Pertemuan 01 - 02 - Internet OSI Layer
Pertemuan 01 - 02 - Internet OSI Layer
Introduction
Introduction 1-2
What’s the Internet: “nuts and bolts” view
PC • millions of connected mobile network
server computing devices:
• hosts = end systems
wireless global ISP
laptop • running network apps
smartphone
home
❖ communication links network
▪ fiber, copper, radio, regional ISP
wireless satellite
links ▪ transmission rate:
wired bandwidth
links
Introduction 1-3
What’s the Internet: “nuts and bolts” view
mobile network
• Internet: “network of networks”
• Interconnected ISPs
global ISP
• protocols control sending,
receiving of msgs
home
• e.g., TCP, IP, HTTP, Skype, 802.11 network
regional ISP
• Internet standards
• RFC: Request for comments
• IETF: Internet Engineering Task
Force
institutional
network
1-4
Introduction
What’s a protocol?
human protocols: network protocols:
• “what’s the time?” • machines rather than
• “I have a question” humans
• introductions • all communication activity
in Internet governed by
protocols
… specific messages sent
… specific actions taken protocols define format, order
when messages received, of messages sent and
or other events
received among network
entities, and actions taken
on message transmission,
Introduction
receipt 1-5
What’s a protocol?
a human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
response
Got the
time? Get http://www.awl.com/kurose-ross
2:00
<file>
time
Introduction 1-7
A closer look at network structure:
• network edge: mobile network
• hosts: clients and servers
• servers often in data centers global ISP
home
❖ access networks, physical network
regional ISP
media: wired, wireless
communication links
❖ network core:
▪ interconnected routers
▪ network of networks
institutional
network
Introduction 1-8
Access networks and physical media
Introduction 1-9
Access net: digital subscriber line (DSL)
central office telephone
network
DSL splitter
modem DSLAM
ISP
voice, data transmitted
at different frequencies over DSL access
dedicated line to central office multiplexer
Introduction 1-10
Access net: cable network
cable headend
…
cable splitter
modem
C
O
V V V V V V N
I I I I I I D D T
D D D D D D A A R
E E E E E E T T O
O O O O O O A A L
1 2 3 4 5 6 7 8 9
Channels
Introduction 1-11
Access net: cable network
cable headend
…
Introduction 1-12
Access net: home network
wireless
devices
to/from headend or
central office
often combined
in single box
Introduction 1-13
Enterprise access networks (Ethernet)
institutional link to
ISP (Internet)
institutional router
Introduction 1-14
Wireless access networks
• shared wireless access network connects end system to router
• via base station aka “access point”
wireless LANs: wide-area wireless access
▪ within building (100 ft) ▪ provided by telco (cellular)
operator, 10’s km
▪ 802.11b/g (WiFi): 11, 54 Mbps
transmission rate ▪ between 1 and 10 Mbps
▪ 3G, 4G: LTE
to Internet
to Internet
Introduction 1-15
Host: sends packets of data
host sending function:
• takes application message
• breaks into smaller chunks, two packets,
known as packets, of length L L bits each
bits
• transmits packet into access
network at transmission rate
R 2 1
• link transmission rate,
aka link capacity, aka R: link transmission rate
link bandwidth host
1-16
Physical media
• bit: propagates between
transmitter/receiver pairs
twisted pair (TP)
• physical link: what lies between
transmitter & receiver • two insulated copper wires
• Category 5: 100 Mbps, 1
• guided media: Gpbs Ethernet
• signals propagate in solid • Category 6: 10Gbps
media: copper, fiber, coax
• unguided media:
• signals propagate freely,
e.g., radio
Introduction 1-17
Physical media: coax, fiber
coaxial cable: fiber optic cable:
❖ glass fiber carrying light pulses, each
• two concentric copper pulse a bit
conductors ❖ high-speed operation:
• bidirectional ▪ high-speed point-to-point
transmission (e.g., 10’s-100’s
• broadband: Gpbs transmission rate)
• multiple channels on cable ❖ low error rate:
▪ repeaters spaced far apart
• HFC
▪ immune to electromagnetic
noise
Introduction 1-18
Physical media: radio
Introduction 1-19
Chapter 1: roadmap
1.1 what is the Internet?
1.2 network edge
▪ end systems, access networks, links
1.3 network core
▪ packet switching, circuit switching, network structure
1.4 delay, loss, throughput in networks
1.5 protocol layers, service models
1.6 networks under attack: security
Introduction 1-20
How do loss and delay occur?
packets queue in router buffers
• packet arrival rate to link (temporarily) exceeds output link
capacity
• packets queue, wait for turn
packet being transmitted (delay)
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction 1-21
Four sources of packet delay
transmission
A
propagation
B
nodal
processing queueing
Introduction 1-22
Four sources of packet delay
transmission
A
propagation
B
nodal
processing queueing
3 probes 3 probes
3 probes
Introduction 1-24
“Real” Internet delays, routes
traceroute: gaia.cs.umass.edu to www.eurecom.fr
buffer
A (waiting area) packet being transmitted
B
packet arriving to
full buffer is lost
Introduction
* Check out the Java applet for an interactive animation on queuing and loss 1-26
Throughput
• throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
server,
server withbits
sends linkpipe
capacity
that can carry linkpipe
capacity
that can carry
file of into
(fluid) F bitspipe Rs bits/sec
fluid at rate Rc bits/sec
fluid at rate
to send to client Rs bits/sec) Rc bits/sec)
Introduction 1-27
Chapter I1
Network Layers
Introduction 1-29
Protocol “layers”
Networks are complex,
with many “pieces”:
• hosts Question:
• routers is there any hope of
organizing structure of
• links of various network?
media
• applications …. or at least our discussion
• protocols of networks?
• hardware,
software
Introduction 1-30
Why layering?
dealing with complex systems:
• explicit structure allows identification, relationship
of complex system’s pieces
• layered reference model for discussion
• modularization eases maintenance, updating of
system
• change of implementation of layer’s service transparent
to rest of system
• e.g., change in gate procedure doesn’t affect rest of
system
Introduction 1-31
Internet protocol stack
• application: supporting network
applications
• FTP, SMTP, HTTP Application
Introduction 1-32
Internet protocol stack
• network: routing of datagrams from
source to destination
• IP, routing protocols Application
• link: data transfer between
neighboring network elements Presentation
• Ethernet, 802.111 (WiFi), PPP
• physical: bits “on the wire” Session
Transport
• Jargon :
• MTU (Maximum Transmission Unit) Network
• PDU (Protocol Data Unit) :
• Data Link
• Segment
• Packet Physical
• Frame
Introduction 1-33
Protocol and Reference Models
source
message M application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl H n Ht M link router
physical
Introduction 1-35
Protocol TCP/IP
OSI Model Layer Function Device
Data Unit Model
Introduction 1-37
Putting It All Together
Port
Logical
MAC MAC
Introduction 1-39
Network security
• field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
• Internet not originally designed with (much)
security in mind
• original vision: “a group of mutually trusting users
attached to a transparent network” ☺
• Internet protocol designers playing “catch-up”
• security considerations in all layers!
Introduction 1-40
Bad guys: put malware into hosts via Internet
Introduction 1-41
Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic
1. select target
Introduction 1-42
Bad guys can sniff packets
packet “sniffing”:
• broadcast media (shared ethernet, wireless)
• promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by
A C
Introduction 1-43
Bad guys can use fake addresses
Introduction 1-45
http://www.slideshare.net/asharahmed/operational-safety-in-telecom
http://www.thefoa.org/tech/safety.htm
Introduction 1-46
Introduction 1-47