Lec 4 Computer Network
Lec 4 Computer Network
Thebes Academy
B
packets in buffers (queueing delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Packet delay: four sources
transmission
A propagation
B
nodal
processing queueing
B
nodal
processing queueing
3 probes 3 probes
3 probes
Packet loss
▪ queue (aka buffer) preceding link in buffer has finite capacity
▪ packet arriving to full queue dropped (aka lost)
▪ lost packet may be retransmitted by previous node, by source end
system, or not at all
buffer
(waiting area) packet being transmitted
A
B
packet arriving to
full buffer is lost
* Check out the Java applet for an interactive animation (on publisher’s website) of queuing and loss
Throughput
▪ throughput: rate (bits/time unit) at which bits are being sent from
sender to receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
link capacity
pipe that can carry linkthat
pipe capacity
can carry
Rsfluid
bits/sec
at rate Rfluid
c bits/sec
at rate
serverserver,
sends with
bits
(fluid) into pipe (Rs bits/sec) (Rc bits/sec)
file of F bits
to send to client
Throughput
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Throughput: network scenario
▪ per-connection end-end
Rs throughput: min(Rc,Rs,R/10)
Rs Rs
R
▪ in practice: Rc or Rs is often
Rc Rc bottleneck
Rc
10 connections (fairly) share backbone * Check out the online interactive exercises for more examples:
http://gaia.cs.umass.edu/kurose_ross/
bottleneck link R bits/sec
Chapter 1: roadmap
A C
A C
B
Bad guys: denial of service
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic
1. select target
2. break into hosts
around the network
(see botnet)
3. send packets to target target
from compromised
hosts
Lines of defense:
▪ authentication: proving you are who you say you are
• cellular networks provides hardware identity via SIM card; no such
hardware assist in traditional Internet
▪ confidentiality: via encryption
▪ integrity checks: digital signatures prevent/detect tampering
▪ access restrictions: password-protected VPNs
▪ firewalls: specialized “middleboxes” in access and core
networks:
▪ off-by-default: filter incoming packets to restrict senders, receivers,
applications
▪ detecting/reacting to DOS attacks
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Services, Layering and Encapsulation
M
application Application exchanges messages to implement some application
application service using services of transport layer
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) transport
from one process to another, using services of
network layer
network ▪ transport-layer protocol encapsulates network
application-layer message, M, with
link transport layer-layer header Ht to link
create a transport-layer segment
• Ht used by transport layer protocol
physical to implement its service physical
source destination
Services, Layering and Encapsulation
M
application application
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) transport
from one process to another, using services of
network layer
network Hn Ht M network
Network-layer protocol transfers transport-layer
segment [Ht | M] from one host to another, using link
link layer services link
▪ network-layer protocol encapsulates
transport-layer segment [Ht | M] with
physical network layer-layer header Hn to physical
create a network-layer datagram
source • Hn used by network layer protocol destination
to implement its service
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
network Hn Ht M network
Network-layer protocol transfers transport-layer
segment [Ht | M] from one host to another, using link
link H Hlayer
l H services
n M t link
Link-layer protocol transfers datagram [Hn| [Ht |M]
from host to neighboring host, using network-layer
physical services physical
▪ link-layer protocol encapsulates
network datagram [Hn| [Ht |M], with
source link-layer header Hl to create a link- destination
layer frame
Encapsulation
Matryoshka dolls (stacking dolls)
Credit: https://dribbble.com/shots/7182188-Babushka-Boi
Services, Layering and Encapsulation
physical physical
source destination
Chapter 1: roadmap
link Hl Hn Ht M Hl Hn Ht M link
frame
physical physical
source destination
Wireshark
application
(www browser,
packet
email client)
analyzer
application
OS
packet Transport (TCP/UDP)
Network (IP)
capture copy of all
Ethernet frames Link (Ethernet)
(pcap) sent/received
Physical