Lecture 01 Part03
Lecture 01 Part03
frequency
• optical, electromagnetic frequencies
divided into (narrow) frequency bands
frequency
time divided into slots
each call allocated periodic slot(s),
can transmit at maximum rate of time
(wider) frequency band (only) during
its time slot(s)
For FDM, the frequency domain is segmented For TDM, the time domain is segmented into frames, with four
into four bands, each of bandwidth 4 kHz. time slots in each frame; each circuit is assigned the same
dedicated slot in the revolving TDM frames
All links in the network use TDM with 24 slots and have a bit rate of 1.536 Mbps.
The time required to establish an end-to-end circuit before Host A can begin to transmit the file is 500 msec.
To this 10 seconds we add the circuit establishment time, giving 10.5 seconds to send
the file.
Note that the transmission time is independent of the number of links: The transmission time
would be 10 seconds if the end-to-end circuit passed through one link or a hundred links.
How do packet delay and loss occur?
• packets queue in router buffers, waiting for turn for transmission
queue length grows when arrival rate to link (temporarily) exceeds output link
capacity
packet loss occurs when memory to hold queued packets fills up
packet being transmitted (transmission delay)
B
packets in buffers (queueing delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
The time required to examine the packet’s header and
Packet delay: four sources determine where to direct the packet is part of the
processing delay
transmission
A propagation
B
nodal
processing queueing
B
nodal
processing queueing
B
packet arriving to
full buffer is lost
Throughput
throughput: rate (bits/time unit) at which bits are being sent from
sender to receiver
• instantaneous: rate at given point in time
• average: rate over longer period of time
link capacity
pipe that can carry linkthat
pipe capacity
can carry
serverserver,
sends with
bits Rsfluid at rate
bits/sec Rfluid
c
at rate
bits/sec
(fluid)
fileinto
of Fpipe
bits (Rs bits/sec) (Rc bits/sec)
to send to client
Throughput
Rs < Rc What is average end-end throughput?
Rs bits/sec Rc bits/sec
Rs bits/sec Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Throughput: network scenario
per-connection end-end
Rs throughput:
Rs Rs min(Rc,Rs,R/10)
in practice: Rc or Rs is
R
often bottleneck
Rc Rc
Rc
• a series of steps
Layering of airline functionality
airplane routing airplane routing airplane routing airplane routing airplane routing
source destination
Services, Layering and Encapsulation
M
application application
Ht M
transport Transport-layer protocol transfers M (e.g., reliably) from transport
one process to another, using services of network layer
Hn Ht M
network Network-layer protocol transfers transport-layer segment
network
[Ht | M] from one host to another, using link layer services
link network-layer protocol encapsulates link
transport-layer segment [Ht | M] with
physical network layer-layer header Hn to create a physical
network-layer datagram
source • Hn used by network layer protocol to destination
implement its service
Introduction: 1-21
Services, Layering and Encapsulation
M
application application
Ht M
transport transport
Hn Ht M
network Network-layer protocol transfers transport-layer segment
network
[Ht | M] from one host to another, using link layer services
Hl Hn Ht
link M
link
Link-layer protocol transfers datagram [Hn| [Ht |M] from
host to neighboring host, using network-layer services
physical link-layer protocol encapsulates network physical
datagram [Hn| [Ht |M], with link-layer header
source Hl to create a link-layer frame destination
Introduction: 1-22
Encapsulation
Matryoshka dolls (stacking dolls)
Introduction: 1-23
Credit: https://dribbble.com/shots/7182188-Babushka-Boi
Services, Layering and Encapsulation
message M
application M application
segment Ht M
transport Ht M
transport
datagram Hn Ht M Hn Ht M
network network
frame Hl Hn Ht M Hl Hn Ht M
link link
physical physical
source destination
Introduction: 1-24
ISO/OSI reference model
• presentation: allow applications
to interpret meaning of data, application
e.g., encryption, compression,
presentation
machine-specific conventions
• session: synchronization, session
checkpointing, recovery of data transport
exchange network
• Internet stack “missing” these link
layers!
• these services, if needed, must be physical
implemented in application
• needed?
message M
source
application
Encapsulation: an
segment
datagram Hn Ht
Htt M
M
transport
network
end-end view
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Introduction: 1-26
message M
source
application
Encapsulation
segment Ht M transport
datagram Hn Ht M network
frame Hl Hn Ht M link
physical
link
physical
switch
destination Hn Ht M network
M application
Hl Hn Ht M link Hn Ht M
Ht M transport physical
Hn Ht M network
Hl Hn Ht M link router
physical
Network security
• Field of network security:
• how bad guys can attack computer networks
• how we can defend networks against attacks
• how to design architectures that are immune to attacks
• Internet not originally designed with (much)
security in mind
• original vision: “a group of mutually trusting users
attached to a transparent network”
• security considerations in all layers!
Bad guys: put malware into hosts via Internet
• malware can get in host from:
• virus: self-replicating infection by receiving/executing
object (e.g., e-mail attachment)
• worm: self-replicating infection by passively receiving
object that gets itself executed
• spyware malware can record keystrokes, web sites
visited, files deletion, upload info to collection site
• , installing spyware which collects private
information, such as passwords
• infected host can be enrolled in botnet, used for
spam. DDoS attacks
Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources (server,
bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic
1. select target
2. break into hosts around the
network (see botnet)
3. send packets to target from
compromised hosts
target
Bad guys can sniff packets
packet “sniffing”:
• broadcast media (shared ethernet, wireless)
• promiscuous network interface reads/records all packets (e.g.,
including passwords!) passing by
A C