Chapter 1 Flashcards
Networks
Collection of devices, routers, links.
Network protocols
Computers rather than humans
Access Network
Network that connect the edge device into the first hop router, into the larger internet
Transmission Rate
How fast a network is
Cable Access Network
A physical cable connecting multiple homes to a single cable head.
Bit
Propagates between transmitter / receiver pairs.
Physical Link
What lies between transmitter and receiver.
Guided Media
Some kind of physical wire / cable.
Unguided Media
Signals propagate freely (ex. Radio)
Packet Switching
End hosts take application level messages, divide them into chunks, put them inside packets and sent them into the internet.
Forwarding
A local action. Moving an arriving packet from the input link of the router to its appropriate output link. Controlled by the forwarding table.
Routing
A global action. Determined the source to destination paths taken by paths.
Packet Transmission Delay
Takes L / R seconds to transmit (push out) L-bit packet into link at R bits.
Packet Transmission Delay
Takes L / R seconds to transmit (push out) L-bit packet into link at R bits.
Store and Forward
Entire packet must arrive at router before it can be transmitted on the next line.
Queueing
Occurs when work arrives faster than it can be serviced.
Packet Queuing
If arrival rate (in bps) to link exceeds transmission rate (in bps) of link for some period of time.
Packet Loss
With packet queueing, packets can be dropped (lost) if memory (buffer) in router fills up
Frequency Division Multiplex (FDM)
Each allocated each own band. Can transmit at max rate or that narrow band.
Time Division Multiplexing (TDM)
Each call allocated periodic slots, can transmit at max rate of wider frequency band only during its time slot.
Excessive Congestion Possible
Packet delay and loss due to buffer overflow.
Sources of Delay
- Processing delay
- Queuing delay
- Transmission delay
- Propagation delay
Processing Delay
Associated with forwarding table lookup forwarding a packet through the switch.
Queueing Delay
Amount of time a packet has to wait to queue at an output link for transmission.
Transmission Delay
Time is takes for all the bits in those packets to be pushed into outgoing link.
Propagation Delay
Amount it takes from when a bit first enters the sending side of the link till it’s out.
Throughput
The rate (bits / sec) that are being sent from a sender to a receiver.
Layers
- Application layer
- Transport layer
- Network layer
- Link layer
- Physical layer
Application layer
Includes application layer protocols that control the sending and receiving of messages among the distributed pieces of the system. (HTML, IMAP, SMTP, DNS)
Transport Layer
Transports application layer messages form one process to another (TCP, UDP).
Network Layer
Transports data from one end device or host to another. Routing of data grams from source to destination (IP, Routing protocols).
Link Layer
Transfers data between two network devices that are at either ends of the same communication link. Data transfer between neighboring network devices elements (Ethernet, WiFi).
Physical Layer
Controls the sending of bits into this communication link. Bits on wire
Application Layer Role
Exchanges messages to implement some application service using services of transport layer.
Transport Layer Role
Exchanges those messages from one part of the network to the other. It will take a message from the application layer and include some additional information with that message to create a new data unit, known as a segment.
Network Layer Role
Encapsulated the transport layer segment and adds its own link layer intonation header to create a network layer datagram.
Link Layer Role
Encapsulated the network layer datagram and adds its own link layer information header. The protocol data unit is transferred between the link sender and the link layer is known as a frame.
Packet Sniffing
Broadcast media. Promiscuous network interface reads / records all packets passing by.
Denial of Service (DoS)
Attackers make resources unavailable to legitimate traffic by overwhelming resource with bogus traffic.
Lines of Defense
- Authentication
- Confidentiality
- Integrity Checks
- Access Restrictions
- Firewalls
Lines of Defense
- Authentication
- Confidentiality
- Integrity Checks
- Access Restrictions
- Firewalls