t-110.5110 computer networks ii introduction 21.9.2009
DESCRIPTION
T-110.5110 Computer Networks II Introduction 21.9.2009. Prof. Sasu Tarkoma. Contents. Course Outline Carrying out the course Lectures Material. Course Outline. 4 credit course - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/1.jpg)
T-110.5110 Computer Networks IIT-110.5110 Computer Networks II
IntroductionIntroduction
21.9.200921.9.2009
Prof. Sasu Tarkoma
![Page 2: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/2.jpg)
ContentsContents
•Course Outline
•Carrying out the course
•Lectures
•Material
![Page 3: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/3.jpg)
Course OutlineCourse Outline
•4 credit course
•During Autumn 2009, we will look at protocols and architectures related to mobility management, session management, authentication, authorization and accounting (AAA) services and quality of service (QoS).
•The course consists of the lectures and a final exam.
•The purpose is that the participants actively read the material beforehand and discuss problem areas during the lectures.
•Networks II lectures start on Monday 21.9. 14.15 - 16 in T2. Registration happens on this first lecture. Course material will be in English. Lectures will be in English if required.
![Page 4: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/4.jpg)
Course GoalsCourse Goals
•Understand advanced networking techniques
•Learn state of the art
•Get a glimpse to near-future technologies and long haul development
![Page 5: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/5.jpg)
Time and PlaceTime and Place
•Time and place: Mondays at 14:15 – 15:45 in T2.
•Prof. Sasu Tarkoma gives the lecture unless otherwise indicated.
![Page 6: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/6.jpg)
Carrying out the CourseCarrying out the Course
•The course grade consists of participation to lectures and a final exam.
– Mandatory assignment: Wireshark
•Final exams will be held as follows:– 17.12.2008 16:30-19:30 in T1.
•Required preliminary knowledge– T-110.300 Telecommunication Architectures– T-110.350 Computer Networks– T-110.402 Information Security Technology
![Page 7: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/7.jpg)
21 Sep 09 39 Mon 14:15-16:00
T2 Introduction
28 Sep 09 40 Mon 14:15-16:00
T2 Mobility protocols
05 Oct 09 41 Mon 14:15-16:00
T2 Transport issues (Dr. Matti Siekkinen)
12 Oct 09 42 Mon 14:15-16:00
T2 NAT (STUN, ICE, TURN)
19 Oct 09 43 Mon 14:15-16:00
T2 Quality of Service
02 Nov 09 45 Mon 14:15-16:00
T2 AAA
09 Nov 09 46 Mon 14:15-16:00
T2 HIP
16 Nov 09 47 Mon 14:15-16:00
T2 HIP II (M.Sc. Miika Komu)
23 Nov 09 48 Mon 14:15-16:00
T2 Internet Router Development using NetFPGA. Network applications of Bloom filters.
30 Nov 09 49 Mon 14:15-16:00
T2 Services and Identity Management
07 Dec 09 50 Mon 14:15-16:00
T2 Summary
LecturesLectures
![Page 8: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/8.jpg)
Final ExamFinal Exam
•17.12.2008 16:30 – 19:30 T1
•Exam will be based on course material
– Slides
– Articles and standards documents
•Essay questions
![Page 9: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/9.jpg)
MaterialMaterial• General
– Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world On Compact Routing for the Internet authored by Dima Krioukov, kc claffy, Kevin Fall, and Arthur Brady. Published in the ACM SIGCOMM Computer Communication Review (CCR), v.37, n.3, 2007.
• Transport layer
– RFC 2960: Stream Control Transmission Protocol RFC 4347: Datagram Transport Layer Security RFC 4340: Datagram Congestion Control Protocol (DCCP) Designing DCCP: Congestion Control Without Reliability (PDF), by Eddie Kohler, Mark Handley, and Sally Floyd. Proc. ACM SIGCOMM 2006.
• NATs
– RFC 3489 STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). IETF Journal article on ICE Peer-to-peer Communication Across Network Address Translators
• AAA
– RFC 2865: Remote Authentication Dial In User Service (RADIUS) RFC 3588: Diameter Base Protocol
• QoS
– RFC 3272: Overview and Principles of Internet Traffic Engineering RFC 3031: Multiprotocol Label Switching Architecture
• HIP
– RFC 4423: Host Identity Protocol (HIP) Architecture
• Services
– Amazon's Dynamo. SOSP 2007.
![Page 10: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/10.jpg)
AssignmentAssignment
•Mandatory assignment: packet capture using WireShark
•Goal: to get hands on experience with protocols
•Write 2 page report on WireShark protocol analyzer and use it to analyze some traffic (TCP, SCTP, TLS, DTLS, IPsec, HIP, some other)
•Can be done as pairwork or alone
•http://www.wireshark.org/
![Page 11: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/11.jpg)
Contact PointsContact Points
•Send email– [email protected]
•Follow course web-page– Results and updates will be posted to the Web
•Reception– After the lectures– Otherwise send email to arrange a meeting– Exam reception will be scheduled after results
![Page 12: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/12.jpg)
Summary of CourseSummary of Course
•As discussed the course focuses on several important features of current networking systems
– Mobility, QoS, Security, Privacy
•We observe that these features were not important for the original Internet architecture
•They are important now– Mobility, QoS, Security are coming with IPv6 – IPv6 deployment does not look promising
•Hence, many proposals to solve issues in the current Internet
•Also many solutions to solve expected problems in the Future Internet
![Page 13: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/13.jpg)
Layered ArchitectureLayered Architecture
•Internet has a layered architecture
•Four layers in TCP/IP– Application (L7)– Transport (L4)– Network (L3)– Link layer / physical (L2-L1)
•We will talk a lot about layering– Benefits, limitations, possibilities (cross-layer) – It is not always clear what is a good layering
•A lot of interesting networking developments are happening on application layer
![Page 14: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/14.jpg)
Convergence and DivergenceConvergence and Divergence
Divergence
Convergence
Wireless / wireline protocols
Applications and Services
TCP/IP
![Page 15: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/15.jpg)
The Internet has ChangedThe Internet has Changed
•A lot of the assumptions of the early Internet has changed
– Trusted end-points
– Stationary, publicly addressable addresses
– End-to-End
•We will have a look at these in the light of recent developments
•End-to-end broken by NATs and firewalls
![Page 16: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/16.jpg)
Network has ValueNetwork has Value
•A network is about delivering data between endpoints
•Data delivery creates value
•Data is the basis for decision making
•We have requirements to the network– Timeliness– Scalability– Security– ...
![Page 17: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/17.jpg)
Cisco’s Traffic ForecastCisco’s Traffic Forecast
Cisco's Global IP Traffic Forecast 2005-2011
0
2000
4000
6000
8000
10000
12000
14000
16000
18000
20000
2005 2006 2007 2008 2009 2010 2011
Pet
abyt
es /
mo
nth
![Page 18: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/18.jpg)
Trends in NetworkingTrends in Networking
Trend Challenges Solutions
P2P Growth in traffic, upstream bottlenecks
P2P caching
Internet Broadcast Flash crowds P2P content distribution, multicast technologies
Internet Video-on-Demand Growth in traffic, especially metropolitan area and core
Content Delivery Networks (CDNs), increasing network capacity, compression
Commercial Video-on-Demand
Growth in traffic in the metropolitan area network
CDNs, increasing network capacity, compression
High-definition content Access network IPTV bottleneck, growth in VoD traffic volume in the metropolitan area network
CDNs, increasing network capacity, compression
![Page 19: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/19.jpg)
Current StateCurrent State
•Internet is growing fast (40%+ annual growth)
•Much of the growth comes from P2P and video delivery
•There are circa 1 billion Internet users and 3.3 billion mobile phone users
•Mobile Internet is anticipated to grow rapidly
– Many problems with applications and services
•It is very difficult to change the Internet backbone and large access networks
– Overlay solutions
– Middleboxes
•A lot of discussion on Internet architecture
– Clean-slate vs. incremental
![Page 20: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/20.jpg)
Looking at the LayersLooking at the Layers
•Link Layer / Physical
•Network– We will look at mobility, security, and QoS on L3– Mobile IP, network mobility, HIP, NAT Traversal
•Transport– Basic properties of transport layer protocols
• TCP variants, DCCP, TLS, dTLS– Mobility and security on L4
•Application– Security, identity management
•Goal: have an understanding of the solutions and tradeoffs on each layer and discussion on the role of layering
![Page 21: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/21.jpg)
Physical
Link
Network
Transport
Application
Physical
Link
Network
Transport
Application
PAP, CHAP, EAP, WEP, ...
IPsec
HIP
HTTPS, S/MIME, PGP,WS-Security, Radius, Diameter, SAML 2.0 ...
TLS, SSH, ...
![Page 22: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/22.jpg)
Role of StandardsRole of Standards
•On this course, we will talk a lot about standards
– IETF is the main standards body for Internet technologies
– Instruments: RFCs, Internet drafts
– Working groups
– IRTF
•Other relevant standards bodies
– W3C, OMA, 3GPP, OMG
![Page 23: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/23.jpg)
Transport IssuesTransport Issues
•Network layer (IP) provides basic unreliable packet delivery between end-points
•Transport layer needs to provide reliability, congestion control, flow control, etc. for applications
•TCP variants
•SCTP
•DCCP
•TLS
•DTLS
![Page 24: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/24.jpg)
MobilityMobility
•What happens when network endpoints start to move?
•What happens when networks move?
•Problem for on-going conversations– X no longer associated with address– Solution: X informs new address
•Problem for future conversations– Where is X? what is the address?– Solution: X makes contact address available
•In practice not so easy. Security is needed!
![Page 25: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/25.jpg)
Mobility
Micro Macro Global
Intra-subnet
Intra-domain Inter-domain
Cellular IP (1998)
TMIP (2001)
Hierarchical MIP (1996)
Hawaii (1999)
Dynamic Mobility Agent (2000)
HMIPv6 (2001)
MIP (1996)
MIPv6 (2001)
Time (evolutionary path)
Classifying Mobility ProtocolsClassifying Mobility Protocols
![Page 26: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/26.jpg)
NAT TraversalNAT Traversal
•As mentioned, end-to-end is broken
•Firewalls block and drop traffic
•NATs do address and port translation– Hide subnetwork and private IPs
•How to work with NATs– Tricky: two NATs between communications– NAT and NAPT– One part is to detect NATs– Another is to get ports open
•IETF efforts– STUN– ICE– TURN– NSIS
![Page 27: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/27.jpg)
QoSQoS
•By default, there is no QoS support on the Internet
•IP is unreliable, packet types are handled differently (TCP/UDP/ICMP)
•No guarantees on TCP flow priority (OS and NW stack issue)
•IETF work– DiffServ, IntServ, NSIS
![Page 28: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/28.jpg)
Security FeaturesSecurity Features
•IPSec provides basic security (tunnel,transport) with IKE
•Solution for autentication, authorization, accounting is needed (AAA)
– Radius, Diameter
•Case: WLAN access network
![Page 29: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/29.jpg)
HIPHIP
•HIP is a proposal to unify mobility, multi-homing, and security features that are needed by applications
•Identity-based addressing realizing locator-identity split
•Change in the networking stack that is not very visible to applications (no IP addresses though!)
•HIP architecture, HIP implementation for Linux
![Page 30: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/30.jpg)
NetFPGANetFPGA
•The NetFPGA is a low-cost platform for teaching networking hardware and router design, and a tool for networking researchers.
•The NetFPGA offloads processing from a host processor.
•The host's CPU has access to main memory and can DMA to read and write registers and memories on the NetFPGA.
•A hardware-accelerated datapath.
•Four Gigabit ports and multiple banks of local memory installed on the card.
•Uses Verilog and a cross compilation environment.
![Page 31: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/31.jpg)
http://netfpga.org/static/guide_beta_1_1.html
![Page 32: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/32.jpg)
Basic Architectural ComponentsBasic Architectural Componentsof an IP Routerof an IP Router
Control Plane
Datapathper-packet processing
SwitchingForwarding
Table
Routing Table
Routing Protocols
Management& CLI
Softw
areH
ardware
Reference: http://yuba.stanford.edu/cs344_public/
![Page 33: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/33.jpg)
Bloom FiltersBloom Filters
•Network applications of Bloom filters
0 1 0 1 1 1 0 0 0 0
x
0 1 0 1 0 0 1 0
y z
![Page 34: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/34.jpg)
Privacy and Identity ManagementPrivacy and Identity Management
•Privacy and trust matters a lot
•Single sign-on
– Liberty, OpenID, OAuth, GAA, ..
•Services on the Web
– How to achieve scalability
– Case: Amazon Dynamo
•Recent developments
![Page 35: T-110.5110 Computer Networks II Introduction 21.9.2009](https://reader035.vdocument.in/reader035/viewer/2022070402/568137f8550346895d9fbaf7/html5/thumbnails/35.jpg)
Questions and DiscussionQuestions and Discussion