slides06 Flashcards
Security in the IP
- Data in transit is readable as it is passed through the various machines on the path to the destination
- Many protocols used are not resistant to malicious interference
- Authentication mechanisms are weak to non-existent
How many different wireless systems does your mobile phone support?
Satellite, Wireless Networking, wimax, wifi
CSMA/CD
carrier sense, multiple access with collision detection
fake delivery of bits? 1GB/s of actual data or not?
Due to layering encapsulation and other overheads, this is overwhelmingly not the rate of delivery of bits to the application you are running
ethernet frame
Destination address Source address type Data crc: cyclic redundancy check, checksum check for corruption errors in the frame
collision
If two hosts try to send simultaneously
carrier sense
before they send data, a host listens to the Ethernet to see if
anyone else is using it at the moment
collision detection
So each host continues to listen while transmitting to make sure there are no collisions (you write and listen atthe same time, if collison, w8 random time)
CSMA/CD differs from Aloha
aloha doesnt solve hidden node problem, aloha doesnt scale, csma is distributed, aloha needs prior centralised knowledge
categories of cables
6, last is expensive 5 is pop
evolution of ethernet
vampire tap, bnc connector, hup and switch
switch advantage
more throughput because full duplex but more complex
why csmacd if swithces avoid collisions?
But buffers in the switch can fill up and then packets would have to be dropped by the switch