lecture 5 Flashcards
why do we need software abstraction
to make hardware convenient
how do we deal with complex problems
- by layering, each layer deals with a certain part of the problem (divide and conquer)
what is a protocol
- a set of rules/procedures that define how data is transmitted between different devices/routers
- helps sender to communicate with the receiver and vice versa
difference between interface and protocol
- interface is the protocol between corresponding layers (e.g layer 5 and layer 4) on the same stack
- protocol is between layers of different stacks
what happens in the sender layers
- checksums are added
- overheads are added
what happens in the receiver layers
- decryption
- removal of the checksums and overheads added in the sender layers
protocol stack
layer n protocol
what is a checksum
is a small-sized block of data added for the purpose of detecting errors
what is an overhead
is any combination of excess computation time, memory, bandwidth, or other resources that are required to perform a specific task
as a network designer you need…
- to decide on the amount of layers
- decide on the interfaces+protocol stack
the philosophy-translator-secretary architecture
- message from philosopher 1 is in a different language
- middle ground translators speak the same language
- from philosopher to translator
- translator to secretary
- secretary to secretary 2
- secretary 2 to translator 2
- translator 2 to philosopher 2
two fundamental concepts of network architecture
- message
- encapsulation
what is fragmentation
the process of splitting a big message into smaller parts
opposite of fragmentation is…
defragmentation
ethernet’s minimum and maximum frame size is
minimum: 64 bytes
maximum: 1518 bytes
what is a header
a header is supplemental data placed at the beginning of a block of data being transmitted/stored
what does header help with
- when a header is clear and unambiguous, it allows for parsing to happen
why do messages have a control and header (4)
- used to synchronise with the remote peer
- contain instructions that tell the remote peer what to do with the message (protocol)
- security purposes(protocol)
- error detection
what is encapsulation
it is when layer N-1 encapsulates and treats the data portion received from layer N as an entire integral unit
e.g layer 4 encapsulates data from layer 5 (transport encapsulate session’s)
what happens when the remote peer receives the encapsulated message
- it strips off the header, trailer, overheads, checksums off the data and passes it to the layer above
what is peer to peer process
when layer N of machine A communicates with layer N of machine B
design issues of layers
- identifying senders and receivers
- rules of data transfer (simplex, half duplex, full duplex)
- error control
- order and length of messages
- fast sender, slow receiver
what is addressing
number or address that is assigned to any device that seeks access to or is part of a network
2 types of layer services
- connectionless
- connection oriented
features of a connectionless service
- does not require protocols
- message delivery not guaranteed
- considers each packet of the same message independent of each other:
1. can have different addressing
2. different route taken - service interface is message based
features of a connection oriented service
- first establishes a connection between the source and destination
- authentication is needed
- error received if message delivery fails
- service interface is stream based
- reliable
the 5 service primitives of a connection oriented service (system calls)
- LISTEN
- CONNECT
- RECEIVE
- SEND
- DISCONNECT
meaning of: LISTEN
block waiting for an incoming connection
meaning of: CONNECT
establish a connection with a waiting peer
meaning of: RECEIVE
block waiting for an incoming message