The first chapter concept of computer network

Source: Internet
Author: User

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M02/6C/BA/ Wkiom1vqozphxhrzaaog_zi71oo389.jpg "" 787 "height=" 603 "/>

Concept:
    LAN: Coverage is small, own money to buy equipment, bandwidth fixed, self-maintenance
        LAN network cable less than 100 meters;
        Bandwidth: The switch is 100M, that is, each interface is 100M
         Access Layer switches: Switches <---> pcs, ports, small bandwidth
        converged layer switches: switch sinks <---> switch "connect", small port, large bandwidth
        specification of LAN should be layered.
    WAN: Wider than LAN, bandwidth is not fixed (pay rent bandwidth), by the ISP maintenance
    Internat:isp, own room, Provide Internet access services to Internet users
        ISP: Internet service operator,
         two-wire room:
    computer Data communication process:
        MAC: Decide who to scare to.
        IP Address: Determine source and target
        Routers: one IP address per interface, one MAC address
        packet:
         Data frame:

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M00/6C/BA/ Wkiom1vqoakcwda3aaikulsfyeu881.jpg "" 751 "height=" 543 "/>650) this.width=650;" Style= "background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M01/6C/BA/ Wkiom1vqoazq6gf3aafgoze4g2q338.jpg "" 718 "height=" 504 "/>650) this.width=650;" Style= "background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt="Image" src= "http://s3.51cto.com/wyfs02/M00/6C/BA/wKiom1VQobjgi5K3AAIWp6B20vQ650.jpg" "712" height= "460"/>
OSI Reference Model: should be shown net chain

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M02/6C/BA/ Wkiom1vqocihi6luaajsxxq8waw799.jpg "" 697 "height=" 523 "/>
Application layer: All programs that can generate network traffic
Presentation layer: Whether to encrypt before transmission, or compression processing, binary, ASCII, etc.
Session Layer: Trojan, differentiate and manage different session programs and Windows
Transport Layer: Reliable transmission (transmission + acknowledgement), unreliable transmission, flow control (sliding window mechanism)
Network layer: Choose the best path, plan IP address
Data Link layer: The start and end of a frame. Transparent transmission (Escape recovery), error checking
Physical layer: Interface standard (physical standard), electrical standard, how to transfer data faster

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M00/6C/BA/ Wkiom1vqodeh1kxwaain9mvdiww952.jpg "" 714 "height=" 473 "/>

ISO troubleshooting: From low to high, one layer at a line of error


Physical Layer:
is connected (connected state)--
Transmitted packets and received packets--network cable, Crystal Head (two rounds, two receipts, total 8)
Data Link Layer:
Does not apply to the MAC address of the network card, but by modifying the registry, using a different MAC address
ADSL Overdue fee
Network negotiation Inconsistent
The computer is connected to the wrong VLAN
Network layer:
No gateway configured
Network Address settings error, subnet mask
No network at the specified address on the router
Application layer:
OSI Reference Model and network security:
1. Physical Layer Security:
Cannot allow others to access their network at will
2. Data Link Layer Security:
ADSL, WiFi account password;
Vlan
Switch-bound Mac
3. Network Layer Security:
Use ACLs on routers to control access
4. Application Layer Security:
App No bugs
The performance index of computer network:

650) this.width=650; "Style=" background-image:none; border-bottom:0px; border-left:0px; margin:0px Auto; padding-left:0px; padding-right:0px; Display:block; Float:none; border-top:0px; border-right:0px; padding-top:0px "title=" image "border=" 0 "alt=" image "src=" http://s3.51cto.com/wyfs02/M01/6C/BA/ Wkiom1vqoewhiaiyaah5kdbayww721.jpg "" 691 "height=" 522 "/>
1) Rate: The rate at which a host on a computer network transmits data bits on a digital channel, also known as date or bit rates, Unit b/s,kb/s,mb/s,gb/s
0,1:bit
2) Bandwidth: The highest data rate that digital channels can transmit in the field of Datacom, Unit b/s,kb/s,mb/s,gb/s
3) Throughput: The amount of data in a network per unit of time, Unit b/s,mb/s
4) Delay:
Send delay:
Transmit delay = data block length (bit)/channel bandwidth (bite/sec)
Propagation delay: Line
Processing delay:
Queue delay:

Propagation Speed:
Fiber: 20.5wkm
Copper Wire: 23.1wkm
But the fiber supports a smaller transmit rate, but the copper wire does not support

5) Delay Bandwidth product:
Delay Bandwidth Product = propagation delay x Bandwidth
The implication is that if the data is sent at the maximum bandwidth, and then the first bit arrives at the destination, the number of bits sent, and the number of these bits is now transmitted in the tunnel, that is, the maximum number of bits that can be accommodated on a link.

        6) Round trip: RTT (round-trip time)
             start sending data from sender to sender to send to receive acknowledgement
             test: Ping time =**ms
        7) Network utilization:
             Channel Utilization: Data elapsed time/(have, no) data elapsed time
             Network utilization: Channel utilization weighted average
             network utilization is closer to 1 o'clock, the time delay increases infinitely;
            D = d0/(1-u )
                D0: Time delay when the network is idle;
                D: Network Current latency
                U: Channel utilization

First chapter concept of computer network

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.