• No results found

Kick starting science...

N/A
N/A
Protected

Academic year: 2021

Share "Kick starting science..."

Copied!
18
0
0

Loading.... (view fulltext now)

Full text

(1)

Computer networking (TDDD63): Part 1 …

Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/

Kick starting science ...

What do you have in the future?

What do you have in the future?

(2)

What happens there?

What happens there?

Or maybe more realistically …

Work at company …

How do we build services that are …

Efficient Secure Reliable

Important problem faced every day

by many companies, including …

(3)

In the computer network part we

will look at things such as …

How do we build scalable, efficient,

secure, and reliable services?

How do we communicate with a

machine across the world?

How do we find out who to talk to?

How do we find a path?

How do we

avoid sending too much

for

(4)

What happens at our machine? Inside the

network? Along the path?

What happens at our machine? Inside the

network? Along the path?

So let’s start the lecture …

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

(5)

What’s the Internet: “Nuts and Bolts View”

What’s the Internet: “Service View”

Today’s service/company landscape include ...

1-27

Today’s service/company landscape include ...

1-28

Today’s service/company landscape include ...

1-29

Equipment manufacturers (also sell services and help

Operate networks)

Today’s service/company landscape include ...

1-30

Network operators

Equipment manufacturers (also sell services and help

(6)

Today’s service/company landscape include ...

1-31

Enterprise solutions and network service (e.g., data center solutions and cloud

providers)

Today’s service/company landscape include ...

1-32

Enterprise solutions and network service (e.g., data center solutions and cloud

providers) Content delivery networks

Today’s service/company landscape include ...

1-33

End user services (e.g., web-based social networks, search, communication, and

streaming)

Some common applications today …

World Wide Web (WWW)

Remote login (telnet, rlogin, ssh)

File transfer

Peer-to-peer file sharing

Cloud computing/services

Instant messaging (chat, text messaging, etc.)

Live and video-on-demand streaming

Internet phone (Voice-Over-IP)

Distributed games

34

… and tomorrow

35 The 2020 vision

Everything that can be connected will be connected

50B devices (perhaps more like 500B ...)

IoT and smart cities

Machine-to-machine

High-definition 3D streaming to heterogeneous clients

(7)

… and tomorrow’s

Internet of Things!

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

A Closer Look at Network Structure

(8)

Access Net: Cable Network

Access Net: Home Network

Enterprise Access Networks (Ethernet)

Wireless Access Networks

(9)

Physical Media: Radio

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

The Network Core

Packet-Switching: Store-and-forward

(10)

Internet Structure: Network of Networks

Internet Structure: Network of Networks

Internet Structure: Network of Networks

Internet Structure: Network of Networks

Internet Structure: Network of Networks

Tier 1 ISPs

Internet Structure: Network of Networks

Peering Link - all traffic between two ISPs travels through one direct connection

IXP- 3rd party company sets up an exchange point where multiple ISPs can peer together (about 300 IXPs)

(11)

Internet Structure: Network of Networks

Internet Structure: Network of Networks

Internet Structure: Network of Networks

Google private network bypasses upper tiers by peering with lower tiers

directly

Google has over 50 data centers some with over 100,000 servers, all interconnected via Googles private TCP/IP network

Tier-1 ISP: Sprint

POP: ISP to ISP

connections

Sets of routers in the provider’s network where customer ISPs can connect into provider ISP

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

(12)

What’s a Protocol?

A Human

Protocol

What’s a Protocol?

A Human

Protocol

A Computer

Network Protocol

What's a Protocol?

Protocol “Layers”

Problem Scenario

Web Email Bittorrent

Ethernet 802.11 Bluetooth

VoIP

Cellular

•This is a nightmare scenario

•Huge amounts of work to add new apps or media

•Limits growth and adoption

More Problems

Bittorrent

Ethernet 802.11

Bittorrent

Application endpoints

may not be on the

(13)

Solution: Use Indirection

Web Email Bittorrent

Ethernet 802.11 Bluetooth

VoIP

Cellular

Magical Network Abstraction

Layer

•O(1) work to add new apps, media

•Few limits on new technology

API

API

API

API

Layers, Protocols, Interfaces

Networks organized as a stack of layers

Offer services to the layer above it using a well-defined interface (programming language analogy: libraries hide details while providing a service)

Reduces design complexity

Protocols: Logical “horizontal” conversations at any layer (between peers)

Data Transfer: each layer passes data & control information over the interfaces (between neighboring layers)

Internet Protocol Stack

The Hourglass

76

IPv4 TCP, UDP, ICMP HTTP, FTP, RTP, IMAP, Jabber, …

Ethernet, 802.11x, DOCSIS, … Fiber, Coax, Twisted Pair, Radio, …

Layering: logical communication

application transport network link physical application transport network link

physical application transport network link physical application transport network link physical network link physical

Layering:

logical

communication

application transport network link physical application transport network link

physical application transport network link physical application transport network link physical network link physical data data data transport transport ack

(14)

Layering:

physical

communication

application transport network link physical application transport network link

physical application transport network link physical application transport network link physical network link physical data data

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M message

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M H t

message segment

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M H t

H t

H n

message segment datagram

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H t

H t

H n

H t

H n

H l

message segment datagram

frame

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H t

H t

H n

H t

H n

H l H lH nH t M

message segment datagram

(15)

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H t

H t

H n

H t

H n

H l

M M H t

H n

H t

H n

H l

message segment datagram

frame

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H t

H t

H n

H t

H n

H l

M M M H t

H t

H n

H t

H n

H l

message segment datagram

frame

Encapsulation: Layering and data

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

application transport network link physical application transport network link physical source destination

M M M M H t

H t

H n

H t

H n

H l

M M M M H t

H t

H n

H t

H n

H l

message segment datagram

frame

Encapsulation

Each layer takes data from above

adds header information to create new data unit

passes new data unit to layer below

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

Network Security

 field of network security

 how bad “entities” can attack computer networks  how we can defend networks against attacks  how to design architectures that are immune to

attacks

 Internet not originally designed with (much) security

in mind

original vision: “a group of mutually trusting users attached to a transparent network” 

 Internet protocol designers playing “catch-up”  security considerations in all layers!

(16)

Bad guys/girls/organizations (“entities”):

can put malware into hosts via Internet

 malware can get in host from a virus, worm, or

Trojan horse.

 spyware malware can record keystrokes, web sites

visited, upload info to collection site.

 infected host can be enrolled in botnet, used for

spam and DDoS attacks.

 malware often self-replicating: from one infected

host, seeks entry into other hosts

Introduction 1-91

Denial of Service (DoS): attackers make resources

(server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic

1. select target

2. break into hosts around the network (see botnet)

3. send packets to target from compromised hosts

target

Introduction 1-92

Bad “entities” can attack servers and

network infrastructure

Bad “entities” can “sniff”

A

B C

src:B dest:A payload

Introduction 1-93

Broadcast medium allow packet sniffers (in promiscuous mode) to listen to packets to others

Bad

“entities”

can use false source

addresses

IP spoofing:

send packet with false source address

A

B C

src:B dest:A payload

Introduction 1-94

Bad

“entities”

can record and playback

record-and-playback

: sniff sensitive info (e.g., password), and use later

A

B C

src:B dest:A user: B; password: foo

Introduction 1-95

… AND lots more …

Roadmap

What is the Internet?

Network Edge

End systems, access networks, links

Network Core

Packet switching, network structure

Protocol Layers, service models

Network Security

History

(17)

Internet History

Internet History

Internet History

DNS - Domain Name Server

Internet History

Internet History

1.11 billion users March 2013 2,7 billion users 2013

2,9 billion users 2014 ??

1.23 billion users2014

Internet History

1.11 billion users March 2013 2,7 billion users 2013

2,9 billion users 2014 ??

(18)

Extra slides ...

Internet Hosts 1981-2013

July 2012: 908,585,739 July 2013: 996,230,757 July 2014: 1,028,544,414

Number of hosts advertised in the DNS

Sweden: Host #

2004 2005 2006 2008 2010 2012 Sweden 945 221 2 701 456 2 958 000 3 579 000 5 727 000

Sweden: 5,727,000 2011 Country Rank: 18

2014: 9,723,809 users

Rank: 44+

2014: 5,891,385

References

Related documents

By issuing certificates of insurance naming the developer as an additional insured, the agent, as the insurer’s authorized agent, “manifested the intent to incorporate

Lots may be irregular in size and shape provided they conform to the natural topography and features of the parcel (e.g., the lot lines follow an existing stone wall, stream, or

Daft Punk Medley Pentatonix's Tribute to Daft Punk Written by: Thomas Bangalter, Guy-Manuel de Homem-Christo, Anthony Wayne Moore, Nile Rodgers, Pharrell Williams, George Duke,

read (either from a memory location or from a port) the RD (Active Low) goes low and if the operation to be performed by 8086 is a write (either to a memory location or to a port)

This centrality of the teacher's role in this process of schooling is at the centre of this inquiry, as it aims, not only to understand how intercultural education is implemented

The program’s 25 activities are distributed in 3 intervention modules or axes about bullying and cyberbullying: (1) Conceptualization and identification of roles (the activities

In this paper, the objec- tives were to (a) examine the prevalence and geographic distribution of overweight and obesity among women of reproductive age; (b) evaluate the change

The HRQOL scores of manual workers are higher than those of mental workers and the unemployed; women's HRQOL scores are lower than men's; HRQOL scores of those who have a