SlideShare a Scribd company logo
How the Internet works
related sections to read
in Networked Life:
10.1-10.2
13.1
14.1
15.1-15.2
17.1
• Take a moment to think about how amazing
the Internet is:
– It’s always on
– It is “free”
– It’s (almost) never noticeably congested (though
individual sites or access points might be)
– you can get messages to anywhere in the world
instantaneously
– you can communicate for free, including voice
and video conferencing
– you can stream music and movies
– it is uncensored (in most places) (of course, this
can be viewed as good or bad)
• This talk focuses on the question of how the
Internet can be so robust
– Is there an “Achilles’ heel”? a single point of
failure that can be attacked?
– How does the network autonomously adapt to
congestion?
• To answer these questions, we will discuss
some of the underlying technologies that
contribute to the robustness of the Internet
– packet switching
– Ethernet
– TCP/IP
– routing protocols
• Evolution of the technologies underlying the
Internet
– the Internet was not designed top-down by a
single company or government organization
– it evolved
• many alternative technologies/protocols were
proposed and tried out
• eventually, the best were identified and adopted (in a
“democratic” way)
• when new people joined, they had to use whatever
protocols everybody was using, until it grew into a
standard
– it is decentralized – no one owns it or controls it
• Compare with the old-style telephone networks
– designed top-down by companies like AT&T, who built
the network of telephone lines, and wanted (and had)
complete control over their use
– good aspect of design:
• old handsets did not need electrical power
• energy for dial-tone and speakers came from phone line
• phones would work even if power knocked out in electrical
strorm
– con: they were circuit-switched (a dedicated path
between caller and receiver had to be established,
and most of that bandwidth was wasted)
• In contrast, given how the Internet “grew”, it is
amazing it works at all (!)
protocol stacks
• layered architecture
drivers,
network card
files
unencrypted
streams
buffers
packets
frames
bytes
bits
each layer is an abstraction
that assumes the functionality
of the layer underneath
Ethernet
• local machines on common wire hear all transmissions
• in cases of packet collisions, use a “back-off” algorithm
• each machine waits a random time (gauged by the amount of
congestion) to re-transmit
IP addresses
• [0-255].[0-255].[0-255].[0.255]
• 128.194.139.1 (associated with a specific MAC)
• <domain>.<domain>.<subnet>.<host>
• IPv4 (current standard, 4 billion IP addresses)
• IPv6 (extended address space: 2128=1039 devices)
• 128.194.139.1 = sun.cs.tamu.edu
• DNS – domain name server
– distributed network of servers that translate hostnames to
IP addresses
– TAMU campus has several DNS servers that
communicate with others worldwide
– nslookup: www.google.com = 74.125.227.145
TCP-IP
• transport layer
• built on top of IP
– assumes can send datagrams to IP addresses
• UDP: User Datagram Protocol
– simple, fast, checksums, no guarantee of
delivery
• TCP-IP: Transmission Control Protocol
– connection-oriented: hand-shaking, requires
message acknowledgements (ACK)
– guarantees all packets delivered uncorrupted
in order
TCP-IP packets
• a file or message is divide up into packets
information:
• source IP address
• destination IP address
• mesg sequence number
• (for acknowledgement)
• payload size
• checksum
payload (e.g. 512 bytes)
Geoff Huston, www.potaroo.net/ispcol
Congestion Control
• TCP/IP senders track the
response time of ACK
messages
• separate latency
(roundtrip) from
throughput (bandwidth)
• adaptively adjust
transmission frequency
Geoff Huston, www.potaroo.net/ispcol
routers and routing
• each router switches
packets among its local
connections
• there are many paths
from source to destination
• ideally, what we want is
to identify the shortest
path (Bellman-Ford
algorithm)
• each router maintains a
router table of IP
addresses sent on out-
going links (plus
congestion information)
http://int.fhsu.edu/kevin/courses/datacom1VC/html/chapter_10.html
router
port 1
port 2:
addresses
128.1.1.1 to
132.255.255.255
port IP address range
1 001.*.*.* to
127.*.*.*
2 128.1.1.1 to
132.255.255.255
3 133.1.1.1 to
191.255.255.255
4 192.1.1.1 to
253.*.*.*
5 254.1.1.1
255.255.255.255
TCP/IP
packet,
dest =
128.19.32.3
• Essentially what routers do is receive packets, extract
destination IP,and switch them to an out-going port.
• Each router has a limited capacity (throughput or
bandwidth, e.g. 10 GB/s).
port 3
port 4
port 5
Router table
Robustness of the Internet
• does the Internet have an “Achilles’ heel”?
• is there a single point of failure (that could
be attacked)?
• or is it designed to be fault tolerant?
• it is hard to know the overall topology
• does the connectivity follow a Poisson
distribution?
– is there an “average” number
of connections, some with more,
some with less?
Modeling the Internet’s Topology
• The connectivity profile likely follows a Power Law
(or Zipf) distribution
– many nodes have few connections (on the edge?)
– few nodes have many connections (in the core?)
– if d is the degree of a node (# connections), then
p(d>x) ≈ kx-a (“scale-free” networks)
– however, this does not necessarily imply that there are
a few highly connected nodes in the core of the Internet
which would become “choke points”
number of connections per node www.crossway.org
proportion
of
nodes
Modeling the Internet with Random
Networks
• Preferential Attachment (PA) model
– new nodes probabilistically connect to popular nodes
• Constrained Optimization (CO) model
– when a cable/router reaches capacity, add another
• both of these generate “scale-free” topologies
• however, CO has much better performance
http://www.nature.com/
nature/journal/v406/n6794
“The Net routes around damage”
the adjacent nodes just
update their router tables
x
What about Internet Congestion?
• the packet-switched design solves this
• packets can take multiple paths to
destination and get re-assembled
• if one router gets overloaded, buffer
overflow messages tell neighbors to route
around it
• also TCP/IP “back-off” algorithm
– monitors throughput of connections and
adjusts transmission frequency adaptively
• thus the Internet is amazingly robust,
adaptive, and fault tolerant by design
Streaming
• Netflix, Pandora
• VOIP (voice-over-IP, Skype)
• video-conferencing
• multi-casting (Olympics)
• dither and jitter
• use lossy compression to adjust
stream to end-to-end bandwidth
• use buffering to smooth out arrival of
packets delayed and out-of-order
• intermediate servers staged for local
distribution (e.g. Akamai)
• quality-of-service guarantees (QoS)
images from: pagetutor.com/
imagecompression
uneven arrival of packets
buffer
even
play-
back
• Access speed is determined by service
provider (bandwidth of connection, e.g.
dialup to T1)
• Internet backbone
– who owns it?
– who controls it? can you tell somebody to stop
streaming or hogging all the bandwidth? (the
cable and phone companies would like to!)
• Net Neutrality
– public policy issue; major economic impact
– service providers cannot discriminate based
on user, content, packet type or destination,
similar to highways
Wireless/Mobile
• replace Ethernet (IEEE 802.3) with 802.11
• transport protocol (TCP/IP) and higher
layers in stack remain the same
• issues
– dynamic IP address assignment (DHCP)
• ask router for temporary unique IP address
– new nodes may join or leave anytime
– roaming – device might change from one
receiver/cell to another, take IP with it?
causes changes in routing tables?
– security – encrypt packets sent over the air

More Related Content

PPT
emp-internet07.ppt
PPTX
Chapter_1_.pptx
PPTX
1 introduction
PPT
Chapter_1_V7.01.ppt
PPT
Chapter_1_V7.01.ppt Computer Networking: A Top Down Approach
PPT
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
PPTX
About the uses of internet & benefits of internet
PPTX
Introduction to Computer Networking CYSE230
emp-internet07.ppt
Chapter_1_.pptx
1 introduction
Chapter_1_V7.01.ppt
Chapter_1_V7.01.ppt Computer Networking: A Top Down Approach
Chapter_1_V7.01gsgsggsgshshsgabbsbshhsh.ppt
About the uses of internet & benefits of internet
Introduction to Computer Networking CYSE230

Similar to HowTheInternetWorks.ppt (20)

PPT
Chapter_1_V7.01.ppt The client sends one request message for the HTML file, a...
PDF
lec1.pdf lecturehsjjdbdbdjkxndbnsjskdndb
PPTX
Lecture 12
PPTX
Computer networking Chapter 1 | computer
PPT
Introduction to computer networks lecture
PPT
Chapter_1_V6.1.ppt
PPT
Chapter_1 V6.1 absolute java original slides
PPT
Chapter 1 v6.1
PPT
what is the Internet? 1.2 network edge network
PDF
Chapter 1 v6.1
PPT
Computer networks notes-module 1 enclosed
PDF
Week 1B.pdf Networking introduction week 1
PPT
Ch1 2ed 29_dec03
PPT
Lecture1 intro
PDF
Introduction to TCP/IP
PPTX
Network chapter 1 ENCS2330 Birzeit_university
PPT
Lecture 01
PPTX
Chapter1 Introduction.pptx
PPTX
LIS3353 SP12 Week 11
PPTX
Introduction to Computer Networking
Chapter_1_V7.01.ppt The client sends one request message for the HTML file, a...
lec1.pdf lecturehsjjdbdbdjkxndbnsjskdndb
Lecture 12
Computer networking Chapter 1 | computer
Introduction to computer networks lecture
Chapter_1_V6.1.ppt
Chapter_1 V6.1 absolute java original slides
Chapter 1 v6.1
what is the Internet? 1.2 network edge network
Chapter 1 v6.1
Computer networks notes-module 1 enclosed
Week 1B.pdf Networking introduction week 1
Ch1 2ed 29_dec03
Lecture1 intro
Introduction to TCP/IP
Network chapter 1 ENCS2330 Birzeit_university
Lecture 01
Chapter1 Introduction.pptx
LIS3353 SP12 Week 11
Introduction to Computer Networking
Ad

Recently uploaded (20)

PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
2. Earth - The Living Planet earth and life
DOCX
Viruses (History, structure and composition, classification, Bacteriophage Re...
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PPTX
Taita Taveta Laboratory Technician Workshop Presentation.pptx
PPTX
Introduction to Cardiovascular system_structure and functions-1
PDF
HPLC-PPT.docx high performance liquid chromatography
PDF
An interstellar mission to test astrophysical black holes
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PPTX
famous lake in india and its disturibution and importance
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PDF
bbec55_b34400a7914c42429908233dbd381773.pdf
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
2Systematics of Living Organisms t-.pptx
PDF
Biophysics 2.pdffffffffffffffffffffffffff
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
Comparative Structure of Integument in Vertebrates.pptx
2. Earth - The Living Planet earth and life
Viruses (History, structure and composition, classification, Bacteriophage Re...
INTRODUCTION TO EVS | Concept of sustainability
Taita Taveta Laboratory Technician Workshop Presentation.pptx
Introduction to Cardiovascular system_structure and functions-1
HPLC-PPT.docx high performance liquid chromatography
An interstellar mission to test astrophysical black holes
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
famous lake in india and its disturibution and importance
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
bbec55_b34400a7914c42429908233dbd381773.pdf
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
AlphaEarth Foundations and the Satellite Embedding dataset
2Systematics of Living Organisms t-.pptx
Biophysics 2.pdffffffffffffffffffffffffff
Ad

HowTheInternetWorks.ppt

  • 1. How the Internet works related sections to read in Networked Life: 10.1-10.2 13.1 14.1 15.1-15.2 17.1
  • 2. • Take a moment to think about how amazing the Internet is: – It’s always on – It is “free” – It’s (almost) never noticeably congested (though individual sites or access points might be) – you can get messages to anywhere in the world instantaneously – you can communicate for free, including voice and video conferencing – you can stream music and movies – it is uncensored (in most places) (of course, this can be viewed as good or bad)
  • 3. • This talk focuses on the question of how the Internet can be so robust – Is there an “Achilles’ heel”? a single point of failure that can be attacked? – How does the network autonomously adapt to congestion? • To answer these questions, we will discuss some of the underlying technologies that contribute to the robustness of the Internet – packet switching – Ethernet – TCP/IP – routing protocols
  • 4. • Evolution of the technologies underlying the Internet – the Internet was not designed top-down by a single company or government organization – it evolved • many alternative technologies/protocols were proposed and tried out • eventually, the best were identified and adopted (in a “democratic” way) • when new people joined, they had to use whatever protocols everybody was using, until it grew into a standard – it is decentralized – no one owns it or controls it
  • 5. • Compare with the old-style telephone networks – designed top-down by companies like AT&T, who built the network of telephone lines, and wanted (and had) complete control over their use – good aspect of design: • old handsets did not need electrical power • energy for dial-tone and speakers came from phone line • phones would work even if power knocked out in electrical strorm – con: they were circuit-switched (a dedicated path between caller and receiver had to be established, and most of that bandwidth was wasted) • In contrast, given how the Internet “grew”, it is amazing it works at all (!)
  • 6. protocol stacks • layered architecture drivers, network card files unencrypted streams buffers packets frames bytes bits each layer is an abstraction that assumes the functionality of the layer underneath
  • 7. Ethernet • local machines on common wire hear all transmissions • in cases of packet collisions, use a “back-off” algorithm • each machine waits a random time (gauged by the amount of congestion) to re-transmit
  • 8. IP addresses • [0-255].[0-255].[0-255].[0.255] • 128.194.139.1 (associated with a specific MAC) • <domain>.<domain>.<subnet>.<host> • IPv4 (current standard, 4 billion IP addresses) • IPv6 (extended address space: 2128=1039 devices) • 128.194.139.1 = sun.cs.tamu.edu • DNS – domain name server – distributed network of servers that translate hostnames to IP addresses – TAMU campus has several DNS servers that communicate with others worldwide – nslookup: www.google.com = 74.125.227.145
  • 9. TCP-IP • transport layer • built on top of IP – assumes can send datagrams to IP addresses • UDP: User Datagram Protocol – simple, fast, checksums, no guarantee of delivery • TCP-IP: Transmission Control Protocol – connection-oriented: hand-shaking, requires message acknowledgements (ACK) – guarantees all packets delivered uncorrupted in order
  • 10. TCP-IP packets • a file or message is divide up into packets information: • source IP address • destination IP address • mesg sequence number • (for acknowledgement) • payload size • checksum payload (e.g. 512 bytes) Geoff Huston, www.potaroo.net/ispcol
  • 11. Congestion Control • TCP/IP senders track the response time of ACK messages • separate latency (roundtrip) from throughput (bandwidth) • adaptively adjust transmission frequency Geoff Huston, www.potaroo.net/ispcol
  • 12. routers and routing • each router switches packets among its local connections • there are many paths from source to destination • ideally, what we want is to identify the shortest path (Bellman-Ford algorithm) • each router maintains a router table of IP addresses sent on out- going links (plus congestion information) http://int.fhsu.edu/kevin/courses/datacom1VC/html/chapter_10.html
  • 13. router port 1 port 2: addresses 128.1.1.1 to 132.255.255.255 port IP address range 1 001.*.*.* to 127.*.*.* 2 128.1.1.1 to 132.255.255.255 3 133.1.1.1 to 191.255.255.255 4 192.1.1.1 to 253.*.*.* 5 254.1.1.1 255.255.255.255 TCP/IP packet, dest = 128.19.32.3 • Essentially what routers do is receive packets, extract destination IP,and switch them to an out-going port. • Each router has a limited capacity (throughput or bandwidth, e.g. 10 GB/s). port 3 port 4 port 5 Router table
  • 14. Robustness of the Internet • does the Internet have an “Achilles’ heel”? • is there a single point of failure (that could be attacked)? • or is it designed to be fault tolerant? • it is hard to know the overall topology • does the connectivity follow a Poisson distribution? – is there an “average” number of connections, some with more, some with less?
  • 15. Modeling the Internet’s Topology • The connectivity profile likely follows a Power Law (or Zipf) distribution – many nodes have few connections (on the edge?) – few nodes have many connections (in the core?) – if d is the degree of a node (# connections), then p(d>x) ≈ kx-a (“scale-free” networks) – however, this does not necessarily imply that there are a few highly connected nodes in the core of the Internet which would become “choke points” number of connections per node www.crossway.org proportion of nodes
  • 16. Modeling the Internet with Random Networks • Preferential Attachment (PA) model – new nodes probabilistically connect to popular nodes • Constrained Optimization (CO) model – when a cable/router reaches capacity, add another • both of these generate “scale-free” topologies • however, CO has much better performance http://www.nature.com/ nature/journal/v406/n6794
  • 17. “The Net routes around damage” the adjacent nodes just update their router tables x
  • 18. What about Internet Congestion? • the packet-switched design solves this • packets can take multiple paths to destination and get re-assembled • if one router gets overloaded, buffer overflow messages tell neighbors to route around it • also TCP/IP “back-off” algorithm – monitors throughput of connections and adjusts transmission frequency adaptively • thus the Internet is amazingly robust, adaptive, and fault tolerant by design
  • 19. Streaming • Netflix, Pandora • VOIP (voice-over-IP, Skype) • video-conferencing • multi-casting (Olympics) • dither and jitter • use lossy compression to adjust stream to end-to-end bandwidth • use buffering to smooth out arrival of packets delayed and out-of-order • intermediate servers staged for local distribution (e.g. Akamai) • quality-of-service guarantees (QoS) images from: pagetutor.com/ imagecompression uneven arrival of packets buffer even play- back
  • 20. • Access speed is determined by service provider (bandwidth of connection, e.g. dialup to T1) • Internet backbone – who owns it? – who controls it? can you tell somebody to stop streaming or hogging all the bandwidth? (the cable and phone companies would like to!) • Net Neutrality – public policy issue; major economic impact – service providers cannot discriminate based on user, content, packet type or destination, similar to highways
  • 21. Wireless/Mobile • replace Ethernet (IEEE 802.3) with 802.11 • transport protocol (TCP/IP) and higher layers in stack remain the same • issues – dynamic IP address assignment (DHCP) • ask router for temporary unique IP address – new nodes may join or leave anytime – roaming – device might change from one receiver/cell to another, take IP with it? causes changes in routing tables? – security – encrypt packets sent over the air