Part I: Introduction
Download
Report
Transcript Part I: Introduction
University of British Columbia
CICS 515 (Part 1) Internet Computing
Lecture 1 - Overview
Instructor: Dr. Son T. Vuong
Email: [email protected]
May 8, 2012
The World Connected
Introduction
Information and Organization
Instructor: Dr. Son Vuong
► Email:
[email protected]
► Office Hours: T, Th: 1:00-2:00pm (CS 329)
TA:
► Jonatan Schroeder
► Shahed Alam
[email protected]
[email protected]
Lectures: T, Th: 11am-1 pm in DMP 110
Lab: Th: 2-4 pm (CS 045/051)
Introduction
1-2
Text and Workload
Text:
Computer Networking: A Top Down Approach
Featuring the Internet, 6th edition. Jim Kurose, Keith
Ross. Addison-Wesley, April 2012.
Course Load:
►2
Projects/Asgmts (20%)
► 2 Quizzes
(10%)
► Midterm
(25%)
► Final exam
(45%)
► Bonus for class participation, BlueCT + Peerwise (4%)
i
Late penalty: 5*2 %, 0< i =< 3 (i = # days late)
Website: www.icics.ubc.ca/~cics515
Vista: http://www.vista.ubc.ca/ (id=pwd=CWL)
Introduction
1-3
Revised CISC 515 Outline (Tentative)
1.
2.
3.
4.
5.
6.
7.
8.
(T - 08/5) Overview (Chapter 1)
P1
(Th - 10/5) Application Layer (The Web and HTTP) (Ch 2)
(T - 15/5) WebCache and Transport Layer (Ch 3)
(Th - 17/5) Transport Layer (Ch 3)
(T - 22/5) Transport Layer (TCP) (Ch 3) Quiz1
(Th - 24/5) TCP Congestion (P1) P2
(T-29/5) IP (Ch 4) IPv6 (Ch 4) Midterm
(Th - 31/6) Other Protocols (ICMP, DHCP, DNS), Routing
(RIP, OSPF) (Ch 4)
9. (T - 05/6) Routing (RIP, OSPF, BGP) (Ch 4)
10. (Th- 07/6) Data Link protocols (Ethernet) (Ch 5) (P2)
11. (T- 12/6) Wireless Networks (WiFi) (Ch 6) Quiz2
12. (Th-14/6) Review 13. (F-15/6) Final Exam
Introduction
1-4
Chapter 1: Introduction
Our goal:
Overview:
get context,
what’s the Internet
overview, “feel” of
networking
more depth, detail
later in course
approach:
► descriptive
► use Internet as
example
what’s a protocol?
network edge
network core
access net, physical media
Internet/ISP structure
performance: loss, delay
protocol layers, service models
history
Introduction
1-5
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.3 Network core
1.4 Network access and physical media
1.5 Internet structure and ISPs
1.6 Protocol layers, service models
1.7 Delay & loss in packet-switched networks
1.8 History
Introduction
1-6
What’s the Internet: “nuts and bolts” view
millions of connected
computing devices: hosts,
end-systems
►
►
PCs workstations, servers
PDAs phones, toasters
router
server
workstation
mobile
local ISP
running network apps
communication links
►
►
regional ISP
fiber, copper, radio,
satellite
transmission rate =
bandwidth
routers: forward packets
(chunks of data)
company
network
Introduction
1-7
“Cool” internet appliances
IP picture frame
http://www.ceiva.com/
Web-enabled toaster+weather forecaster
World’s smallest web server
http://www-ccs.cs.umass.edu/~shri/iPic.html
Introduction
1-8
What’s the Internet: “nuts and bolts” view
protocols control sending,
receiving of msgs
►
e.g., TCP, IP, HTTP, FTP, PPP
Internet: “network of
router
server
workstation
mobile
local ISP
networks”
►
►
loosely hierarchical
public Internet versus
private intranet
Internet standards
► RFC: Request for comments
► IETF: Internet Engineering
Task Force
regional ISP
company
network
Introduction
1-9
What’s the Internet: a service view
communication
infrastructure enables
distributed applications:
►
Web, email, games, ecommerce, database.,
voting, file (MP3) sharing
communication services
provided to apps:
►
►
connectionless
connection-oriented
cyberspace [Gibson]:
“a consensual hallucination experienced daily by
billions of operators, in every nation, ...."
Introduction
1-10
Uses of Internet
•
•
•
•
Business Applications
Home Applications
Mobile Users
Social Issues
Introduction
1-11
Business Applications of Networks
A network with two clients and one server.
Introduction
1-12
Business Applications of Networks (2)
The client-server model involves requests
and replies.
Introduction
1-13
Home Network Applications
Access to remote information
Person-to-person communication
Interactive entertainment
Electronic commerce
Introduction
1-14
Home Network Applications (2)
In peer-to-peer system there are no fixed
clients and servers.
Introduction
1-15
Home Network Applications (3)
Some forms of e-commerce.
Introduction
1-16
Mobile Network Users
Combinations of wireless networks and
mobile computing.
Introduction
1-17
Classification of Networks
Classification of interconnected
processors by scale.
Introduction
1-18
Example Networks
The Internet
Connection-Oriented Networks:
X.25, Frame Relay, and ATM
Ethernet
Wireless LANs: 802:11 (WiFi)
Introduction
1-19
Network Perspective
Network users: services that their
applications need, e.g., guarantee that each
message it sends will be delivered without
error within a certain amount of time
Network designers: cost-effective design
e.g., that network resources are efficiently
utilized and fairly allocated to different
users
Network providers: system that is easy to
administer and manage e.g., that faults can
be easily isolated and it is easy to account
for usage
Introduction
1-20
Connectivity
Building Blocks
► links: coax cable, optical fiber...
► nodes: general-purpose workstations...
Direct Links
► point-to-point
► multiple
access
Introduction
1-21
Switched Networks
A network can be defined recursively as:
► two
or more nodes connected
by a physical link,
► or
by two or more networks
connected by one
or more nodes
Internetworks
Internet vs internet
Introduction
1-22
A closer look at network structure:
network edge:
applications and hosts
network core:
► routers
► network
of networks
access networks,
physical media:
communication links
Introduction
1-23
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.3 Network core
1.4 Network access and physical media
1.5 Internet structure and ISPs
1.6 Protocol layers, service models
1.7 Delay & loss in packet-switched networks
1.8 History
Introduction
1-24
The network edge:
end systems (hosts):
►
►
►
run application programs
e.g. Web, email
at “edge of network”
client/server model
►
►
client host requests, receives
service from always-on server
e.g. Web browser/server;
email client/server
peer-peer model:
►
►
minimal (or no) use of
dedicated servers
e.g. Gnutella, KaZaA
Introduction
1-25
Network edge: connection-oriented service
Goal: data transfer
between end systems
handshaking: setup
(prepare for) data
transfer ahead of time
►
►
Hello, hello back human
protocol
set up “state” in two
communicating hosts
TCP - Transmission
Control Protocol
►
Internet’s connectionoriented service
TCP service [RFC 793]
reliable, in-order bytestream data transfer
►
flow control:
►
loss: acknowledgements
and retransmissions
sender won’t overwhelm
receiver
congestion control:
►
senders “slow down sending
rate” when network
congested
Introduction
1-26
Network edge: connectionless service
Goal: data transfer
between end systems
►
same as before!
UDP - User Datagram
Protocol [RFC 768]:
Internet’s
connectionless service
► unreliable data
transfer
► no flow control
► no congestion control
App’s using TCP:
HTTP (Web), FTP (file
transfer), Telnet
(remote login), SMTP
(email)
App’s using UDP:
streaming media,
teleconferencing, DNS,
Internet telephony
Introduction
1-27
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.3 Network core
1.4 Network access and physical media
1.5 Internet structure and ISPs
1.6 Protocol layers, service models
1.7 Delay & loss in packet-switched networks
1.8 History
Introduction
1-28
The Network Core
mesh of interconnected
routers
the fundamental
question: how is data
transferred through net?
► circuit switching:
dedicated circuit per
call: telephone net
► packet-switching: data
sent thru net in
discrete “chunks”
Introduction
1-29
Switching Strategies
Circuit switching: dedicated circuit;
send/receive a bit stream
► original
telephone network
Packet switching: store-and-forward;
send/receive messages (packets)
► Internet
Introduction
1-30
Switching Strategies
(a) Circuit switching
(b) Message switching
(c) Packet
switching
Introduction
1-31
Nodal delay
dnodal dproc dqueue dtrans dprop
dproc = processing delay
► typically a few microsecs or less
dqueue = queuing delay
► depends on congestion
dtrans = transmission delay
► = L/R, significant for low-speed links
dprop = propagation delay
► a few microsecs to hundreds of msecs
Introduction
1-32
Packet switching versus circuit switching
Is packet switching a “slam dunk winner?”
Great for bursty data
► resource
sharing
► simpler, no call setup
Excessive congestion: packet delay and loss
► protocols needed for reliable data transfer,
congestion control
Q: How to provide circuit-like behavior?
► bandwidth guarantees needed for audio/video apps
► still an unsolved problem (chapter 6)
Introduction
1-33
Packet-switching: store-and-forward
L
R
Takes L/R seconds to
R
transmit (push out)
packet of L bits on to
link or R bps
Entire packet must
arrive at router before
it can be transmitted
on next link: store and
R
Example:
L = 7.5 Mbits
R = 1.5 Mbps
delay = 3x 5 sec = 15 sec
forward
delay = 3L/R
Introduction
1-34
Packet Switching: Message Segmenting
Now break up the message
into 5000 packets
Each packet 1,500 bits
1 msec to transmit
packet on one link
pipelining: each link
works in parallel
Delay reduced from 15
sec to 5.002 sec
Introduction
1-35
Packet Switching: Message Segmenting
L
R
R
R
R
Now assume the message/packets go through 2
additional switches (over the path of 4 switches)
What is the total delay to send the message without
breaking into packets (i.e. non-pipelining) ?
What is the total delay to send the message as 5000
packets (i.e. pipelining) ?
Introduction
1-36
Q 1.1 Peer Instruction packet switching
Now assume the message/packets go through 2
additional switches (over the path of 4 switches)
What is the total delay to send the message
as 5000 packets (i.e. pipelining) ?
Answer:
(A) 25 s (B) 15 s (C) 5.002 s
(E) None of the above
(D) 5.004 s
Introduction
1-37
Q 1.1 Peer Instruction packet switching
Now assume the message/packets go through 2
additional switches (over the path of 4 switches)
What is the total delay to send the message
as 5000 packets (i.e. pipelining) ?
Answer:
(A) 25 s (B) 15 s (C) 5.002 s
(E) None of the above
(D) 5.004 s
Introduction
1-38
Packet-switched networks: forwarding
Goal: move packets through routers from source to
destination
►
we’ll study several path selection (i.e. routing)algorithms
(chapter 4)
datagram network:
► destination address in packet determines next hop
► routes may change during session
► analogy: driving, asking directions
virtual circuit network:
► each packet carries tag (virtual circuit ID), tag
determines next hop
► fixed path determined at call setup time, remains fixed
thru call
► routers maintain per-call state
Introduction
1-39
Addressing and Routing
Address: byte-string that identifies a
node
► usually
unique
Routing: how to forward messages
towards the destination node based on its
address
Types of addresses
► unicast: node-specific
► broadcast: all nodes on the network
► multicast: some subset of nodes on the
network
Introduction
1-40
Multiplexing
Time-Division Multiplexing (TDM)
Frequency-Division Multiplexing (FDM)
L1
R1
L2
R2
L3
Switch 1
Switch 2
R3
Introduction
1-41
Circuit Switching: FDMA and TDMA
Example:
FDMA
4 users
frequency
time
TDMA
frequency
time
Introduction
1-42
Time Division Multiplexing (T1 Carrier)
The T1 carrier (1.544 Mbps).
(1 bit + 24 slots * 8 bits/slot) * 8000 frames/s
= 193 bits/frame * 8000 frames/s = 1.544 Mbps
Introduction
1-43
Peer Instruction 1.1 – T1 TDM
Question
How long does it take to send a file of 640,000 bits
from host A to host B over a (sub)channel (a circuit) in
a T1 TDM based circuit-switched network?
►
►
►
Overall T1 TDM carrier capacity is 1.536 Mbps
Data transmission uses one of the 24 slots of the T1 carrier
500 msec to establish end-to-end circuit
Work it out!
(A) 510 ms (B) 1500 ms (C) 2.5 s (D) 10.5 s
(E) None of the above
Introduction
1-44
1.1 Peer Instruction – T1 TDM
Answer
How long does it take to send a file of 640,000 bits
from host A to host B over a (sub)channel (a circuit) in
a T1 TDM based circuit-switched network?
►
►
►
Overall TDM channel capacity is 1.536 Mbps (T1: 1.544 Mbps
with 8Kbps framing)
Data transmission uses one of the 24 slots of the TDM channel
500 msec = 0.5s to establish end-to-end circuit
Answer: Each circuit= 1.536Mbps/24 = 64Kbps
Tx(file) = 640Kb/64Kbps = 10s plus Tsetup
(A) 510 ms (B) 1500 ms (C) 2.5 s (D) 10.5 s
(E) None of the above
Introduction
1-45
Peer Instruction 1.1 – T1 TDM
Question
How long does it take to send a file of 640,000 bits
from host A to host B over 5 (sub)channels (circuits) in
a T1 TDM based circuit-switched network?
►
►
►
Overall T1 TDM carrier capacity is 1.536 Mbps
Data transmission uses one of the 24 slots of the T1 carrier
500 msec to establish end-to-end circuit
Work it out!
(A) 510 ms (B) 1500 ms (C) 2.5 s (D) 10.5 s
(E) None of the above
Introduction
1-46
1.1 Peer Instruction – T1 TDM
Answer
How long does it take to send a file of 640,000 bits
from host A to host B over 5 (sub)channel (circuits) in
a T1 TDM based circuit-switched network?
►
►
►
Overall TDM channel capacity is 1.536 Mbps (T1: 1.544 Mbps
with 8Kbps framing)
Data transmission uses one of the 24 slots of the TDM channel
500 msec = 0.5s to establish end-to-end circuit
Answer: Each circuit= 1.536Mbps/24 = 64Kbps
Tx(file) = 640Kb/(5x64Kbps) = 2s plus Tsetup
(A) 510 ms (B) 1500 ms (C) 2.5 s (D) 10.5 s
(E) None of the above
Introduction
1-47
Statistical Multiplexing (ATDM)
On-demand time-division, rather than fixed (STDM)
Schedule link on a per-packet basis
Packets from different sources interleaved on link
Buffer packets that are contending for the link
Packet queue may be processed FIFO
Buffer (queue) overflow is called congestion
ATDM or Concentrator
…
Introduction
1-48
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.3 Network core
1.4 Network access and physical media
1.5 Internet structure and ISPs
1.6 Protocol layers, service models
1.7 Delay & loss in packet-switched networks
1.8 History
Introduction
1-49
Protocols
Building blocks of a network
architecture
Each protocol object has two different
interfaces:
► service:
operations on this protocol
► peer-to-peer (protocol): messages
exchanged with peer
Term “protocol” is overloaded
► specification of peer-to-peer interface
► module that implements this interface
Introduction
1-50
Interfaces (Protocol and Service)
Host 1
High-level
object
Protocol
Host 2
SERVICE
interface
PROTOCOL
Peer-to-peer
interface
High-level
object
Protocol
Introduction
1-51
What’s a protocol?
human protocols:
“what’s the time?”
“I have a question”
introductions
… specific msgs sent
… specific actions taken
when msgs received,
or other events
network protocols:
machines rather than
humans
all communication
activity in Internet
governed by protocols
protocols define format,
order of msgs sent and
received among network
entities, and actions
taken on msg
transmission, receipt
Introduction
1-52
What’s a protocol?
a human protocol and a computer network protocol:
Hi
TCP connection
req
Hi
TCP connection
response
Got the
time?
Get http://www.awl.com/kurose-ross
2:00
<file>
time
Q: Other human protocols?
Introduction
1-53
Internet Architecture
Defined by Internet Engineering Task Force
(IETF)
Hourglass Design
Application vs Application Protocol (FTP, HTTP)
FTP
HTTP
NV
TFTP
UDP
TCP
TCP
IP
NET1
NET2
Application
UDP
IP
…
NETn
Network
Introduction
1-54
ISO Architecture
End host
End host
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Network
Network
Data link
Data link
Data link
Data link
Physical
Physical
Physical
Physical
One or more nodes
within the network
Introduction
1-55
Reference Models
The TCP/IP reference model.
Introduction
1-56
Layering
Use abstractions to hide complexity
Abstraction naturally lead to layering
Alternative abstractions at each layer
Application programs
Application programs
Process-to-process
Request/reply Message stream
channel
channel
Host-to-host connectivity
Host-to-host connectivity
Hardware
Hardware
Introduction
1-57
Layering: logical communication
Each layer:
distributed
“entities”
implement
layer functions
at each node
entities
perform
actions,
exchange
messages with
peers
application
transport
network
link
physical
application
transport
network
link
physical
network
link
physical
application
transport
network
link
physical
application
transport
network
link
physical
Introduction
1-58
Layering: logical communication
E.g.: transport
take data from app
add addressing,
reliability check
info to form
“datagram”
send datagram to
peer
wait for peer to
ack receipt
analogy: post
office
data
application
transport
transport
network
link
physical
application
transport
network
link
physical
ack
data
network
link
physical
application
transport
network
link
physical
data
application
transport
transport
network
link
physical
Introduction
1-59
Layering: physical communication
data
application
transport
network
link
physical
application
transport
network
link
physical
network
link
physical
application
transport
network
link
physical
data
application
transport
network
link
physical
Introduction
1-60
Protocol layering and data
Each layer takes data from above
adds header information to create new data unit
passes new data unit to layer below
source
M
Ht M
Hn Ht M
Hl Hn Ht M
application
transport
network
link
physical
destination
application
Ht
transport
Hn Ht
network
Hl Hn Ht
link
physical
M
message
M
segment
M
M
datagram
frame
Introduction
1-61
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.3 Network core
1.4 Network access and physical media
1.5 Internet structure and ISPs
1.6 Protocol layers, service models
1.7 Delay & loss in packet-switched networks
1.8 History
Introduction
1-62
How do loss and delay occur?
packets queue in router buffers
packet arrival rate to link exceeds output link capacity
packets queue, wait for turn
packet being transmitted (delay)
A
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction
1-63
1.2 Peer Instruction - Packet Error Prob
Question
Let p be the bit error probability. Assume
packet of length L bits. What's the packet
error probability in terms of p and L?
(A)
(B)
(C)
(D)
(E)
(1- p) **L
1- p**L
1- p * L
1- (1-p)**L
None of the above
Introduction
1-64
1.2 Peer Instruction - Packet Error Prob
Answer
Let p be the bit error probability. Assume packet of
length L bits. What's the packet error probability in
terms of p and L?
(A) (1- p) **L
(B) 1- p**L
prob (not all bits in error)
(C) 1- p * L
(D) 1- (1-p)**L
(E) None of the above
Answer:
(D)
prob(a bit not in error) = 1-p
prob (L bits not in error) = (1-p)**L
prob(packet error) = prob (not all bits not in error)
= 1- (1-p)**L
Introduction
1-65
What Goes Wrong in the Network?
Bit-level errors (electrical interference) prob=p
Packet-level errors (congestion) = 1-(1-p)f
Link and node failures
Messages are delayed
Messages are delivered out-of-order
Third parties eavesdrop
The key problem is to fill in the gap between what
applications expect and what the underlying
technology provides.
Introduction
1-66
Four sources of packet delay
1. nodal processing:
► check bit errors
► determine output link
2. queueing
► time waiting at output
link for transmission
► depends on congestion
level of router
transmission
A
propagation
B
nodal
processing
queueing
Introduction
1-67
Delay in packet-switched networks
3. Transmission delay:
R=link bandwidth (bps)
L=packet length (bits)
time to send bits into
link = L/R
transmission
A
4. Propagation delay:
d = length of physical link
s = propagation speed in
medium (~2x108 m/sec)
propagation delay = d/s
Note: s and R are very
different quantities!
propagation
B
nodal
processing
queueing
Introduction
1-68
Nodal delay
dnodal dproc dqueue dtrans dprop
dproc = processing delay
► typically a few microsecs or less
dqueue = queuing delay
► depends on congestion
dtrans = transmission delay
► = L/R, significant for low-speed links
dprop = propagation delay
► a few microsecs to hundreds of msecs
Introduction
1-69
Queueing delay (revisited)
R=link bandwidth (bps)
L=packet length (bits)
a=average packet
arrival rate
traffic intensity = La/R
La/R ~ 0: average queueing delay small
La/R -> 1: delays become large
La/R > 1: more “work” arriving than can be
serviced, average delay infinite!
Introduction
1-70
Digression- Simple Queuing Model
Queuing system – general properties:
Arrival rate: λ = a msg/s
Service rate: μ = R/L msg/s
Service time: Ts = L/R = ρ / a
s/msg
Traffic intensity = Utilization factor = ρ = λ / μ = aL / R
Little Formula: N = λ T = a T or T = N/a
N = Nw + Ns
and T = Tw + Ts
M/M/1 Queue Model (M/M/1 is Kendall’ notation):
Can derive:
# in system: N = ρ / (1- ρ)
# waiting in queue: Nw = ρ2 / (1- ρ)
=> Time in system: T = N/a = Ts / (1- ρ) (using Little formula)
= Tw + Ts = N Ts + Ts = (N+1) Ts
Waiting time: Tw = T – Ts = Ts / (1- ρ) - Ts = (1/ (1- ρ) - 1 )Ts
= ρ Ts / (1- ρ)
= N Ts
Introduction
1-71
“Real” Internet delays and routes
What do “real” Internet delay & loss look like?
Traceroute program: provides delay
measurement from source to router along end-end
Internet path towards destination. For all i:
►
►
►
sends three packets that will reach router i on path
towards destination
router i will return packets to sender
sender times interval between transmission and reply.
3 probes
3 probes
3 probes
Introduction
1-72
“Real” Internet delays and routes
traceroute: gaia.cs.umass.edu to www.eurecom.fr
Three delay measements from
gaia.cs.umass.edu to cs-gw.cs.umass.edu
1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms
2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms
3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms
4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms
5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms
6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms
7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms trans-oceanic
8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms
link
9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms
10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms
11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms
12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms
13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms
14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms
15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms
16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms
17 * * *
* means no reponse (probe lost, router not replying)
18 * * *
19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms
Introduction
1-73
Packet loss
queue (aka buffer) preceding link in buffer
has finite capacity
when packet arrives to full queue, packet is
dropped (aka lost)
lost packet may be retransmitted by
previous node, by source end system, or
not retransmitted at all
Introduction
1-74
Performance Metrics
Bandwidth (throughput) (a)
► data transmitted per time unit
► link versus end-to-end
► notation
KB = 210 bytes
(b)
6
Mbps = 10 bits per second
1 second
1 second
Latency (delay)
► time to send message from point A to point B
► one-way versus round-trip time (RTT)
► components
Latency = Propagation + Transmit + Queue
Propagation = Distance / c (c=3, 2.3, 2x10**8 m/s)
Transmit = Size / Bandwidth
Introduction
1-75
Bandwidth versus Latency
Relative importance
► 1-byte: 1ms vs 100ms dominates 1Mbps vs 100Mbps
► 25MB: 1Mbps vs 100Mbps dominates 1ms vs 100ms
Infinite bandwidth
► RTT dominates
Throughput = TransferSize / TransferTime
TransferTime = RTT + TransferSize / Bandwidth
► 1-GB file to 1-Gbps link as 1-MB packet to 1-Mbps
link
Introduction
1-76
Delay x Bandwidth Product
Amount of data “in flight” or “in the pipe”
Example: 100ms x 45Mbps = 560KB
Delay
Bandwidth
Introduction
1-77
ITU
Main sectors
•
•
•
Radiocommunications
Telecommunications Standardization
Development
Classes of Members
•
•
•
•
National governments
Sector members
Associate members
Regulatory agencies
Introduction
1-78
IEEE 802 Standards
The 802 working groups. The important ones are marked with *. The
ones marked with are hibernating. The one marked with
† gave up.
Introduction
1-79
Bad Timing
The apocalypse of the two elephants.
Introduction
1-80
Chapter 1: roadmap
1.1 What is the Internet?
1.2 Network edge
1.3 Network core
1.4 Network access and physical media
1.5 Internet structure and ISPs
1.6 Protocol layers, service models
1.7 Delay & loss in packet-switched networks
1.8 History
Introduction
1-81
Internet History
1961-1972: Early packet-switching principles
1961: Kleinrock - queueing
theory shows
effectiveness of packetswitching
1964: Baran - packetswitching in military nets
1967: ARPAnet conceived
by Advanced Research
Projects Agency
1969: first ARPAnet node
operational
1972:
►
►
►
►
ARPAnet demonstrated
publicly
NCP (Network Control
Protocol) first hosthost protocol
first e-mail program
ARPAnet has 15 nodes
Introduction
1-82
Internet History
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite
network in Hawaii
1973: Metcalfe’s PhD thesis
proposes Ethernet
1974: Cerf and Kahn architecture for
interconnecting networks
late70’s: proprietary
architectures: DECnet, SNA,
XNA
late 70’s: switching fixed
length packets (ATM
precursor)
1979: ARPAnet has 200 nodes
Cerf and Kahn’s
internetworking principles:
► minimalism, autonomy no internal changes
required to
interconnect networks
► best effort service
model
► stateless routers
► decentralized control
define today’s Internet
architecture
Introduction
1-83
Internet History
1980-1990: new protocols, a proliferation of networks
1983: deployment of
TCP/IP
1982: SMTP e-mail
protocol defined
1983: DNS defined
for name-to-IPaddress translation
1985: FTP protocol
defined
1988: TCP congestion
control
new national networks:
Csnet, BITnet,
NSFnet, Minitel
100,000 hosts
connected to
confederation of
networks
Introduction
1-84
Internet History
1990, 2000’s: commercialization, the Web, new apps
Early 1990’s: ARPAnet
decommissioned
1991: NSF lifts restrictions on
commercial use of NSFnet
(decommissioned, 1995)
early 1990s: Web
► hypertext [Bush 1945, Nelson
1960’s]
► HTML, HTTP: Berners-Lee
► 1994: Mosaic, later Netscape
► late 1990’s:
commercialization of the Web
Late 1990’s – 2000’s:
more killer apps: instant
messaging, peer2peer
file sharing (e.g.,
Naptser)
network security to
forefront
est. 100 million host,
500 million+ users
backbone links running
at Gbps
Introduction
1-85