Chapters 1-4 Flashcards
The scripting language invented by Dutch programmer Guido van Rossum
Python
Python has these instead of Arrays
Lists
The way to access values at the end of a string
Negative indexes
What is a host
An end system
What is a packet switch
A device that forwards packets
Communication Links
fiber, copper, radio satellite
Network
A collection of devices, routers, and links managed by an organization
This is called a “network of networks”
The Internet
Protocols
Control sending, receiving of mesages
RFC
Request for Comments
IETF
Internet Engineering Task Force
Network edge
clients and servers
Network core
interconnected routers, network of networks
Frequency Division Multiplexing(FDM)
Different channels transmitted in different frequency bands
Wireless Local Area Networks(WLAN)
Provide connection within or around a building
Wide-area Cellular Access Networks
Provide connection from mobile, cellular network operators, typically within 10’s of Kilometers
Bit
Propagates between transmitter/receiver pairs
Physical link
What lies between transmitter and receiver
Guided media
signals propagate in solid media such as copper, fiber, coax
Unguided media
Signals propagate freely, e.g. radio
Twisted pair (TP)
Two insulated copper wires
Packet-switching
Hosts break application-layer messages into packets
Length (L)
Length of a packet in bits
Transmission rate (R)
How fast bits are being transmitted in bits/sec
Transmission delay
Takes L/R seconds to transmit (push out ) L-bit packet into link at R bps
Store and forward
Entire packet must arrive at router before it can be transmitted on next link
End-end delay
2L/R, assuming zero propagation delay
What happens if arrival rate to link exceeds transmission rate of link for a period of time
Packet queuing and loss, packets will queue and wait to be transmitted on output link, some may be dropped if router fills up
Forwarding
Local action, move arriving packets from router’s input to appropriate router output link
Routing
Global action, determine source-destination paths taken by packets
Time Division Multiplexing (TDM)
Time divided into slots, in which a user can utilize the entire bandwidth for a limited time
How do hosts connect to the internet
Internet Service Providers (ISPs)
“Tier-1” commercial ISPs
National and international coverage
Content Provider Networks (CPNs)
Private network that connects its data centers to Internet, often bypassing tier-1, regional ISPs
What happens when arrival rate to link exceeds output link capacity
Packet Loss
What are the four sources of packet delay?
Nodal Processing, Queueing, Transmission, and Propagation
Throughput
Rate at which bits are being sent from sender to receiver
Instantaneous throughput
Rate at given point in time
Average throughput
Rate over longer period of time
Bottleneck link
Link on end-end path that constrains end-end throughput
Virus
Self-replicating infection by receiving/executing object (e.g., e-mail attachment)
Worm
Self-replicating infection by passively receiving object that gets itself executed
Spyware
Can record keystrokes, websites visited, upload info to collection site
Denial of Service (DoS)
Attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic
Packet sniffing
Promiscuous network interface reads/records all packets, including passwords, passing by
IP spoofing
Send packet with false source address
Layer 5
Application layer, highest in IP stack model, contains supporting network applications such as IMAP, SMTP, HTTP
Layer 4
Transport layer, process-process data transfer, TCP, UDP