Ethernet Op, DSL and 4G Bad

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Chap 1 Introduction 🤔

1.1 What is the internet


1. What is the "nuts-and-bolts" view of the Internet? (3 things)
• A "network of networks"
• A collection of billions of computing devices and packet switches interconnected
by links.
• A collection of hardware and software components executing protocols that define
the format and the order of messages exchanged between two or more
communicating entities, as well as the actions taken on the transmission and/or
receipt of a message or other event.
2. What is the "services" view of the Internet? (2 things)
• A platform for building network applications.
• A place to go for information, entertainment, and to communicate with people.
3. What is a protocol? (might be important)

*Basically two-way communication.


1.2 Network edge
• Ethernet: Wired. Up to 100's Gbps per link
• WiFi: Wireless. 10’s to 100’s of Mbps per device
• Cable access network: Wired. Up to 10’s to 100’s of Mbps downstream per user.
• Digital Subscriber Line: Wired. Up to 10’s of Mbps downstream per user.
• 4G cellular LTE: Wireless. Up to 10’s Mbps per device
In order of data speed:
-Digital Subscriber Line (wired) and 4G cellular LTE (wireless)
-Cable access network (wired) and WiFi (wireless)
-Ethernet (wired)
Ethernet op, DSL and 4G bad
Which of the following physical layer technologies has the highest transmission rate and
lowest bit error rate in practice?
802.11 WiFi Channel
4G/5G cellular
Twisted pair (e.g., CAT5, CAT6)
Fiber optic cable
Coaxial cable
Satellite channel
Fiber optic = sound cool = very good
1.3 Network core
VERSUS FORWARDING: Forwarding is the local action of moving arriving packets
from router’s input link to appropriate router output link, while routing is the global action
of determining the source-destination paths taken by packets.
packet-switching
mesh of interconnected routers
packet-switching: hosts break application-layer messages into packets
§ forward packets from one router to the next, across links on path from source to
destination
§ each packet transmitted at full link capacity
1.4 delay, loss, throughput in networks
• Transmission delay
Time spent transmitting packets bits into the link.
• Processing delay
Time needed to perform an integrity check, lookup packet information in a
local table and move the packet from an input link to an output link in a router.
• Propagation delay
Time needed for bits to physically propagate through the transmission medium from
end one of a link to the other.
• Queueing delay
Time spent waiting in packet buffers for link transmission.
1.5 protocol layers, service models
1. Link layer: Transfer of data between neighboring network devices (unit of data
that is exchanged among protocol: Frame )
2. Physical layer: Transfer of a bit into and out of a transmission media. (unit of data
that is exchanged among protocol: Bit )
3. Network layer: Delivery of datagrams from a source host to a destination host
(typically). (unit of data that is exchanged among protocol: Datagram )
4. Transport layer; Transfer of data between one process and another process
(typically on different hosts). (unit of data that is exchanged among protocol:
Segment )
5. Application Layer: Protocols that are part of a distributed network application.
(unit of data that is exchanged among protocol: Message )

ENCAPSULATION: Taking data from the layer above, adding header fields appropriate
for this layer, and then placing the data in the payload field of the “packet” for that layer.

1.6 network under attack: security


6. Firewall: Specialized “middleboxes” filtering or blocking traffic, inspecting packet
contents inspections.
7. Encryption: Provides confidentiality by encoding contents.
8. Digital signatures: Used to detect tampering/changing of message contents, and
to identify the originator of a message.
9. Access control: Limiting use of resources or capabilities to given users.
10. Authentication: Proving you are who you say you are.
1.7 history
Chap2 Application Layer
2.1 Principles of network applications
CLIENT-SERVER PARADIGM.
There is a server with a well known server IP address
There is a server that is always on
HTTP uses this application structure.
THE PEER-TO-PEER (P2P) PARADIGM.
There is not a server that is always on.
A process requests service from those it contacts and will provide service to processes
that contact it.
UDP SERVICE.
Best effort service. The service will make a best effort to deliver data to the destination
but makes no guarantees that any particular segment of data will actually get there.
TCP SERVICE.
Loss-free data transfer. The service will reliably transfer all data to the receiver,
recovering from packets dropped in the network due to router buffer overflow.
Flow Control. The provided service will ensure that the sender does not send so fast as
to overflow receiver buffers
Congestion control. The service will control senders so that the senders do not
collectively send more data than links in the network can handle
2.2 Web and HTTP
2.3 FTP
2.4 electronic mail
(SMTP, POP3, IMAP)
2.5 DNS
2.6 P2P applications
2.7 socket programming with UDP and TCP
Chap3 Transport Layer
3.1 transport-layer services
-Transport layer functions are implemented primarily at the hosts at the “edge” of the
network.
-It provides for host-to-host delivery service.
3.2 multiplexing and demultiplexing
TRANSPORT-LAYER DEMULTIPLEXING.
Receiving a transport-layer segment from the network layer, extracting the payload (data)
and delivering the data to the correct socket
TRANSPORT-LAYER MULTIPLEXING
Taking data from one socket (one of possibly many sockets), encapsulating a data chuck
with header information – thereby creating a transport layer segment – and eventually
passing this segment to the network layer.
MULTIPLEXING/DEMULTIPLEXING: UDP PORT NUMBERS.
When multiple UDP clients send UDP segments to the same destination port number at
a receiving host, those segments (from different senders) will always be directed to the
same socket at the receiving host.

MULTIPLEXING UDP WITH IDENTICAL PORT NUMBERS.


It is possible for two UDP segments to be sent from the same socket with source port
5723 at a server to two different clients.
MULTIPLEXING TCP WITH IDENTICAL PORT NUMBERS.
It is possible for two TCP segments with source port 80 to be sent by the sending host to
different clients
3.3 connectionless transport: UDP
DOES UDP PRESERVE APPLICATION-LAYER MESSAGE BOUNDARIES?
On the sending side, the UDP sender will take each application-layer chunk of data written
into a UDP socket and send it in a distinct UDP datagram. And then on the receiving side,
UDP will deliver a segment’s payload into the appropriate socket, preserving the
application-defined message boundary.
UDP header field include:
Source port number
Destination port number
Internet checksum
Length (of UDP header plus payload)
Why is the UDP header length field needed?
because the payload section can be of variable length. and thí let UDP know where the
segment ends.
Over what set of bytes is the checksum field in the UDP header computed over?
the entire UDP segment, except the checksum field itself, and the IP sender and receive
address fields.
3.4 principles of reliable data transfer
3.5 connection-oriented transport: TCP
3.6 principles of congestion control
3.7 TCP congestion control
Chap 4 Network Layer
4.1 introduction
4.2 virtual circuit and datagram networks
4.3 what’s inside a router
4.4 IP: Internet Protocol
who’s that?
4.5 routing algorithm
4.6 routing in the internet
4.7 broadcast and multicast routing
Some obscure formulas just in case:
(think of it like time = distance/velocity; t = s/v)
Reference link:
Knowledge Checks

You might also like