Podcast
Questions and Answers
Which of the following is NOT a component of the network edge?
Which of the following is NOT a component of the network edge?
- Access network
- Routers (correct)
- Hosts
- Physical media
Packet switching involves dedicating resources for the duration of a call or session.
Packet switching involves dedicating resources for the duration of a call or session.
False (B)
What is the primary function of packet switches in a network?
What is the primary function of packet switches in a network?
forward packets
A network of networks connected by economic agreements between customer and provider ISPs is referred to as ______.
A network of networks connected by economic agreements between customer and provider ISPs is referred to as ______.
Match the following network components with their descriptions:
Match the following network components with their descriptions:
Which of the following best describes the role of protocols in computer networks?
Which of the following best describes the role of protocols in computer networks?
The terms 'bandwidth' and 'throughput' can always be used interchangeably in the context of network performance.
The terms 'bandwidth' and 'throughput' can always be used interchangeably in the context of network performance.
Name the organization responsible for standardizing Internet protocols.
Name the organization responsible for standardizing Internet protocols.
In circuit switching, if a circuit is idle it means it is not being used by any call, indicating ______.
In circuit switching, if a circuit is idle it means it is not being used by any call, indicating ______.
Match each access network technology to its distinguishing characteristic:
Match each access network technology to its distinguishing characteristic:
What is the primary advantage of packet switching over circuit switching for data transmission?
What is the primary advantage of packet switching over circuit switching for data transmission?
In the context of packet transmission delay, propagation delay depends on the transmission rate of the link.
In the context of packet transmission delay, propagation delay depends on the transmission rate of the link.
What term is used to describe the point on an end-to-end path that constrains end-to-end throughput?
What term is used to describe the point on an end-to-end path that constrains end-to-end throughput?
The process of encapsulating data with headers at different protocol layers is known as ______.
The process of encapsulating data with headers at different protocol layers is known as ______.
Match the following physical media with their characteristics:
Match the following physical media with their characteristics:
Which of the following is an example of spyware malware?
Which of the following is an example of spyware malware?
Tier-1 ISPs are local or regional ISPs that form the foundation of the Internet.
Tier-1 ISPs are local or regional ISPs that form the foundation of the Internet.
What is 'IP spoofing'?
What is 'IP spoofing'?
The tool which network administrators use to perform delay measurements from source to router along the end-end Internet path towards a given destination is ______.
The tool which network administrators use to perform delay measurements from source to router along the end-end Internet path towards a given destination is ______.
Match the network performance impairments with their primary cause:
Match the network performance impairments with their primary cause:
According to Kahn's internetworking principles, what is a key aspect of the Internet architecture?
According to Kahn's internetworking principles, what is a key aspect of the Internet architecture?
The ISO/OSI reference model aligns perfectly with the TCP/IP model, with a one-to-one mapping of layers.
The ISO/OSI reference model aligns perfectly with the TCP/IP model, with a one-to-one mapping of layers.
What is a 'botnet' used for in network security attacks?
What is a 'botnet' used for in network security attacks?
Fiber optic cables use ______ to transmit data, which makes the cable immune to electromagnetic noise.
Fiber optic cables use ______ to transmit data, which makes the cable immune to electromagnetic noise.
Match the following network security terms with their definitions:
Match the following network security terms with their definitions:
Which access technology uses frequency division multiplexing (FDM) to divide channels?
Which access technology uses frequency division multiplexing (FDM) to divide channels?
Queueing delay is primarily influenced by physical distance between routers, not congestion levels.
Queueing delay is primarily influenced by physical distance between routers, not congestion levels.
What is the use of the command, 'traceroute'?
What is the use of the command, 'traceroute'?
The practice of a bad actor sending packets at a high rate aimed at a target server to overwhelm it is called a ______ attack.
The practice of a bad actor sending packets at a high rate aimed at a target server to overwhelm it is called a ______ attack.
Which of these matches the best definition of network history concepts?
Which of these matches the best definition of network history concepts?
Which of the below are functions of a 'router'?
Which of the below are functions of a 'router'?
FDM and TDM are used in network security.
FDM and TDM are used in network security.
What does the term TCP stand for?
What does the term TCP stand for?
A self replicating infection that gets itself executed is called a ______.
A self replicating infection that gets itself executed is called a ______.
Match the correct Internet Protocol stack models.
Match the correct Internet Protocol stack models.
What made the design of the internet different from other networks when it was designed?
What made the design of the internet different from other networks when it was designed?
Residential access nets are institutional.
Residential access nets are institutional.
What does the acronym ISP stand for?
What does the acronym ISP stand for?
4G and 5G networks are ______ access networks.
4G and 5G networks are ______ access networks.
Match the correct bandwidths to their speeds.
Match the correct bandwidths to their speeds.
What is the problem if too many access ISPs try to connect to each other?
What is the problem if too many access ISPs try to connect to each other?
Queueing delay depends on the distance between the nodes.
Queueing delay depends on the distance between the nodes.
Flashcards
The Internet (Nuts and Bolts View)
The Internet (Nuts and Bolts View)
Billions of connected computing devices, including hosts (end systems) that run network applications.
Packet Switches
Packet Switches
Devices that forward packets (chunks of data). Examples: routers, switches
Networks
Networks
Collections of devices, routers, and links, managed by an organization.
Internet
Internet
A network of networks, interconnected by ISPs.
Signup and view all the flashcards
Network protocols
Network protocols
Define the format, order of messages sent and received among network entities, and actions taken on message transmission, receipt
Signup and view all the flashcards
Network Edge
Network Edge
Hosts, access network, physical media
Signup and view all the flashcards
Network Core
Network Core
Packet/circuit switching, Internet structure
Signup and view all the flashcards
Hosts
Hosts
Clients and servers
Signup and view all the flashcards
Access Networks
Access Networks
Wired or wireless communication links connect end systems to edge routers
Signup and view all the flashcards
Digital Subscriber Line (DSL)
Digital Subscriber Line (DSL)
Uses existing telephone lines to connect to a central office DSLAM, offering dedicated downstream and upstream transmission rates.
Signup and view all the flashcards
Wireless Local Area Networks (WLANs)
Wireless Local Area Networks (WLANs)
Typically within or around a building, using 802.11b/g/n (WiFi) standards for wireless communication.
Signup and view all the flashcards
Wide-Area Cellular Access Networks
Wide-Area Cellular Access Networks
Provided by mobile, cellular network operators, using 4G cellular networks (5G coming).
Signup and view all the flashcards
Packets
Packets
Breaks application messages into smaller chunks
Signup and view all the flashcards
Physical Link
Physical Link
What lies between the transmitter & receiver.
Signup and view all the flashcards
Guided Media
Guided Media
Signals propagate in solid media: copper, fiber, coax
Signup and view all the flashcards
Unguided Media
Unguided Media
Signals propagate freely, e.g., radio
Signup and view all the flashcards
Frequency Division Multiplexing(FDM)
Frequency Division Multiplexing(FDM)
optical, electromagnetic frequencies divided into (narrow) frequency bands
Signup and view all the flashcards
Time Division Multiplexing (TDM)
Time Division Multiplexing (TDM)
each call allocated periodic slot(s), can transmit at maximum rate of (wider) frequency band, but only during its time slot(s)
Signup and view all the flashcards
Packet-Switching
Packet-Switching
Mesh of interconnected routers that forward packets from one router to the next.
Signup and view all the flashcards
Transmission Delay
Transmission Delay
Takes L/R seconds to transmit (push out) L-bit packet into link at R bps
Signup and view all the flashcards
Packet Queueing
Packet Queueing
Packets will queue, waiting to be transmitted on output link
Signup and view all the flashcards
Packet Loss
Packet Loss
Loss: Packets can be dropped (lost) if memory (buffer) in router fills up.
Signup and view all the flashcards
Forwarding
Forwarding
The local action of moving arriving packets from a router's input link to an appropriate router output link.
Signup and view all the flashcards
Routing
Routing
The global action of determining source-destination paths taken by packets
Signup and view all the flashcards
Circuit Switching
Circuit Switching
End-end resources are allocated and reserved for a 'call' between source and destination.
Signup and view all the flashcards
Bottleneck Link
Bottleneck Link
A link on the end-end path that constrains end-end throughput.
Signup and view all the flashcards
Network Security
Network Security
A field of study focused on how bad actors attack networks
Signup and view all the flashcards
Virus
Virus
Self-replicating infection via receiving or executing an object
Signup and view all the flashcards
Worm
Worm
Self-replicating infection from passively receiving an object that gets itself executed
Signup and view all the flashcards
Botnet
Botnet
Compromised hosts used for spam
Signup and view all the flashcards
Denial of Service
Denial of Service
Attackers make resources unavailable
Signup and view all the flashcards
Packet Sniffing
Packet Sniffing
Promiscuous network interface reads packets
Signup and view all the flashcards
IP spoofing
IP spoofing
When a device sends packet with false source
Signup and view all the flashcards
Protocol Layers
Protocol Layers
Layers: each layer implements a service via its own actions relying on services provided by layer below
Signup and view all the flashcards
Packet Arrival Rate
Packet Arrival Rate
The average packet arrival rate
Signup and view all the flashcards
Full Buffer
Full Buffer
Queue (aka buffer) to full
Signup and view all the flashcards
Propgate
Propgate
What it means when something is being propogated?
Signup and view all the flashcards
Throughput
Throughput
A measure of a network's ability to send messages at a certain rate
Signup and view all the flashcardsStudy Notes
Assessment Breakdown
- Quizzes, assignments, and lab assessments before the Mid-Term Examination contribute 20% to the final grade
- The Mid-Term Examination accounts for 15% of the final grade
- Project work constitutes 20% of the final grade
- Quizzes, assignments, and lab assessments before the Final Exam contribute 20% to the final grade
- The Final Exam is worth 25% of the final grade
Course Resources
- Textbook by Jim Kurose and Keith Ross titled "Computer Networking: A Top-Down Approach," 8th edition, published by Addison-Wesley in 2020
- Integrated Development Environment (IDE) options include Python and Wireshark
- Additional online resources are available
Course Content Overview
- The course covers fundamental concepts related to computer networks
- Topics include the Application Layer, Transport Layer, and Network Layer
Introduction to Computer Networks
- The goal of the first chapter is to get a "feel" and "big picture" introduction to computer networking terminology
- Topics include, what is the Internet, what is a protocol, network edge components, network core functions, performance metrics, security considerations, protocol layers, service models, and historical context
Internet Overview
- The Internet consists of billions of connected computing devices like hosts or end systems that run network applications
- Packet switches forward data
- Communication links include fiber, copper, radio, and satellite
- Networks consist of devices, routers, and links managed by organizations
- Internet standards involve Request for Comments (RFC) and the Internet Engineering Task Force (IETF)
Internet as an Infrastructure
- The Internet provides services to applications that include web, streaming video, multimedia teleconferencing, email, and e-commerce
- A programming interface to applications is provided through "hooks" for sending or receiving data
- Service options analogous to postal service options provided
Protocols
- Human protocols involve specific messages and actions
- Network protocols enable computers (devices) to communicate rather than humans
- Protocols define the format, order, and actions taken during message transmission and receipt among network entities
Chapter 1 Roadmap
- Key topics: what the internet is, protocols, hosts, access networks, the network edge, physical media, packet/circuit switching, internet structure, loss, delay, throughput, security issues, protocol layers, service models, and history
Internet Structure Breakdown
- The network edge includes clients, servers, and data centers
- Access networks involve wired and wireless communication links
- The network core consists of interconnected routers that create a network of networks
Access Network Considerations
- Considerations when connecting end systems to an edge router include the type of access network and transmission rate
- Access networks include residential, institutional (school, company), and mobile networks
Cable-Based Access Networks
- Frequency division multiplexing (FDM), different channels transmit in different frequency bands
- Hybrid Fiber Coax (HFC) is asymmetric with downstream rates of, up to 40 Mbps – 1.2 Gbps and upstream rates of 30-100 Mbps
- Cable and fiber connect homes to the ISP router using a shared access network
Digital Subscriber Line (DSL) Access Networks
- Existing telephone lines connect to a central office DSLAM
- The data over DSL phone line goes to the Internet
- Voice over DSL phone line goes to the telephone net
- Dedicated downstream transmission is 24-52 Mbps
- Dedicated upstream transmission is 3.5-16 Mbps
Home Networks
- The components of home networks often include wireless devices, a single box combining modem functionality, and wired Ethernet connections
Wireless Access Networks
- Wireless access network connects end systems to a router via a base station
- Wireless Local Area Networks (WLANs) with ~100 ft range using 802.11b/g/n (WiFi) at 11-450 Mbps transmission rate
- Wide-area cellular access networks that are mobile, cellular networks operating up to 10's of Mbps using 4G cellular networks
Enterprise Access Networks
- Used by companies, universities etc
- Connects technologies using switches and routers
- Ethernet at 100Mbps, 1Gbps, 10Gbps wired access
- WiFi wireless access points at 11, 54, 450 Mbps
Data Transmission
- Hosts break application messages into packets of length L bits which are then transmitted into the access network at a rate R
- The time needed to transmit a L-bit packet into a link, transmission delay is equal to L (bits) divided by R
Physical Media Links
- Data transmitted as bits propagates between transmitter and receiver pairs over a physical link
- Guided media propagates signals in solid media such as copper, fiber, or coax cables
- Unguided media propagates signals freely through radio waves
Twisted Pair (TP) Cabling
- It consists of two insulated copper wires
- Category 5: 100 Mbps, 1 Gbps Ethernet
- Can support 10Gbps Ethernet
Coaxial Cable Transmission
- Two concentric copper conductors are used
- Transmission is bidirectional
- It is broadband: multiple frequency channels on cable
- 100's of Mbps per channel
Fiber Optic Cable Transmission
- Glass fibers carry light pulses
- High-speed point-to-point transmission ranging from 10's to 100's of Gbps.
- Low error rate due to immunity to electromagnetic noise
- Repeaters are spaced far apart
Wireless Radios
- Carries electronic signals with no physical wire
- Broadcast and half-duplex, between sender and receiver
- Reflects electromagnetic waves
- Subject to obstruction by objects and susceptible for interference
Radio Link Transmission Types
- Terrestrial microwave: Up to 45 Mbps channels
- Wireless LAN (WiFi): Up to 100's Mbps
- Wide-area (cellular): up to 10's Mbps
- Satellite offers up to 45 Mbps per channel with 270ms end-end delay, geosynchronous versus low-earth-orbit
Network Core Function
- The network core is a mesh of interconnected routers that use packet-switching to forward application-layer messages into packets
- Packets are forwarded from one router to the next along the path from source to destination
- Each packet is transmitted at full link capacity
Packet Switching Details
- Taking L/R seconds to transmit push an L-bit packet into a link at R bps
Queuing and Packet Loss
- Packet queuing and loss occurs when transmission rate exceeds the link for a period of time
- Packets will queue, waiting to be transmitted on output link
- Packets are dropped if memory buffer in router is full
Network Core Functions
- Local function: moves arriving packets from router's input link to router output link
- Global function: the algorithm determines the source to destination paths taken by packets
Circuit Switching Alternative
- End-end resources allocated and reserved for "call" between source and designation
- Dedicated resources: no sharing
- Circuit segment is idle if it's not used
Circuit Switching: FDM and TDM
- Frequency Division Multiplexing (FDM) optical and electromagnetic frequencies are divided into frequency bands for allocation
- Time Division Multiplexing (TDM): time is divided into slots, each call allocated periodic slot(s)
Packet Switching vs Circuit Switching
- Packet switching allows more users to use the network
- Circuit switching guarantees resources
- Packet switching is great for"bursty" data with resource sharing and no call setup
- Packet overflow is possible
How to Connect Access ISPs
- It is not feasible that each of the millions of access ISPs connect to each other as it would not scale
- A more viable option is to connect each access ISP to one global transit ISP subject to customer and provider agreement
- A more likely scenario involves multiple global ISPs that want to connect, resulting in Internet exchange points
Internet Structure Progression
- Regional networks arrive to connect access nets to ISPs
- Content provider networks may run their own network in efforts to bring services and content closer to endusers
- Tier-1 commercial ISPs establish national & international coverage
- Content provider networks connect data centers while bypassing tier-1 and regional ISPs
Analyzing Network Performance
- Losses and delays occur when packets queue in router buffers because the packet queue waits for turn
Packet Delay Components
- The components of nodal delay include processing, queuing, transmission, and propagation
- Nodal delay equals processing plus queuing, plus transmission, and propagation delay
- Transmission delay equals packet length(bits) over transmissions rate (bps)
- Propagation delay equals the distance of physical link / the propagation speed
Throughput Rate
- Expressed as bits per time unit, measures the rate at which bits are being sent from receiver to sender
Types of Network Security Attacks
- Malware such as viruses or worms can get in host
- Spyware malware can record keystrokes, web sites visited, upload info to collection site
- Infected hosts can be enrolled in botnet, DDOS for spam
Types of Malware
- Denial of Service (DoS): attackers make resources unavailable to legitimate traffic
- Packet Interception: promiscuous network interface reads/records all packets
- IP spoofing: packets are sent with false source addresses
Protocol Layers
- Networks are complex, so protocol "layers" provide structure and organization
- Layering deals with identification, relationship of complex systems
Internet Protocol Stack Structure
- Application: network applications
- Transport: process-process data transfer
- Network: routing of datagrams from source to destination
- Link: data transfer between neighboring network elements
- Physical: bits “on the wire”
Hybrid Model
- Application Layer
- Transport layer
- Network layer
- Data link layer
- Physical layer
Internet History Highlights
- 1961-1972: Early packet-switching principles
- 1972: ARPAnet public demo
- 1972-1980: Internetworking, new and proprietary nets
- 1974: Cerf and Kahn architecture for interconnecting networks
- Internetworking principles, and defining today's Internet architecture
- 1980-1990: New protocols and proliferation of networks.
More Internet History
- Deployment of TCP/IP and definition of smtp e-mail
- DNS defined name-to-IP-address translation
- ftp protocol defined and TCP congestion control implemented
- 100,000 hosts connected to networks
- Early 1990s: ARPAnet decommissioned, NSF lifts restrictions on commercial use of NSFnet
- Killer apps emerge as more users join
History of Malware Protection
- 2005-present: New applications and the Internet are "everywhere"
- ~18B devices attached in 2017, aggressive broadband deployment, increasing 4G and 5G wireless access
- Online social network and enterprises run services in "cloud"
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.