David Evans CS150: Computer Science University of Virginia Computer Science Class 29: Making Primitives Class 29: Trick-or-Treat.

Slides:



Advertisements
Similar presentations
David Evans CS200: Computer Science University of Virginia Computer Science Class 28: Networks, The Internet, and the.
Advertisements

ECE358: Computer Networks Fall 2014
Packet / Message Switching Concepts
PRESENTED BY PAYTON FAKER JAWS, JANUARY 22, 2015.
1 Sending a Message Then and Now Trinidad September 2008 Nico Beute.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Computer Networks and the Internet CMPT 109 Montclair State University.
Module 3.4: Switching Circuit Switching Packet Switching K. Salah.
1 K. Salah Module 2.1: QA – Putting it all together What is the max number of users/connections/sessions a particular network can support for handling.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
Networks “Each time you use the telephone you use the world’s largest computer network – the telephone system”
Calculating “a”. a Used as a term in analyzing many network characteristics Has a physical interpretation Represents the number of frames on a link.
Problems.
8.1 Chapter 8 Switching Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Communication concepts (Continued) Week 2 Lecture 2.
Lecture 33: Networking Memex Machine
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Chapter 8 COMMUNICATION AND COMPUTER NETWORK
Data Communications and Networking
Communications & Networks
CS448 Computer Networking Chapter 1 Introduction to Computer Networks Instructor: Li Ma Office: NBC 126 Phone: (713)
David Evans CS200: Computer Science University of Virginia Computer Science Class 31: Networks, The Internet, and the.
CS 447 Networks and Data Communication
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
David Evans CS150: Computer Science University of Virginia Computer Science Lecture 33: Networking Memex Machine Vannevar.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
CS 150 – Computing: From Ada to the Web Communication and Networking.
David Evans CS200: Computer Science University of Virginia Computer Science Class 35: Cookie Monsters and Semi-Secure.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
Echo Cancellation Chapter 4. Echo : Echo is the repetition of a signal back to the transmitter; either due to a coupling between the loudspeaker and microphone.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
Computer Networks with Internet Technology William Stallings
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
BA 471 – Telecommunications and Networking Dr. V.T. Raja Oregon State University As presented in Dr. Marshall’s BA471 class, Winter.
Lecture 8 Virtual Switching (contd.) & Message Switching.
EEC4113 Data Communication & Multimedia System Chapter 7: Network Layer by Muhazam Mustapha, October 2011.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Review of Network Technologies. Basic of Network concepts Computer Network – A Communication system for connecting computers/hosts Why? – Better connectivity.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 CH. 8: SWITCHING & DATAGRAM NETWORKS 7.1.
Class 28: Interpreters cs1120 Fall 2009 David Evans.
Computer Science Using Directional Antennas to Prevent Wormhole Attacks Stephen Thomas Acknowledgement: Portions of this presentation have been donated.
WAN Transmission Media
science/internet-intro
Computer Communication & Networks Lecture # 10. Bandwidth ϞBand Width means the width of the band (channel) ϞIt is the maximum capacity of a link ϞThat.
Introduction Computer networks: – definition – computer networks from the perspectives of users and designers – Evaluation criteria – Some concepts: –
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Attenuation is the loss of signal strength, for example, when cables exceed a maximum length. This means that a 1 bit voltage signal loses amplitude as.
Chapter 2 : Data Communications BENG 4522 Data Communications & Computer Networks Transmission Impairment Signals travel through the transmission.
The Internet Book Chapter 5 3 The World Was Once Digital 150 years ago, telegraph messages were sent from one town to another. –Using audible clicks.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 15: From Here to Oblivion.
Lecture # 3: WAN Data Communication Network L.Rania Ahmed Tabeidi.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Prepaid by: Guided by: ashwin goswami.
1. Layered Architecture of Communication Networks: Circuit Switching & Packet Switching.
Switching By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Chapter 2 PHYSICAL LAYER.
Instructor Materials Chapter 1 Ever Wonder How It Works?
Class 28: Networks, The Internet, and the World Wide Web Memex Machine
Network & Inter-networking
Packet Switching Datagram Approach Virtual Circuit Approach
Introduction to Networking & Telecommunications
Chapter 3 Switching.
ANEEL ABBASI MUHAMMAD ADNAN MOIZ SHAH MUHAMMAD KHAYAM GROUP MEMBERS.
Data Communication Networks
Circuit Switched Network
Presentation transcript:

David Evans CS150: Computer Science University of Virginia Computer Science Class 29: Making Primitives Class 29: Trick-or-Treat Protocols

2 CS150 Fall 2005: Lecture 29: Trick-or-Treat This Week in CS150 Today: –Networking and the Internet –Trick-or-Treat Protocols Wednesday: –How to make a dynamic web site using HTML, SQL, Python Friday: Return to Models of Computation

3 CS150 Fall 2005: Lecture 29: Trick-or-Treat Who Invented the Internet?

4 CS150 Fall 2005: Lecture 29: Trick-or-Treat Who Invented Networking?

5 CS150 Fall 2005: Lecture 29: Trick-or-Treat What is a Network? A group of three or more connected communicating entities

6 CS150 Fall 2005: Lecture 29: Trick-or-Treat Beacon Chain Networking Thus, from some far-away beleaguered island, where all day long the men have fought a desperate battle from their city walls, the smoke goes up to heaven; but no sooner has the sun gone down than the light from the line of beacons blazes up and shoots into the sky to warn the neighboring islanders and bring them to the rescue in their ships. Iliad, Homer, 700 BC Chain of beacon’s signaled Agammemnon’s return (~1200BC), spread on Greek peaks over 600km.

7 CS150 Fall 2005: Lecture 29: Trick-or-Treat Pony Express April 1860 – October 1861 Missouri to California –10 days –10-15 miles per horse, ~100 miles per rider 400 horses total (not per station like Kahn’s)

8 CS150 Fall 2005: Lecture 29: Trick-or-Treat Chappe’s Semaphore Network Mobile Semaphore Telegraph Used in the Crimean War First Line (Paris to Lille), 1794

9 CS150 Fall 2005: Lecture 29: Trick-or-Treat Measuring Networks Latency Time from sending a bit until it arrives seconds (or seconds per geographic distance) Bandwidth How much information can you transmit per time unit bits per second

10 CS150 Fall 2005: Lecture 29: Trick-or-Treat Latency and Bandwidth Napoleon’s Network: Paris to Toulon, 475 mi Latency: 13 minutes (1.6s per mile) –What is the delay at each signaling station, how many stations to reach destination –At this rate, it would take ~1 hour to get a bit from California Bandwidth: 2 symbols per minute (98 possible symbols, so that is ~13 bits per minute –How fast can signalers make symbols –At this rate, it would take you about 9 days to get ps7.zip

11 CS150 Fall 2005: Lecture 29: Trick-or-Treat Improving Latency Less transfer points –Longer distances between transfer points –Semaphores: how far can you see clearly Telescopes can help, but curvature of Earth is hard to overcome –Use wires (electrical telegraphs, 1837) Faster travel –Hard to beat speed of light (semaphore network) –Electrons in copper travel about 1/3 rd speed of light Faster transfers –Replace humans with machines

12 CS150 Fall 2005: Lecture 29: Trick-or-Treat How many transfer points between here and California?

13 CS150 Fall 2005: Lecture 29: Trick-or-Treat ] tracert cs.berkeley.edu Tracing route to cs.berkeley.edu [ ] over a maximum of 30 hops: 1 <10 ms <10 ms <10 ms router137.cs.Virginia.EDU [ ] 2 <10 ms <10 ms <10 ms carruthers-6509a-x.misc.Virginia.EDU [ ] 3 <10 ms <10 ms <10 ms uva-internet.acc.Virginia.EDU [ ] 4 <10 ms <10 ms <10 ms <10 ms <10 ms 10 ms <10 ms 10 ms 10 ms nycm-wash.abilene.ucaid.edu [ ] 7 20 ms 20 ms 20 ms clev-nycm.abilene.ucaid.edu [ ] 8 21 ms 30 ms 30 ms ipls-clev.abilene.ucaid.edu [ ] 9 30 ms 40 ms 30 ms kscy-ipls.abilene.ucaid.edu [ ] ms 50 ms 40 ms dnvr-kscy.abilene.ucaid.edu [ ] ms 70 ms * snva-dnvr.abilene.ucaid.edu [ ] ms 70 ms 70 ms ms 70 ms 71 ms BERK--SUNV.POS.calren2.net [ ] ms 70 ms 70 ms pos1-0.inr-000-eva.Berkeley.EDU [ ] ms 70 ms 70 ms vlan199.inr-202-doecev.Berkeley.EDU [ ] 16 * * * Request timed out ms 100 ms 70 ms relay2.EECS.Berkeley.EDU [ ] Trace complete. > (define meters-to-berkeley (* )) ;; 3000 miles * 1600 meters/mi > (define seconds-to-berkeley 0.070) > (define speed-to-berkeley (/ meters-to-berkeley seconds-to-berkeley)) > speed-to-berkeley ;;; meters per second > (define speed-of-light ) ;;; meters per second > (/ speed-of-light speed-to-berkeley) The Internet latency today is about ¼ the best physically possible!

14 CS150 Fall 2005: Lecture 29: Trick-or-Treat Improving Bandwidth Faster transmission –Train signalers to move semaphore flags faster –Use something less physically demanding to transmit Bigger pipes –Have multiple signalers transmit every other letter at the same time Better encoding –Figure out how to code more than 98 symbols with semaphore signal –Morse code (1840s)

15 CS150 Fall 2005: Lecture 29: Trick-or-Treat Morse Code Represent letters with series of short and long electrical pulses

16 CS150 Fall 2005: Lecture 29: Trick-or-Treat Circuit Switching Reserve a whole path through the network for the whole message transmission Paris Toulon Nantes Lyon Bourges Once you start a transmission, know you will have use of the network until it is finished. But, wastes network resources.

17 CS150 Fall 2005: Lecture 29: Trick-or-Treat Packet Switching Use one link at a time Paris Toulon Nantes Lyon Bourges Interleave messages – send whenever the next link is free.

18 CS150 Fall 2005: Lecture 29: Trick-or-Treat Circuit and Packet Switching (Land) Telephone Network –Circuit: when you dial a number, you have a reservation on a path through the network until you hang up The Internet –Packet: messages are broken into small packets, that find their way through the network link by link

19 CS150 Fall 2005: Lecture 29: Trick-or-Treat internetwork A collection of multiple networks connected together, so messages can be transmitted between nodes on different networks.

20 CS150 Fall 2005: Lecture 29: Trick-or-Treat Okay, so who invented the Internet?

21 CS150 Fall 2005: Lecture 29: Trick-or-Treat “Trick or Treat” Protocols

22 CS150 Fall 2005: Lecture 29: Trick-or-Treat “Trick or Treat” Protocols Trick-or-Treater must convince victim that she poses a credible threat Need to prove you know a trick, without revealing what it is –Revealing the trick gives victim opportunity to prevent it

23 CS150 Fall 2005: Lecture 29: Trick-or-Treat Tricker’s License TRICKER’S LICENSE

24 CS150 Fall 2005: Lecture 29: Trick-or-Treat Cryptographic Hash Functions One-way Given h, it is hard to find x such that H(x) = h. Collision resistance Given x, it is hard to find y  x such that H(y) = H(x).

25 CS150 Fall 2005: Lecture 29: Trick-or-Treat Example One-Way Function Input: two 100 digit numbers, x and y Output: the middle 100 digits of x * y Given x and y, it is easy to calculate f (x, y) = select middle 100 digits (x * y) Given f (x, y) hard to find x and y.

26 CS150 Fall 2005: Lecture 29: Trick-or-Treat A Better Hash Function? H(x) = encrypt x (0) Weak collision resistance? –Given x, it should be hard to find y  x such that H(y) = H(x). –Yes – encryption is one-to-one. (There is no such y.) A good hash function? –No, its output is as big as the message!

27 CS150 Fall 2005: Lecture 29: Trick-or-Treat Trick-or-Treat Trickers? “Trick or Treat?”, H (secret) Trickers Bureau H (secret) Valid! Ouch! Now victim knows enough to be a tricker!

28 CS150 Fall 2005: Lecture 29: Trick-or-Treat Trick-or-Treat Trickers? “Trick or Treat?” Trickers Bureau R, Challenge Valid! Challenge R = H (secret, Challenge)

29 CS150 Fall 2005: Lecture 29: Trick-or-Treat Problem Set 7

30 CS150 Fall 2005: Lecture 29: Trick-or-Treat Charge Next class: –Who invented the Internet? –How to make a dynamic web application –Password Authentication (similar to Trick-or- Treat) Before Wednesday: –Read through PS7 handout