Kick starting science ... What do you have in the future?

advertisement
2015-09-20
Computer networking (TDDD63): Part 1 …
Kick starting science ...
Niklas Carlsson, Associate Professor
http://www.ida.liu.se/~nikca/
What do you have in the future?
What do you have in the future?
How does it keep going?
… well, cable into wall …
1
2015-09-20
What happens there?
What happens there?
Or maybe more realistically …
• Work at company …
How do we build services that are …
Efficient
Secure
Important problem faced every day
by many companies, including …
Reliable
1-12
2
2015-09-20
In the computer network part we
will look at things such as …
How do we communicate with a
machine across the world?
How do we find a path?
How do we build scalable, efficient,
secure, and reliable services?
How do we find out who to talk to?
How do we avoid sending too much for
the receiver and network to handle?
3
2015-09-20
What happens at our machine? Inside the
network? Along the path?
What happens at our machine? Inside the
network? Along the path?
Roadmap
So let’s start the lecture …
Roadmap
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
What’s the Internet: “Nuts and Bolts View”
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
4
2015-09-20
What’s the Internet: “Nuts and Bolts View”
What’s the Internet: “Service View”
Today’s service/company landscape include ...
Today’s service/company landscape include ...
1-27
Today’s service/company landscape include ...
1-28
Today’s service/company landscape include ...
Network operators
Equipment manufacturers
(also sell services and help
Operate networks)
Equipment manufacturers
(also sell services and help
Operate networks)
1-29
1-30
5
2015-09-20
Today’s service/company landscape include ...
Today’s service/company landscape include ...
Content delivery networks
Enterprise solutions
and network service
(e.g., data center
solutions and cloud
1-31
providers)
Enterprise solutions
and network service
(e.g., data center
solutions and cloud
1-32
providers)
Today’s service/company landscape include ...
End user services (e.g.,
web-based social
networks, search,
communication, and
streaming)
Some common applications today …
•
•
•
•
•
•
•
•
•
•
World Wide Web (WWW)
Remote login (telnet, rlogin, ssh)
File transfer
Peer-to-peer file sharing
Cloud computing/services
Instant messaging (chat, text messaging, etc.)
Live and video-on-demand streaming
Internet phone (Voice-Over-IP)
Distributed games
…
34
1-33
… and tomorrow
Today’s end hosts …
The 2020 vision
 Everything that can be connected will be connected
 50B devices (perhaps more like 500B ...)
 IoT and smart cities
 Machine-to-machine
 High-definition 3D streaming to heterogeneous clients
35
6
2015-09-20
… and tomorrow’s
Internet of Things!
Roadmap
A Closer Look at Network Structure
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
Access Networks and Physical Media
Access Net: Digital Subscriber Line (DSL)
7
2015-09-20
Access Net: Cable Network
Access Net: Home Network
Enterprise Access Networks (Ethernet)
Wireless Access Networks
Host: Sends Packets of Data
Physical Media
8
2015-09-20
Physical Media: Radio
Roadmap
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
The Network Core
Packet Switching: Queueing Delay, Loss
Packet-Switching: Store-and-forward
Two Key Network Functions
9
2015-09-20
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Tier 1 ISPs
IXP- 3rd party company sets up an
exchange point where multiple ISPs
can peer together (about 300 IXPs)
Peering Link - all traffic between two ISPs
travels through one direct connection
10
2015-09-20
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Internet Structure: Network of Networks
Tier-1 ISP: Sprint
Google private network bypasses Google has over 50 data centers some with
upper tiers by peering with lower tiers over 100,000 servers, all interconnected via
directly
Googles private TCP/IP network
Roadmap
POP: ISP to ISP
connections
Sets of routers in the provider’s network
where customer ISPs can connect into provider ISP
What’s a Protocol?
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
11
2015-09-20
What’s a Protocol?
What’s a Protocol?
A Human
Protocol
Web
A Human
Protocol
What's a Protocol?
Protocol “Layers”
Problem Scenario
More Problems
Email
Bittorrent
VoIP
Bittorrent
802.11
Bluetooth
Cellular
Bittorrent
Application endpoints
may not be on the
same media
•This is a nightmare scenario
•Huge amounts of work to add new apps or media
•Limits growth and adoption
Ethernet
A Computer
Network Protocol
Ethernet
802.11
12
2015-09-20
Solution: Use Indirection
Web
Email
Bittorrent
VoIP
Layers, Protocols, Interfaces
•
Networks organized as a stack of layers
•
API
•O(1)
work toNetwork
add newAbstraction
apps, media
Magical
Layer
API limitsAPI
•Few
on new API
technology
Ethernet
802.11
Bluetooth
•
•
•
Offer services to the layer above it using a welldefined interface (programming language analogy:
libraries hide details while providing a service)
Reduces design complexity
Protocols: Logical “horizontal” conversations at any
layer (between peers)
Data Transfer: each layer passes data & control
information over the interfaces (between neighboring
layers)
Cellular
Internet Protocol Stack
The Hourglass
HTTP, FTP, RTP, IMAP, Jabber, …
TCP, UDP, ICMP
IPv4
Ethernet, 802.11x, DOCSIS, …
Fiber, Coax, Twisted Pair, Radio, …
76
Layering: logical communication
Layering: logical communication
application
transport
network
link
physical
application
transport
network
link
physical
network
link
physical
application
transport
network
link
physical
application
transport
network
link
physical
data
application
transport
transport
network
link
physical
application
transport
network
link
physical
ack
data
network
link
physical
application
transport
network
link
physical
data
application
transport
transport
network
link
physical
13
2015-09-20
Layering: physical communication
Encapsulation: Layering and data
data
application
transport
network
link
physical
application
transport
network
link
physical
Each layer takes data from above
•
•
network
link
physical
application
transport
network
link
physical
adds header information to create new data unit
passes new data unit to layer below
M
data
application
transport
network
link
physical
source
destination
application
transport
network
link
physical
application
transport
network
link
physical
Encapsulation: Layering and data
Encapsulation: Layering and data
Each layer takes data from above
Each layer takes data from above
•
•
•
•
adds header information to create new data unit
passes new data unit to layer below
source
M
Ht M
application
transport
network
link
physical
adds header information to create new data unit
passes new data unit to layer below
destination
application
transport
network
link
physical
message
segment
M
Ht M
Hn Ht M
source
destination
application
transport
network
link
physical
application
transport
network
link
physical
Encapsulation: Layering and data
Encapsulation: Layering and data
Each layer takes data from above
Each layer takes data from above
•
•
•
•
adds header information to create new data unit
passes new data unit to layer below
M
Ht M
Hn Ht M
Hl Hn Ht M
source
destination
application
transport
network
link
physical
application
transport
network
link
physical
segment
datagram
frame
message
segment
datagram
adds header information to create new data unit
passes new data unit to layer below
source
message
message
M
Ht M
Hn Ht M
Hl Hn Ht M
application
transport
network
link
physical
destination
application
transport
network
Hl Hn Ht M
link
physical
message
segment
datagram
frame
14
2015-09-20
Encapsulation: Layering and data
Encapsulation: Layering and data
Each layer takes data from above
Each layer takes data from above
•
•
•
•
adds header information to create new data unit
passes new data unit to layer below
source
M
Ht M
Hn Ht M
Hl Hn Ht M
passes new data unit to layer below
source
destination
application
transport
network
link
physical
application
transport
Hn Ht M
network
link
Hl Hn Ht M
physical
message
segment
datagram
frame
M
Ht M
Hn Ht M
Hl Hn Ht M
application
transport
network
link
physical
Encapsulation
Encapsulation: Layering and data
destination
application
Ht M
transport
Hn Ht M
network
link
Hl Hn Ht M
physical
message
segment
datagram
frame
Each layer takes data from above
•
•
Each layer takes data from above
•
•
adds header information to create new data unit
adds header information to create
new data unit
passes new data unit to layer below
adds header information to create new data unit
passes new data unit to layer below
source
M
Ht M
Hn Ht M
Hl Hn Ht M
destination
application
transport
network
link
physical
application
Ht
transport
Hn Ht
network
link
Hl Hn Ht
physical
M
message
M
segment
M
datagram
M
frame
Roadmap
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
Network Security


field of network security
 how bad “entities” can attack computer networks
 how we can defend networks against attacks
 how to design architectures that are immune to
attacks
Internet not originally designed with (much) security
in mind
 original vision: “a group of mutually trusting users
attached to a transparent network” 
 Internet protocol designers playing “catch-up”
 security considerations in all layers!
Introduction 1-90
15
2015-09-20
Bad guys/girls/organizations (“entities”):
can put malware into hosts via Internet
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic by
overwhelming resource with bogus traffic

malware can get in host from a virus, worm, or
Trojan horse.

spyware malware can record keystrokes, web sites
visited, upload info to collection site.

infected host can be enrolled in botnet, used for
spam and DDoS attacks.

Bad “entities” can attack servers and
network infrastructure
1. select target
2. break into hosts around the
network (see botnet)
3. send packets to target from
compromised hosts
target
malware often self-replicating: from one infected
host, seeks entry into other hosts
Introduction 1-91
Introduction 1-92
Bad “entities” can use false source
addresses
Bad “entities” can “sniff”
IP spoofing: send packet with false source address
Broadcast medium allow packet
sniffers (in promiscuous mode)
to listen to packets to others
C
A
C
A
src:B dest:A
payload
B
src:B dest:A
payload
B
Introduction 1-93
Bad “entities” can record and playback
record-and-playback: sniff sensitive info (e.g.,
password), and use later
C
A
src:B dest:A
user: B; password: foo
B
… AND lots more …
Introduction 1-94
Roadmap
• What is the Internet?
• Network Edge
• End systems, access networks, links
• Network Core
• Packet switching, network structure
• Protocol Layers, service models
• Network Security
• History
Introduction 1-95
16
2015-09-20
Internet History
Internet History
Internet History
Internet History
DNS - Domain Name Server
Internet History
Internet History
2,9 billion users 2014 ??
2,7 billion users 2013
2,9 billion users 2014 ??
2,7 billion users 2013
1.23 billion users2014
1.11 billion users March 2013
1.23 billion users2014
1.11 billion users March 2013
17
2015-09-20
Extra slides ...
Internet Hosts 1981-2013
Number of hosts
advertised in the DNS
July 2012: 908,585,739
July 2013: 996,230,757
July 2014: 1,028,544,414
Sweden: Host #
2014: 5,891,385
2004
2005
2006
2008
2010
Sweden 945 221 2 701 456 2 958 000 3 579 000 5 727 000
2012
Sweden: 5,727,000
2011 Country Rank: 18
2014: 9,723,809 users
Rank: 44+ 94,8% penetration!
18
Download