Nice Stuf Chapter 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

LAN (Local Area Network)

A LAN is a privately owned network that operates within and nearby a single building like a home, office or factory. LANs are widely used to connect personal computers and consumer electronics to let them share resources (e.g., printers) and exchange information. When LANs are used by companies, they are called enterprise networks.

communication medium

A computer network can provide a powerful

TCP/IP Reference Model

A four layer model derived from experimentation; omits some OSI layers and uses the IP as the network layer.

protocol stack

A list of the protocols used by a certain system, one protocol per layer

MAN (Metropolitan Area Network)

A network that covers an area equivalent to a city or other municipality. cable television networks

e-commerce (electronic commerce

A third goal for many companies is doing business electronically, especially with customers and suppliers

World Wide Web

A well-known example of a distributed system

TCP/IP Link Layer

All these requirements led to the choice of a packet-switching network based on a connectionless layer that runs across different networks. The lowest layer in the model, the link layer describes what links such as serial lines and classic Ethernet must do to meet the needs of this connectionless internet layer. It is not really a layer at all, in the normal sense of the term, but rather an interface between hosts and transmission links. Early material on the TCP/IP model has little to say about it.

flow control

An allocation problem that occurs at every level is how to keep a fast sender from swamping a slow receiver with data. Feedback from the receiver to the sender is often used.

Network Layer

Controls operation of the subnet. A key design issue is determining how packets are routed from source to destination. Routes can be based on static tables that are ''wired into'' the network and rarely changed, or more often they can be updated automatically to avoid failed components. They can also be determined at the start of each conversation, for example, a terminal session, such as a login to a remote machine. Finally, they can be highly dynamic, being determined anew for each packet to reflect the current network load.

negotiation

In some cases when a connection is established, the sender, receiver, and subnet conduct... ...about the parameters to be used, such as maximum message size, quality of service required, and other issues

Virtual LAN or VLAN

In this design each port is tagged with a ''color,'' say green for engineering and red for finance. The switch then forwards packets so that computers attached to the green ports are separated from the computers attached to the red ports. Broadcast packets sent on a red port, for example, will not be received on a green port, just as though there were two different LANs. We will cover VLANs at the end of Chap. 4

request-reply

In this service the sender transmits a single datagram containing a request; the reply contains the answer

architecture of the mobile phone network

It has several parts, as shown in the simplified version of the UMTS architecture in Fig. 1-31. First, there is the air interface. This term is a fancy name for the radio communication protocol that is used over the air between the mobile device (e.g., the cell phone) and the cellular base station. Advances in the air interface over the past decades have greatly increased wireless data rates. The UMTS air interface is based on Code Division Multiple Access (CDMA), a technique that we will study in Chap. 2. The cellular base station together with its controller forms the radio access network. This part is the wireless side of the mobile phone network. The controller node or RNC (Radio Network Controller) controls how the spectrum is used. The base station implements the air interface. It is called Node B, a temporary label that stuck

TCP/IP transport layer.

It is designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end transport protocols have been defined here. The first one, TCP (Transmission Control Protocol), is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet. It segments the incoming byte stream into discrete messages and passes each one on to the internet layer. At the destination, the receiving TCP process reassembles the received messages into the output stream. TCP also handles flow control to make sure a fast sender cannot swamp a slow receiver with more messages than it can handle.

client-server model.

It is widely used and forms the basis of much network usage. The most popular realization is that of a Web application, in which the server generates Web pages based on its database in response to client requests that may update the database.

communication subnet, or just subnet

The rest of the network that connects these hosts is then called

network service provider

The second variation is that the subnet may be run by a different company.

Ethernet

The topology of many wired LANs is built from point-to-point links. IEEE 802.3. by far, the most common type of wired LAN

DMCA takedown notices

There are now automated systems that search peer-to-peer networks and fire off warnings to network operators and users who are suspected of infringing copyright Digital Millennium Copyright Act

Switching elements, or just switches,

are specialized computers that connect two or more transmission lines

hotspots

based on the 802.11 standard are another kind of wireless network for mobile computers.

VPNs (Virtual Private Networks)

be used to join the individual networks at different sites into one extended network

connectivity

home users can access information, communicate with other people, and buy products and services with e-commerce.

UDP (User Datagram Protocol)

is anunreliable, connectionless protocol for applications that do not want TCP's sequencing or flow control and wish to provide their own. own. It is also widely used for one-shot, client-server-type request-reply queries and applications in which prompt delivery is more important than accurate delivery, such as transmitting speech or video

ARPANET

The NPL system was not a national system (it just connected several computers on the NPL campus), but it demonstrated that packet switching could be made to work. Furthermore, it cited Baran's now discarded earlier work. Roberts came away from Gatlinburg determined to build what later became known as the

TCP/IP Application Layer

The TCP/IP model does not have session or presentation layers. No need for them was perceived. Instead, applications simply include any session and presentation functions that they require. Experience with the OSI model has proven this view correct: these layers are of little use to most applications. On top of the transport layer is the application layer. It contains all the higher- level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP). Many other protocols have been added to these over the years. Some important ones that we will study, shown in Fig. 1-22,

cut-through switching.

The alternative, in which the onward transmission of a message at a node starts before it is completely received by the node

Application Layer

The application layer contains a variety of protocols that are commonly needed by users. One widely used application protocol is HTTP (HyperText Transfer Protocol), which is the basis for the World Wide Web. When a browser wants a Web page, it sends the name of the page it wants to the server hosting the page using HTTP. The server then sends the page back. Other application protocols are used for file transfer, electronic mail, and network news.

Session Layer

The fifth layer in the OSI model. This layer establishes and maintains communication between two nodes on the network. It can be considered the "traffic cop" for network communications.

Transport Layer

The fourth layer of the OSI model. In this layer protocols ensure that data are transferred from point A to point B reliably and without errors. this layer services include flow control, acknowledgment, error correction, segmentation, reassembly, and sequencing.

resource sharing

The goal is to make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource or the user.

IP(Internet Protocol), plus a companion protocol called ICMP (Internet Control) Message Protocol

The job of the internet layer is to deliver IP packets where they are supposed to go. Packet routing is clearly a major issue here, as is congestion (though IP has not proven effective at avoiding congestion)

interface

Between each pair of adjacent layers. The interface defines which primitive operations and services the lower layer makes available to the upper one.

social network

Between person-to-person communications and accessing information. Facebook

Medium Access Control

Broadcast networks have an additional issue in the data link layer: how to control access to the shared channel. A special sublayer of the data link layer, the medium access control sublayer, deals with this problem.

broadcasting(multicasting)

Broadcast systems usually also allow the possibility of addressing a packet to all destinations by using a special code in the address field

scalable

Designs that continue to work well when the network gets large are said to be

power-line networks

Devices such as televisions that plug into the wall... to send information throughout the house over the wires that carry electricity

switched Ethernet

Each computer speaks the Ethernet protocol and connects to a box called a switch with a point-to-point link. Hence the name. A switch has multiple ports, each of which can connect to one computer. The job of the switch is to relay packets between computers that are attached to it, using the address in each packet to determine which computer to send it to.

wiki

Even more loosely, groups of people can work together to create content. Wikipedia

profiling

For example, small files called cookies that Web browsers store on users' computers allow companies to track users' activities in cyberspace and may also allow credit card numbers, social security numbers, and other confidential information to leak all over the Internet (Berghel, 2001).

forwarding algorithm

How each router makes the decision as to where to send a packet next

routing algorithm

How the network makes the decision as to which path

network neutrality

It should now come only as a slight surprise to learn that some network operators block content for their own reasons. Some users of peer-to-peer applications had their network service cut off because the network operators did not find it profitable to carry the large amounts of traffic sent by those applications. Those same operators would probably like to treat different companies differently. If you are a big company and pay well then you get good service, but if you are a small-time player, you get poor service. Opponents of this practice argue that peer-to-peer and other content should be treated in the same way because they are all just bits to the network

ISP (Internet Service Provider)

Its customers who connect to the ISP receive Internet service.

confidentiality

Mechanisms that provide... ...defend against this threat, and they are used in multiple layers.

error correction

More powerful codes allow... ...where the correct message is recovered from the possibly incorrect bits that were originally received

Middleware

Often a layer of software on top of the operating system.

servers

Often these are centrally housed and maintained by a system administrator.

error detection

One mechanism for finding errors in received information uses codes

point-to-point (unicasting)

Point-to-point links connect individual pairs of machines. source to the destination on a network made up of point-to-point links, short messages, called packets

addressing or naming

Since there are many computers on the network, every layer needs a mechanism for identifying the senders and receivers that are involved in a particular message.

congestion

Sometimes the problem is that the network is oversubscribed because too many computers want to send too much traffic, and the network cannot deliver it all. This overloading of the network is called

IEEE 802.11

There is a standard for wireless LANs. 802.11, popularly known as WiFi, which has become very widespread

primitives

These primitives tell the service to perform some action or report on an action taken by a peer entity.

router

These switching computers have been called by various names in the past

botnet

They might be used to steal your bank account passwords, or to have your computer send spam

layers or levels

To reduce their design complexity, most networks are organized as a stack of

Presentation Layer (Layer 6)

Unlike the lower layers, which are mostly concerned with moving bits around, the presentation layer is concerned with the syntax and semantics of the information transmitted. In order to make it possible for computers with different internal data representations to communicate, the data structures to be exchanged can be defined in an abstract way, along with a standard encoding to be used ''on the wire.'' The presentation layer manages these abstract data structures and allows higher-level data structures (e.g., banking records) to be defined and exchanged.

protocol layering

We have recently seen the key structuring mechanism used to support change by dividing the overall problem and hiding implementation details:

store-and-forward switching

When the intermediate nodes receive a message in full before sending it on to the next node

distributed system

a collection of independent computers appears to its users as a single coherent system

computer networks

a large number of separate but interconnected computers do the job

protocol

an agreement between the communicating parties on how communication is to proceed

circuit

another name for a connection with associated resources, such as a fixed bandwidth. This dates from the telephone network in which a circuit was a path over copper wire that carried a phone conversation

internetwork

composite networks that are made up of more than one network

physical layer

concerned with transmitting raw bits over a communication channel.43

OSI (Open Systems Interconnection) model

deals with connecting open systems—that is, systems that are open for communication with other systems. We will just call it the OSI model for short

header

front of the message to identify the message and passes the result to layer 3. The header includes control information, such as addresses, to allow layer 4 on the destination machine to deliver the message. Other examples of control information used in some layers are sequence numbers (in case the lower layer does not preserve message order), sizes, and times.

RFID (Radio Frequency IDentification)

future. RFID tags are passive (i.e., have no battery) chips the size of stamps and they can already be affixed to books, passports, pets, credit cards, and other items in the home and out. This lets RFID readers locate and communicate with the items over a distance of up to several meters, depending on the kind of RFID. Originally, RFID was commercialized to replace barcodes. It has not succeeded yet because barcodes are free and RFID tags cost a few cents. Of course, RFID tags offer much more and their price is rapidly declining. They may turn the real world into the Internet of things (ITU, 2005).

datagram service,

guarantee. Unreliable (meaning not acknowledged) connectionless service

data link layer

is to transform a raw transmission facility into a line that appears free of undetected transmission errors. It does so by masking the real errors so the network layer does not see them. It accomplishes this task by having the sender break up the input data into data frames (typically a few hundred or a few thousand bytes) and transmit the frames sequentially. If the service is reliable, the receiver confirms correct receipt of each frame by sending back an acknowledgement frame.

PANs (Personal Area Networks)

let devices communicate over the range of a person Bluetooth

statistical multiplexing

meaning sharing based on the statistics of demand. It can be applied at low layers or a single link, or at high layers for a network or even applications that use the network.

packet

message at the network layer

Phishing

messages masquerade as originating from a trustworthy party, for example, your bank, to try to trick you into revealing sensitive information, for example, credit card numbers

Transmission lines

move bits between machines. They can be made of copper wire, optical fiber, or even radio links. Most companies do not have transmission lines lying about, so instead they lease the lines from a telecommunications company.

Quality of service

name given to mechanisms that reconcile these competing demands

authentication

prevent someone from impersonating someone else

integrity

prevent surreptitious changes to messages, such as altering ''debit my account $10'' to ''debit my account $1000.'' All of these designs are based on cryptography, which we shall study in Chap. 8.

AP (Access Point), wireless router, or base station,

relays packets between the wireless computers and also between them and the Internet.

connectionless

service is modeled after the postal system. Each message (letter) carries the full destination address. and each one is routed through the intermediate nodes inside the system independent of all the subsequent messages.

Connection-oriented

service is modeled after the telephone system

network architecture

set of layers and protocols. The specification of an architecture must contain enough information to allow an implementer to write the program or build the hardware for each layer so that it will correctly obey the appropriate protocol

Acknowledged Datagram

situations, the convenience of not having to establish a connection to send one message is desired, but reliability is essential. It is like sending a registered letter and requesting a return receipt. When the receipt comes back, the sender is absolutely sure that the letter was delivered to the intended party and not lost along the way. Text messaging on mobile phones is an example.

WAN (Wide Area Network)

spans a large geographical area, often a country or continent

dialog control (keeping track of whose turn it is to transmit), token management (preventing two parties from attempting the same critical operation simultaneously), and synchronization

ssss

IPTV (IP TeleVision)

systems that are based on IP technology instead of cable TV or radio transmissions

broadcast links

the communication channel is shared by all the machines on the network; packets sent by any machine are received by all the others. An address field within each packet specifies the intended recipient

TCP/IP Internet Layer

the linchpin that holds the whole architecture together. It is shown in Fig. 1-21 as corresponding roughly to the OSI network layer. Its job is to permit hosts to inject packets into any network and have them travel independently to the destination (potentially on a different network). They may even arrive in a completely different order than they were sent, in which case it is the job of higher layers to rearrange them, if in-order delivery is desired. Note that ''internet'' is used here in a generic sense, even though this layer is present in the Internet

internetworking

the linking of separate networks into an interconnected network, where each network retains its own identity

NFC (Near Field Communication)

the mobile can act as an RFID smartcard and interact with a nearby reader for payment

Internet

the most well-known example of a network of networks

physical medium

through which actual communication occurs

ubiquitous computing

which computing is embedded into everyday life, as in the vision of Mark Weiser (1991

email (electronic mail)

which employees generally use for a great deal of daily communication

clients

with which they access remote data, for example, to include in spreadsheets they are constructing.


Kaugnay na mga set ng pag-aaral

Learning Curve 6b. Sensory and Perceptual Processing

View Set

Patho I, Ch.19 - Neurobiology of Schizophrenia, Mood Disorders, and Anxiety Disorders

View Set

American Government Exam 1 Free Response

View Set

Mastering Biology Chapter 11 Study Guide

View Set

Edexcel A Level Physics Command Words

View Set

English IV: Unit 7 - The Search for Meaning

View Set

World Geography Today Chapter 8 and Chapter 26 Reading Checks and Section Reviews

View Set