Computer Network Note (Internet Technology "Notes)

xiaoxiao2021-03-30  199

.

2. Multicasting: WHEN a Packet with a special code in the address field is transmitted, it is recection and processed by a specific.com.

3. Unicasting: Point-to-Point Transmission with one decer.

4. InternetWork / Internet: a Collection of Interconnected Networks IS Called An InternetWork OR Internet.

5. Subnet: in The Context of a Wan, IT Refers To The Collection of Routers and Communication Lines Owned by The Network Operator.

6. Network Architecture: a set of layers and protocoll.

7. Protocol Stack: a list of protocols used by a certcon system, One Protocol Per Layer.

8. MULTIPLEXING / DEMULTIPLE: They Are Needed in The Physical Layer, WHERE All The Traffic for All Connections Has To Be Sent Or ReceiveD over at Most A Few Physical Circuits.

!. 9. Connection oriented (based on telephony system): transmission in sequence) Steps: Connect à Use à Disconnect2) Applications: i Message stream (reliable): need acknowledgements (eg A sequence of pages (with boundaries));.. ii Byte stream (reliable): need acknowledgements (eg Remote login (without boundaries); iii Unreliable connection (unreliable):..... no acknowledgements (eg Digital voice) .3).. Service primitives: i LISTEN ii CONNECT. Iii. Receive IV. Send V. Disconnect

10. Connectionless (based on system post): a datagram service do not guarantee transmit in sequence.1) Steps: Use.2) Applications: i unreliable datagram:... No acknowledgment (eg Electronic jerk mail); ii Acknowledged datagram : reliable (eg Registered email.); iii Request-reply: eg Database query.11 Why need unreliable service:... 1) when acknowledgement (or reliable communication) is unavailable; 2) when delay (brought by acknowledgments) is unacceptable (eg. Live Conversation).

12. Services vs. protocols: 1) Services: a set of primitives that a layer provides to the above layer (related to the interfaces between layers) Protocols:. Rules which govern the format and meanings of packets that are exchanged by peers at the Same Layer. (Related to Peer Entities)

13. Layer Divisions Principles: 1) Abstract 3) Function 3) INTERNATIONAL 4) MINIMIZE THE INFORMATION PASS The Interfaces 5) Number of Layers

14. TCP:.. Is a reliable connection-oriented protocol (with sequencing, acknowledging, and flow control) It fragments the incoming byte stream into messages, and passes them to the next layer The messages are reassembled at the destination transport-layer.

15. UDP: IS An Unreliable, ConnectionLESS Protocol.

16. Network layer / Internet layer:.. Wraps messages (from transport layer) into packets with IP address Major issue is packet routing For OSI, avoiding congestion is the responsibility of data-link layer For TCP / IP, avoiding congestion is done. BY Internet Layer.

17. Service / Interfaces / Protocols: Service Tells What The Layer Does; Interface Tells The Process Above It That To Access It. Protocols Are The Peers' Own Business.

18. Function of data-link layer:... 1) Providing a well-defined service interface to network layer 2) Handling transmission errors (error-control) 3) Regulating data-flow (flow-control) .19 Services provided by Data-Link Layer: 1) Unacknowledged ConnectionLess Service. (EG. LAN); 2) Acknowledged ConnectionLess Service. (Eg. Wireless); 3) Acknowledged Connection-Orientated Service. (EG. WAN, VPN).

20. Framing methods: 1) Character Count; 2) flag bytes with byte stuffing; 3) Start and end flags with bit stuffing. 4) Physical Layer Coding ViOLATIONS.

21. Hamming distance: The number of bit positions in which two codewords diffe

22. Go-back-N vs. Selective repeat: 1) Go-back-N: the receiver discards all subsequent frames from error point, sending no acknowledgement until ack timeout and frames from the error point are retransmitted in sequence 2) Selective. repeat: the receiver buffers good frames after the error point, and relies on sender to resend the oldest unacknowledged frames which is the error frame or lost frame 3) Go-back-n can waste a lot of bandwidth if the error rate is high. While Selective Repeat Can Require Large Amount of Data Link Layer Memory if The Window Size Is Large.

(No. 23 ~ 40 WERE MISSING)

41. Contention vs. contention-free protocols:.. Under the condition of light load, contention is preferable due to its low delay As load increases, it becomes increasingly inefficient For contention-free protocols, at low load, they have high delay, But as the load increas, Channel Efficiency Increases Rather Than gets Worse.

42. CSMA / CD: CSMA, But Abort on Detecting a Collision.

43. Tree-walk protocol:. A contention-free protocol It reduces contention by dynamically dividing stations into two disjoint groups, one of which is permitted to transmit and the other is not It tries to make the division in this way that only one. STATION THATED.44. NetWork Layer: The Network Layer Is The Lowest Layer That DEALS with end-to-end transmission. It is response for routing packets from source to destination.

45. Services provided by Network Layer: 1) ConnectionLess Service (EG. Internet); 2) Connection-Oriented Service (EG. ATM).

46. ​​Virtual Circuits (Connection-Oriented): Virtual Circuits Avoid Having to Choose A New Route for Every Packet Sent. Each Packet Carries An Identifier Telling Which Virtual Circuit It Belongs To.

47. Routing Algorithm: It manages the routing tables and makes the routing decision.

48. Tradeoffs between Virtual circuit & Datagram: 1) virtual circuits allow packets to contain circuit numbers instead of full destination addresses which lead to a large amount of overhead, hence wasted bandwidth Routers have to maintain routing tables for virtual circuits, which need more. memory space of the routers. While Datagram do not need so much. 2) virtual circuits require more complicated lookup procedure to locate the entry for destinations. 3) virtual circuits are easily to implement QoS. While for datagram, it's difficult. 4) Vc is more Vulnerable. The Whole Circuit Will Abort. While In DataGram, IF A Router Is Down, Packets Can Choose The Other Ways. Communication Will Keep Going.

49. Nonadeptive vs. adaptive algorithms: Nonadeptive: the choice of route is computed in advance, off-line, but not based on the current traffic & topology.Adeptive: routing decisions changes corresponding to the change of topology and sometimes the traffic.45 Goal of Routing Algorithm: The Good of All Routing Algorithm Is To Discover and Use The "Sink Tree" for all routers.

46. ​​Distance Vector Routing: Tables Are Updated by Exchanging Information with the neighbors.

47. Link state routing: 1) discover its neighbors and learn their network addresses; 2) measure the delay or cost to each neighbors 3) construct a packet telling all it just learned 4) compute the shortest path to every other router...

48. Congestion control vs. flow control: Congestion control is to make sure the subnet is able to carry the offered traffic It's a global issue, which is related to the behavior of all hosts, routers, and all the other factors that tend to. diminish the carrying capacity of the subnet. Flow control is related to the point-to-point traffic between a given sender and a given receiver. It is to make sure that fast sender can not continually send data faster than the receiver is able to Absorb it.

49. Approaches Of Contem: 1) Monitor and Detect Where CONGESTION OCCURS. 2) Pass this information to where Actions Can Be Taken. 3) Adjust System Operation To Correct The Problem.

50. Concatenated Virtual Circuits: Using Gateways (MultiProtocol Routers) To Combinate DiffERENT SUBNES TOGETHER, AND Pass Data from Source To Destination.

51. Internetwork routing: Interior Routing Protocol / Exterior Routing Protocol.

52. ICMP: Internet Control Message Protocol. It is used to monitor the Operation of the Internet and also test it.53. QoS parameters: 1) reliability 2) DELAY 3) JITTER 4) Bandwidth

54. Transport layer vs. network layer: 1) Network layer service is unreliable Transport layer service (connection-oriented) is reliable; 2) Network layer only provides its service to transport layer Users can not see it Transport layer can... BEEN by Many Programs Or Users.

(No. 55 ~ 59 WERE MISSING)

60. Asymmetric vs. symmetric disconnection: Asymmetric: either side can send DISCONNECT primitive, and then the connection is released Symmetric:. Either side can do DISCONNECT independently if it has no more data to send, but it can still receive data and it won 'T Affect The Other Side. When Both Sides Do Disconnect, The Connection is released.

61. Transport vs. datalink: 1) connectivity:. Transport: via subnet Datalink:. Via physical channel 2) Addressing:.. Transport: explicit destination address Datalink:. No address needed 3) Connection establish:.. Transport: more complicated (destination may not exist) Datalink:.. destination is always there 4) Storage: Transport: packets may be stored by subnets for quite a while, befor they get to the destination Datalink:. no such significant effect, only a short delay may Occur. 5) Buffering & Flow-Control: Transport: More complicated. Datalink: Simpler.

62. Reliable Connection Establish: 1) Ensure Packets Lifetime Bounded. 2) Packet Sequence Number Can't Be Reuse Withnin A Packet Lifetime. 3) Use 3-Way-Handshake To make Initial Sequence Agree.

(Note: this note does not Guarantee Mistake-Free.)

Summarized by Dan

June, 2006

转载请注明原文地址:https://www.9cbs.com/read-130552.html

New Post(0)