Professional Documents
Culture Documents
Networking
Prof. Carl Hauser
hauser@eecs.wsu.edu
509 335 6470
Introduction
1-1
Introduction
Computer Networking:
A Top Down Approach ,
5th edition.
Jim Kurose, Keith Ross
Addison-Wesley, April
2009.
Introduction
1-2
Motivating Example
Our goal:
see an example of
Overview:
C37.118.2 PMU communication
how communications
standard
supports the smart
What matters? Performance.
grid idea
Delay
approach:
Throughput
use
Loss
synchrophasors as
What contributes to
example
performance?
use Internet as
example of wide- What technologies are
area
available and what are the
communication
tradeoffs?
Introduction
1-3
infastructure
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-4
PMU Communications
You should obtain the C37.118.2 standard:
Introduction
1-5
Introduction
1-6
Throughput
Loss
1-7
Networking Introduction
Internet as unified
communication
solution:
get feel and
Overview:
whats the Internet?
whats a protocol?
1-8
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-9
millions of connected
computing devices:
hosts = end systems
wireless
laptop
running network
cellular
handheld
apps
communication links
fiber, copper,
access
points
radio, satellite
wired
links
transmission
rate = bandwidth
routers: forward
router
packets (chunks of
data)
Mobile network
server
Global ISP
Home network
Regional ISP
Institutional network
Introduction
1-10
Mobile network
receiving of msgs
Internet: network of
networks
loosely hierarchical
public Internet versus
private intranet
Global ISP
Home network
Regional ISP
Institutional network
Internet standards
RFC: Request for comments
IETF: Internet Engineering
Task Force
Introduction
1-11
infrastructure enables
distributed applications:
Web, VoIP, email, games,
e-commerce, file sharing
communication services
provided to apps:
reliable data delivery
from source to
destination
best effort (unreliable)
data delivery
Introduction
1-12
applications and
hosts
access networks,
physical media:
wired, wireless
communication links
network core:
interconnected
routers
network of
networks
Introduction
1-13
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-14
peer-peer
client/server model
peer-peer model:
1-15
Substation
RTU
modem
telephone
network
CC Network or SCADA
equipment
CC
modem
home
phone
Internet
DSLAM
telephone
network
splitter
DSL
modem
home
PC
central
office
Substation Router/Gateway
Ethernet
switch
100 Mbps
1 Gbps
100 Mbps
server
substations
wireless LANs:
802.11b/g (WiFi): 11 or 54 Mbps
wider-area wireless access
provided by telco operator
~1Mbps over cellular system
(EVDO, HSDPA)
next up (?): WiMAX (10s Mbps)
over wide area
router
base
station
mobile
hosts
Introduction
1-19
Physical Media
Bit: propagates between
transmitter/rcvr pairs
physical link: what lies
between transmitter &
receiver
guided media:
Category 3: traditional
phone wires, 10 Mbps
Ethernet
Category 5:
100Mbps Ethernet
unguided media:
signals propagate freely,
e.g., radio
Introduction
1-20
conductors
bidirectional
baseband:
broadband:
multiple channels on
cable
HFC
high-speed point-to-point
transmission (e.g., 10s100s Gps)
Introduction
1-21
electromagnetic
spectrum
no physical wire
bidirectional
propagation
environment effects:
reflection
obstruction by objects
interference
1-22
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-23
routers
the fundamental
question: how is data
transferred through net?
circuit switching:
dedicated circuit per
call: telephone net
packet-switching: data
sent thru net in
discrete chunks
Introduction
1-24
capacity
dedicated resources:
no sharing
circuit-like
(guaranteed)
performance
call setup required
Introduction
1-25
resource contention:
aggregate resource
demand can exceed
amount available
congestion: packets
queue, wait for link use
store and forward:
packets move one hop
at a time
Introduction
1-26
A
B
statistical multiplexing
1.5 Mb/s
queue of packets
waiting for output
link
1-27
Packet-switching: store-and-forward
L
R
Example:
L = 7.5 Mbits
R = 1.5 Mbps
transmission delay = 15
sec
1-28
resource sharing
simpler, no call setup
excessive congestion: packet delay and loss
protocols needed for reliable data transfer,
congestion control
Q: How to provide circuit-like behavior?
bandwidth guarantees needed for audio/video apps
Introduction
1-29
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-30
capacity
packets queue, wait for turn
Introduction
1-31
2. queueing
time waiting at output
link for transmission
depends on congestion
level of router
transmission
propagation
nodal
processing
queueing
Introduction
1-32
transmission
4. Propagation delay:
d = length of physical link
s = propagation speed in
medium (~2x108 m/sec)
propagation delay = d/s
Note: s and R are very
different quantities!
propagation
nodal
processing
queueing
Introduction
1-33
Nodal delay
dnodal dproc dqueue d trans dprop
dproc = processing delay
typically a few microsecs or less
dqueue = queuing delay
depends on congestion
dtrans = transmission delay
= L/R, significant for low-speed links
dprop = propagation delay
a few microsecs to hundreds of msecs
Introduction
1-34
arrival rate
Introduction
1-35
3 probes
3 probes
Introduction
1-36
1-37
Packet loss
queue (aka buffer) preceding link in buffer has
finite capacity
packet arriving to full queue dropped (aka lost)
lost packet may be retransmitted by previous
node, by source end-system, or not at all
buffer
(waiting area)
A
B
packet arriving to
full buffer is lost
Introduction
1-38
Throughput
throughput: rate (bits/time unit) at which
link
capacity
that
can carry
server,
with
server
sends
bits pipe
Rs bits/sec
fluid
at rate
file of
F bits
(fluid)
into
pipe
Rs bits/sec)
to send to client
link that
capacity
pipe
can carry
Rfluid
c bits/sec
at rate
Rc bits/sec)
Introduction
1-39
Throughput (more)
Rs < Rc What is average end-end throughput?
Rs bits/sec
Rc bits/sec
Rc bits/sec
bottleneck link
link on end-end path that constrains end-end throughput
Introduction
1-40
end-end
throughput:
min(Rc,Rs,R/10)
in practice: Rc or
Rs is often
bottleneck
Rs
Rs
Rs
R
Rc
Rc
Rc
1-41
Performance Calculations-1
Substation S is 100km from control center
Introduction
1-42
Performance Calculations-2
Control center C1 in WA state is 2000km
1-43
Performance Calculations(aside)
The U.S. power system uses AC at a
Introduction
1-44
Performance Calculations-3
Going back to the situation of the first
1-45
Performance Calculations-4
In the previous problem (30 samples per
1-46
Performance Calculations-5
Continuing the previous problem, what
Introduction
1-47
Performance Calculations-6
Assume now that the link speed from the
Introduction
1-48
Performance Calculations-7
Assuming a 50kbit/sec link speed for both
1-49
Performance Calculations-8
Bulk data transfer: if the substation
1-50
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-51
Whats a protocol?
human protocols:
whats the time?
I have a question
introductions
specific msgs sent
specific actions taken
when msgs received,
or other events
network protocols:
machines rather than
humans
all communication
activity in Internet
governed by protocols
protocols define format,
order of msgs sent and
received among network
entities, and actions
taken on msg
transmission, receipt
Introduction
1-52
Protocol Layers
Networks are complex!
many pieces:
hosts
routers
links of various
media
applications
protocols
hardware,
software
Question:
Is there any hope of
organizing structure of
network?
Introduction
1-53
Why layering?
Dealing with complex systems:
explicit structure allows identification,
1-54
applications
transfer
TCP, UDP
source to destination
application
transport
network
link
physical
PPP, Ethernet
Introduction
1-55
application
presentation
session
transport
network
link
physical
Introduction
1-56
Encapsulation
source
message
segment
Ht
datagram Hn Ht
frame Hl Hn Ht
application
transport
network
link
physical
link
physical
switch
destination
M
Ht
Hn Ht
Hl Hn Ht
M
M
application
transport
network
link
physical
Hn Ht
Hl Hn Ht
M
M
network
link
physical
Hn Ht
router
Introduction
1-57
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-58
Network Security
The field of network security is about:
Introduction
1-59
trojan horse.
1-60
1.
select target
target
Introduction
1-61
src:B dest:A
payload
1-62
A
src:B dest:A
payload
Introduction
1-63
src:B dest:A
B
Introduction
1-64
Network Security
More in 4th part of the course
Introduction
1-65
Roadmap
1.
2.
3.
4.
Network core
5.
6.
7.
8.
1-66
Introduction: Summary
Covered a lot of material!
Internet overview
whats a protocol?
network edge, core, access
network
packet-switching versus
circuit-switching
Internet structure
performance: loss, delay,
throughput
layering, service models
Security
Introduction
1-67