• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back

List the "nuts and bolts" of the internet

Hosts = end systems


Running network apps


Communication Links


Packet Switches (routers and switches)

Internet: _______ of ________; interconnected _____

network of networks; interconnected ISPs

Protocols control _______________________

Controls sending and receiving of messages (e.g. TCP, IP, HTTP)

Internet standards

RFC: Request for comments


IETF: Internet Engineering Task Force

What is the internet from a service view?

Infrastructure that provides services to applications: Web, VoIP, email, games, social-networks.



Provides programming interface to apps:


-hooks that allow sending and receiving app programs to "connect" to Internet


-provides service options, analogous to postal service

What is a protcol?

A protocol defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event.

Network Edge

-Hosts: Clients and servers


-Servers often in data centers

Access networks

The network that physically connects an end
system to the first router (also known as the “edge router”) on a path from the end
system to any other distant end system.

Network Core

-interconnected routers


-network of networks

How to connect end systems to edge router?

-Residential access nets


-Institutional access networks


-Mobile access networks

Frequency division multiplexing (FDM)

Different channels transmitted in different frequency bands

Shared wireless access network connects _______ to _______

end systems to router

Host sending packets of data function:

-takes application message


-breaks into smaller chunks, known as packets, of length L bits


-transmits packet into access network at transmission rate R


-link transmission rate aka link capacity, or bandwidth

Packet transmission delay =

Time needed to transmit L-bit packet into link =


L (bits) / R (bits/sec)

Bit

propagates between transmitter/receiver pairs

Physical link

What lies between transmitter and receiver

Guided media

Signals propagate in solid media: copper, fiber, coax

Unguided media

Signals propagate freely: radio

Twisted Pair (TP)

two insulated copper wires

Coaxial Cable

-2 concentric copper conductors


-bidirectional


-broadband:


-multiple channels on cable


-HFC

Fiber optic cable

-glass fiber carrying light pulses, each pulse a bit


-high-speed operation


-low error rate:


-repeaters spaced far apart


-immune to electromagnetic noise

Radio

-signal carried in electromagnetic spectrum


-no physics "wire"


-bidirectional


-propagation environment effects:


-reflects


-obstruction of objects


-interference

Radio Link Types

-terrestrial microwave


-LAN (WiFi)


-wide-area (cellular)


-satellite

Packet Switching

Hosts break application layer messages into packets:


-forward packets from one router to next, across links on path from source to destination


-each packet transmitted at full link capacity

Store and foreward

Entire packet must arrive at router before it can be transmitted on next link

Queuing and Loss

If arrival rate (in bits) to link exceeds transmission rate of link for a period of time:


-packets will queue, wait to be transmitted on link


-packets can be dropped (lost) if memory (buffer) fills up

Routing

Determines source-destination route taken by packets:


-routing algorithms

Forwarding

Move packets from router's input to appropriate router output

Circuit Switching

Dedicated resources: no sharing


Circuit segment idle if not used by call


Commonly used in traditional telephone networks

What are the different paradigms that can be used in the network core to transfer data? which one is used in the internet? Explain the main difference between the two.

The two different paradigms are packet switching and circuit switching. The current internet uses packet switching because of the high amount of users it has to service.


The main difference between these paradigms is that circuit switching reserves lines for communication. This ensures the user using this line will have a stable connection. In packet switching, resources are shared (no lines reserved). This is usually sufficient because users aren't accessing the network 100% of the time.

Packet switching is great for _______ data

bursty

End systems connect to internet via _____________

access ISPs

Access ISPs must be ________________ so that any 2 hosts can send packets to each other

interconnected

Evolution of the network of networks was driven by ____________ and _______________

economics and national policies

Time-division multiplexing (TDM)

Time is divided into frames of fixed duration, and each frame is divided into a fixed number of time slots.

The internet, the network of networks, contains

access ISP, regional ISPs, tier1 ISPs, internet exchange points (IXPs), content provider networks

Types of delays

Processing Delay


Queuing Delay


Transmission Delay


Propagation Delay

Processing Delay

-The time required to examine the packet’s header and determine where to direct the packet



-Includes the time needed to check for bit-level errors in the packet that occurred in transmitting the packet’s bits from the upstream node to the router

Queuing Delay

-The waiting time for a packet to be transmitted onto the link.



-The length of the queuing delay of a specific packet will depend on the number of earlier-arriving packets that are queued and waiting for transmission onto the link.

Transmission Delay

Assuming first come first server, the packet can only be transmitted after all the packets that have arrived before it have been transmitted.



So the transmission rate can be denoted as the length of packet L (bits) divided by the rate of transmission R (bits/sec) = L / R

Propagation Delay

Once a bit is pushed into a link, it needs to propagate to the next router.



The time required to propagate from the beginning of the link to the next router is the propagation delay. The bit propagates at the propagation speed of the link.



The propagation delay is the distance d between two routers divided by the propagation speed s.


d / s

Queuing Delay:
R: Link bandwidth (bps)


L: Packet length (bits)


a: average packet arrival rate


La/R ~ 0 = _______________


La/R -> 1 = ________________


La/R -> 1 = ________________

La/R ~ 0 = Avg queuing delay small


La/R -> 1 = Avg queuing delay large


La/R > 1 = Avg delay infinite

traceroute program

provides delay measurement from source to router along end-end internet path towards destination

Packet Loss

Queue preceding link in buffer has finite capacity, so any packets arriving to a full queue will be dropped (lost).


Lost packet may be re-transmitted by previous node, by source end system, or not at all.

Throughput

Rate (bits/time unit) at which bits transferred between sender/receiver:


-instantaneous: rate at given point in time


-average: rate over longer period of time

Bottleneck link

link on end-end path that constrains end-end throughput

Layers

Each layer implements a service:


-via its own internal-layer actions


-relying on services provided by layer below


Why layering?

  • Dealing with complex systems:
  • explicit structure allows identification, relationship of complex system's pieces
  • modularization eases maintenance, updating of system

Internet protocol stack

  • Application: supporting network application (FTP, SMPT, HTTP)
  • Transport: process-process data transfer (TCP, UDP)
  • Network: routing of datagrams from source to destination (IP, routing protocols)
  • Link: data transfer between neighboring network elements (ethernet, WiFi)
  • Physical: bits "on the wire"

ISO/OSI Reference model

  • Presentation: allow applications to interpret meaning of data (encryption, compression)
  • Session: synchronization, checkpointing, recovery of data exchange
  • Internet stack "missing" these layers, if they are needed they must be implemented in Application layer.

Malware can get in host from:

  • virus: self-replicating infection by receiving/executing object (e.g., email attachment)
  • worm: self-replicating infection by passively receiving object that gets itself executed

spyware malware

can record keystrokes, web sites visited, and upload info to collection site

Denial of Service (DoS)

Attackers make resources (server, bandwidth) unavailable to legitimate traffic by overshelming resource with bogus traffic

Packet sniffing

Broadcast media (shared ethernet, wireless)


Promiscuous network interface reads/records all packets passing by

IP spoofing

Send packet with false source address