Note for Computer Networks_1

Source: Internet
Author: User

Network Hardware

1. A computer network is a collection of computers connected by communication links

2. Communication Link:

1.Point to Point

2.Broadcast

3. Nodes: The Entities in the network (hosts, routers, servers, devices, programs, etc)

edges/links: The connections between entities

4. topology: A topologyrefers to the physical layout of the network.

5.Network Hardware:

1m:personal Area Network

Point-to-point:usb/serial/parallel/infrared

Boradcast:bluetooth

10m to 1km:local area network (LAN)

Boradcast:

1.Cable 100Mbps to 10Gbps (switched Ethernet)

2.Radio (Wlan) 11Mbps to hundreds Mbps (Wifi)

10km:metropolitan Area Network

100km to 1000km:wide area network (WAN)

  

ROUTER:A computer that PROVDE Communications Service

Subnet:collection of routers

Host:send packets of data to all other via LAN and Rounter

---

Subnet:end Systems (hosts) is interconnected via a communication sub-network

SubNet is composed of lines (wires) and switches

SubNet May is based on packet-switched and/or circuit-switched technologies

–packet switched means users compete for bandwidth
–circuit-switched means users are guaranteed bandwidth

10000km:the Internet

Connecting networks together to form a network of networks are called an Internet

*the largest (worldwide) Internet is the called the Internet

6. The Internet is an infrastructure

The world Wide Web was just another service that uses the Internet

-----------------------------------------------------------------------

Network Software

1. Communication protocols

Communication protocols consist of a set of rules governing the interaction of processes in a network

Communication protocols define:

1. The service It provides

2. The assumptions about the environment where it executes, including the services it uses

3. The type and format of the messages (called frames or packets) used to implement it

4. The rules (algorithms) guarding the consistency of the message exchanges and the integrity of the service provided

2. Connection-oriented Service Protocol:

1. connection-oriented Packet Switching (Virtual circuit switching)

Establish a connection→use it for data transfer (if the connection is established) →release the connection

* Data is always delivered and in theorder sent

3. Connectionless Service Protocol:

1. Connectionless packet Switching (Datagram switching)

1.There is no attempt to set up a connection

2. Eachmessage carries the full destination address

3.Each message is routed through the network Independent of all the others

4. Protocol/service Hierarchies

  

1. Networks is organised as a series of layers, each one built on the one below it

2. The lower layers provide services to the upper layers, the upper layers is shielded how the Serv ICES implemented

3. When layer n on one machine holds a conversation with Layer N in another machine (peer):

The rules and conventions are called protocols.

Data is send indirectly between the peers, by using the services of the lower layers

4. The interface between adjacent layers defines the primitive operations and services offered

5. OSI Reference Model

  

1. The data switch between appliction is translated as following:

Layer 7→layer 3 (then packed) →layer 1→layer 3 in router the Side→layer 3 in router target side→layer 3 target Si De (unpacking) →layer 7

2. Layer

1. Layer 1 (physical layer) defines the electrical, mechanical, procedural, and functional specifications

–activating the physical link between end systems
–maintaining the physical link between end systems
–deactivating the physical link between end systems

2. Layer 2 (Data Link layer) provides a data transmission service free of transmission errors between adjacent nodesusing The physical layer

Layer 2 breaks data from the network layer to frames

–process Acknowledgements
–detect and recover from damaged, lost and duplicate frame problems
–make sure the transmitter does not drown the receiver (flow control)
–control the access to the medium in broadcast networks (Mac-medium access control sublayer)

3. Layer 3 (Network layer) controls how a packet are routed from source to destination through a subnet

–determine the route for each source/destination pair
–perform Congestion Control (when there is too many messages in transit)
–maintain Accounting information
–overcome the problem of interconnecting heterogeneous subnets (LANs and WANs, each with different protocols)

4. Layer 4 (Transport layer) creates a distinct network connection for each Transport connection

1.Layer 4 is the real (lowest) End-to-end Layer between source and destination applications

2.It creates a distinct network connection for each transport connection

–or creates multiple connections and divides the data among those connections to improve performance
–or shares several transport connections onto the same network connection to reduce cost

3.It provides end to end flow control (data link layer is deals with adjacent nodes)

4.It provides end to end error detection and correction

5.It may provide additional congestion control

5. Layer 5 (Session layer)

1.Performs Dialogue Control (who's turn it to talk?)

2.Token Management (who have access to shared resource?)

3.Data Synchronisation (Where were we before the line went down?)

6. Layer 6 (Presentation layer)

1.Concerned with syntax and semantics of data rather than it ' s transmission

2.Provides common data abstractions to allow communication between heterogeneous computers

7. Layer 7 (Application layer) is where the applications reside

–network Virtual terminals (TELNET)
–file Transfer (FTP)
–electronic Mail (SMTP)
–newsgroups (NNTP)
– Web (HTTP)
–directory Lookup (DNS)
–electronic Commerce

3. Terminology

1. Entities: Active elements in each layer

2. Entities in the same layer on different machines is called peer entities. They exchange Protocol Data Units (PDU)

3. Entities in layer N implement a service used by layer n+1. Layer N is the "service provider" and layer n+1 is the "service user"

4. Layers N and n+1 Exchange Interface Data Units (IDU), containing Interface Control information (ICI) and Service Data Units (SDU)

5. Services is accessible at a SAP (Service Access point)

4. OSI Encapsulation

1. As each data unit was passed down the layers, Moreheaders was added

2. As each data unit was passed up the layers, headers was removed

*icis do not form part of message or header and does not propagate

    

6. TCP/IP (transmission Control protocol/internet Protocol) Reference Model

1.The difference between TCP/IP and OSI

  

2. The different Layers

1. Host-to-network Layer (= OSI physical+ Data link layers):

, haven Reference Model does not really say much about the this layer
–TCP/IP runs over almost any layer 1-2 protocols (egethernet, Frame Relay, ATM)

2. Internet Layer (=osi network layer):

–this is a packet-switching network based on a connectionless layer
–packets travel independently to the destination (could arrive out of sequence)
, Haven official Packet format and protocol is called IP
–packet Routing and Congestion control is the major issues here

3. Transport Layer

–designed to allow peer entities on the source and destination hosts to exchange data

–two end-to-end protocols is defined:tcp and UDP

–TCP (transmission Control Protocol) is a reliable connection-oriented Protocol:

» It works on byte stream
» It can fragment application data before sending it to the network layer
» It handles flow control

–UDP (User Datagram Protocol) is a unreliable connectionless Protocol, used for client-server type request-reply queries and applications which require prompt delivery (Egspeech and video)

    

Note for Computer Networks_1

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.