This document provides an overview of the key concepts in computer networking. It discusses the two main views of the Internet as a network of networks that connects billions of devices and as a platform for network applications and online services. The document then covers various topics related to the different layers of the OSI model including physical network components, protocols, routing, transport layer services, and security concerns. It provides definitions and examples to explain foundational networking concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
86 views
Ethernet Op, DSL and 4G Bad
This document provides an overview of the key concepts in computer networking. It discusses the two main views of the Internet as a network of networks that connects billions of devices and as a platform for network applications and online services. The document then covers various topics related to the different layers of the OSI model including physical network components, protocols, routing, transport layer services, and security concerns. It provides definitions and examples to explain foundational networking concepts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8
Chap 1 Introduction 🤔
1.1 What is the internet
1. What is the "nuts-and-bolts" view of the Internet? (3 things) • A "network of networks" • A collection of billions of computing devices and packet switches interconnected by links. • A collection of hardware and software components executing protocols that define the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event. 2. What is the "services" view of the Internet? (2 things) • A platform for building network applications. • A place to go for information, entertainment, and to communicate with people. 3. What is a protocol? (might be important)
*Basically two-way communication.
1.2 Network edge • Ethernet: Wired. Up to 100's Gbps per link • WiFi: Wireless. 10’s to 100’s of Mbps per device • Cable access network: Wired. Up to 10’s to 100’s of Mbps downstream per user. • Digital Subscriber Line: Wired. Up to 10’s of Mbps downstream per user. • 4G cellular LTE: Wireless. Up to 10’s Mbps per device In order of data speed: -Digital Subscriber Line (wired) and 4G cellular LTE (wireless) -Cable access network (wired) and WiFi (wireless) -Ethernet (wired) Ethernet op, DSL and 4G bad Which of the following physical layer technologies has the highest transmission rate and lowest bit error rate in practice? 802.11 WiFi Channel 4G/5G cellular Twisted pair (e.g., CAT5, CAT6) Fiber optic cable Coaxial cable Satellite channel Fiber optic = sound cool = very good 1.3 Network core VERSUS FORWARDING: Forwarding is the local action of moving arriving packets from router’s input link to appropriate router output link, while routing is the global action of determining the source-destination paths taken by packets. packet-switching mesh of interconnected routers packet-switching: hosts break application-layer messages into packets § forward packets from one router to the next, across links on path from source to destination § each packet transmitted at full link capacity 1.4 delay, loss, throughput in networks • Transmission delay Time spent transmitting packets bits into the link. • Processing delay Time needed to perform an integrity check, lookup packet information in a local table and move the packet from an input link to an output link in a router. • Propagation delay Time needed for bits to physically propagate through the transmission medium from end one of a link to the other. • Queueing delay Time spent waiting in packet buffers for link transmission. 1.5 protocol layers, service models 1. Link layer: Transfer of data between neighboring network devices (unit of data that is exchanged among protocol: Frame ) 2. Physical layer: Transfer of a bit into and out of a transmission media. (unit of data that is exchanged among protocol: Bit ) 3. Network layer: Delivery of datagrams from a source host to a destination host (typically). (unit of data that is exchanged among protocol: Datagram ) 4. Transport layer; Transfer of data between one process and another process (typically on different hosts). (unit of data that is exchanged among protocol: Segment ) 5. Application Layer: Protocols that are part of a distributed network application. (unit of data that is exchanged among protocol: Message )
ENCAPSULATION: Taking data from the layer above, adding header fields appropriate for this layer, and then placing the data in the payload field of the “packet” for that layer.
1.6 network under attack: security
6. Firewall: Specialized “middleboxes” filtering or blocking traffic, inspecting packet contents inspections. 7. Encryption: Provides confidentiality by encoding contents. 8. Digital signatures: Used to detect tampering/changing of message contents, and to identify the originator of a message. 9. Access control: Limiting use of resources or capabilities to given users. 10. Authentication: Proving you are who you say you are. 1.7 history Chap2 Application Layer 2.1 Principles of network applications CLIENT-SERVER PARADIGM. There is a server with a well known server IP address There is a server that is always on HTTP uses this application structure. THE PEER-TO-PEER (P2P) PARADIGM. There is not a server that is always on. A process requests service from those it contacts and will provide service to processes that contact it. UDP SERVICE. Best effort service. The service will make a best effort to deliver data to the destination but makes no guarantees that any particular segment of data will actually get there. TCP SERVICE. Loss-free data transfer. The service will reliably transfer all data to the receiver, recovering from packets dropped in the network due to router buffer overflow. Flow Control. The provided service will ensure that the sender does not send so fast as to overflow receiver buffers Congestion control. The service will control senders so that the senders do not collectively send more data than links in the network can handle 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail (SMTP, POP3, IMAP) 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Chap3 Transport Layer 3.1 transport-layer services -Transport layer functions are implemented primarily at the hosts at the “edge” of the network. -It provides for host-to-host delivery service. 3.2 multiplexing and demultiplexing TRANSPORT-LAYER DEMULTIPLEXING. Receiving a transport-layer segment from the network layer, extracting the payload (data) and delivering the data to the correct socket TRANSPORT-LAYER MULTIPLEXING Taking data from one socket (one of possibly many sockets), encapsulating a data chuck with header information – thereby creating a transport layer segment – and eventually passing this segment to the network layer. MULTIPLEXING/DEMULTIPLEXING: UDP PORT NUMBERS. When multiple UDP clients send UDP segments to the same destination port number at a receiving host, those segments (from different senders) will always be directed to the same socket at the receiving host.
MULTIPLEXING UDP WITH IDENTICAL PORT NUMBERS.
It is possible for two UDP segments to be sent from the same socket with source port 5723 at a server to two different clients. MULTIPLEXING TCP WITH IDENTICAL PORT NUMBERS. It is possible for two TCP segments with source port 80 to be sent by the sending host to different clients 3.3 connectionless transport: UDP DOES UDP PRESERVE APPLICATION-LAYER MESSAGE BOUNDARIES? On the sending side, the UDP sender will take each application-layer chunk of data written into a UDP socket and send it in a distinct UDP datagram. And then on the receiving side, UDP will deliver a segment’s payload into the appropriate socket, preserving the application-defined message boundary. UDP header field include: Source port number Destination port number Internet checksum Length (of UDP header plus payload) Why is the UDP header length field needed? because the payload section can be of variable length. and thí let UDP know where the segment ends. Over what set of bytes is the checksum field in the UDP header computed over? the entire UDP segment, except the checksum field itself, and the IP sender and receive address fields. 3.4 principles of reliable data transfer 3.5 connection-oriented transport: TCP 3.6 principles of congestion control 3.7 TCP congestion control Chap 4 Network Layer 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol who’s that? 4.5 routing algorithm 4.6 routing in the internet 4.7 broadcast and multicast routing Some obscure formulas just in case: (think of it like time = distance/velocity; t = s/v) Reference link: Knowledge Checks