ECEN5553 Telecom Systems Dr. George Scheets Week #5 Read [7c] "How can the Internet have too many routes and not enough addresses?" [8a] "The Cognitive Net is Coming" [8b] "The Internet of Things" [9a] "Browse at your Own Risk" [9b] "The Data Brokers: Selling Your Personal Information" [10a] "Internet QoS: Pieces of the Puzzle" [10b] "Innovation on the Web Lives and Dies with Net Neutrality" Exam #1 Lecture 16, 24 September (Live) No later than 1 October (Remote DL) Outline 8 October 2014, Lecture 22 (Live) No later than 15 October (Remote DL)
68
Embed
ECEN5553 Telecom Systems Dr. George ScheetsWeek #5 Read [7c] "How can the Internet have too many routes and not enough addresses?" [8a] "The Cognitive.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
ECEN5553 Telecom SystemsDr. George Scheets Week #5
Read[7c] "How can the Internet have too many routes and not enough
addresses?"[8a] "The Cognitive Net is Coming"[8b] "The Internet of Things"[9a] "Browse at your Own Risk"[9b] "The Data Brokers: Selling Your Personal Information"[10a] "Internet QoS: Pieces of the Puzzle"[10b] "Innovation on the Web Lives and Dies with Net Neutrality"Exam #1 Lecture 16, 24 September (Live)
No later than 1 October (Remote DL)Outline 8 October 2014, Lecture 22 (Live)
No later than 15 October (Remote DL)
ECEN5553 Telecom SystemsDr. George Scheets Week #5
Read[7c] "How can the Internet have too many routes and not enough
addresses?"[8a] "The Cognitive Net is Coming"[8b] "The Internet of Things"[9a] "Browse at your Own Risk"[9b] "The Data Brokers: Selling Your Personal Information"[10a] "Internet QoS: Pieces of the Puzzle"[10b] "Innovation on the Web Lives and Dies with Net Neutrality"Exam #1 Lecture 16, 24 September (Live)
No later than 1 October (Remote DL)Outline 8 October 2014, Lecture 22 (Live)
No later than 15 October (Remote DL)
OutlinesReceived
due 8 October (local)
15 October (remote)
OutlinesReceived
due 8 October (local)
15 October (remote)
22 %
Exam #1 (90 points)Exam #1 (90 points) Friday, 24 September (Local)Friday, 24 September (Local)
Remote Distant Learners, no later than 1 OctoberRemote Distant Learners, no later than 1 October Work 3 of 4 pagesWork 3 of 4 pages Closed Book & NotesClosed Book & Notes Calculators & phones are NOT allowedCalculators & phones are NOT allowed
...Set up numerical problem for full credit...Set up numerical problem for full credit Most equations are provided (on 5th page)Most equations are provided (on 5th page) Approximately 40% of upcoming exam will be lifted from the Approximately 40% of upcoming exam will be lifted from the
Fall 2013 Exam #1Fall 2013 Exam #1 AnythingAnything in the notes, on Power Point, or in reading in the notes, on Power Point, or in reading
assignments is fair gameassignments is fair game
On Short Answer or Essay QuestionsOn Short Answer or Essay Questions Answer the Question!Answer the Question! Memory Dump Memory Dump in the space providedin the space provided
Knowledgeable individual can write moreKnowledgeable individual can write more Grader will look for "Power Point bullets"Grader will look for "Power Point bullets" Same remarks as instructor's typically Same remarks as instructor's typically notnot required required
To get "A" or "B", To get "A" or "B", instructor needs to walk away with impression instructor needs to walk away with impression you could've said moreyou could've said more Got space? Anything else pertinent to add?Got space? Anything else pertinent to add? It is NOT necessary to write small or fill up allotted space to get a good It is NOT necessary to write small or fill up allotted space to get a good
score!score! Lost points? No comments? → Insufficient info providedLost points? No comments? → Insufficient info provided Rule of Thumb: "X" point question needs Rule of Thumb: "X" point question needs >> "X" facts "X" facts
The InternetThe Internet VASTVAST collection of interconnected collection of interconnected
networks networks Key Building Block:Key Building Block:
Routers running IP (Layer 3)Routers running IP (Layer 3) Router link speeds range up to 100 GbpsRouter link speeds range up to 100 Gbps Hierarchical Alpha-Numeric NamesHierarchical Alpha-Numeric Names
Fall 2007 Weird TraceRoute Seen by StudentTulsa to OSU Stillwater
Fall 2007 Weird TraceRoute Seen by StudentTulsa to OSU Stillwater
Tracert launched from Tulsa, hitTracert launched from Tulsa, hitAtlantaAtlantaWashington, D.C.Washington, D.C.IllinoisIllinoisKansas CityKansas CityTulsaTulsaOklahoma CityOklahoma CityOSU StillwaterOSU Stillwater
Internet Service Provider BackboneInternet Service Provider Backbone
Switched Network, full duplex trunks.Access lines attach to corporate routers &
routers of other ISP's.
Router
TrunksAccess Line
OSU BackboneOSU Backbone
Access lines attach to Ethernet switches, Onenet and other routers.
Router
TrunksAccess Line
ISO OSI Seven Layer ModelISO OSI Seven Layer Model
Layer 7 ApplicationLayer 7 Application Layer 6 PresentationLayer 6 Presentation Windows API Windows API Layer 5 SessionLayer 5 Session Windows TCPWindows TCP Layer 4 TransportLayer 4 Transport Windows TCPWindows TCP Layer 3 NetworkLayer 3 Network WindowsWindows IP IP Layer 2 Data LinkLayer 2 Data Link PC NICPC NIC Layer 1 Physical Layer 1 Physical PC NICPC NIC
Internet Protocal v4 (20 Bytes)Internet Protocal v4 (20 Bytes)
TOS
TTL
Source Address
Destination Address
4 Bytes
Microsoft's TracertMicrosoft's Tracert
802.3 Ethernet Packet Format802.3 Ethernet Packet Format
MACDestination
Address
MACSource
Address
CRCData + Padding
Bytes: 7 1 6 6 2
20 20 6-1460 4
IPv4 TCP
IPv4 HeaderIPv4 Header Contains two addressesContains two addresses
Example addressExample address 10001011 01001110 01000010 1101001110001011 01001110 01000010 11010011
Dotted Decimal Format simplifiesDotted Decimal Format simplifies x.x.x.xx.x.x.x Treat each byte as Base2 number, write in Base10Treat each byte as Base2 number, write in Base10 Above number simplifies to 139.78.66.211Above number simplifies to 139.78.66.211
IP HeaderIP Header Alpha-numeric name simplifies furtherAlpha-numeric name simplifies further
es302.ceat.okstate.edues302.ceat.okstate.edu Domain Name Servers convert to numericalDomain Name Servers convert to numerical
All OSU Stillwater addresses are of formAll OSU Stillwater addresses are of form 139.78139.78.0.0 to .0.0 to 139.78139.78.255.255.255.255
IP addresses & alpha-numeric names are IP addresses & alpha-numeric names are effectively backwardseffectively backwards 139.78139.78..6666..211211 mapped to mapped to
es302es302..ceatceat..okstate.eduokstate.edu
IP vs Ethernet AddressesIP vs Ethernet Addresses Ethernet has a flat address spaceEthernet has a flat address space
Similar to Social Security NumberSimilar to Social Security Number Adjacent #'s nearby or on other side of globe?Adjacent #'s nearby or on other side of globe?
Huge look up tables required to avoid floodingHuge look up tables required to avoid flooding Need 70.37 trillion entriesNeed 70.37 trillion entries
IP has a hierarchical address spaceIP has a hierarchical address space Packet delivery similar to Mail deliveryPacket delivery similar to Mail delivery
Adjacent IP addresses frequently nearbyAdjacent IP addresses frequently nearby
Reduces size of look up tablesReduces size of look up tables Don't need 4.295 billion entriesDon't need 4.295 billion entries
ISP Router OverloadISP Router OverloadSource:1 October 2007Network World
Fall 2011Level3
BGP entries375,550 IPv47,210 IPv6
Peak Traffic8.0 Tbps IPv4500 Mbps IPv6
ISP Router OverloadISP Router Overload
Core BGP entries as of 19 August 2014Core BGP entries as of 19 August 2014 IPv4 about 520,400IPv4 about 520,400 IPv6 about 18,300IPv6 about 18,300
2nd week of August2nd week of August Caused some problemsCaused some problems Some routers had 512,000 entry limitSome routers had 512,000 entry limit
source: bgp.potaroo.netNetwork World , 13Aug2014, "Internet outages expected to abate as routers are modified, rebooted"
TCP HeaderTCP Header
Source Port Destination Port
Sequence Number
ACK Number
Window
Checksum
4 Bytes
Wireshark Packet CaptureWireshark Packet Capture
This interaction starts with a click on a Firefox bookmark to a distance calculator. Firefox This interaction starts with a click on a Firefox bookmark to a distance calculator. Firefox then triggers a query to an OSU Domain Name Server asking for the IPv4 address of then triggers a query to an OSU Domain Name Server asking for the IPv4 address of www.indo.comwww.indo.com. This is next followed by a TCP 3 way handshake to open logical connections, an . This is next followed by a TCP 3 way handshake to open logical connections, an HTTP request to download the distance calculator page, and the beginning of the file transfer.HTTP request to download the distance calculator page, and the beginning of the file transfer.
ISO OSI Seven Layer ModelISO OSI Seven Layer Model
Layer 7 ApplicationLayer 7 Application Layer 6 PresentationLayer 6 Presentation Windows API Windows API Layer 5 Session Layer 5 Session Windows Windows TCPTCP Layer 4 TransportLayer 4 Transport Windows Windows TCPTCP Layer 3 Network Layer 3 Network Windows IPWindows IP Layer 2 Data LinkLayer 2 Data Link PC NICPC NIC Layer 1 Physical Layer 1 Physical PC NICPC NIC
MSS = 1460 B = Size of Layer 6 & 7 info per packet
NPD = 0.015 / 0.1309 = 0.1146NPD = 0.015 / 0.1309 = 0.1146 Front end of packet arrives at far side prior to back end being transmitted.Front end of packet arrives at far side prior to back end being transmitted.
Packet #1
Throughput on 64 Kbps LineThroughput on 64 Kbps Line
Server PC
3,000 Km, 64 Kbps line
At this instant in time...At this instant in time... 2nd unACK'd packet is being transmitted2nd unACK'd packet is being transmitted ACK for #1 enroute back to serverACK for #1 enroute back to server
TCP+IP+Layer 2 TCP+IP+Layer 2 → 47 bytes if PPP→ 47 bytes if PPP
When ACK#1 arrives at server, When ACK#1 arrives at server, only packet #2 is unacknowledged.only packet #2 is unacknowledged.
Will 64 packet unACK'd limit be reached?Will 64 packet unACK'd limit be reached? No. At most, 1 packet likely unACK'd.No. At most, 1 packet likely unACK'd.
Packet #2 #1
#1 ACK
Throughput on 45 Mbps LineThroughput on 45 Mbps Line
Server PC3,000 Km, 45 Mbps line
NPD = Prop Delay / Packet inject timeNPD = Prop Delay / Packet inject time Prop Delay = distance / EM energy speedProp Delay = distance / EM energy speed
= 3,000,000 m / 200,000,000 m/sec = 3,000,000 m / 200,000,000 m/sec = 0.015 seconds = 0.015 seconds
NPD = 0.015 / 0.0001861 = 80.60NPD = 0.015 / 0.0001861 = 80.60 80.60 average sized packets will fit back-to-back on this line80.60 average sized packets will fit back-to-back on this line
#1#2#3
Throughput on 45 Mbps LineThroughput on 45 Mbps Line
Server PC
3,000 Km, 45 Mbps line
At this instant in time, the Server...At this instant in time, the Server... Has transmitted 64 packets w/o ACK.Has transmitted 64 packets w/o ACK. Has hit window limit. Halts.Has hit window limit. Halts.
Packets 1 - 64
Throughput on 45 Mbps LineThroughput on 45 Mbps Line
Server PC
3,000 Km, 45 Mbps line
At this instant in time, At this instant in time, The PC has processed 1st packet & sent an ACKThe PC has processed 1st packet & sent an ACK The Server is still halted, waiting for ACK #1.The Server is still halted, waiting for ACK #1.
When ACK #1 arrives, server can then transmit one When ACK #1 arrives, server can then transmit one additional packet.additional packet.
Other ACK’s arrive fast enough to allow back-to-back Other ACK’s arrive fast enough to allow back-to-back transmission of next group of 64 packetstransmission of next group of 64 packets
Packets 2 - 64 #1
ACK#1
Can Estimate Throughput with a Time LineCan Estimate Throughput with a Time Line
timeto = 0
ttoo: Leading edge of 1st packet injected: Leading edge of 1st packet injected
tt11: Trailing edge of 64th packet injected: Trailing edge of 64th packet injected
tt22: Leading edge of 1st packet hits far side: Leading edge of 1st packet hits far side
15 msec (propagation delay)15 msec (propagation delay) If ACK injected right away...If ACK injected right away...
tt33: ...ACK arrives at server at t = 30 msec: ...ACK arrives at server at t = 30 msec
Process Repeats...Process Repeats...
t1 t2 t3
Can Estimate Throughput with a Time LineCan Estimate Throughput with a Time Line
time (msec)to = 0
This system can transmitThis system can transmit 64(1,047) = 67,008 B = 536,064 bits64(1,047) = 67,008 B = 536,064 bits Every 30 msec (one round trip time)Every 30 msec (one round trip time) Estimated throughput = 536,064/0.03 = 17.89 MbpsEstimated throughput = 536,064/0.03 = 17.89 Mbps
Actual throughput a bit lowerActual throughput a bit lower 1st ACK not transmitted until packet #1 fully received...1st ACK not transmitted until packet #1 fully received...
... and processed by PC... and processed by PC 65th packet not transmitted until ACK #1 fully received...65th packet not transmitted until ACK #1 fully received...
... and processed by Server... and processed by Server
11.91 15.00 30.00
Can Estimate Throughput with a Time LineCan Estimate Throughput with a Time Line
time (msec)to = 0
Need to be able to fill the pipe for 1 RTTNeed to be able to fill the pipe for 1 RTT 30 msec in our example30 msec in our example 45 Mbps * .030 sec = 1.35 M b = 168,750 B 45 Mbps * .030 sec = 1.35 M b = 168,750 B
= 168,750/1,047 = 161.2 packets = 168,750/1,047 = 161.2 packets Window Size needs to be = Window Size needs to be =
Actually would need another segment or two to cover source & sink Actually would need another segment or two to cover source & sink processing processing
11.91 15.00 30.00
TCP HeaderTCP Header
Source Port Destination Port
Sequence Number
ACK Number
Window
Checksum
4 Bytes
UDP Header (8 Bytes)UDP Header (8 Bytes)
Source Port Destination Port
Checksum
4 Bytes
For interactive real-time traffic, usually used with Real Time Transport Protocol (12 bytes).
Virtual CircuitsVirtual Circuits Routing decisions made Routing decisions made onceonce when when
circuit is set upcircuit is set up Concerned switches have internal Concerned switches have internal
Look-Up tables updatedLook-Up tables updated All packets part of info transfer followAll packets part of info transfer follow
the same path the same path Allows option of setting aside switch resources (buffer Allows option of setting aside switch resources (buffer
space, bandwidth) for specific traffic flowsspace, bandwidth) for specific traffic flows MPLS, Frame Relay, ATM, & Carrier Ethernet use MPLS, Frame Relay, ATM, & Carrier Ethernet use
VC’sVC’s
DatagramsDatagrams
IP uses Datagrams IP uses Datagrams Routing Tables updated independently of Routing Tables updated independently of
individual traffic flowsindividual traffic flows Routers continuously talking with each otherRouters continuously talking with each other Packets may follow different pathsPackets may follow different paths
Routers get no advance warning of Routers get no advance warning of specific packet flows.specific packet flows.
IP is ConnectionlessIP is Connectionless
Data + Padding
20 20 up to 1,460
IP TCP
I/O decisions based on IP address & look-up table.Tables updated independent of traffic, hence paththru network may suddenly change.
TCP is connection oriented.
TCP, UDP, and IPTCP, UDP, and IP 30+ year old Protocols 30+ year old Protocols
Designed for dataDesigned for dataOne Priority & “Best Effort” servicesOne Priority & “Best Effort” servicesNo QoS GuaranteesNo QoS GuaranteesAvailable bandwidth depends on otherAvailable bandwidth depends on other users users
TCP (Layer 4 & 5) provides reliable transferTCP (Layer 4 & 5) provides reliable transfer UDP (Layer 4 & 5) unreliable transferUDP (Layer 4 & 5) unreliable transfer IP at Layer 3IP at Layer 3 Arbitrary Protocols at Layers 1 & 2Arbitrary Protocols at Layers 1 & 2
InternetTraffic2008 - 2009 Comparison
InternetTraffic2008 - 2009 Comparison
sou
rce:
htt
p://
ww
w.s
andv
ine.
com
s
Fixed Access Internet Traffic ProfileFixed Access Internet Traffic Profile
PC to PCPC to PC Internet Phone to Internet PhoneInternet Phone to Internet Phone
CommodityInternet
VoIPVoIP PC to Wired PhonePC to Wired Phone Internet Phone to Wired PhoneInternet Phone to Wired Phone
CommodityInternet
Gateway
PhoneSystem
VoIP (Wired Phone-to-Wired Phone)VoIP (Wired Phone-to-Wired Phone) Carrier prioritizes VoIP traffic Carrier prioritizes VoIP traffic (DiffServ)(DiffServ) Paths nailed down Paths nailed down (MPLS)(MPLS) Gateways control # of voice callsGateways control # of voice calls Good Quality Possible with this configurationGood Quality Possible with this configuration
"QoS Enabled"Internet
Gateway
PhoneSystem
Gateway
PhoneSystem
Traditional VideoconferencingTraditional Videoconferencing
at least 1 in Oklahoma City 4 Oklahoma State routers4 Oklahoma State routers rtt = 55 msecrtt = 55 msec
...may be worsethan End-to-Endperformance onthis 14 router path when not using DiffServ.
LAN
LAN
Internet Service Provider NetworkInternet Service Provider Network
RouterRouter
TrunksLeased Line
PC
PC
Corporate sites using Internet as WAN.Can pay ISP extra $$ → Traffic between sites gets preferential treatment.
Interactive VOICE & VIDEO over the commodity INTERNET
(Best Effort, No Priorities)
Interactive VOICE & VIDEO over the commodity INTERNET
(Best Effort, No Priorities) Is not ready for Prime TimeIs not ready for Prime Time Delay & Quality problems Delay & Quality problems difficult to solve difficult to solve under the under the
current system...current system... ...although throwing Bandwidth at the problem will ...although throwing Bandwidth at the problem will
alleviatealleviate Has a place for the user whose main concern is $$$$ or Has a place for the user whose main concern is $$$$ or
convenienceconvenience
LAN
LAN
Internet Service Provider NetworkInternet Service Provider Network
Routers operate at Layers 1-3.PC’s operate at Layers 1-7. Routers do not monitor opening of TCP Logical Connections. RSVP would change this.
Internet QoSInternet QoS Most every ISP is installing or testing one or more of Most every ISP is installing or testing one or more of
following...following... DiffServDiffServ MPLSMPLS Resource Reservation capabilityResource Reservation capability Pricing structure to reflect different QoSPricing structure to reflect different QoS
... but they are not yet widely deployed.... but they are not yet widely deployed. As a result, currently the Commodity Internet As a result, currently the Commodity Internet
remains mostlyremains mostly Best Effort, FIFO RoutingBest Effort, FIFO Routing
Thinking of moving large amountsof high quality, time sensitive
traffic over the Commodity Internet?
Thinking of moving large amountsof high quality, time sensitive
traffic over the Commodity Internet?
Check back in 2-3 years when...Check back in 2-3 years when... Priorities Enabled (IPv6 and/or DiffServ)Priorities Enabled (IPv6 and/or DiffServ) Resources Guaranteed Resources Guaranteed
(Resource Reservation Protocol (RSVP) or equivalent is (Resource Reservation Protocol (RSVP) or equivalent is deployed)deployed)
Flat rate pricing is goneFlat rate pricing is gone
The Internet Is... The Internet Is... A superb information sourceA superb information source
Sometimes difficult to separate wheat from chaffSometimes difficult to separate wheat from chaff IEEE Communications or ProceedingsIEEE Communications or Proceedings
Peer Reviewed Peer Reviewed
IEEE Spectrum IEEE Spectrum Reviewed by editorReviewed by editor
Jane Doe's Web siteJane Doe's Web site Reviewed by Jane DoeReviewed by Jane Doe
A good marketing toolA good marketing tool
The Internet Is... a Security Nightmare
The Internet Is... a Security Nightmare
Any-to-Any connectivity is both strength and weaknessAny-to-Any connectivity is both strength and weakness Tracert yields Router IP AddressesTracert yields Router IP Addresses Could Telnet or HTTP to many. Password?Could Telnet or HTTP to many. Password?
EspionageEspionage Read “The Cuckoo’s Egg” by Cliff StollRead “The Cuckoo’s Egg” by Cliff Stoll
Former #1 on New York Times Best SellerFormer #1 on New York Times Best SellerRecommended by Dr. Scheets’ MomRecommended by Dr. Scheets’ Mom