COM320 Computer Networks and Operating Systems Kevin Curran.

Slides:



Advertisements
Similar presentations
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Advertisements

CS 381 Introduction to computer networks Lecture 2 1/29/2015.
Introduction to Security Computer Networks Computer Networks Term B10.
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Adapted from Tanenbaum's Slides for Computer Networks, 4e
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.
Introduction Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Computer Networks IGCSE ICT Section 4.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
Data Communications and Networking
Computer Networks Lecture 1 & 2 Introduction and Layer Model Approach Lahore Leads University.
Introduction Chapter 1 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Networks and Telecommunications
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Chapter 4 Computer Networks – Part 1
Presentation on Osi & TCP/IP MODEL
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
Definitions Protocol (1) An agreement between the communicating parties on how communication is to proceed. (2) A set of rules that governs how two or.
Introduction Chapter 1 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Network Hardware Network Software Reference.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Introduction Chapter 1 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Uses of Computer Networks Network Hardware.
NETWORKS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Introduction Hamed Jamshak Hamed Jamshak Chapter 1 Hamed Jamshak.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Computer Networks A.S. Tanenbaum 5 th Edition 2011 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice.
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Computer Networks with Internet Technology William Stallings
Lecture 0: Course Overview. Lecturer Details Dr. Walid Khedr Web: Department of Information Technology.
1 Computer Networks & The Internet Lecture 4 Imran Ahmed University of Management & Technology.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
CS 3830 Day 4 Introduction 1-1. Announcements  No office hour 12pm-1pm today only  Quiz on Friday  Program 1 due on Friday (put in DropBox on S drive)
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
DELAYS, LAYERED NETWORK MODEL AND NETWORK SECURITY.
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction Chapter 1. Business Applications of Networks A network with two clients and one server. Client-Server Model.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Introduction Chapter 1 Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues
Introduction Chapter 1 Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
Digital Planet: Tomorrow’s Technology and You Chapter 8 Networking and Digital Communication Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 3 Omar Meqdadi Department of Computer Science and Software Engineering.
Introduction Chapter 1. Uses of Computer Networks Business Applications Home Applications Mobile Users Social Issues.
Network Processing Systems Design
Chapter 1: Explore the Network
COM320 Computer Networks and Operating Systems
Revised: August 2011 and February 2018
Introduction Chapter 1 Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Computer Networks CMSC417 Prof. Ashok K . Agrawala
Lecture#2- Computer Networks
Presentation transcript:

COM320 Computer Networks and Operating Systems Kevin Curran

Before we start… Main Books: Tanenbaum, A. (2010) Computer Networks (5th edition), Prentice Hall, ISBN: Stallings, W. (2008) Operating Systems, internals and design principles. Upper Saddle River, New Jersey: Pearson/Prentice Hall (6th ed.).

Before we start… 2 important Links…… if you missed class, please ask a colleague…..

Labs & Notes Main Page - Notes - Labs - Assignments – 2 class tests Attendance & what not to do when absent Structure of Labs

Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units

Uses of Computer Networks Computer networks are collections of autonomous computers, e.g., the Internet They have many uses: Business Applications » Home Applications » Mobile Users » These uses raise: Social Issues » This text covers networks for all of these uses

request response Business Applications Companies use networks and computers for resource sharing with the client-server model: Other popular uses are communication, e.g., , VoIP, and e-commerce

Home Applications Homes contain many networked devices, e.g., computers, TVs, connected to the Internet by cable, DSL, wireless, etc. Home users communicate, e.g., social networks, consume content, e.g., video, and transact, e.g., auctions Some application use the peer-to-peer model in which there are no fixed clients and servers:

Mobile Users Tablets, laptops, and smart phones are popular devices; WiFi hotspots and 3G cellular provide wireless connectivity. Mobile users communicate, e.g., voice and texts, consume content, e.g., video and Web, and use sensors, e.g., GPS. Wireless and mobile are related but different:

Social Issues Network neutrality – no network restrictions Content ownership, e.g., DMCA takedowns Anonymity and censorship Privacy, e.g., Web tracking and profiling Theft, e.g., botnets and phishing

Network Neutrality Some network operators block content for their own reasons. Opponents of this practice argue that peer-to-peer and other content should be treated in the same way because they are all just bits to the network. This argument for communications that are not differentiated by their content or source or who is providing the content is known as Network Neutrality

Network Hardware Networks can be classified by their scale: ScaleType VicinityPAN (Personal Area Network) » BuildingLAN (Local Area Network) » CityMAN (Metropolitan Area Network) » CountryWAN (Wide Area Network) » PlanetThe Internet (network of all networks)

Personal Area Network Connect devices over the range of a person Example of a Bluetooth (wireless) PAN:

Local Area Networks Connect devices in a home or office building Called enterprise network in a company Most use Copper Wiring but some use Optical Wireless LAN with Wired LAN with switched Ethernet

Metropolitan Area Networks Connect devices over a metropolitan area Example MAN based on cable TV:

Connect devices over a country Example WAN connecting three branch offices: Wide Area Networks (1)

Wide Area Networks (2) An ISP (Internet Service Provider) network is also a WAN. Customers buy connectivity from the ISP to use it.

Wide Area Networks (3) A VPN (Virtual Private Network) is a WAN built from virtual links that run on top of the Internet.

Network Software Protocol layers » Design issues for the layers » Connection-oriented vs. connectionless service » Service primitives » Relationship of services to protocols »

Protocol Layers (1) Protocol layering is the main structuring method used to divide up network functionality. Each protocol instance talks virtually to its peer Each layer communicates only by using the one below Lower layer services are accessed by an interface At bottom, messages are carried by the medium

Protocol Layers (2) Example: the philosopher-translator-secretary architecture Each protocol at different layers serves a different purpose

Protocol Layers (3) Each lower layer adds its own header (with control inform- ation) to the message to transmit and removes it on receive Layers may also split and join messages, etc.

Design Issues for the Layers Each layer solves a particular problem but must include mechanisms to address a set of recurring design issues IssueExample mechanisms at different layers Reliability despite failures Codes for error detection/correction (§3.2, 3.3) Routing around failures (§5.2) Network growth and evolution Addressing (§5.6) and naming (§7.1) Protocol layering (§1.3) Allocation of resources like bandwidth Multiple access (§4.2) Congestion control (§5.3, 6.3) Security against various threats Confidentiality of messages (§8.2, 8.6) Authentication of communicating parties (§8.7)

Connection-Oriented vs. Connectionless Service provided by a layer may be kinds of either: Connection-oriented, must be set up for ongoing use (and torn down after use), e.g., phone call Connectionless, messages are handled separately, e.g., postal delivery

Multiplexing Many network designs share network bandwidth dynamically, according to the short-term needs of hosts, rather than by giving each host a fixed fraction of the band-width that it may or may not use. This design is called statistical multiplexing. Statistical TDM

Switching Store & Forward Switching - Used on a packet network, when the intermediate nodes receive a message in full before sending it on to the next node, Cut-through switching is a method for packet switching systems, wherein the switch starts forwarding a frame (or packet) before the whole frame has been received, normally as soon as the destination address is processed. Compared to store and forward, this technique reduces latency through the switch, but decreases reliability; corrupted frames are potentially forwarded. Adaptive Switching dynamically selects between cut- through and store and forward behaviors based on current network conditions.

How do loss and delay occur? packets queue in router buffers  packet arrival rate to link exceeds output link capacity  packets queue, wait for turn A B packet being transmitted (delay) packets queueing (delay) free (available) buffers: arriving packets dropped (loss) if no free buffers

Four sources of packet delay d proc : nodal processing  check bit errors  determine output link  typically < msec A B propagation transmission nodal processing queueing d queue : queueing delay  time waiting at output link for transmission  depends on congestion level of router d nodal = d proc + d queue + d trans + d prop

Four sources of packet delay A B propagation transmission nodal processing queueing d nodal = d proc + d queue + d trans + d prop d trans : transmission delay:  L: packet length (bits)  R: link bandwidth (bps)  d trans = L/R d prop : propagation delay:  d: length of physical link  s: propagation speed in medium (~2x10 8 m/sec)  d prop = d/s d trans and d prop very different

Caravan analogy  cars “propagate” at 100 km/hr  toll booth takes 12 sec to service car (transmission time)  car~bit; caravan ~ packet  Q: How long until caravan is lined up before 2nd toll booth?  time to “push” entire caravan through toll booth onto highway = 12*10 = 120 sec  time for last car to propagate from 1st to 2nd toll both: 100km/(100km/hr)= 1 hr  A: 62 minutes toll booth toll booth ten-car caravan 100 km

Caravan analogy (more)  cars now “propagate” at 1000 km/hr  toll booth now takes 1 min to service a car  Q: Will cars arrive to 2nd booth before all cars serviced at 1st booth?  A: Yes! After 7 min, 1st car arrives at second booth; three cars still at 1st booth.  1st bit of packet can arrive at 2nd router before packet is fully transmitted at 1st router! (see Ethernet applet at AWL Web site toll booth toll booth ten-car caravan 100 km

Service Primitives (1) A service is provided to the layer above as primitives Hypothetical example of service primitives that may provide a reliable byte stream (connection-oriented) service:

Service Primitives (2) Hypothetical example of how these primitives may be used for a client-server interaction Client Server LISTEN (0) ACCEPT RECEIVE SEND (4) DISCONNECT (6) CONNECT (1) SEND RECEIVE DISCONNECT (5) Connect request Accept response Request for data Reply Disconnect (2) (3)

Relationship of Services to Protocols Recap: A layer provides a service to the one above[vertical] A layer talks to its peer using a protocol [horizontal]

Relationship of Services to Protocols Services and protocols are distinct concepts. A service is a set of primitives (operations)that a layer provides to the layer above it. The service defines what operations the layer is prepared to perform on behalf of its users, but it says nothing at all about how these operations are implemented.

Reference Models Reference models describe the layers in a network architecture OSI reference model » TCP/IP reference model » Model used for this text » Critique of OSI and TCP/IP »

OSI Reference Model A principled, international standard, seven layer model to connect different systems – Provides functions needed by users – Converts different representations – Manages task dialogs – Provides end-to-end delivery – Sends packets over multiple links – Sends frames of information – Sends bits as signals

TCP/IP Reference Model A four layer model derived from experimentation; omits some OSI layers and uses the IP as the network layer. IP is the “narrow waist” of the Internet Protocols are shown in their respective layers

Model Used in this Book It is based on the TCP/IP model but we call out the physical layer and look beyond Internet protocols.

Critique of OSI & TCP/IP OSI: +Very influential model with clear concepts −Models, protocols and adoption all bogged down by politics and complexity TCP/IP: +Very successful protocols that worked well and thrived −Weak model derived after the fact from protocols

Model Used in this Book It is based on the TCP/IP model but we call out the physical layer and look beyond Internet protocols.

Example Networks The Internet » 3G mobile phone networks » Wireless LANs » RFID and sensor networks »

Internet (1) Before the Internet was the ARPANET, a decentralized, packet-switched network based on Baran’s ideas. ARPANET topology in Sept Nodes are IMPs, or early routers, linked to hosts 56 kbps links

Internet (2) The early Internet used NSFNET ( ) as its backbone; universities connected to get on the Internet NSFNET topology in 1988 T1 links (1.5 Mbps)

Internet (3) The modern Internet is more complex: ISP networks serve as the Internet backbone ISPs connect or peer to exchange traffic at IXPs Within each network routers switch packets Between networks, traffic exchange is set by business agreements Customers connect at the edge by many means −Cable, DSL, Fiber-to-the-Home, 3G/4G wireless, dialup Data centers concentrate many servers (“the cloud”) Most traffic is content from data centers (esp. video) The architecture continues to evolve

Internet (4) Architecture of the Internet

Internet (5) Internet Service Provider (ISP) networks may be regional, national, or international in scope. If a packet is destined for a host served directly by the ISP, that packet is routed over the backbone and delivered to the host. Otherwise, it must be handed over to another ISP. ISPs connect their networks to exchange traffic at IXPs(Internet eXchange Points).

3G Mobile Phone Networks (1) 3G network is based on spatial cells; each cell provides wireless service to mobiles within it via a base station

3G Mobile Phone Networks (2) Base stations connect to the core network to find other mobiles and send data to the phone network and Internet

3G Mobile Phone Networks (3) As mobiles move, base stations hand them off from one cell to the next, and the network tracks their location Handover

Wireless LANs (1) In , clients communicate via an AP (Access Point) that is wired to the rest of the network.

Wireless LANs (2) Signals in the 2.4GHz ISM band vary in strength due to many effects, such as multipath fading due to reflections − requires complex transmission schemes, e.g., OFDM

Wireless LANs (3) Radio broadcasts interfere with each other, and radio ranges may incompletely overlap −CSMA (Carrier Sense Multiple Access) designs are used

RFID and Sensor Networks (1) Passive UHF RFID networks everyday objects: −Tags (stickers with not even a battery) are placed on objects −Readers send signals that the tags reflect to communicate

RFID and Sensor Networks (2) Sensor networks spread small devices over an area: −Devices send sensed data to collector via wireless hops

Peer to Peer A peer-to-peer (abbreviated to P2P) computer network is one in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to various resources such as files, peripherals, and sensors without the need for a central server. P2P networks can be set up within the home, a business, or over the Internet. Each network type requires all computers in the network to use the same or a compatible program. P2P networks can be used for sharing content such as audio, video, data, or anything in digital format. Many peer-to-peer systems, such as BitTorrent, do not have any central database of content. Instead, each user maintains his own database locally and provides a list of other nearby people who are members of the system.

Peer to Peer P2P is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged participants in the application. Each computer in the network is referred to as a node. The owner of each computer on a P2P network would set aside a portion of its resources—such as processing power, disk storage, or network bandwidth—to be made directly available to other network participant, without the need for central coordination by servers or stable hosts. With this model, peers are both suppliers and consumers of resources and also it can supplement the user detection and recovery and improve quality assurance activity of the product., in contrast to the traditional client–server model where only the server supply (send), and clients consume (receive).

Network Standardization Standards define what is needed for interoperability Some of the many standards bodies: BodyAreaExamples ITUTelecommunicationsG.992, ADSL H.264, MPEG4 IEEECommunications802.3, Ethernet , WiFi IETFInternetRFC 2616, HTTP/1.1 RFC 1034/1035, DNS W3CWebHTML5 standard CSS standard

Security Where do we start? e.g. Phising Phising Messages masquerade as originating from a trustworthy party, for example, your bank, to try to trick you into revealing sensitive information, for example, credit card numbers. …..Hacking tools, DDoS, Passwords, Hashing, PGP, Encryption, Cryptography….all covered later

Network Security  field of network security:  how bad guys can attack computer networks  how we can defend networks against attacks  how to design architectures that are immune to attacks  Internet not originally designed with (much) security in mind  original vision: “a group of mutually trusting users attached to a transparent network”  Internet protocol designers playing “catch-up”  security considerations in all layers!

Bad guys: put malware into hosts via Internet  malware can get in host from a virus, worm, or Trojan horse.  spyware malware can record keystrokes, web sites visited, upload info to collection site.  infected host can be enrolled in botnet, used for spam and DDoS attacks.  malware often self-replicating: from one infected host, seeks entry into other hosts

Trojan horse hidden part of some otherwise useful software today often in Web page (Active-X, plugin) virus infection by receiving object (e.g., attachment), actively executing self-replicating: propagate itself to other hosts, users worm:  infection by passively receiving object that gets itself executed  self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data) Bad guys: put malware into hosts via Internet

Denial of Service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets to target from compromised hosts target Bad guys: attack server, network infrastructure

The bad guys can sniff packets Packet sniffing: broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload  Wireshark software used for end-of-chapter labs is a (free) packet-sniffer

The bad guys can use false source addresses IP spoofing: send packet with false source address A B C src:B dest:A payload

The bad guys can record and playback record-and-playback: sniff sensitive info (e.g., password), and use later password holder is that user from system point of view A B C src:B dest:A user: B; password: foo … lots more on security later in course

Metric Units CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The main prefixes we use: Use powers of 10 for rates, powers of 2 for storage −E.g., 1 Mbps = 1,000,000 bps, 1 KB = 1024 bytes “B” is for bytes, “b” is for bits PrefixExp.prefixexp. K(ilo)10 3 m(illi)10 -3 M(ega)10 6 μ(micro)10 -6 G(iga)10 9 n(ano)10 -9

Undersea Cables

Today’s Lab Protocol LayersProtocol Layers - Wireshark Network Packet Sniffing Word version Command Line Tools - Ping, IPconfig, NSlookup and more.Word version Command Line Tools Week 1 Supplementary Tutorials Web Page Load Test - Run a diagnostic on to see resource loading waterfall charts, Page Speed optimization checks and suggestions for improvements. Web Page Load Comparison - Compare 2 sites such as and to see how optimised they are. Mobile Web Page Load Test - Choose one of the device/location options and hit run. Your page will be loaded on a real mobile device, and you will receive rich detail about how long it took to load, including waterfall charts and video recording of the page load. Web Page Load Test Web Page Load Comparison Mobile Web Page Load Test Week 1 Online Tutorials OSI Layer Names - Arrange the OSI Layers OSI Layer Activity - Arrange the OSI Layers by function Layers video - Short tutorial on network layer communication OSI Layer Names OSI Layer Activity Layers video

End Chapter 1