About the uses of internet & benefits of internet

samiulmahmood999 7 views 49 slides Jul 16, 2024
Slide 1
Slide 1 of 49
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49

About This Presentation

Good information for us


Slide Content

1 Defining the key component of internet Major services provided by internet Efficient search techniques Ways of communicating through internet

2 A Little Bit of Internet History 1961: Kleinrock - queueing theory shows effectiveness of packet-switching 1967: ARPAnet conceived by Advanced Research Projects Agency 1969: First ARPAnet node operational 1972: 15 nodes in ARPAnet; First e-mail program 1973: Metcalfe’s PhD thesis proposes Ethernet 1974: Cerf and Kahn - architecture for interconnecting networks 1983: deployment of TCP/IP 1982: smtp e-mail protocol defined 1983: DNS defined for name-to-IP-address translation early 1990s: Web Late 1990’s – 2000’s: instant messaging, P2P file sharing; network security, est. 50 million host, 100 million+ users, backbone links running at Gbps

3 Cerf and Kahn’s internetworking principles: minimalism, autonomy - no internal changes required to interconnect networks best effort service model stateless routers decentralized control define today’s Internet architecture

4 What is the Internet? Application Application Network Network Data Link Transport Transport Data Link Physical link Web, Email… TCP, UDP IP Ethernet, cellular

Some Internet applications E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video conference Massive parallel computing

6 6 Internet Internet: loosely hierarchical “network of networks” Major Components: Hosts, Routers, Communication links Protocols: for sending, receiving of msgs e.g., TCP, IP, HTTP, FTP, PPP Internet standards RFC: Request for comments IETF: Internet Engineering Task Force local ISP company network regional ISP router workstation server mobile

7 7 Internet: Three Components End systems (hosts): millions of connected computing devices executing network applications Routers: forwarding packets (chunks of data) Communication links: Connecting hosts and routers fiber, copper, radio, satellite transmission rate = bandwidth local ISP company network regional ISP router workstation server mobile

8 8 Internet Service Communication infrastructure enables distributed applications: Web, email, games, e-commerce, file sharing Communication services provided to applications: Connectionless unreliable connection-oriented reliable

9 9 Internet structure: network of networks roughly hierarchical at center: “tier-1” ISPs (e.g., UUNet, BBN/Genuity, Sprint, AT&T), national/international coverage treat each other as equals Tier 1 ISP Tier 1 ISP Tier 1 ISP Tier-1 providers interconnect (peer) privately NAP Tier-1 providers also interconnect at public network access points (NAPs)

10 10 Internet structure: network of networks “Tier-2” ISPs: smaller (often regional) ISPs Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP pays tier-1 ISP for connectivity to rest of Internet tier-2 ISP is c ustomer of tier-1 provider Tier-2 ISPs also peer privately with each other, interconnect at NAP

11 11 Internet structure: network of networks “Tier-3” ISPs and local ISPs last hop (“access”) network (closest to end systems) Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP Local and tier- 3 ISPs are customers of higher tier ISPs connecting them to rest of Internet

12 12 Internet structure: network of networks a packet passes through many networks! Tier 1 ISP Tier 1 ISP Tier 1 ISP NAP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP Tier-2 ISP local ISP local ISP local ISP local ISP local ISP Tier 3 ISP local ISP local ISP local ISP

“ Real” Internet delays and routes What do “real” Internet delay & loss look like? Traceroute program: provides delay measurement from source to router along end-end Internet path towards destination. For all i: sends three packets that will reach router i on path towards destination router i will return packets to sender sender times interval between transmission and reply. 3 probes 3 probes 3 probes

“ Real” Internet delays and routes 1 cs-gw (128.119.240.254) 1 ms 1 ms 2 ms 2 border1-rt-fa5-1-0.gw.umass.edu (128.119.3.145) 1 ms 1 ms 2 ms 3 cht-vbns.gw.umass.edu (128.119.3.130) 6 ms 5 ms 5 ms 4 jn1-at1-0-0-19.wor.vbns.net (204.147.132.129) 16 ms 11 ms 13 ms 5 jn1-so7-0-0-0.wae.vbns.net (204.147.136.136) 21 ms 18 ms 18 ms 6 abilene-vbns.abilene.ucaid.edu (198.32.11.9) 22 ms 18 ms 22 ms 7 nycm-wash.abilene.ucaid.edu (198.32.8.46) 22 ms 22 ms 22 ms 8 62.40.103.253 (62.40.103.253) 104 ms 109 ms 106 ms 9 de2-1.de1.de.geant.net (62.40.96.129) 109 ms 102 ms 104 ms 10 de.fr1.fr.geant.net (62.40.96.50) 113 ms 121 ms 114 ms 11 renater-gw.fr1.fr.geant.net (62.40.103.54) 112 ms 114 ms 112 ms 12 nio-n2.cssi.renater.fr (193.51.206.13) 111 ms 114 ms 116 ms 13 nice.cssi.renater.fr (195.220.98.102) 123 ms 125 ms 124 ms 14 r3t2-nice.cssi.renater.fr (195.220.98.110) 126 ms 126 ms 124 ms 15 eurecom-valbonne.r3t2.ft.net (193.48.50.54) 135 ms 128 ms 133 ms 16 194.214.211.25 (194.214.211.25) 126 ms 128 ms 126 ms 17 * * * 18 * * * 19 fantasia.eurecom.fr (193.55.113.142) 132 ms 128 ms 136 ms traceroute: gaia.cs.umass.edu to www.eurecom.fr Three delay measurements from gaia.cs.umass.edu to cs-gw.cs.umass.edu * means no response (probe lost, router not replying) trans-oceanic link Under Windows is “tracert”

Traceroute from My Home Computer

Where a Router is Placed? There are many public websites provide IP location service www.geobytes.com/ iplocator .htm http://www.iplocation.net/ Based on traceroute and IP locator, you can know the complete routing path of a connection Major reason why many networks block traceroute traffic 17

Protocol network protocols: all communication activity in Internet governed by protocols Protocols define format, order of messages sent and received among network entities, and actions taken on message transmission, receipt

What’s a protocol? a human protocol and a computer network protocol: Hi Hi Got the time? 2:00 TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> time

20 20 A closer look at network structure: network edge: applications and hosts network core: routers network of networks Connection: communication links

The network edge: end systems (hosts): run application programs e.g. Web, email at “edge of network” client/server model client host requests, receives service from always-on server e.g. Web browser/server; email client/server peer-peer model: minimal (or no) use of dedicated servers e.g. Gnutella, KaZaA

Network edge: connection-oriented service TCP [ Transmission Control Protocol ] reliable, in-order : byte-stream data transfer loss: acknowledgements and retransmissions flow control: sender won’t overwhelm receiver congestion control: senders “slow down sending rate” when network congested Examples of applications using TCP: HTTP (Web), FTP (file transfer), SSH (remote secure login), SMTP (email)

Network edge: connectionless service UDP [User Datagram Protocol] connectionless unreliable data transfer no flow control no congestion control Examples of applications using UDP: streaming media, teleconferencing, DNS, Internet telephony

The Network Core mesh of interconnected routers data transfer methods through net circuit switching: dedicated circuit per call: telephone net packet-switching: data sent through net in discrete “chunks”

Circuit Switching End-end resources reserved for “call” call setup required link bandwidth, switch capacity dedicated resources: no sharing circuit-like (guaranteed) performance

Packet-switched networks Move packets through routers from source to destination datagram network: destination address in packet determines next hop routes may change during session virtual circuit network: each packet carries tag (virtual circuit ID), tag determines next hop fixed path determined at call setup time, remains fixed thru call routers maintain per-call state

Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: host-host data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements PPP, Ethernet physical: bits “on the wire or wireless” application transport network link physical

message segment datagram frame source application transport network link physical H t H n H l M H t H n M H t M M destination application transport network link physical H t H n H l M H t H n M H t M M network link physical link physical H t H n H l M H t H n M H t H n H l M H t H n M H t H n H l M H t H n H l M router switch Encapsulation

Message Flow transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every host, router router examines header fields in all IP datagrams passing through it application transport network data link physical application transport network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical 29

TCP/IP Introduction 30

TCP  Transport Layer IP  Network Layer Networking security mainly deals with these two services/protocols 31

Transport Layer TCP - connection-oriented service Provide reliable data transmission Used by most data-based, not time-sensitive network applications Email, Web, file transfer…. Require to set up TCP connection channel first UDP – connectionless service Unreliable data transmission Error packets will be discarded without retransmission No additional delay for future incoming packets Used for time-sensitive, error-tolerant applications VOIP, video streaming, DNS…. 32

Transport vs. network layer network layer: logical communication between hosts transport layer: logical communication between processes relies on, enhances, network layer services A B C D Sport:4625 Dport: 80 Sport:8050 Dport: 25

Addressing processes to receive messages, process must have identifier identifier includes both IP address and port numbers associated with process on host. host device has unique 32-bit IP address IP address is for addressing a host/computer Example port numbers: HTTP server: 80 Mail server: 25 to send HTTP message to gaia.cs.umass.edu web server: IP address: 128.119.245.12 Port number: 80

TCP and UDP Port Numbers 16 bits (0 – 65535) Internet Assigned Numbers Authority (IANA) www.iana.org Well known ports (0 -1023) Example: HTTP – 80, SMTP – 25 Registered ports (1024 – 49151) Example: HTTP alternate 8080 used for web proxy and caching server Dynamic and/or private ports: (49152–65535)

Each TCP connection is identified by 4-tuple: source IP address source port number dest IP address dest port number These four values are widely used in network filtering and intrusion detection 36

UDP Packet Header UDP packet header is 8 bytes long Port number is 16 bits long Checksum for verifying packet error 37 source port # dest port # 32 bits Application data (message) UDP segment format length checksum Length, in bytes of UDP segment, including header

UDP Transmission Process 38 Host A Packet 2 time Host B Packet 1 Packet 3 Packet 4 Packet 5 X No acknowledgement from recipient Sending rate is controlled by sender (bounded by sender’s bandwidth)

TCP Transmission Process (simplified without considering piplining) 39 Need sequence # and acknowledge # to distinguish each packet

TCP segment structure (Header is 20 bytes normally) source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number Receive window Urg data pnter checksum F S R P A U head len not used Options (variable length) URG: urgent data (generally not used) ACK: ACK # valid PSH: push data now RST, SYN, FIN: connection estab (setup, teardown commands) # bytes rcvr willing to accept counting by bytes of data (not segments!) Internet checksum (as in UDP)

TCP seq. #’s and ACKs Seq. #’s: byte stream “number” of first byte in segment’s data ACKs: seq # of next byte expected from other side Cumulative ack  ack to receive all bytes until the specified # Q: how receiver handles out-of-order segments? TCP spec doesn’t say Practical approach: save in buffer Q : How TCP implement duplex communication? Seq. # for sending data, Ack# for receiving data

An example of TCP Duplex Communication Host A Host B Seq=42, ACK=79, data = ‘john’ Seq=79, ACK= 46 , data = ‘pass’ Seq= 46 , ACK= 83 data =‘CNT4704’ User host ACKs receipt, send back use password host ACKs receipt, echoes back ‘pass’ time simple telnet scenario 42 79 Sequence number is based on bytes, not packets!

ACK Only in Duplex Communication ? 43 Seq=79, ACK= 46 , data = ‘pass’ Seq= 46 , ACK= 83 data =‘CNT4704’ host ACKs receipt, send back use password time Seq= 83 , ACK= 53 , no data section ACK only packet, seq# is the first byte to be transmitted in the future (the packet has no data section)

TCP: retransmission scenarios Host A Seq=100, 20 bytes data ACK=100 time premature timeout Host B Seq=92, 8 bytes data ACK=120 Seq=92, 8 bytes data Seq=92 timeout ACK=120 Host A Seq=92, 8 bytes data ACK=100 loss timeout lost ACK scenario Host B X Seq=92, 8 bytes data ACK=100 time Seq=92 timeout SendBase = 100 SendBase = 120 SendBase = 120 Sendbase = 100

TCP retransmission scenarios (more) Host A Seq=92, 8 bytes data ACK=100 loss timeout Cumulative ACK scenario Host B X Seq=100, 20 bytes data ACK=120 time SendBase = 120 Host A Seq=100, 20 bytes data ACK=100 time premature timeout Host B Seq=92, 8 bytes data ACK=120 Seq=92, 8 bytes data Seq=92 timeout ACK=120 Seq=92 timeout SendBase = 120 SendBase = 120 Sendbase = 100

TCP Connection Setup --- Three-Way Handshaking Step 1: client host sends TCP SYN segment to server specifies initial seq # no data Step 2: server host receives SYN, replies with SYN/ACK segment server allocates buffers specifies server initial seq. # Step 3: client receives SYN/ACK, replies with ACK segment, which may contain data client SYN, seq=client_seq server SYN/ACK, seq=server_seq, ack=client_seq+1 ACK, seq=client_seq+1 ack=server_seq+1

TCP Connection Setup Most firewalls, packet capturing software, and intrusion detection software use TCP connection setup packets to determine how to deal with the new connection Very important to understand the three-way handshake 47

TCP Connection Management (cont.) Closing a connection: close (); Step 1: client end system sends TCP/FIN control segment to server Step 2: server receives FIN, replies with ACK. Closes connection, sends FIN. client FIN server ACK ACK FIN close close closed timed wait

TCP Connection Management (cont.) Step 3: client receives FIN, replies with ACK. Enters “timed wait” - will respond with ACK to received FINs Step 4: server , receives ACK. Connection closed. client FIN server ACK ACK FIN closing closing closed timed wait closed Some applications simply send RST to terminate TCP connections immediately
Tags