ppt - Oklahoma State University

Download Report

Transcript ppt - Oklahoma State University

ECEN5553 Telecom Systems
Dr. George Scheets Week #5
Read
[9a] "The Cognitive Net is Coming"
[8b] "How Can the Internet Have Too Many Routes and Not Enough
Addresses?"
[10a] "Cybercrime: Dissecting the State of Underground Enterprise"
[10b] "A Call to Cyber Arms"
[11a] "The Complete Story of Phish"
[11b] "Target Breach Happened Because of a Basic
Network Segmentation Error"
[11c] "Sony Hack Dubbed 'Unparalleled' Crime"
Exam #1 Lecture 15, 21 September (Live)
No later than 28 September (Remote DL)
Outline 7 October 2015, Lecture 22 (Live)
No later than 14 October (Remote DL)
Outlines
Received
due 7 October (local)
14 October (remote)
12 %
Exam #1 (90 points)







Friday, 21 September (Local)
Remote Distant Learners, no later than 28 September
Work 3 of 4 pages
Closed Book & Notes
Calculators & phones are NOT allowed
...Set up numerical problem for full credit
Most equations are provided (on 5th page)
Approximately 40% of upcoming exam will be lifted from
the Fall 2014 Exam #1
Anything in the notes, on Power Point, or in reading
assignments is fair game
On Short Answer or Essay Questions


Answer the Question!
Memory Dump in the space provided
 Knowledgeable
individual can write more
 Grader will look for "Power Point bullets"
 Same remarks as instructor's typically not required

To get "A" or "B", instructor needs to walk away
with impression you could've said more
 Got
space? Anything else pertinent to add?
 It is NOT necessary to write small or fill up allotted space
to get a good score!
 Lost points? No comments? → Insufficient info provided
 Rule of Thumb: "X" point question needs > "X" facts
Wireshark Packet Capture

This interaction startedwith a click on a Firefox bookmark to a distance calculator from a
computer in Engineering South at OSU Stillwater. Firefox then triggers a query to an OSU
Domain Name Server asking for the IPv4 address of www.indo.com. This is next followed by
a TCP 3 way handshake to open logical connections, an HTTP request to download the
distance calculator page, and the beginning of the file transfer.
ISO OSI Seven Layer Model
MSS = 1460 B =
Size of Layer 6 & 7 info per packet
Layer 7
 Layer 6
 Layer 5
 Layer 4
 Layer 3
 Layer 2
 Layer 1

Application
Presentation
Session
Transport
Network
Data Link
Physical
Windows API
Windows TCP
Windows TCP
Windows IP
PC NIC
Ethernet
Payload = 1500 B
PC NIC
TCP Window Size (Layer 4)
Effects End-to-End Throughput

Suppose
 Window
Size (set by PC) = 64 KB
 Microsoft
Windows XP
 Maximum
Segment Size = 1 KB
 Server can send < 64 unACK'd packets
PC
Server
3,000 Km
Throughput on 64 Kbps Line
Packet #1
PC
Server
3,000 Km, 64 Kbps line

NPD = Prop Delay / Packet inject time
 Prop
Delay = distance / EM energy speed
= 3,000,000 m / 200,000,000 m/sec
= 0.015 seconds
 Packet inject time = 8,376 bits / 64 Kbits/sec
= 0.1309 seconds (7B PPP, 20B IPv4, 20B TCP)
 NPD = 0.015 / 0.1309 = 0.1146
 Front end of packet arrives at far side prior to
back end being transmitted.
Throughput on 64 Kbps Line
#1
PC
Packet #2
Server
#1 ACK
3,000 Km, 64 Kbps line

At this instant in time...
 2nd
unACK'd packet is being transmitted
 ACK for #1 enroute back to server
 TCP+IP+Layer
2 → 47 bytes if PPP
 When
ACK#1 arrives at server,
only packet #2 is unacknowledged.

Will 64 packet unACK'd limit be reached?
 No.
At most, 1 packet likely unACK'd.
Throughput on 45 Mbps Line
#3 #2 #1
Server
PC
3,000 Km, 45 Mbps line

NPD = Prop Delay / Packet inject time
 Prop
Delay = distance / EM energy speed
= 3,000,000 m / 200,000,000 m/sec
= 0.015 seconds
 Packet inject time = 8,376 bits / 45 Mbits/sec
= 186.1 μseconds (PPP, IPv4, TCP overhead)
 NPD = 0.015 / 0.0001861 = 80.60
 80.60 average sized packets will fit back-to-back
on this line
Throughput on 45 Mbps Line
Packets 1 - 64
PC
Server
3,000 Km, 45 Mbps line

At this instant in time, the Server...
 Has
transmitted 64 packets w/o ACK.
 Has hit window limit. Halts.
Throughput on 45 Mbps Line
Packets 2 - 64
#1
PC
Server
ACK#1
3,000 Km, 45 Mbps line

At this instant in time,
 The
PC has processed 1st packet & sent an ACK
 The Server is still halted, waiting for ACK #1.
 When
ACK #1 arrives, server can then transmit one
additional packet.
 Other ACK’s arrive fast enough to allow back-toback transmission of next group of 64 packets
Can Estimate Throughput with a Time Line
to = 0
 to:




t1
t2
t3
time
Leading edge of 1st packet injected
t1: Trailing edge of 64th packet injected
 t1 = (64*1047B)(8b/B)/(45 Mb/sec) = 11.91 msec
t2: Leading edge of 1st packet hits far side
 15 msec (propagation delay)
 If ACK injected right away...
t3: ...ACK arrives at server at t = 30 msec
Process Repeats...
Can Estimate Throughput with a Time Line
to = 0

11.91 15.00
30.00
time (msec)
This system can transmit
 64(1,047)
= 67,008 B = 536,064 bits
 Every 30 msec (one round trip time)
 Estimated throughput = 536,064/0.03 = 17.89 Mbps

Actual throughput a bit lower
 1st
ACK not transmitted until packet #1 fully received...
 ... and processed by PC
 65th packet not transmitted until ACK #1 fully received...
 ... and processed by Server
Can Estimate Throughput with a Time Line
to = 0

11.91 15.00
30.00
time (msec)
Need to be able to fill the pipe for 1 RTT
 30
msec in our example
 45 Mbps * .030 sec = 1.35 M b = 168,750 B
= 168,750/1,047 = 161.2 packets
 Window Size needs to be =
161.2 segments*1,000 bytes/segment = 161,200 B

Actually would need another segment or two to
cover source & sink processing
TCP Header
4 Bytes
Source Port
Destination Port
Sequence Number
ACK Number
Window
Checksum
UDP Header (8 Bytes)
4 Bytes
Source Port
Destination Port
Checksum
For interactive real-time traffic, usually used
with Real Time Transport Protocol (12 bytes).
Virtual Circuits

Routing decisions made once when
circuit is set up
 Concerned
switches have internal
Look-Up tables updated
All packets part of info transfer follow
the same path
 Allows option of setting aside switch
resources (buffer space, bandwidth) for
specific traffic flows
 MPLS, Frame Relay, ATM, & Carrier
Ethernet use VC’s

Datagrams
IP uses Datagrams
 Routing Tables updated independently of
individual traffic flows

 Routers
continuously talking with each other
 Packets may follow different paths

Routers get no advance warning of
specific packet flows.
IP is Connectionless
20
IP
20
TCP
up to 1,460
Data + Padding
I/O decisions based on IP address & look-up table.
Tables updated independent of traffic, hence path
thru network may suddenly change.
TCP is connection oriented.
TCP, UDP, and IP
30+ year old Protocols
Designed for data
One Utilized Priority & “Best Effort” services
No QoS Guarantees
Available bandwidth depends on other
users
 TCP (Layer 4 & 5) provides reliable transfer
 UDP (Layer 4 & 5) unreliable transfer
 IP at Layer 3
 Arbitrary Protocols at Layers 1 & 2

source: http://www.sandvine.coms
Internet
Traffic
2008 - 2009
Comparison
Fixed Access Internet Traffic Profile
2013
Source: www.sandvine.com/downloads/documents/Phenomena_2H_2012/ Sandvine_Global_Internet_Phenomena_Snapshot_2H_2012_NA_Fixed.pdf
& www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf
2015 Fixed Access
https://www.sandvine.com/downloads/general/global-internet-phenomena/2015/global-internet-phenomena-report-latin-america-andnorth-america.pdf
2012 Mobile Access Internet Traffic Profile
http://www.sandvine.com/downloads/documents/Phenomena_2H_2012/
Sandvine_Global_Internet_Phenomena_Snapshot_2H_2012_NA_Mobile.pdf
2013 Mobile Access Internet Traffic Profile
source: www.sandvine.com/downloads/general/global-internet-phenomena/2014/1h-2014-global-internet-phenomena-report.pdf
2015 Mobile Access
https://www.sandvine.com/downloads/general/global-internet-phenomena/2015/global-internet-phenomena-report-latin-america-andnorth-america.pdf
Internet Traffic Growth
source: "The Road to 100G Deployment", IEEE Communications Magazine, March 2010
Internet Traffic Growth
source: www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/VNI_Hyperconnectivity_WP.html
Combining the
Figures
VoIP
 PC
to PC
 Internet Phone to Internet Phone
Commodity
Internet
VoIP
 PC
to Wired Phone
 Internet Phone to Wired Phone
Gateway
Commodity
Internet
Phone
System
VoIP (Wired Phone-to-Wired Phone)
 Carrier
prioritizes VoIP traffic (DiffServ)
 Paths nailed down (MPLS)
 Gateways control # of voice calls
 Good Quality Possible with this configuration
Gateway
Gateway
Phone
System
Phone
System
"QoS Enabled"
Internet
Traditional Videoconferencing
384 Kbps fixed
rate output
(video + audio)
Camera
Codec
Audio
Video
Codec
Dedicated Bandwidth
Network:
Circuit Switched TDM
6 Bytes @ 8000 times/sec
*State Owned Fiber
*ISDN
2002 Videoconferencing V2.0
384 Kbps fixed
rate output
(video + audio)
Now > 784 Kbps
Camera
Codec
Packet Switched
StatMuxed
Prioritized
*State Owned Fiber
Audio
Video
Codec
This is technique being
used in this class for
video to & from Tulsa &
Stillwater.
Internet Video Streaming
The Internet
Quality of
Received Stream
depends on:
(1) Size of your
pipe.
(2) Internet
congestion.
PC
(3) Server
congestion.
Disk Drive
Internet Video Streaming
Disk Drive
Stillwater
Video Server
generates
packets.
Fairly steady generation if server not swamped.
Rate depends on pipe size.
Internet Video Streaming
Internet
Video Server
Packets exit at an irregular rate.
Random delays.
Non-Dedicated Bandwidth
(Packet Switched, Stat Muxing)
Disk Drive
ISP Routes can be Roundabout
Launched 30 January 2007, 2 miles from OSU campus
 1 Dr. Scheets' home router
 6 SBC routers
 adsl-70-233-191-254.dsl.okcyok.sbcglobal.net
 ex2-p11-0.eqchil.sbcglobal.net
Using DiffServe,
End-to-End
 7 Level3 routers
performance on
 Te-3-2.Chicago1.Level3.net
this 22 router
 kscymo2wcx010-pos9-0-oc48.wcg.net
path ...
 tulsok6wcx2-pos11-0-oc48.wcg.net
 5 ONENET routers
 at least 1 in Oklahoma City
 3 Oklahoma State routers
ISP Routes can be Roundabout
Launched 5 September 2008, 2 miles from OSU campus
 1 Scheets' home router
 4 SBC routers
 adsl-70-233-191-254.dsl.okcyok.sbcglobal.net
 bb1-g1-0-2.rcfril.sbcglobal.net
 1 Equinix router
 1 Transitrail router
...may be worse
 onenet.chcgil01.transitrail.net
than End-to-End
 3 ONENET routers
performance on
 at least 1 in Oklahoma City
this 14 router
path when not
 4 Oklahoma State routers
using DiffServ.
 rtt = 55 msec
Internet Service Provider Network
LAN
PC
Router
Corporate sites using Internet as WAN.
Can pay ISP extra $$ →
Traffic between sites gets preferential treatment.
LAN
PC
Interactive VOICE & VIDEO
over the commodity INTERNET
(Best Effort, No Priorities)
Is not ready for Prime Time
 Delay & Quality problems difficult to
solve under the current system...
 ...although throwing Bandwidth at the
problem will alleviate
 Has a place for the user whose main
concern is $$$$ or convenience

Internet Service Provider Network
LAN
PC
Router
Routers operate at Layers 1-3.
PC’s operate at Layers 1-7.
Routers do not monitor opening of TCP
Logical Connections. RSVP would change this.
LAN
PC
Multi-Protocol
Label Switching

Enables Virtual Circuits
 End-to-End
Paths nailed down
 Traffic Engineering Easier
 Resource Reservation Easier

Seeing fairly widespread ISP deployment
Internet QoS

Most every ISP is installing or testing one
or more of following...
 DiffServ
 MPLS
 Resource
Reservation capability
 Pricing structure to reflect different QoS
... but they are not yet widely deployed.
 As a result, currently the Commodity
Internet remains mostly
 Best
Effort, FIFO Routing
Thinking of moving large amounts
of high quality, time sensitive
traffic over the
Commodity Internet?
Check back in 2-3 years when...
 Priorities Enabled (IPv6 and/or DiffServ)
 Resources Guaranteed
(Resource Reservation Protocol (RSVP)
or equivalent is deployed)
 Flat rate pricing is gone
The Internet Is...
A
superb information source
 Sometimes
difficult to separate wheat from chaff
 IEEE Communications or Proceedings
 Peer
 IEEE
Reviewed
Spectrum
 Reviewed
 Jane
Doe's Web site
 Reviewed
A
by editor
by Jane Doe
good marketing tool
The Internet Is...
a Security Nightmare
Any-to-Any connectivity is both strength and
weakness
 Tracert yields Router IP Addresses
 Could Telnet or HTTP to many. Password?
 Espionage
 Read “The Cuckoo’s Egg” by Cliff Stoll
 Former #1 on New York Times Best Seller
 Recommended by Dr. Scheets’ Mom

The Internet Is...
a Security Nightmare
 Bad
things have been out there for years
 Viruses,
Worms, Trojans, Denial of Service, etc.
 November
2, 1988 Internet Worm
 Network
shut down for 2-3 days
 Took advantage of
 Unix
buffer overflow problems
 Poor password choices
 2009-2010
 State
Stuxnet Worm
sponsored?
 Seemed to target Iran's nuclear bomb program
The Internet Is...
a Security Nightmare




TCOM5223
Information Assurance Management
TCOM5233
Applied Information Systems Security
TCOM5243
Information Technology Forensics
“Remember, when you connect with another
computer, you're connecting to every computer
that computer has connected to.”
 Dennis
Miller, Saturday Night Live
Pros of Using the Internet
Any-to-Any Connectivity
 It’s Inexpensive (save $$$$)
 Tons of valuable information available
 Excellent marketing/sales tool

Cons of Using the Commodity Internet

Any-to-Any Connectivity
puts all attached machines at risk
WARNING: SECURITY HAZARD!
Slightly higher risk of Theft of Traffic
 Tons of Worthless Information Available
 No QoS guarantees or Guaranteed Bandwidth
May have trouble rapidly moving large files
May have trouble reliably moving time
sensitive traffic

802.3 Ethernet Packet Format
Bytes: 7
1
6
6
MAC
Destination
Address
40
IPv6
20
TCP
2
MAC
Source
Address
6-1440
Data +
Padding
4
CRC
Connectionless vs.
Connection Oriented
Connectionless
* Packet delivery may be out of order
* Packet delivery NOT guaranteed
* Packets may be mangled
* End User’s responsibility to fix any
problems
 Connection Oriented
* Packet delivery in order
* Packet delivery usually guaranteed

IP is Connectionless
20
IP
20
TCP
up to 1,460
Data + Padding
I/O decisions based on IP address & look-up table.
Tables updated independent of traffic.
Wide Area Connectivity Options

Leased Line (a.k.a. Private Line) Network
 Switches
are byte aware
 Circuit is assigned trunk BW via TDM
 BW
 Route
required is based on peak input rates
through system determined in advance.
 Pricing function of distance & peak rate
 Most expensive connectivity option
 Highest quality connectivity option
Leased Line Usage

U.S. Revenues still around
$34 Billion in 2009
 Drop
in Corporate
 Increase in wireless
backhaul

$30 Billion in 2014
 Shift
is to Internet Services
source: Insight Research
Switched Ethernet LAN's
Edge
Router
PC
Switched
Hub
PC
PC
PC
PC
Switched
Hub
Switched
Hub
PC
PC
Ex) Corporate Leased Line Connectivity
Detroit
OKC
Carrier Leased
Line Network
128 Kbps
NYC
Telecom Carriers
dedicate 320, 128, and 256 Kbps links for
our sole use via Circuit Switching.
Router
Ex) Corporate Leased Line Connectivity
Detroit
384 Kbps
Carrier Leased
Line Network
OKC
320 Kbps
From/To
OKC
DET
NYC
OKC
-
144
76
DET
88
-
28
NYC
112
34
-
NYC
Router
How will company connect to Internet?

Configuration
 Every
site connect locally?
 All sites connect thru, say, OKC?

Type of connection
 Leased
Line
 DSL?
 Cable
Modem?
 Other?
Ex) Internet thru OKC
Detroit
ISP
OKC
Carrier Leased
Line Network
NYC
Traffic matrix should expand to include
ISP. Faster line speeds likely required.
Router
Ex) Internet thru OKC
Detroit
ISP
640 Kbps
OKC
From\To OKC
Carrier Leased
Line Network
DET NYC ISP
OKC
-
144
76
60
DET
88
-
28
50
NYC
112
34
-
40
ISP
110
100
90
-
NYC
Router
How big should the pipe
to the ISP be?
300 Kbps is outbound from ISP
> 640 Kbps circuit needed.
Ex) Internet thru OKC
Detroit
ISP
640 Kbps
OKC
From\To OKC DET
OKC
-
144
Carrier Leased
Line Network
NYC ISP
76
DET
88
-
28
NYC
112
34
-
ISP
110
100
90
NYC
60
Router
50
Need to bump size of other
40 2 pipes.
194/186 I/O @ NYC → 448 Kbps
278/166 I/O @ DET → 576 Kbps