Computer Networks Introduction

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is NOT a component of the network edge?

  • Access network
  • Routers (correct)
  • Hosts
  • Physical media

Packet switching involves dedicating resources for the duration of a call or session.

False (B)

What is the primary function of packet switches in a network?

forward packets

A network of networks connected by economic agreements between customer and provider ISPs is referred to as ______.

<p>the Internet</p> Signup and view all the answers

Match the following network components with their descriptions:

<p>Hosts = End systems that run applications. Routers = Forward packets between networks. Links = Communication pathways between network devices. Protocols = Define the format, order, and actions for message exchange.</p> Signup and view all the answers

Which of the following best describes the role of protocols in computer networks?

<p>To govern all communication activity in the Internet. (C)</p> Signup and view all the answers

The terms 'bandwidth' and 'throughput' can always be used interchangeably in the context of network performance.

<p>False (B)</p> Signup and view all the answers

Name the organization responsible for standardizing Internet protocols.

<p>IETF</p> Signup and view all the answers

In circuit switching, if a circuit is idle it means it is not being used by any call, indicating ______.

<p>no sharing</p> Signup and view all the answers

Match each access network technology to its distinguishing characteristic:

<p>DSL = Uses existing telephone lines. Cable = Employs frequency division multiplexing (FDM). Wireless LAN = Connects end systems via a base station. Ethernet = Common in enterprise networks, offering wired access.</p> Signup and view all the answers

What is the primary advantage of packet switching over circuit switching for data transmission?

<p>Better for bursty data. (B)</p> Signup and view all the answers

In the context of packet transmission delay, propagation delay depends on the transmission rate of the link.

<p>False (B)</p> Signup and view all the answers

What term is used to describe the point on an end-to-end path that constrains end-to-end throughput?

<p>bottleneck link</p> Signup and view all the answers

The process of encapsulating data with headers at different protocol layers is known as ______.

<p>encapsulation</p> Signup and view all the answers

Match the following physical media with their characteristics:

<p>Twisted Pair = Commonly used for Ethernet; two insulated copper wires. Coaxial Cable = Bidirectional transmission with multiple frequency channels. Fiber Optic Cable = High-speed, immune to electromagnetic noise. Wireless Radio = Signal carried in the electromagnetic spectrum.</p> Signup and view all the answers

Which of the following is an example of spyware malware?

<p>Software that records keystrokes and visited websites. (B)</p> Signup and view all the answers

Tier-1 ISPs are local or regional ISPs that form the foundation of the Internet.

<p>False (B)</p> Signup and view all the answers

What is 'IP spoofing'?

<p>sending packets with false source address</p> Signup and view all the answers

The tool which network administrators use to perform delay measurements from source to router along the end-end Internet path towards a given destination is ______.

<p>traceroute</p> Signup and view all the answers

Match the network performance impairments with their primary cause:

<p>Queueing Delay = Time waiting at output link for transmission. Packet Loss = Arrival rate exceeds link capacity. Low Throughput = A bottleneck link on the end-to-end path.</p> Signup and view all the answers

According to Kahn's internetworking principles, what is a key aspect of the Internet architecture?

<p>Best-effort service model. (B)</p> Signup and view all the answers

The ISO/OSI reference model aligns perfectly with the TCP/IP model, with a one-to-one mapping of layers.

<p>False (B)</p> Signup and view all the answers

What is a 'botnet' used for in network security attacks?

<p>spam or DDoS attacks</p> Signup and view all the answers

Fiber optic cables use ______ to transmit data, which makes the cable immune to electromagnetic noise.

<p>light pulses</p> Signup and view all the answers

Match the following network security terms with their definitions:

<p>Virus = Self-replicating infection by receiving/executing an object. Worm = Self-replicating infection by passively receiving an object that executes itself. DDoS = Attacker makes resources unavailailable. Packet Sniffing = Promiscuous network interface to read/record packets.</p> Signup and view all the answers

Which access technology uses frequency division multiplexing (FDM) to divide channels?

<p>HFC (Hybrid Fiber Coax). (B)</p> Signup and view all the answers

Queueing delay is primarily influenced by physical distance between routers, not congestion levels.

<p>False (B)</p> Signup and view all the answers

What is the use of the command, 'traceroute'?

<p>delay/loss measurement</p> Signup and view all the answers

The practice of a bad actor sending packets at a high rate aimed at a target server to overwhelm it is called a ______ attack.

<p>denial of service</p> Signup and view all the answers

Which of these matches the best definition of network history concepts?

<p>1969 = First ARPANET node. 1972 = Email program. 1983 = Deployment of TCP/IP. 1990 = Commercialazation of the web.</p> Signup and view all the answers

Which of the below are functions of a 'router'?

<p>All of the above. (D)</p> Signup and view all the answers

FDM and TDM are used in network security.

<p>False (B)</p> Signup and view all the answers

What does the term TCP stand for?

<p>Transmission control protocol</p> Signup and view all the answers

A self replicating infection that gets itself executed is called a ______.

<p>worm</p> Signup and view all the answers

Match the correct Internet Protocol stack models.

<p>layer 5 = application layer 4 = transport layer 3 = network layer 2 = link layer 1 = physical</p> Signup and view all the answers

What made the design of the internet different from other networks when it was designed?

<p>It was assumed that users would be trustworthy. (C)</p> Signup and view all the answers

Residential access nets are institutional.

<p>False (B)</p> Signup and view all the answers

What does the acronym ISP stand for?

<p>Internet service provider</p> Signup and view all the answers

4G and 5G networks are ______ access networks.

<p>mobile</p> Signup and view all the answers

Match the correct bandwidths to their speeds.

<p>100Mbps = ethernet wired access 1Gbps = ehternet wired access 11Mbps = wifi wireless access 450Mbps = wifi wireless access</p> Signup and view all the answers

What is the problem if too many access ISPs try to connect to each other?

<p>all of the above (D)</p> Signup and view all the answers

Queueing delay depends on the distance between the nodes.

<p>False (B)</p> Signup and view all the answers

Flashcards

The Internet (Nuts and Bolts View)

Billions of connected computing devices, including hosts (end systems) that run network applications.

Packet Switches

Devices that forward packets (chunks of data). Examples: routers, switches

Networks

Collections of devices, routers, and links, managed by an organization.

Internet

A network of networks, interconnected by ISPs.

Signup and view all the flashcards

Network protocols

Define the format, order of messages sent and received among network entities, and actions taken on message transmission, receipt

Signup and view all the flashcards

Network Edge

Hosts, access network, physical media

Signup and view all the flashcards

Network Core

Packet/circuit switching, Internet structure

Signup and view all the flashcards

Hosts

Clients and servers

Signup and view all the flashcards

Access Networks

Wired or wireless communication links connect end systems to edge routers

Signup and view all the flashcards

Digital Subscriber Line (DSL)

Uses existing telephone lines to connect to a central office DSLAM, offering dedicated downstream and upstream transmission rates.

Signup and view all the flashcards

Wireless Local Area Networks (WLANs)

Typically within or around a building, using 802.11b/g/n (WiFi) standards for wireless communication.

Signup and view all the flashcards

Wide-Area Cellular Access Networks

Provided by mobile, cellular network operators, using 4G cellular networks (5G coming).

Signup and view all the flashcards

Packets

Breaks application messages into smaller chunks

Signup and view all the flashcards

Physical Link

What lies between the transmitter & receiver.

Signup and view all the flashcards

Guided Media

Signals propagate in solid media: copper, fiber, coax

Signup and view all the flashcards

Unguided Media

Signals propagate freely, e.g., radio

Signup and view all the flashcards

Frequency Division Multiplexing(FDM)

optical, electromagnetic frequencies divided into (narrow) frequency bands

Signup and view all the flashcards

Time Division Multiplexing (TDM)

each call allocated periodic slot(s), can transmit at maximum rate of (wider) frequency band, but only during its time slot(s)

Signup and view all the flashcards

Packet-Switching

Mesh of interconnected routers that forward packets from one router to the next.

Signup and view all the flashcards

Transmission Delay

Takes L/R seconds to transmit (push out) L-bit packet into link at R bps

Signup and view all the flashcards

Packet Queueing

Packets will queue, waiting to be transmitted on output link

Signup and view all the flashcards

Packet Loss

Loss: Packets can be dropped (lost) if memory (buffer) in router fills up.

Signup and view all the flashcards

Forwarding

The local action of moving arriving packets from a router's input link to an appropriate router output link.

Signup and view all the flashcards

Routing

The global action of determining source-destination paths taken by packets

Signup and view all the flashcards

Circuit Switching

End-end resources are allocated and reserved for a 'call' between source and destination.

Signup and view all the flashcards

Bottleneck Link

A link on the end-end path that constrains end-end throughput.

Signup and view all the flashcards

Network Security

A field of study focused on how bad actors attack networks

Signup and view all the flashcards

Virus

Self-replicating infection via receiving or executing an object

Signup and view all the flashcards

Worm

Self-replicating infection from passively receiving an object that gets itself executed

Signup and view all the flashcards

Botnet

Compromised hosts used for spam

Signup and view all the flashcards

Denial of Service

Attackers make resources unavailable

Signup and view all the flashcards

Packet Sniffing

Promiscuous network interface reads packets

Signup and view all the flashcards

IP spoofing

When a device sends packet with false source

Signup and view all the flashcards

Protocol Layers

Layers: each layer implements a service via its own actions relying on services provided by layer below

Signup and view all the flashcards

Packet Arrival Rate

The average packet arrival rate

Signup and view all the flashcards

Full Buffer

Queue (aka buffer) to full

Signup and view all the flashcards

Propgate

What it means when something is being propogated?

Signup and view all the flashcards

Throughput

A measure of a network's ability to send messages at a certain rate

Signup and view all the flashcards

Study Notes

Assessment Breakdown

  • Quizzes, assignments, and lab assessments before the Mid-Term Examination contribute 20% to the final grade
  • The Mid-Term Examination accounts for 15% of the final grade
  • Project work constitutes 20% of the final grade
  • Quizzes, assignments, and lab assessments before the Final Exam contribute 20% to the final grade
  • The Final Exam is worth 25% of the final grade

Course Resources

  • Textbook by Jim Kurose and Keith Ross titled "Computer Networking: A Top-Down Approach," 8th edition, published by Addison-Wesley in 2020
  • Integrated Development Environment (IDE) options include Python and Wireshark
  • Additional online resources are available

Course Content Overview

  • The course covers fundamental concepts related to computer networks
  • Topics include the Application Layer, Transport Layer, and Network Layer

Introduction to Computer Networks

  • The goal of the first chapter is to get a "feel" and "big picture" introduction to computer networking terminology
  • Topics include, what is the Internet, what is a protocol, network edge components, network core functions, performance metrics, security considerations, protocol layers, service models, and historical context

Internet Overview

  • The Internet consists of billions of connected computing devices like hosts or end systems that run network applications
  • Packet switches forward data
  • Communication links include fiber, copper, radio, and satellite
  • Networks consist of devices, routers, and links managed by organizations
  • Internet standards involve Request for Comments (RFC) and the Internet Engineering Task Force (IETF)

Internet as an Infrastructure

  • The Internet provides services to applications that include web, streaming video, multimedia teleconferencing, email, and e-commerce
  • A programming interface to applications is provided through "hooks" for sending or receiving data
  • Service options analogous to postal service options provided

Protocols

  • Human protocols involve specific messages and actions
  • Network protocols enable computers (devices) to communicate rather than humans
  • Protocols define the format, order, and actions taken during message transmission and receipt among network entities

Chapter 1 Roadmap

  • Key topics: what the internet is, protocols, hosts, access networks, the network edge, physical media, packet/circuit switching, internet structure, loss, delay, throughput, security issues, protocol layers, service models, and history

Internet Structure Breakdown

  • The network edge includes clients, servers, and data centers
  • Access networks involve wired and wireless communication links
  • The network core consists of interconnected routers that create a network of networks

Access Network Considerations

  • Considerations when connecting end systems to an edge router include the type of access network and transmission rate
  • Access networks include residential, institutional (school, company), and mobile networks

Cable-Based Access Networks

  • Frequency division multiplexing (FDM), different channels transmit in different frequency bands
  • Hybrid Fiber Coax (HFC) is asymmetric with downstream rates of, up to 40 Mbps – 1.2 Gbps and upstream rates of 30-100 Mbps
  • Cable and fiber connect homes to the ISP router using a shared access network

Digital Subscriber Line (DSL) Access Networks

  • Existing telephone lines connect to a central office DSLAM
  • The data over DSL phone line goes to the Internet
  • Voice over DSL phone line goes to the telephone net
  • Dedicated downstream transmission is 24-52 Mbps
  • Dedicated upstream transmission is 3.5-16 Mbps

Home Networks

  • The components of home networks often include wireless devices, a single box combining modem functionality, and wired Ethernet connections

Wireless Access Networks

  • Wireless access network connects end systems to a router via a base station
  • Wireless Local Area Networks (WLANs) with ~100 ft range using 802.11b/g/n (WiFi) at 11-450 Mbps transmission rate
  • Wide-area cellular access networks that are mobile, cellular networks operating up to 10's of Mbps using 4G cellular networks

Enterprise Access Networks

  • Used by companies, universities etc
  • Connects technologies using switches and routers
  • Ethernet at 100Mbps, 1Gbps, 10Gbps wired access
  • WiFi wireless access points at 11, 54, 450 Mbps

Data Transmission

  • Hosts break application messages into packets of length L bits which are then transmitted into the access network at a rate R
  • The time needed to transmit a L-bit packet into a link, transmission delay is equal to L (bits) divided by R
  • Data transmitted as bits propagates between transmitter and receiver pairs over a physical link
  • Guided media propagates signals in solid media such as copper, fiber, or coax cables
  • Unguided media propagates signals freely through radio waves

Twisted Pair (TP) Cabling

  • It consists of two insulated copper wires
  • Category 5: 100 Mbps, 1 Gbps Ethernet
  • Can support 10Gbps Ethernet

Coaxial Cable Transmission

  • Two concentric copper conductors are used
  • Transmission is bidirectional
  • It is broadband: multiple frequency channels on cable
  • 100's of Mbps per channel

Fiber Optic Cable Transmission

  • Glass fibers carry light pulses
  • High-speed point-to-point transmission ranging from 10's to 100's of Gbps.
  • Low error rate due to immunity to electromagnetic noise
  • Repeaters are spaced far apart

Wireless Radios

  • Carries electronic signals with no physical wire
  • Broadcast and half-duplex, between sender and receiver
  • Reflects electromagnetic waves
  • Subject to obstruction by objects and susceptible for interference
  • Terrestrial microwave: Up to 45 Mbps channels
  • Wireless LAN (WiFi): Up to 100's Mbps
  • Wide-area (cellular): up to 10's Mbps
  • Satellite offers up to 45 Mbps per channel with 270ms end-end delay, geosynchronous versus low-earth-orbit

Network Core Function

  • The network core is a mesh of interconnected routers that use packet-switching to forward application-layer messages into packets
  • Packets are forwarded from one router to the next along the path from source to destination
  • Each packet is transmitted at full link capacity

Packet Switching Details

  • Taking L/R seconds to transmit push an L-bit packet into a link at R bps

Queuing and Packet Loss

  • Packet queuing and loss occurs when transmission rate exceeds the link for a period of time
  • Packets will queue, waiting to be transmitted on output link
  • Packets are dropped if memory buffer in router is full

Network Core Functions

  • Local function: moves arriving packets from router's input link to router output link
  • Global function: the algorithm determines the source to destination paths taken by packets

Circuit Switching Alternative

  • End-end resources allocated and reserved for "call" between source and designation
  • Dedicated resources: no sharing
  • Circuit segment is idle if it's not used

Circuit Switching: FDM and TDM

  • Frequency Division Multiplexing (FDM) optical and electromagnetic frequencies are divided into frequency bands for allocation
  • Time Division Multiplexing (TDM): time is divided into slots, each call allocated periodic slot(s)

Packet Switching vs Circuit Switching

  • Packet switching allows more users to use the network
  • Circuit switching guarantees resources
  • Packet switching is great for"bursty" data with resource sharing and no call setup
  • Packet overflow is possible

How to Connect Access ISPs

  • It is not feasible that each of the millions of access ISPs connect to each other as it would not scale
  • A more viable option is to connect each access ISP to one global transit ISP subject to customer and provider agreement
  • A more likely scenario involves multiple global ISPs that want to connect, resulting in Internet exchange points

Internet Structure Progression

  • Regional networks arrive to connect access nets to ISPs
  • Content provider networks may run their own network in efforts to bring services and content closer to endusers
  • Tier-1 commercial ISPs establish national & international coverage
  • Content provider networks connect data centers while bypassing tier-1 and regional ISPs

Analyzing Network Performance

  • Losses and delays occur when packets queue in router buffers because the packet queue waits for turn

Packet Delay Components

  • The components of nodal delay include processing, queuing, transmission, and propagation
  • Nodal delay equals processing plus queuing, plus transmission, and propagation delay
  • Transmission delay equals packet length(bits) over transmissions rate (bps)
  • Propagation delay equals the distance of physical link / the propagation speed

Throughput Rate

  • Expressed as bits per time unit, measures the rate at which bits are being sent from receiver to sender

Types of Network Security Attacks

  • Malware such as viruses or worms can get in host
  • Spyware malware can record keystrokes, web sites visited, upload info to collection site
  • Infected hosts can be enrolled in botnet, DDOS for spam

Types of Malware

  • Denial of Service (DoS): attackers make resources unavailable to legitimate traffic
  • Packet Interception: promiscuous network interface reads/records all packets
  • IP spoofing: packets are sent with false source addresses

Protocol Layers

  • Networks are complex, so protocol "layers" provide structure and organization
  • Layering deals with identification, relationship of complex systems

Internet Protocol Stack Structure

  • Application: network applications
  • Transport: process-process data transfer
  • Network: routing of datagrams from source to destination
  • Link: data transfer between neighboring network elements
  • Physical: bits “on the wire”

Hybrid Model

  • Application Layer
  • Transport layer
  • Network layer
  • Data link layer
  • Physical layer

Internet History Highlights

  • 1961-1972: Early packet-switching principles
  • 1972: ARPAnet public demo
  • 1972-1980: Internetworking, new and proprietary nets
  • 1974: Cerf and Kahn architecture for interconnecting networks
  • Internetworking principles, and defining today's Internet architecture
  • 1980-1990: New protocols and proliferation of networks.

More Internet History

  • Deployment of TCP/IP and definition of smtp e-mail
  • DNS defined name-to-IP-address translation
  • ftp protocol defined and TCP congestion control implemented
  • 100,000 hosts connected to networks
  • Early 1990s: ARPAnet decommissioned, NSF lifts restrictions on commercial use of NSFnet
  • Killer apps emerge as more users join

History of Malware Protection

  • 2005-present: New applications and the Internet are "everywhere"
  • ~18B devices attached in 2017, aggressive broadband deployment, increasing 4G and 5G wireless access
  • Online social network and enterprises run services in "cloud"

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

OSI Model Overview
14 questions

OSI Model Overview

LegendaryBronze avatar
LegendaryBronze
Computer Networks Lecture 10: Data Link Layer
6 questions
Computer Networks: Data Link Layer
6 questions
Use Quizgecko on...
Browser
Browser