A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.

Slides:



Advertisements
Similar presentations
Introduction 2 1: Introduction.
Advertisements

Computer Networks Performance Metrics Computer Networks Term B10.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
CS 381 Introduction to computer networks Chapter 1 - Lecture 3 2/5/2015.
Introduction1-1 Introduction to Computer Networks Our goal:  get “feel” and terminology  more depth, detail later in course  approach:  use Internet.
Lecture 2 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Networking Based on the powerpoint presentation of Computer Networking: A Top Down Approach Featuring the Internet, Third Edition, J.F. Kurose and K.W.
1-1 Foundation Objectives: 1.1 What’s the Internet? 1.2 Network edge 1.3 Network core 1.4 Network access and physical media 1.5 Internet structure and.
Network Architecture and the OSI Reference Model Computer Networks Computer Networks Term B10.
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Lecture Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
What’s the Internet: “nuts and bolts” view
Introduction 1 Lecture 3 Networking Concepts slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering Department.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
CS671 Advanced Computer Networking Chen Qian Fall 2014 Introduction CQ (2014) 1-1.
Throughput: Internet scenario
Adapted from: Computer Networking, Kurose/Ross 1-1 1DT066 Distributed Information Systems Chapter 1 Introduction.
Slides originally from Professor Williamson at U Calgary1-1 Introduction Part II  Network Core  Delay & Loss in Packet-switched Networks  Structure.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Networking Networking 101 Notes are adapted from chapter-1 in the textbook Multimedia Streaming {week-2} Mohamed Abdel-Maguid Computer Networking:
CS 3214 Computer Systems Godmar Back Lecture 23. Announcements Project 5 due Dec 8 Exercise 10 handed out Exercise 11 coming before Thanksgiving CS 3214.
How do loss and delay occur?
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Introduction 1-1 Chapter 1: Computer networks and the Internet 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network.
Introduction 1-1 “Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Introduction Chapter 1: roadmap 1.1 what is the Internet? 1.2 network edge  end systems, access networks, links 1.3 network core  packet switching, circuit.
RSC Part I: Introduction Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are, mainly, part of the companion slides to.
Lecture 5: Internetworking: A closer View By Dr. Najla Al-Nabhan Introduction 1-1.
Lecture 4 Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CS3516: These slides are generated from.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Computer Networks Performance Metrics
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
Lecture 1: Overview of Internet Architecture Communication Networks ELEN E6761 Instructor: Javad Ghaderi Lecture Slides adapted from “Computer Networking:
1 Computer Networks & The Internet Lecture 4 Imran Ahmed University of Management & Technology.
1: Introduction1 Introduction 3. 1: Introduction2 Delay in packet-switched networks packets experience delay on end-to-end path r four sources of delay.
Introduction 1-1 Chapter 1 Part 3 Delay, loss and throughput These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose,
CS 3830 Day 4 Introduction 1-1. Announcements  No office hour 12pm-1pm today only  Quiz on Friday  Program 1 due on Friday (put in DropBox on S drive)
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
EEC-484/584 Computer Networks
Ch 1. Computer Networks and the Internet Myungchul Kim
Marina Papatriantafilou – Introduction to computer communication Based on the book Computer Networking: A Top Down Approach, Jim Kurose, Keith Ross, Addison-Wesley.
Computer Networks Performance Metrics Computer Networks Spring 2013.
“Real” Internet delays and routes  What do “real” Internet delay & loss look like?  Traceroute program: provides delay measurement from source to router.
Lecture 2: Internet Structure & Internetworking By Dr. Najla Al-Nabhan edited by Maysoon Al Duwais Introduction 1-1.
Introduction 1-1 1DT057 Distributed Information Systems Chapter 1 Introduction.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
What’s the Internet: “nuts and bolts” view
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Network Processing Systems Design
Computer Networks Dr. Adil Yousif CS Lecture 1.
Introduction to Networks
Administrative Things
OSI Protocol Stack Given the post man exemple.
RSC Part II: Network Layer 1. Basic Concepts
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
Session 2 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the book “Computer Networking, A Top-Down Approach” All material copyright J.F Kurose and K.W. Ross, All Rights Reserved CS 283Computer Networks Spring 2013 Instructor: Yuan Xue

Roadmap 1.1 Local Area Network  Network edge  direct-link network  multiple access network  end systems, physical media, links, framing, access network 1.2 Internetworking  Network core  network structure, packet switching 1.3 Protocol layers, service models 1.4 Performance  delay, loss and throughput Self-Reading:  Networks under attack: security  History

From host-to-host data delivery to app-to-app communication service Web Serv er brow ser server client MSN client MSN server Two views of Internet : “Infrastructure” and “Service” view

What’s the Internet: “Infrastructure” view  Internet: “network of networks”  loosely hierarchical  public Internet versus private intranet Home network Institutional network Mobile network Global ISP Regional ISP

What’s the Internet: a service view  communication infrastructure supports distributed applications:  Web, VoIP, , games, e-commerce, file sharing  communication services provided to apps:  reliable data delivery from source to destination  “best effort” (unreliable) data delivery

End-to-End Protocols  Problem  Turn host-to-host packet delivery service into a logical communication channel between application processes.  End-to-end protocols of Internet  Multiplexing on a host  port  Different services: UDP –Best effort connectionless TCP –Reliable Connection-oriented »Connection establishment »Reliable transmission »Congestion control

What’s a protocol? human protocols:  “what’s the time?”  “I have a question”  introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols:  machines rather than humans  all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt

What’s a protocol? a human protocol and a computer network protocol: Hi Got the time? 2:00 TCP connection response Get time TCP connection request

Internet protocol stack: Network layer application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network link physical  network: routing of datagrams from source to destination  link: data transfer between neighboring network elements  physical: bits “on the wire”

Internet protocol stack: Transport layer application transport network data link physical application transport network data link physical logical end-end transport transport network link physical  transport: process- process data transfer  network: routing of datagrams from source to destination  link: data transfer between neighboring network elements  physical: bits “on the wire”

Finally…

Internet protocol stack  application: supporting network applications  FTP, SMTP, HTTP  transport: process-process data transfer  TCP, UDP  network: routing of datagrams from source to destination  IP, routing protocols  link: data transfer between neighboring network elements  Ethernet, (WiFi), PPP  physical: bits “on the wire” application transport network link physical

source application transport network link physical HtHt HnHn M segment HtHt datagram destination application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M network link physical link physical HtHt HnHn HlHl M HtHt HnHn M HtHt HnHn M HtHt HnHn HlHl M router switch Message Encapsulation message M HtHt M HnHn frame

Stack Deployment Link Network (IP) Network (IP) Transport (TCP) Application (HTTP) Link Network (IP) Transport (TCP) Application (HTTP) Link Network (IP) Link … Internet network End host Physical

Implementation Multi/Demultiplex port CW port Congestion window port Congestion window port HTTP Application Transport Network Link Fragment/Reassemble Forward Routing IP Address Routing table Forwarding table IEEE SMTPFTP UDPTCP CW port Stream Frame Packet payload Transport header (e.g.TCP) payload IPTCP payloadIPTCPMAC Skype User space OS Kernel Hardware

ISO/OSI reference model  presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine- specific conventions  session: synchronization, checkpointing, recovery of data exchange  Internet stack “missing” these layers!  these services, if needed, may be implemented in application/transport layer application presentation session transport network link physical

Why layering? Dealing with complex systems:  explicit structure allows identification, relationship of complex system’s pieces  modularization eases maintenance, updating of system  change of implementation of layer’s service transparent to rest of system  Allow the growth of a healthy eco-system  Google, MS, cisco, Sprint, etc..  layering considered harmful?

Roadmap 1.1 Local Area Network  Network edge  direct-link network  multiple access network  end systems, physical media, links, framing, access network 1.2 Internetworking  Network core  network structure, packet switching 1.3 Protocol layers, service models 1.4 Performance  delay, loss and throughput Self-Reading:  Networks under attack: security  History

Understand and Measure Internet Performance

How do loss and delay occur? packets queue in router buffers  packet arrival rate to link exceeds output link capacity  packets wait in a buffer (queue) A B packet being transmitted (delay) packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers

Four sources of packet delay A B propagation transmission nodal processing queueing d nodal = d proc + d queue + d trans + d prop d proc : nodal processing  check bit errors  determine output link  typically < msec d queue : queueing delay  time waiting at output link for transmission  depends on congestion level of router d trans : transmission  Recall its calculation

Four sources of packet delay A B propagation transmission nodal processing queueing d nodal = d proc + d queue + d trans + d prop d trans : transmission delay:  L: packet length (bits)  R: link bandwidth (bps)  d trans = L/R d prop : propagation delay:  d: length of physical link  s: propagation speed in medium (~2x10 8 m/sec)  d prop = d/s d trans and d prop very different

 R: link bandwidth (bps)  L: packet length (bits)  a: average packet arrival rate traffic intensity = La/R  La/R ~ 0: avg. queueing delay small  La/R -> 1: avg. queueing delay large  La/R > 1: more “work” arriving than can be serviced, average delay infinite! average queueing delay La/R ~ 0 Queueing delay (revisited) La/R -> 1

Packet loss  queue (aka buffer) preceding link in buffer has finite capacity  packet arriving to full queue dropped (aka lost)  lost packet may be retransmitted by previous node, by source end system, or not at all A B packet being transmitted packet arriving to full buffer is lost buffer (waiting area)

Throughput  throughput: rate (bits/time unit) at which bits transferred between sender/receiver  instantaneous: rate at given point in time  average: rate over longer period of time server, with file of F bits to send to client link capacity R s bits/sec link capacity R c bits/sec server sends bits (fluid) into pipe pipe that can carry fluid at rate R s bits/sec) pipe that can carry fluid at rate R c bits/sec)

Throughput (more)  R s < R c What is average end-end throughput? R s bits/sec R c bits/sec  R s > R c What is average end-end throughput? R s bits/sec R c bits/sec link on end-end path that constrains end-end throughput bottleneck link

Throughput: Internet scenario 10 connections (fairly) share backbone bottleneck link R bits/sec RsRs RsRs RsRs RcRc RcRc RcRc R  per-connection end-end throughput: min(R c,R s,R/10)  in practice: R c or R s is often bottleneck

Throughput (more)  If the sender sends the data at R s bits/sec, but the receiver receives the data at R r bits/sec (< R s bits/sec), where is the rest of data?  Can a sender ask for a reliable data transfer service at rate R s bits/sec on Internet?  How can I measure the maximum possible throughput for my application(flow/traffic)?

How to perform measurement  Delay/Route  Traceroute program: provides delay measurement from source to router along end-end Internet path towards destination. For all i:  sends three packets that will reach router i on path towards destination  router i will return packets to sender  sender times interval between transmission and reply. 3 probes

Demo traceroute: traceroute: Points of interest: Three delay measurements trans-oceanic link no response (probe lost, router not replying) Etc…

How to perform measurement  TCP/UDP Bandwidth, UDP loss  iperf tool: provides measurement of maximum TCP and UDP bandwidth performance and reports bandwidth, delay jitter, datagram loss.  Iperf demo