and Networking

Transport and Network Layer

Overview of TCP/IP. TCP/IP and Internet

Chapter 5. Data Communication And Internet Technology

Internet Protocol: IP packet headers. vendredi 18 octobre 13

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Technical Support Information Belkin internal use only

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Overview of Computer Networks

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

CSE 3461 / 5461: Computer Networking & Internet Technologies

Using MIS 3e Chapter 6A Appendix

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

The OSI and TCP/IP Models. Lesson 2

Ethernet. Ethernet. Network Devices

Life of a Packet CS 640,

How do I get to

Introduction to computer networks and Cloud Computing

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Architecture and Performance of the Internet

Computer Networks III

How To Design A Layered Network In A Computer Network

The OSI & Internet layering models

Lecture 28: Internet Protocols

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Internet Protocols. Addressing & Services. Updated:

Networking Test 4 Study Guide

Connecting with Computer Science, 2e. Chapter 5 The Internet

Computer Networks - Xarxes de Computadors

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Communications and Computer Networks

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Introduction Chapter 1. Uses of Computer Networks

CPS221 Lecture: Layered Network Architecture

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Computer Networks Vs. Distributed Systems

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Networks: IP and TCP. Internet Protocol

The Journey Inside SM : The Internet Background Information, Part 1

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

CS101 Lecture 19: Internetworking. What You ll Learn Today

Basic Network Configuration

Lecture 8. IP Fundamentals

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Simulation Traffic, Paths and Impairment

Layered Architectures and Applications

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Protocol Data Units and Encapsulation

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network layer: Overview. Network layer functions IP Routing and forwarding

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

1.1 Prior Knowledge and Revision

LESSON Networking Fundamentals. Understand TCP/IP

Internetworking. Problem: There is more than one network (heterogeneity & scale)

IT Internet Architecture and Protocols. Lecture 02 Overview of Internet Architecture

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

8.2 The Internet Protocol

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Review: Lecture 1 - Internet History

Network Technologies

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Ethernet and IP A slightly less introductory networking class. Drew Saunders Networking Systems Stanford University

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

Network Security TCP/IP Refresher

Internet Privacy Options

An Introduction to VoIP Protocols

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Sage ERP Accpac Online

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

IP - The Internet Protocol

Objectives of Lecture. Network Architecture. Protocols. Contents

IST 220 Exam 3 Notes Prepared by Dan Veltri

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

TCP/IP Basis. OSI Model

Internet Public Network

Web Browsers And Mailing Tools

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.

Internet and IP addressing

Networking Technology Online Course Outline

2. IP Networks, IP Hosts and IP Ports

Unix System Administration

Networking Basics and Network Security

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Data Communication Networks and Converged Networks

Transcription:

Communications and ing tory and background telephone system local area s Internet architecture: what the pieces are and how they fit toget names and addresses: what's name and number? Domain Name System, IP addresses routing: how to get from e to te traceroute, ping fundamental protocols and layers IP, TCP hig level protocols and services: HTTP, SSH, SMTP, IMAP,...; web, email, instant messaging, peer to peer,... Web what makes it work: URL, HTTP, HTML, browser Early technology: runners ("Rejoice, we conquer") riders ("Neit snow nor rain nor heat nor gloom of night...") signal lights ("1 if by land and 2 if by sea") fires, mirrors, flags, drums, voices, pigeons, Optical telegraph (Chappe, 1792) faced many of the problems of modern s protocols: rules by which independent parties exchange info bandwidth limitations: how to send information faster error detection and recovery security and privacy: protecting info from eavesdroppers & imposters Gerard Holzmann, The Early History of Data Networks Telegraph (Morse, 1850's) similar issues (and a new technology that killed the old one) Tom Standage, The Victorian Internet Telephone system (Alexander Graham Bell, 1876) organizing principles, all based on voice traffic: voice calls need only a narrow bandwidth channel a call uses a dedicated circuit, with long setup and hold times telephone number is a unique identifier fixed routing for a specific call parallel signaling ; separated from control simple user interface: all intelligence inside guarantees on quality of service; high reliability running out of some resources (area codes, 800/888/877/866,...) traffic model changing rapidly (cell phones,,...) technology changing rapidly (wireless, Internet,...) worldwide evolution from highly regulated and/or governmentoperated to deregulated / private highly competitive incumbent carriers threatened by Internet s Local Area Networks Local Area Networks; Etnet s a LAN connects s ("hosts") in a small geographical area Etnet is the most widely used LAN technology developed by Bob Metcalfe & David Boggs at Xerox PARC, 1973 each host has a unique 48-bit identification number sent from one host to anot in "packets" of 100-1500 bytes including source and destination address and error checking bits typical rate 10-1000 Mbits/sec; limits on cable length packet: hdr src dest type check 8 6 6 2 46-1500 bytes 4 "broadcast" technology: sent to all connected hosts sender broadcasts, but if it detects someone else sending, stops, waits a random interval, tries again wireless Etnet uses radio to carry signals logical behavior is exactly like a wired Etnet 1

Connecting s (wide area s / WAN) how do we connect LANs to each ot? LANs may have different properties may be far away names & addresses now needed to find ot s and hosts routing needed to find a path if multiple s are involved can't have each connected directly to all ots need to agree on format of information and how it is exchanged especially if s are different kinds that use different format for packets different physical and electrical properties different names and addresses themselves how do we handle errors, delays, overload, etc.? how does it scale as the number of s gets really big? Gateways and Routers Router s Internet History a huge number of independent s that are connected NOT a giant or a single each may serve many host s nearby s are connected by a local area most often Etnet information travels through s in small "packets" each packet independent of all ots like individual envelopes through the mail all packets have the same format standard protocols for format of info and behavior s connected by specialized gateway s (routers) route packets of information from one to the next gateways continuously exchange routing information each packet passes through multiple gateways gateway passes packet to gateway that is closer to ultimate destination gateways usually operated by different companies 1961: packet switching concept (Leonard Kleinrock, MIT, UCLA) 1960's: ARPANET, funding from DARPA (Dept of Defense) 1969: first Internet communication 1972: first email 1973: basic protocols: TCP/IP (Bob Kahn *64, Vint Cerf) 1980's: National Science Foundation funding, NSFNet (Al Gore) 1980's: Internet Engineering Task Force for technical decisions 1990's: commercialization, Web, dot-com boom 2000: dot-com bust 2010: universal availability for lots more, http://www.isoc.org/internet/tory/ Essential Features Interconnection of large number of heterogeneous, independent s competitors These s connected by gateway s Information is packaged in packets with standard form Protocals dictate how packets must be handled as travel from gateway to gateway through Internet Protocals define Internet Basic mechanisms names for s princeton.edu, finance.yahoo.com, www.whitehouse.gov, kernighan.net,... addresses for identifying s and s each has a unique number like 128.112.128.81 (IP address) central authority assigns numbers to s each host has unique address (32 bit integer in IPv4), assigned locally according to what it's on Domain Name System to convert names to addresses routing for finding paths from to protocols (rules) for packaging and transporting information IP, or "Internet Protocol": a uniform transport mechanism at IP level, all information is in a common format below IP, different hardware uses different protocols above IP, hig-level protocols for handling web pages, mail, login 2

Internet (IP) addresses each and each connected has an IP address IP address: a unique 32-bit number in IPv4 (IPv6 is 128 bits) 1st part is id, assigned centrally in blocks (Internet Assigned Numbers Authority -> Internet Service Provider -> you) 2nd part is host id within that assigned locally, often dynamically net part host on that net written in "dotted decimal" notation: each byte in decimal e.g., 128.112.128.81 = princeton.edu 128 112 128 81 Domain names a hierarchical naming scheme central authority (ICANN) manages top level of names top level domains include.com,.edu,.gov,.xx for country XX and newer domains like.biz,.info,.name, each domain delegates responsibilities to levels below for administration and translation into addresses each level is responsible for names within it princeton.edu handles all of princeton delegates cs.princeton.edu to a CS machine CS department manages names within, e.g., bolle.cs.princeton.edu names impose logical structure, not physical or geographical 10000000 01110000 10000000 01010001 ICANN Internet Corporation for Assigned Names and Numbers non-profit corporation, established 1998 by Dept of Commerce technical coordination of the Internet www.icann.org "coordinates the assignment of the following identifiers that must be globally unique for the Internet to function: Internet domain names IP address numbers protocol parameter and port numbers "coordinates the stable operation of the Internet's root server system" Domain name system (DNS) DNS converts names to IP addresses and vice versa princeton.edu == 128.112.128.81 carnegiehall.org == 63.131.135.199 kernighan.org == 67.18.147.42 hierarchical searching for addresses central authority controls top level domain names (.com, etc.) delegates responsibilities for searching to levels below each level responsible for names and addresses within it princeton.edu handles address lookup for all of princeton delegates cs.princeton.edu to a CS machine top level domains handled by 13 root servers lookup for a name asks a local name server first if not known locally, asks a server hig up,, to root server recently-used names are cached to speed up access names impose logical structure, not physical or geographical Inter- Routing s are connected by gateways or routers routing rules direct packets from gateway to gateway trying to get closer to ultimate destination at gateway if destination on connecting, use physical address and local routing Otwise use id to determine next gateway and to reach it routers exchange information frequently about routes which nets each knows about and number of hops to reach them autonomous system: group of s under single authority interior gateway protocols exchange routing info within a single AS traceroute: how do you get from e to te? Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from to as IP packets no guarantees on quality of service or reliability: "best effort" each physical has its own format for carrying IP packets TCP: transmission control protocol creates a reliable 2-way stream using IP errors are detected and corrected most things we think of as "Internet" use TCP "application-level" protocols, mostly built from TCP HTTP (web), SMTP (mail), SSH (secure login), FTP (file transfer), UDP: user gram protocol simple unreliable gram protocol (errors not detected) used in DNS, remote file systems, voice over IP... 3

Packets packet: a sequence of bytes carrying information usually over a connection bytes have a specific sequence, format, organization usually as specified in a protocol typical packet includes source (we it comes from) destination (we it goes to) size or length information (how big is the part) miscellaneous information (type, version, info to detect errors,...) the itself ("payload") typical sizes range from a few bytes 150-1500 (Etnet packets) 100-65000 (IP packets) What's in an IP packet a "header" that contains protocol version, type of packet, length of header, length of fragmentation info in case it was broken into pieces time to live: maximum number of hops before packet is discarded each gateway decreases t by 1 source & destination addresses (32 bits for IPv4, 128 bits for IPv6) checksum of header information redundant info to detect errors in header information only, not itself etc.; about 20-40 bytes in header actual up to 64 KB of payload IPv4: version type hdr len total len frag TTL source address dest address chk IP: Internet Protocol IP provides an unreliable connectionless packet delivery service every packet has full source & destination addresses every packet is independent of all ots IP packets are grams individually addressed packages, like postcards in the postal system "connectionless" stateless: no memory from one packet to next each packet is independent of ots, even if in sequence and going same place unreliable: packets can be lost or duplicated ("best effort" delivery) packets can be delivered out of order contents can be wrong (though error rates are usually very low) no speed control: packets can arrive too fast to be processed limited size: long messages have to be split up and then reassembled hig level protocols use IP packets to carry information IP packets are carried on a wide variety of physical media TCP: Transmission Control Protocol a reliable 2-way byte stream built with IP a TCP connection is established to a specific host and a specific "port" at that host each port provides a specific service SSH = 22, SMTP = 25, HTTP = 80,... a message is broken into 1 or more packets each TCP packet has a header (src, dest, etc) + header includes checksum for error detection, and sequence number to preserve order and detect missing or duplicated packets each TCP packet is wrapped in an IP packet and sent has to be positively acknowledged to ensure that it arrived safely otwise, re-send it after a time interval TCP is the basis of most hig-level protocols Hig level protocols SSH: secure login SMTP: mail transfer HTTP: hypertext transfer -> Web protocol layering: a single protocol can't do everything hig-level protocols build elaborate operations out of simpler ones each layer uses only the services of the one directly below and provides the services expected by the layer above all communication is between peer levels: layer N destination receives exactly the object sent by layer N source Encapsulation each piece of at one level is wrapped up with a header and sent as a packet at the next lower level lowest level is what moves across specific TCP HTTP application reliable transport service connectionless packet delivery service physical layer et IP 4

How are things connected? local nets connected to local Internet Service Provider (ISP) these in turn connect to regional ISPs and then to larger ones like UUNet, AT&T, Sprint, traffic exchanged at Internet exchanges large and small, formal and informal, profit and non-profit bandwidth (bit-carrying capacity) of connections is usually hig the larger the ISP cable modem, DSL 500 Kbps 4Mbps (you to ISP) dedicated telephone lines 1.5-45 Mbps (local ISP, big company to ISP) optical fiber 155 Mbps and up (large carriers) Coping with bandwidth limits flows no faster than the slowest link limits to how much can pass per unit time no guarantees about packet delivery no bandwidth, delay or quality of service guarantees IP telephony is hard because voice traffic requires limited delay, jitter video is somewhat easier but needs a lot more bandwidth caching save previous so it doesn't have to be retrieved again compression, encoding to improve use of available bandwidth don't send redundant or unnecessary information text, code, etc., can be compressed and recreated exactly music, pictures, movies are compressed with some information discarded home connectivity telephone modem 56 Kbps ADSL, cable modem 1-4 Mbps wireless 1-50 Mbps fiber 50 Mbps? Internet Ideas packets versus circuits different models (mail vs phone) names and addresses what is it called, how to find it routing how to get from e to te protocols and standards Internet works because of IP as common mechanism hig level protocols all use IP specific hardware technologies carry IP packets layering divide system into layers each of which provides services to next hig level while calling on service of next lower level a way to organize and control complexity, hide details Internet technical issues: privacy & security are hard passes through shared unregulated dispersed media and sites scattered over the whole world it's hard to control access & protect information along the way many technologies (e.g., Etnet, wireless) use broadcast encryption necessary to maintain privacy many mechanisms are not robust against intentional misuse it's easy to lie about who you are service guarantees are hard no assurance of reliable delivery, let alone of bandwidth, delay or jitter some resources are running low especially IPv4 addresses IPv6 (the next generation) uses 128-bit addresses acceptance has been slow but is growing but it has handled exponential growth amazingly well 5