Computer Networking - Chapter 1

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is the most accurate description of the relationship between interconnected ISPs?

  • All interconnected ISPs must have a customer-provider relationship.
  • Interconnected ISPs operate independently and do not require any formal agreements.
  • Interconnected ISPs can have customer-provider relationships or peering agreements. (correct)
  • Interconnected ISPs must have a peering agreement.

Which of the following is a primary function of packet switches in the context of the Internet?

  • Converting data packets into different transmission formats.
  • Storing data indefinitely for archival purposes.
  • Forwarding packets (chunks of data) towards their destination based on addressing information. (correct)
  • Encrypting data packets to ensure secure transmission.

Which statement accurately describes the role of protocols in the Internet?

  • Protocols are primarily used for security measures and do not affect normal data transmission.
  • Protocols govern all communication activity in the Internet between devices. (correct)
  • Protocols are optional guidelines for communication that hosts can choose to follow.
  • Protocols are suggestions for application developers.

How does frequency division multiplexing (FDM) enable multiple channels to be transmitted simultaneously?

<p>By transmitting different channels in different frequency bands. (A)</p>
Signup and view all the answers

What is the primary purpose of the Internet Engineering Task Force (IETF)?

<p>To develop and promote Internet standards. (A)</p>
Signup and view all the answers

Why is it essential for access ISPs to be interconnected?

<p>To ensure that any two hosts on the Internet can exchange packets. (A)</p>
Signup and view all the answers

If a network link is described as 'half-duplex', what does this imply about data transmission?

<p>Data can only be transmitted in one direction at a time. (B)</p>
Signup and view all the answers

What is the function of 'access networks' in the context of the Internet?

<p>To connect end systems to the edge router. (A)</p>
Signup and view all the answers

What is the role of content provider networks (e.g., Google, Facebook) in the Internet structure?

<p>To run their own networks to bring services and content closer to end users. (B)</p>
Signup and view all the answers

Which of the following best describes 'packet sniffing' as a network security threat?

<p>Intercepting and recording packets transmitted over a network. (C)</p>
Signup and view all the answers

Which of the following is most true of 'Tier-1' commercial ISPs?

<p>They have national and international reach, forming the backbone of the Internet. (C)</p>
Signup and view all the answers

What is the significance of the work by Cerf and Kahn?

<p>They developed the architecture for interconnecting networks, defining key Internet design principles. (C)</p>
Signup and view all the answers

Why is layering used in network protocols?

<p>To simplify network design and maintenance. (A)</p>
Signup and view all the answers

According to the introduction slides, what constitutes a 'protocol'?

<p>The format, order of messages, and actions taken during communication between network entities. (A)</p>
Signup and view all the answers

In the context of access networks, what is the key difference between HFC (Hybrid Fiber Coax) and DSL (Digital Subscriber Line)?

<p>HFC uses a shared access network, and DSL uses a dedicated line to the central office. (C)</p>
Signup and view all the answers

Why was the Internet not originally designed with strong security measures?

<p>The initial vision was of a network with mutually trusting users. (C)</p>
Signup and view all the answers

Which of the following describes a ‘denial-of-service’ (DoS) attack?

<p>Making a resource unavailable to legitimate traffic. (B)</p>
Signup and view all the answers

What is the significance of 'queueing delay' in a packet-switching network?

<p>It is the time a packet spends waiting in a router's buffer. (A)</p>
Signup and view all the answers

How has the Internet's structure evolved to handle the millions of access ISPs?

<p>By creating a hierarchical structure with global transit ISPs, regional ISPs, and Internet Exchange Points (IXPs). (A)</p>
Signup and view all the answers

What is the role of the network layer in the Internet protocol stack?

<p>Routing datagrams from source to destination. (C)</p>
Signup and view all the answers

What is a key implication of the packet transmission delay?

<p>It influences the time required to push an L-bit packet onto a link with rate R. (E)</p>
Signup and view all the answers

Why do service providers run their own 'cloud' networks?

<p>To connect “close” to the end user, providing “instantaneous” access to services. (E)</p>
Signup and view all the answers

Of the media listed, which is least susceptible to interference and noise problems?

<p>Fiber optic cable. (B)</p>
Signup and view all the answers

What benefit can a 'traceroute' provide?

<p>It provides delay measurement from source to router and facilitates learning path to destination. (D)</p>
Signup and view all the answers

What year did ARPAnet first become operational?

<ol start="1969"> <li>(C)</li> </ol>
Signup and view all the answers

In the caravan analogy, what is comparable to the 'link transmission' that moves the caravan from one place to another?

<p>Toll service. (A)</p>
Signup and view all the answers

In the layered internet service model, which layer is considered nearest to the end customers?

<p>Application. (C)</p>
Signup and view all the answers

What name is given to the delay when a packet may fill a queue entirely?

<p>Queueing delay. (D)</p>
Signup and view all the answers

If the sending rate is faster than bits can be serviced, then what happens?

<p>Queueing. (C)</p>
Signup and view all the answers

How would you determine “throughput”?

<p>Calculate the rate at which data is sent from the sender to the data receiver. (B)</p>
Signup and view all the answers

What might a system do to protect itself from would-be intruders on the network?

<p>Have integrity checks. (A)</p>
Signup and view all the answers

If a host injects packets with a false source, what action is that?

<p>IP spoofing. (D)</p>
Signup and view all the answers

Given what you know about networking, describe a situation where circuit sharing is useful.

<p>For times where connections are constant. (C)</p>
Signup and view all the answers

What is the benefit of interconnected routers?

<p>Networks forward packets to next router. (A)</p>
Signup and view all the answers

Why is it important to retain a reference model for discussions?

<p>So that all parties can communicate about system's pieces. (B)</p>
Signup and view all the answers

In the layered Internet protocol stack, what is above the transport layer?

<p>Application. (A)</p>
Signup and view all the answers

Why are access networks useful?

<p>To connect end systems to edge router. (B)</p>
Signup and view all the answers

In the layered internet service model, what comes directly after H_n, where 'H' is the network-layer header?

<p>H_1. (D)</p>
Signup and view all the answers

Within the layers, if a gate procedure were changed, what is most likely to result?

<p>Only its service impacted. (C)</p>
Signup and view all the answers

What is required for broadband activity?

<p>Multiple frequency channels. (C)</p>
Signup and view all the answers

Flashcards

What are 'hosts'?

End systems that run network applications.

What are packet switches?

Devices that forward packets (chunks of data).

What is bandwidth?

The rate at which data can be transmitted over a communication link, measured in bits per second (bps).

What is a network protocol?

A set of rules governing communication between devices on a network

Signup and view all the flashcards

What is the network edge?

The edge of the network where hosts, access networks, and physical media are located.

Signup and view all the flashcards

What is the network core?

The central part of the network that connects different network edges.

Signup and view all the flashcards

What are key network performance considerations?

Delay, loss and throughput.

Signup and view all the flashcards

What are networks?

Collection of devices, routers, and links managed by an organization.

Signup and view all the flashcards

What comprises the Internet?

Interconnected ISPs that communicate with each other.

Signup and view all the flashcards

What are Internet standards?

Formal standards for protocols allowing interoperability.

Signup and view all the flashcards

What is cable-based access?

A high-speed Internet connection using cable TV infrastructure.

Signup and view all the flashcards

What is Digital Subscriber Line(DSL)?

Technology using existing phone lines for internet access.

Signup and view all the flashcards

What is Frequency Division Multiplexing (FDM)?

Combining multiple signals into one channel by frequency.

Signup and view all the flashcards

What are home networks?

Households connecting multiple devices through a single internet connection.

Signup and view all the flashcards

What are Wireless Local Area Networks (WLANs)?

Wireless connections via access points within a building.

Signup and view all the flashcards

What are Wide-Area Cellular Access Networks?

Mobile networks using cellular technology over a wide area.

Signup and view all the flashcards

What are enterprise networks?

Networks providing high-speed links for companies and universities.

Signup and view all the flashcards

What are data center networks?

High bandwidth links that connect thousands of servers.

Signup and view all the flashcards

What are packets?

Breaking application messages into smaller units for transmission.

Signup and view all the flashcards

What is transmission rate?

The rate at which data is transmitted over a network connection.

Signup and view all the flashcards

What is transmission delay?

The time needed to transmit an L-bit packet into a link.

Signup and view all the flashcards

What are communication links?

Physical pathways for data transmission.

Signup and view all the flashcards

What is twisted pair (TP) cable?

A type of cable consisting of two insulated copper wires.

Signup and view all the flashcards

What is fiber optic cable?

Glass fiber cable carrying light pulses.

Signup and view all the flashcards

What is wireless radio?

Using radio waves to transmit signals.

Signup and view all the flashcards

What is routing?

Forwarding packets based on destination address to next router.

Signup and view all the flashcards

What is forwarding?

Moving arriving packets from router's input to output link.

Signup and view all the flashcards

What is packet-switching?

Data switches over an entire network.

Signup and view all the flashcards

What is circuit switching?

Allocating end-to-end resources for a 'call'.

Signup and view all the flashcards

What is queueing?

Occurs when arriving packets wait in buffers due to link capacity.

Signup and view all the flashcards

What does Circuit switching do?

End-to-end resources are allocated to calls.

Signup and view all the flashcards

What do Tier 1 ISPs provide?

Global transit ISPs.

Signup and view all the flashcards

What are router buffers?

Memory in routers which queue packets.

Signup and view all the flashcards

What is propagation delay?

Amount of time to get to destination.

Signup and view all the flashcards

What is packet transmission delay?

Amount of time to push all bits onto link.

Signup and view all the flashcards

What does Caravan analogy describe?

Analogies for delays.

Signup and view all the flashcards

What is throughput?

A measure of the actual data transfer rate.

Signup and view all the flashcards

What was a major flaw during internet's original design?

Internet initially lacked security.

Signup and view all the flashcards

What is 'packet sniffing'?

Reading/recording all packets.

Signup and view all the flashcards

What is IP spoofing?

Injecting packets with a false source address.

Signup and view all the flashcards

Study Notes

  • Computer Networking: A Top-Down Approach, 8th edition, by Jim Kurose and Keith Ross, published by Pearson in 2020 is the source material for the notes.

Chapter 1 Goal

  • Get a feel for computer networking
  • See the "big picture"
  • Learn the terminology of computer networking
  • More details will come later in the course

Overview/Roadmap

  • Understand what the Internet is and the role of protocols
  • Learn network edge concepts such as hosts, access networks, and physical media
  • Learn network core concepts such as packet/circuit switching and internet structure
  • Understand network performance factors such as loss, delay, and throughput
  • Learn about protocol layers and service models
  • Learn about security considerations
  • Know the history of the Internet

The Internet: A "Nuts and Bolts" View

  • Billions of connected computing devices make up the Internet
  • Hosts are end systems that run network applications at the internet's edge
  • Packet switches forward packets (chunks of data) using routers and switches
  • Communication links involve fiber, copper, radio, and satellite, and their transmission rate is bandwidth
  • Networks are a collection of devices, routers, and links managed by an organization

The Internet: 'Network of Networks'

  • Internet is a network of interconnected ISPs
  • Protocols are everywhere, controlling the sending and receiving of messages
  • Examples of Internet protocols include HTTP for the web, streaming video protocols, Skype, TCP, IP, WiFi, 4G, and Ethernet
  • Internet standards include RFCs (Request for Comments) and the work of the IETF (Internet Engineering Task Force)

The Internet: a “Services” View

  • Infrastructure provides services to applications.
  • Services include web, streaming video, multimedia teleconferencing, email, games, and e-commerce.
  • The internet provides connection for interconnected devices and distributed applications.

What is a Protocol?

  • A protocol defines the format and order of messages sent and received
  • Protocols also determine the actions taken on message transmission and receipt
  • Network protocols are for computers (devices) rather than humans
  • All communication activity on the Internet is governed by protocols

Chapter 1 Roadmap

  • The roadmap explores the Internet, protocols, network edges (hosts, access networks, physical media), and network cores (packet/circuit switching, internet structure)
  • It also includes network performance, security, protocol layers, service models, and history

Internet Structure: Network Edge

  • Hosts include clients and servers
  • Servers are often in data centers
  • Access networks and physical media include wired and wireless communication links

Network Core

  • The network core has interconnected routers
  • It is a network of networks

Access Networks and Physical Media

  • Connecting end systems to the edge router involves residential access nets, institutional access networks, and mobile access networks (WiFi, 4G/5G).
  • Cable-based access networks use frequency division multiplexing (FDM)
  • FDM transmits different channels in different frequency bands

Access Networks: Cable-Based Access

  • Hybrid fiber coax (HFC) is asymmetric with up to 40 Mbps – 1.2 Gbps downstream and 30-100 Mbps upstream
  • Homes share access networks to cable headends
  • The network of cable and fiber attaches homes to the ISP router

Access Networks: Digital Subscriber Line (DSL)

  • Digital Subscriber Line (DSL) uses an existing telephone line to the central office DSLAM
  • Data over a DSL phone line goes to the Internet, and voice goes to the telephone net
  • DSL provides 24-52 Mbps dedicated downstream and 3.5-16 Mbps dedicated upstream transmission rates

Access Networks: Home Networks

  • Home networks include wireless and wired devices
  • They often combine cable or DSL modems, routers, firewalls, and NAT
  • Wired Ethernet provides 1 Gbps, and WiFi wireless access points offer 54 to 450 Mbps

Wireless Access Networks

  • Wireless access networks connect end systems to routers via a base station, also known as an "access point"
  • Wireless Local Area Networks (WLANs) are typically within or around buildings (~100 ft)
  • Wireless LANs use 802.11b/g/n (WiFi): connections at 11, 54, or 450 Mbps transmission rate
  • Wide-area cellular access networks are provided by cellular network operators (over tens of kilometers)
  • Wide-area cellular access networks typically offer 10's of Mbps: 4G cellular networks (with 5G coming)

Access Networks: Enterprise Networks

  • Enterprise networks include companies, universities, etc.
  • Enterprise networks mix wired and wireless link technologies
  • Ethernet provides wired access at 100 Mbps, 1 Gbps, or 10 Gbps
  • WiFi provides wireless access points at 11, 54, or 450 Mbps

Access Networks: Data Center Networks

  • Data center networks use high-bandwidth links (10s to 100s Gbps)
  • High bandwidth links connect hundreds to thousands of servers together, and to the Internet.

Host: Sends Packets of Data

  • The host sending function takes an application message and breaks it into smaller chunks, known as packets, of length L bits
  • It transmits the packet into an access network at transmission rate R
  • Link transmission rate (capacity or bandwidth) = L (bits) / R (bits/sec)
  • A bit propagates between transmitter/receiver pairs
  • Physical links lie between the transmitter and receiver
  • Guided media contains signals that propagate in solid media like copper, fiber, and coax
  • Unguided media contains signals that propagate freely, such as radio waves
  • Twisted pair (TP) cable has two insulated copper wires
  • Category 5: 100 Mbps, 1 Gbps Ethernet
  • Category 6: 10Gbps Ethernet
  • Coaxial cable has two concentric copper conductors
  • Coaxial cable is bidirectional and broadband
  • Fiber optic cable carries light pulses, each pulse transmits a bit
  • High-speed fiber optic operation: point-to-point transmission (10's-100's Gbps)
  • Fiber optic cables have a low error rate and use repeaters spaced far apart
  • Wireless radio transmits signals carried in various "bands" of the electromagnetic spectrum
  • There is no physical "wire"
  • Wireless radio is broadcast, "half-duplex" (sender to receiver)
  • Wireless radio experiences propagation environment effects such as reflection, obstruction by objects, and interference/noise
  • Wireless LAN (WiFi) radios transmit 10-100's Mbps over 10's of meters
  • Wide-area (e.g., 4G cellular) radios transmit 10's Mbps over ~10 Km
  • Bluetooth radios offer cable replacement over short distances with limited rates
  • Terrestrial microwave radios offer point-to-point transmission at 45 Mbps channels
  • Satellites transmit up to 45 Mbps per channel and incur a 270 msec end-end delay

Chapter 1 Roadmap: Network Core

  • The network core involves packet/circuit switching and internet structure

The Network Core: Packet Switching

  • The network core is a mesh of interconnected routers
  • Packet-switching breaks application-layer messages into packets
  • A network forwards packets from one router to the next, across links on a path from source to destination

Two Key Network-Core Functions

  • Forwarding: The local action of moving arriving packets from a router's input link to the appropriate router output link
  • Routing is a global action that determines the source-destination paths taken by packets, using algorithms

Packet-Switching: Store-and-Forward

  • In packet switching, packet transmission delay takes L/R seconds to transmit (push out) an L-bit packet into a link at R bps
  • Store and forward requires the entire packet to arrive at the router before it can be transmitted on the next link
  • One-hop numerical example: L = 10 Kbits, R = 100 Mbps, one-hop transmission delay = 0.1 msec

Packet-Switching: Queueing

  • Queueing occurs when work arrives faster than it can be serviced
  • Packet queuing and loss results if the arrival rate (in bps) to a link exceeds transmission rate (bps) of the link for some time
  • Packets will queue, waiting to be transmitted on output link
  • Packets can be dropped (lost) if memory (buffer) fills up

Alternative to Packet Switching: Circuit Switching

  • End-end resources are allocated to, and reserved for, the "call" between source and destination
  • Dedicated resources mean that no sharing occurs, and performance is guaranteed
  • In circuit switching, a circuit segment is idle if not used

Circuit Switching: FDM and TDM

  • Frequency Division Multiplexing (FDM) divides optical, electromagnetic frequencies into (narrow) frequency bands
  • each call is allocated its own band, can transmit at max rate of that narrow band
  • Time Division Multiplexing (TDM) divides time into periodic slots; each call has a dedicated time slot
  • Each call can transmit at maximum rate of (wider) frequency band (only) during its time slot(s).

Internet Structure

  • Hosts connect to the Internet via access Internet Service Providers (ISPs)
  • Access ISPs must be interconnected so any two hosts (anywhere!) can send packets to each other
  • The resulting network of networks is complex due to evolution driven by economics and national policies

Protocol Layers

  • Networks are complex due to hosts, routers, links of various media, applications, protocols, hardware, and software
  • Layering helps organize network structure

Why Layering?

  • Explicit structure allows identification and relationship of system's pieces
  • Layering eases maintenance and updating of systems
  • Changes in a layer's service is transparent to the rest of the system.

Layered Internet Protocol Stack

  • Application Layer: Supports network applications (HTTP, SMTP, DNS)
  • Transport Layer: Provides process-process data transfer (TCP, UDP)
  • Network Layer: Routes datagrams from source to destination (IP, routing protocols)
  • Link Layer: Transfers data between neighboring network elements (Ethernet, WiFi, PPP)
  • Physical Layer: Transmits bits "on the wire".

Services, Layering and Encapsulation

  • Application exchanges messages to implement some application service using services of transport layer
  • Transport-layer protocol transfers M (e.g., reliably) from one process to another, using services of network layer
  • Transport-layer protocol encapsulates application-layer message, M, with transport layer-layer header Ht to create a transport-layer segment

Packet Transmission Delay

  • Packet Transmission Delay is the time it takes for a host to push all of the packets bits into the link.
  • packets cannot be transmitted faster than the link bandwidth
  • Packet Transmission Delay = L/R -L- packet length (bits) -R- link transmission rate (bits/sec)
  • Real life caravan analogy of a tollbooth

Packet Queueing Delay

  • Average Queueing Delay is La/R ~ 0: queueing delay -Small -L - is packet length bits -a - is packet arrival rate -R - is rate of bits intensity
  • La/R -> 1. avg queueing delay -Large •La/R 1. more "work" arriving is more than can be serviced

"Real" Internet Delays and Routes

  • Traceroute program to measure delay on Internet path to the destination
  • Sends 3 packets which results in router, and router replies by time interval between transmission

Packet Loss

  • A queue( or buffer) where packets precede the link, this buffer has finite capacity
  • a packet that arrives to a buffer that is full, results in a packet drop (packet lost)
  • A lost packet may be retransmitted by the previous mode or source end system.

Throughput

  • Throughput Is the rate (bits/ time unit) that bits are being sent from the sender to the receiver
  • Can be instantaneous rate or average rate over a long period

Throughput: Network Scenario

  • Per-connection end-end throughput: min(Rc,Rs,R/10)
  • In practice: Rc or Rs is often the bottleneck
  • **

Network Security

  • The Internet was not originally designed with security in mind
    • Security has been added later
  • We now need to consider how bad guys hack computer networks
  • how to defend against attacks
  • how to set up safe architectures that are immune to attacks

Bad Guys: Packet Interception

  • Broadcast media "sniffing" are packet interceptions
  • Promiscuous network interfaces read/ record all packets passing by, like passwords
  • Wireshark can be used to prevent packet access
  • **

Bad Guys: Fake Identity

  • There is IP Spoofing, or packet injection with false source addresses
  • **

Bad Guys: Denial of Service

  • Denial of Service ( DOS): hackers overwhelm a network with bogus traffic and make the resources unavailable
    • They break into hosts around the network
    • Send Packets to the target from the compromised hosts.***

Lines of Defense

  • authentication - proving you are who you say are
  • Confidentiality - via encryption
  • Integrity Checks - digital signatures prevent/ detect tampering -Access Restrictions - password protected VPN's
  • Firewalls - specialized "middleboxes" in access and core networks
    • detecting/ reacting to DOS attacks

Internet History: Early Packet-Switching Principles

  • 1961: Kleinrock's queueing theory shows the effectiveness of packet-switching
  • 1964: Baran's packet-switching in military nets
  • 1967: ARPAnet conceived by Advanced Research Projects Agency
  • 1969: First ARPAnet node is operational
  • 1972: ARPAnet public demo. NCP (Network Control Protocol) is the first host-host protocol; first e-mail
  • ARPAnet has 15 nodes

Internet History: Internetworking, New and Proprietary Networks

  • 1970: ALOHAnet satellite network in Hawaii
  • 1974: Cerf and Kahn's architecture interconnecting networks
  • 1976: Ethernet at Xerox PARC
  • Late 70s: proprietary architectures such as DECnet, SNA, and XNA
  • 1979: ARPAnet has 200 nodes
  • Cerf and Kahn's internetworking principles define today's Internet architecture
    • minimalism and autonomy
      • best-effort service model, stateless routing, decentralized control
    • no internal changes were required to interconnect networks

Internet History: New Protocols, a Proliferation of Networks

  • 1983: Deployment of TCP/IP
  • 1982: SMTP e-mail protocol defined
  • 1983: DNS defined for name-to-IP-address translation
  • 1985: FTP protocol defined
  • 1988: TCP congestion control
  • New national networks proliferated CSnet, BITnet, NSFnet, and Minitel. 100,000 hosts connected to networks.

History: Commercialization, the Web, New Applications

  • Early 1990s: ARPAnet decommissioned -
  • 1991: NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995)
  • Early 1990s: Web
    • Hypertext links: 1945, hypertext links were created. -HTML, HTTP: Berners-Lee: made hypertext links to the web
    • 1994: Mosaic- Berners Lee creates Netscape
      • Late1990s
        • commercialization of the Web

Timeline of Internet Technology and Throughput(cont.)

  • Late 1990s – 2000s:
    • more killer apps: instant messaging, P2P file sharing, network security to forefront
    • About 50 million hosts with 100 million + users with backbone links running at Gbps

Internet History: Recent Developments

  • 2005 to Present): the latest timeline of developments
    • aggressive deployment of broadband home access (10-100's Mbps), software-defined networking (SDN)
    • greater presence of high-speed wireless access: -4G/5G, WiFi, increase in cloud services like Google, service providers create their own networks to connect to end users. -18B devices attached to internet by 2017

ISO/OSI Reference Model

  • Presentation - enables applications to understand of data ( ie encryption, and machine specific agreements)
  • Session - data control, recovery( ie, restart transmission from Checkpoint.)
  • note- some services like security may need to function at app level
  • the 7 Layer OSI / ISO Model of layers exists as well. - Application (network process to application) - Layer 7 - Presentation (data representation, encryption) -Layer 6 - Session (interhost connection) - Layer 5 - Transport (reliable data transfer) - Layer 4 - Network (logical addressing and routing) - Layer 3 - Link (physical addessing) - Layer 2 - Physical (bit transmission) - Layer 1

Wireshark

  • Software used to precent packet sharing( analyzer)
  • captures different network - Application - Transport - Network - Link - Physical

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Use Quizgecko on...
Browser
Browser