Computer Network Review
Computer network This course is this semester, "Software Technology Foundation" one of the course content, accounted for only 20 hours of teaching, scaled score is also about 30 points. But the knowledge of this course is too much, too miscellaneous, and often closely related to life, such as: why the router with the time is 192.168.0.1? Why is the intranet within the campus inaccessible outside the campus? Why the Internet is slow to set up a DNS this thing? These content let me want to know a little more about the knowledge, but the time is not much, can only listen to the class, the class repeatedly thought, by taking two books outside the Book 1 as a supplement. After all, the TCP/IP 4-layer protocol, and the 5-layer protocol in the book, each layer tells the process to "indecisive", but also "mastery", along with the most of the fields I have learned the nouns, it is not easy to understand. So in this review summary, will add some life-related ideas, not just a summary of knowledge.
Tomorrow will be the exam, today can not be summed up, dig a hole, back to fill.
Directory
Chapter One physical layer
Chapter II Data Link Layer
Chapter III Network layer
Fourth transmission layer
Fifth application layer (temporary space)
The sixth chapter related noun
The seventh chapter of the computer network in life
The eighth chapter analysis
Chapter One physical layer
Physical Layer Overview: Each layer has a responsibility for each layer, the physical layer of the overview is: How to send? How to collect? 2
The primary task of the physical layer is described as some of the features that determine the interface to the transport media, namely:
- Mechanical properties
- Electrical characteristics
- Functional characteristics
- Process characteristics
Quadrature amplitude modulated QAM
- Using a variety of phase, amplitude, frequency, to generate a variety of code elements, so that each code element can represent a multi-bit 3
Shannon Formula
C = W log2 (1+s/n) b/S
W for Channel bandwidth
- S/n for signal-to-noise ratio
- S is the average power of the signal transmitted within the channel
- N is the Gaussian noise power inside the channel
- Shannon's formula shows an ideal transmission rate, but the actual channel will be much lower.
Various cables
- Twisted pair Wire
- Coaxial cable
- Optical cable
Channel Multiplexing Technology 4
Frequency Division Multiplexing
Time Division Multiplexing
Statistical Time Division Multiplexing
Wavelength Division Multiplexing
- Frequency Division multiplexing of Light
Code Division Multiplexing (CDM) 5
- Commonly used: CDMA (Code Division Multiple Access)
- The chip sequence should be orthogonal
Waveform
- Mann Code
- Differential Mann Code
Chapter II Data Link Layer
Data Link Layer Overview: How is it transmitted? How good is it?
The data link layer increases the frame head and tail at the first paragraph to increase the frame tail (CRC check)
Error checking
- Parity check (this is a technology)
- Internet checksum (This is the transport layer)
- Cyclic check code (this is a technique)
- CRC check (this is the data link layer, in the tail package)
MAC Protocol (media access control) 6
LAN Technology
Hubs
is essentially a repeater on the work-at-a-stream level: The received Bitstream is replicated on all other interfaces 11
Network Bridge
The bridge has the function of filtering frames. When a bridge receives a frame, it does not forward the frame to all of the connections, but instead checks the destination MAC address of the frame before determining which interface to forward the frame to 12
Chapter III Network layer
Network layer Overview: How can I find a place to go? How can I give it to the port I want to give?
IP datagram Format
Minimum of 20 bytes
- IP grouping reorganization
IP Address
- The IP address is only relevant to the interface, not much to the host router
- All 1 addresses in the network are broadcast
- 127.0.0.1 Native IP
- The ABC class has a private network address
Sub-Network Division
- Divide an IP segment into multiple subnets so that departments can use each
- DHCP dynamically assigns IP addresses
Fourth transmission layer
Transport Layer Overview: How can I give it to the program?
Port
- Range is 0~65535 (16 x bits)
- 0~1023 is a low-end, reserved for some well-known applications or system applications
- 1024~65535 for high-end
TCP Message Section header details
Three phases of TCP data transfer
Establish a connection
- SYN = 1, seq = x
- SYN = 1, ACK = 1, seq = y, ack= x+1
- ack = 1, seq = x + 1, ack = y+1
- Data transmission
Release connection
- After sending the data, the party that wants to release a send fin = 1, seq = u
- At this time the other party can also send
- ack = 1, seq = V, ack= u+1 If the other person is still sending.
- Until Fin = 1, ACK = 1, seq = w, ack= u+1
- A must give answer ack = 1, seq = U + 1, ack = w+1
- When B is received, it can be closed, a must wait for two MSL to close
TCP's caching mechanism and traffic control
A sliding window is used to cache, ensuring that the buffer is not overrun by confirmation and window size
Congestion control of TCP
- Slow start and congestion avoidance
- Udp
Fifth application layer (temporary space) chapter sixth related nouns
- Protocol: Protocol defines the format and sequence of information sent and received between network entities, and the actions required to send and receive information 14
- ASDL (asymmetric subscriber lines): Asymmetric digital Subscriber Line 15
Packet names for each layer:
- Data Link layer: frame, ether frame, Ethernet frame
- Network layer: IP datagram
- Transport Layer: TCP segment, TCP message segment
- Unidirectional communication (simplex) [can only be sent], bi-directional alternating communication (half-duplex communication) [cannot simultaneously receive \ Send], two-way simultaneous communication (full-duplex communication) [may simultaneously receive, send]
- Baseband signal: Data signals such as text and images are baseband signals
- Band-Pass signal: The baseband signal is modulated by the carrier signal. (signals that can be transmitted)
- Modulation: amplitude modulation, frequency modulation, phase adjustment 16
- IP Address: 32-bit, network layer address
- MAC address (LAN address or Physical address): 48-bit to get a grouping (or frame) between interfaces that are physically interconnected (on the same network)
- TCP: Built on a non-connected unreliable protocol (IP) that provides a reliable, connected delivery protocol
The seventh chapter of the computer network in life
Network Bridge
This word appears in the bridging of Virtual machine network settings
What is going on in the intranet of campus network?
The IP address of the intranet is the IP address of the private network, these IP addresses can only access the external network and cannot be accessed by the external network.
Why is the intranet site not on the outside?
See outside the IP is a unified public IP, intranet IP can not find a public network host
Mobile Internet I also have an IP address ah? Why are there so many mobile IPs?
Carefully confirm that these IP are also private network IP, not public IP
The eighth chapter analysis
CSMA/CD Minimum Ethernet frame length
This Ethernet frame length to meet the transmission delay is twice times the longest propagation delay in the entire line, so as to ensure that a host a every time, even if the furthest host B in the impending conflict (the channel busy information) issued its Ethernet frame, a can also be sent after the Ethernet frame to receive the latest possible conflict signal.
Maximum Transmission Unit MTU
Hubs, bridges, routers
- A hub is a physical layer device: received on the hair 17
- A network bridge is a data-link layer device: Received look at which group, the group of 18
- Router is the network layer device: received to see which network, consider how to go, sent to the next stop 19
Reference books include the fourth edition of the computer network Shehiren
The introduction of foreign textbooks of black skin in computer network
"TCP/IP Detail: Volume One"?
- Personal understanding, the summary of each chapter is so??
- Suppose there are 16 kinds of code elements, then for each code element designator, 1~16, you can use different code element to indicate its label corresponding to the bits, that is, 4 bits. But the more kinds require more precision.
- This actually does not belong to how to preach, is how to hair of the good content, the main view of the data link layer of this technology discussion??
- Analogy: You communicate with the machine in Chinese, I communicate with the machine in English.
- Mac here is not talking about MAC address that Mac, that is, the media Access Control??
- Because if the etheric frame is too short to detect all possible collisions at the same time, the etheric frame has been sent out, and it is impossible to confirm that the Ethernet frame just emitted has been sent out?
- 1 conflicts in {0,1} randomly selected a time to send, the second conflict {0,1,2,3}, exponential increment, 10 times and then 1024 in the selection of one??
- Determine MAC address based on IP??
- Determine IP based on MAC address??
- Receive a data to send to all nodes, inefficient??
- This look at the data is going to the heap, if the original pile of no matter, the other heap on the tube??
- In other words, there will be two times 1 when the connection is established.
- "In-depth understanding of the computer system," the description, information is a bit + context, the agreement stipulates the fixed meaning of the context, is the network can continue to operate without ambiguity on the basis of the operation??
- Upstream speed and downlink speed is not equal, (PT station Brush upload when obviously feel the fax slow. ) ??
- Just like the triangle function in high school?
- The equivalent of it does not exist, he is the root line??
- This is the MAC address that is written down, to see which pile of which on which to send??
- Express in the Xi ' An interchange level, to go to Changchun Express? Send to Shenyang Transit station!??
Computer Network Review