Networking Fundamentals, Chapter 1

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Explain the significance of the term 'network edge' in the context of the Internet's architecture.

The network edge comprises hosts (clients and servers) and access networks, representing the entry and exit points for data within the Internet infrastructure.

Describe the function of 'packet switches' within the Internet and their role in data transmission.

Packet switches (routers and switches) forward packets (chunks of data) between networks, directing data along the most efficient path from source to destination.

How does 'frequency division multiplexing' (FDM) enable multiple channels to transmit over a single cable-based access network?

FDM allows different channels to transmit simultaneously on a single cable by allocating distinct frequency bands to each channel, preventing interference.

Compare and contrast residential access networks with institutional access networks in terms of their connectivity to the edge router.

<p>Residential access networks connect individual homes, while institutional access networks connect larger organizations like schools or companies to the edge router.</p> Signup and view all the answers

Illustrate the concept of 'store and forward' packet switching with an example, demonstrating how it affects end-to-end delay.

<p>In store and forward, an entire packet must arrive at a router before it can be transmitted on the next link, resulting in a transmission delay which affects the end-to-end delivery time.</p> Signup and view all the answers

Explain the 'packet queuing and loss' scenario in packet switching and its relationship to link transmission rates.

<p>When the arrival rate of packets to a link exceeds the link's transmission rate, packets queue up. If the router's memory fills up, packets are dropped, resulting in loss.</p> Signup and view all the answers

How does 'circuit switching' differ from 'packet switching' in resource allocation and performance guarantees?

<p>Circuit switching allocates dedicated resources for each connection, guaranteeing circuit-like performance, while packet switching shares resources on demand, potentially leading to congestion and variable performance.</p> Signup and view all the answers

Analyze the trade-offs between 'Frequency Division Multiplexing' (FDM) AND 'Time Division Multiplexing' (TDM) in circuit switching scenarios.

<p>FDM divides bandwidth into frequency bands, providing simultaneous transmission, whereas TDM divides bandwidth into time slots, allocating each slot to a different user.</p> Signup and view all the answers

Describe the concept of 'Internet Exchange Points' (IXP) and their role in facilitating internet connectivity.

<p>IXPs are physical locations where different networks ([ISPs] and content providers) connect to exchange Internet traffic, reducing latency and improving network performance.</p> Signup and view all the answers

Define the term 'tier-1' commercial ISPs and explain what distinguishes them from other ISPs.

<p>Tier-1 ISPs are large, well-connected networks with national/international coverage that can reach every other network on the Internet without purchasing transit from another provider.</p> Signup and view all the answers

Explain the concept of a ‘content provider network’ and why major content providers create them.

<p>Content provider networks are private networks that connect the datacenters of major content providers to the Internet, often bypassing tier-1 ISPs to deliver content more efficiently and reduce costs.</p> Signup and view all the answers

Differentiate between 'transmission delay' and 'propagation delay' in data transmission, providing the formulas for each.

<p>Transmission delay is the time to push out a packet onto a link and is calculated as $L/R$, where $L$ is packet length and $R$ is transmission rate; propagation delay is the time for a bit to travel across the link, calculated as $d/s$, where $d$ is length of the physical link and $s$ is the propagation speed.</p> Signup and view all the answers

Explain the significance of the term 'bottleneck link' in the context of end-to-end throughput.

<p>The bottleneck link is the link on the end-to-end path that constrains the end-to-end throughput, limiting the rate at which data can be transmitted from sender to receiver.</p> Signup and view all the answers

Outline several reasons why the Internet was not originally designed with security in mind.

<p>The Internet was initially conceived as a collaborative network of trusted users. Original design priorities: interoperability and rapid development (rather than security). There are no security measures in the initial layers. Limited understanding of malicious threats.</p> Signup and view all the answers

How does 'IP spoofing' undermine network security, and what are its potential consequences?

<p>IP spoofing allows attackers to inject packets with false source addresses, deceiving network devices, bypassing access controls, and launching attacks that are difficult to trace.</p> Signup and view all the answers

What strategies can be employed as 'lines of defense' against the types of security attacks that are commonly launched?

<p>Strategies include authentication to verify user identity, encryption to ensure data confidentiality, digital signatures for data integrity, access restrictions to control network access, and firewalls to filter malicious traffic.</p> Signup and view all the answers

Define internet protocol layering and what the benefits are concerning its overall architecture.

<p>Protocol layering is the organization of network functionality into distinct layers, each providing specific services to the layer above, simplifying design, development, maintenance, and interoperability, and allowing modular components.</p> Signup and view all the answers

Elaborate on the unique roles the 'presentation' and 'session' layers have in the OSI model and why they are not present within the standard Internet protocol stack.

<p>The presentation layer handles data representation (encryption, compression), while the session layer manages dialog control and synchronization. They aren't in the standard Internet Protocol stack because their functionalities are often implemented within application layers when needed.</p> Signup and view all the answers

How does encapsulate work within 'Services, Layering and Encapsulation'?

<p>Encapsulation involves adding headers to data packets as they move down the protocol stack, with each layer adding its header to provide specific control or identification.</p> Signup and view all the answers

Identify key internetworking principles of Cerf and Kahn that contribute to decentralized control, and stateless routing.

<p>Autonomy for connected networks with no internal changes required, and best-effort service model.</p> Signup and view all the answers

Explain how access ISPs connect to form the internet, and why directly connecting each access ISP to each other directly doesn't scale.

<p>Access ISPs connect through regional and Tier 1 ISPs. Directly connecting each access ISP would require $O(N^2)$ connections, which isn't feasible for a large number of ISPs.</p> Signup and view all the answers

What was the original vision for the Internet and why is it different from the Internet of today?

<p>The original vision was a group of mutually trusting users within a transparent network. Today, the Internet isn't trustworthy and is very concerned with security.</p> Signup and view all the answers

How does an access provider's decision to implement access networks that use shared cables affect network performance?

<p>Employing shared access networks over a cable results in contention for network bandwidth, potentially decreasing average performance. The network has to use a frequency division multiplexing scheme.</p> Signup and view all the answers

In cable-based access, data and TV signals are transmitted over shared cable. Explain how 'cable distribution network' helps segregate such data.

<p>Data and TV are separated in different frequencies through cable distribution network.</p> Signup and view all the answers

In the context of 'Internet structure: a "network of networks"', what is meant by 'economics, national policies' in the evolution.

<p>ISPs, typically private companies, operate based on economics and profitability. Local rules are also applied through regulators.</p> Signup and view all the answers

Explain in what areas 'hardware assist' is not possible in traditional Internet.

<p>Hardware assist is not possible in traditional Internet since there are no cellular network-provided hardware identities via SIM cards.</p> Signup and view all the answers

Elaborate on how the delay may not increase always across different levels of networks.

<p>The packets take the 'easier' route with lesser crowded networks; delays can happen due to transfer in intercontinental network transfers.</p> Signup and view all the answers

Identify a key limitation of 'packet switching'?

<p>Packets may take long depending on the 'bursty-ness' of data; a possibility of over-utilized 'congestion' may occur.</p> Signup and view all the answers

How can we make 'packet-switching' more 'circuit-like'?

<p>Though it's complicated, one could make packet switching 'circuit-like' by carefully making various techniques.</p> Signup and view all the answers

Explain the significance of the transition from ARPANET to NSFNET in the context of the Internet's evolution.

<p>ARPANET's restrictions were decommissioned in 1995; NSFNET went to non-commercial usage.</p> Signup and view all the answers

Explain the role of 'promiscuous network interface' is in 'packet sniffing'.

<p>The interface is setup to read and record all packets that pass by (including potentially passwords)</p> Signup and view all the answers

Discuss the key characteristics of wide-area cellular access networks, including a comparison to Wireless LANs.

<p>Wide-area 4G/5G can scale ~ 10's Mbps over ~10 km networks. Wireless LANs (ie, WiFi) are only about ~10-100's Mbps over 10's of meters.</p> Signup and view all the answers

Internet protocol designers playing 'catch-up' suggests Internet security vulnerabilities are due to poor protocol design. Elaborate.

<p>The original protocols were created in a trusting environment with less regard toward security, protocols need updates and patches to the design or new designs.</p> Signup and view all the answers

Explain the concept of 'stateless routing' as one of Cerf and Kahn's internetworking principles and how it contributes to the scalability of the Internet.

<p>Stateless routing is where each router makes forwarding decisions independently based on the destination address in the packet, without maintaining per-connection state, enabling scalability and resilience.</p> Signup and view all the answers

Describe the mechanism of 'queueing delay' in packet switching, including its relation to congestion management and network capacity.

<p>Queuing delay is the time a packet spends waiting in a router's queue before being transmitted, exacerbated by congestion, impacted by available network capacity, and managed through various queue management techniques.</p> Signup and view all the answers

How did 'software-defined networking (SDN)' impact the internet architecture?

<p>It was an industry-wide acceptance for programmable software used in the Internet.</p> Signup and view all the answers

Explain the concept 'best-effort service model' as one of Kahn and Cerf's internetworking principles.

<p>There are only efforts by the hosts and the networks to deliver packets, but it isn't guaranteed.</p> Signup and view all the answers

Discuss the benefits and drawbacks of implementing security measures 'in all layers' of the Internet protocol stack.

<p>Implementing security in all layers provides defense-in-depth mechanisms, but can increase complexity, overhead, and processing. There also can be overlap and ineffectiveness.</p> Signup and view all the answers

Explain why calculating 'packet transmission delay' is crucial in assessing communication speed.

<p>You need to factor in data like L and R (where L = packet length (bits:) and R = Transmission rate (bps)). Using this you can use math to understand how long it takes to send packets L/R.</p> Signup and view all the answers

Explain why traceroute looks like delays are reducing.

<p>Traceroute returns only time it took from one IP network to the next. It isn't aware of transit or other networking factors.</p> Signup and view all the answers

Flashcards

What is the Internet?

The Internet is a network of networks connecting billions of computing devices (hosts or end systems) running network applications at the Internet's "edge."

What is a protocol?

A protocol defines the format and order of messages exchanged between network entities, as well as the actions taken on message transmission or receipt.

Networks

Collection of devices, routers, links, managed by an organization.

Network Edge

Hosts, access network, physical media.

Signup and view all the flashcards

Network Core

The part of the Internet consisting of packet/circuit switching and internet structure.

Signup and view all the flashcards

Performance (network)

A measure of loss, delay, and throughput in a network.

Signup and view all the flashcards

Internet

Collection of interconnected ISPs.

Signup and view all the flashcards

Access Networks

Residential, institutional, and mobile connections to the Internet.

Signup and view all the flashcards

Communication Links

Fiber, copper, radio, satellite.

Signup and view all the flashcards

Networks

Collection of devices, routers, links: managed by an organization.

Signup and view all the flashcards

Bandwidth

A measure of the transmission rate over a communication link.

Signup and view all the flashcards

Packet Switches

Forward packets (chunks of data) in the network.

Signup and view all the flashcards

End Systems

Devices that connect to the internet.

Signup and view all the flashcards

HFC (Hybrid Fiber Coax)

Fiber optic or copper cable networks that combine to provide internet access to homes.

Signup and view all the flashcards

DSL (Digital Subscriber Line)

Asymmetric connection to the network through existing telephone lines.

Signup and view all the flashcards

Wi-Fi

A wireless access point for connecting to a local network.

Signup and view all the flashcards

Enterprise Networks

Collection of devices, routers, links, managed by an organization.

Signup and view all the flashcards

FDM (Frequency Division Multiplexing)

Different channels transmitted in different frequency bands.

Signup and view all the flashcards

Transmission Rate

The rate at which data is transmitted over a medium.

Signup and view all the flashcards

Twisted Pair (TP)

Copper wires used for network connections.

Signup and view all the flashcards

Fiber Optic Cable

Glass or plastic fiber carrying light pulses to transmit data.

Signup and view all the flashcards

Packet Switching

Routers break application-layer messages into packets.

Signup and view all the flashcards

Circuit Switching

A method for allocating resources for a dedicated end-to-end connection.

Signup and view all the flashcards

Routing

Global action: determine source-destination paths taken by packets.

Signup and view all the flashcards

Forwarding

Local action: move arriving packets from router's input link to appropriate output link.

Signup and view all the flashcards

Packet Transmission Delay

The delay it takes to transmit a packet into a link.

Signup and view all the flashcards

Store and Forward

Packets must fully arrive at router before being transmitted on next link.

Signup and view all the flashcards

Queueing

When work arrives faster than it can be serviced, causing waiting lines.

Signup and view all the flashcards

Internet Structure Option

Global ISPs have economic agreements.

Signup and view all the flashcards

Packet Queuing and Loss

If arrival rate to a link exceeds its transmission rate, buffer can be full.

Signup and view all the flashcards

Nodal Processing Delay

Delay due to checking for bit errors and determining output link.

Signup and view all the flashcards

Queueing Delay

Time waiting at output link for transmission.

Signup and view all the flashcards

Transmission Delay

Time to transmit (push out) L-bit packet into link at rate R.

Signup and view all the flashcards

Throughput

A rate (bits/time unit) at which bits are being sent from sender to receiver.

Signup and view all the flashcards

Internet Structure

A network of networks; hosts connect via access ISPs.

Signup and view all the flashcards

Bottleneck link

A link on end-end path that constrains end-end throughput.

Signup and view all the flashcards

Network security

Internet not designed with security in mind. We must learn how to protect computers.

Signup and view all the flashcards

Protocol Layers

Layer protocol stack, provides a structure for network communication.

Signup and view all the flashcards

IP Spoofing

It is an injection of packet with false source address.

Signup and view all the flashcards

Study Notes

  • Chapter 1 introduces fundamental networking concepts and terminology.

Overview/Roadmap

  • The chapter explains the Internet protocols, layers, structure, performance, security, and history.

The Internet: Nuts and Bolts View

  • The Internet connects billions of computing devices, including hosts and end systems at the network edge.
  • Packet switches forward data in chunks and include routers and switches.
  • Communication links use fiber, copper, radio, and satellite, with transmission rate defined by bandwidth.
  • Networks are a collection of devices, routers, and links managed by an organization.

The Internet: Network of Networks

  • The Internet is a network of networks formed by interconnected ISPs.
  • Protocols are essential for controlling the sending and receiving of messages.
  • Internet standards include RFC: Request for Comments and IETF: Internet Engineering Task Force.

The Internet: Services View

  • The Internet provides Infrastructure services to applications, enabling web browsing, video streaming, multimedia teleconferencing, email, games, e-commerce, social media, and interconnected appliances.
  • It provides a programming interface with hooks for apps to connect and use Internet transport services.
  • Offered service options are analogous to postal service options.

Protocols

  • Human protocols involve questions, introductions, and agreement on timing.
  • Network protocols govern all communication activity between devices on the Internet.
  • Protocols define the format, order, and actions taken on messages during transmission and receipt.

Network Edge

  • Network edge consists of hosts (clients and servers)
  • Servers often reside in data centers.

Access Networks and Physical Media

  • Access networks connect end systems to edge routers via residential access nets, institutional access networks (school, company), and mobile access networks (WiFi, 4G/5G).

Cable-Based Access Networks

  • Networks transmit data and TV over shared cable.
  • HFC (hybrid fiber coax) provides asymmetric transmission rates: downloads at 40 Mbps – 1.2 Gbps and uploads at 30-100 Mbps.
  • Cable and fiber networks attach homes to an ISP router where homes share access to the cable headend.
  • Frequency division multiplexing (FDM) transmits channels in different frequency bands.

Digital Subscriber Line (DSL) Access Networks

  • Existing telephone lines are used to connect to the central office DSLAM.
  • DSL carries data to the Internet, while voice goes to the telephone network.
  • 24-52 Mbps dedicated downstream and 3.5-16 Mbps dedicated upstream transmission rates.

Home Networks

  • Home networks utilize wireless and wired devices combined in a single box that connects to the central office/headend.
  • They have WiFi wireless access points (54, 450 Mbps), cable or DSL modem, router, firewall, NAT, and wired Ethernet (1 Gbps).

Wireless Access Networks

  • Shared wireless access networks connect end systems to the router through an access point.
  • Wireless local area networks (WLANs) are typically short-range, using 802.11b/g/n (WiFi) with 11, 54, and 450 Mbps transmission rates.
  • Wide-area cellular access networks are provided by mobile operators (10's km range), with 10's Mbps via 4G/5G.

Enterprise and Data Center Networks

  • Enterprise networks are used by companies and universities with mixes of wired and wireless technologies.
  • Ethernet provides wired connections at 100Mbps, 1Gbps, and 10Gbps, while WiFi offers wireless access points at 11, 54, and 450 Mbps.
  • Data center networks are high-bandwidth links (10s-100s Gbps) connect thousands of servers.

Host Sending Packets of Data

  • Hosts break applications into smaller chunks called packets and transmit them into the access network at transmission rate R.
  • The packet transmission delay equals the time needed to transmit L-bit packet into the link

Physical Media

  • Physical links lie between the transmitter and receiver.
  • Guided media propagates signals through solid media like copper, fiber, and coax.
  • Unguided media propagate signals freely, such as with radio.
  • Twisted pair (TP) uses two insulated copper wires for 100 Mbps to 10Gbps Ethernet connections.
  • Coaxial cable has two concentric copper conductors and is bidirectional and broadband, supporting multiple frequency channels at 100’s Mbps per channel.
  • Fiber optic cable transmits light pulses through glass fiber. It has high-speed point-to-point transmission (10's-100's Gbps) and low error rates, and is immune to electromagnetic noise.
  • Wireless radio uses various bands in spectrum
  • Wide-area wireless (4G/5G cellular) provides 10's Mbps over ~10 km.

Network Core

  • The network core interconnected routers and enables packet-switching
  • Networks forward packets along the path from source to destination.

Key Network-Core Functions

  • Forwarding (switching) moves packets from a router's input link to an output link, being a local action.
  • Routing determines the global source-destination paths taken by packets using routing algorithms.

Packet Switching

  • Packet transmission delay refers to the time it takes to push an L-bit packet into a link with the bit rate R.
  • Store and forward ensures the entire packet arrives at the router before being transmitted on the next link.

Packet Switching: Queueing

  • Packet queueing occurs when the arrival rate exceeds the transmission rate.
  • Packet queuing can result in loss if the buffer fills up.

Circuit Switching

  • Resources are dedicated end-to-end, not shared when using circuit switching.
  • Circuit switching is used in traditional telephone networks

Circuit Switching: FDM and TDM

  • Frequency Division Multiplexing (FDM) divides the spectrum of optical and electromagnetic frequencies.
  • Time Division Multiplexing (TDM) divides time into slots.

Packet Switching versus Circuit switching

  • Packet-switching is great for bursty data as it allows resource sharing.
  • The two limitations of packet switching is that their can be excessive congestion, and it requires protocols to have reliable data transfer and congestion control.

Internet Structure

  • Hosts connect to the Internet via access ISPs, which need to be interconnected.
  • The resulting interconnectedness is complex and influenced by economics and national policies, leading to a need for a structured approach to understanding.

Internet Structure: Key Components

  • Global transit ISPs connect with regional networks and have Internet exchange points.
  • Content provider networks create services to reduce the load on the internet.
  • Tier-1 ISPs are composed of commercial ISPs which provide national and international coverage.

Network Performance: Packet Delay and Loss

  • Packet delay occurs within router buffers while packets wait for transmission.
  • Delay increases when arrival rate exceeds output link capacity.

Packet Delay: Four Sources

  • Nodal processing (dproc): check bit errors, determine output link.
  • Queueing delay (dqueue): time waiting at output link for transmission.
  • Transmission delay (dtrans): equals packet length over the link transmission rate.
  • Propagation delay (dprop): distance over propagation speed.

Packet Queueing Delay

  • If the arrival rate to a link exceeds the transmission rate for sometime, packets must wait.
  • If the memory buffer in a router fills up then, packets can be dropped (lost)

Real Internet Delays and routes

  • Traceroute measures the end-end Internet delay to a router along a path which uses 3 packets to discover delay measurement.

Packet Loss

  • Packets are dropped then the queue (aka buffer) becomes full to its capacity.
  • A packet may not be retransmitted by its source node.

Throughput

  • Throughput is the rate that bits are sent from sender to receiver.
  • Bottleneck link constrains end-to-end throughput.
  • Per-connection end-end throughput is calculated based on the bottleneck and the number of clients.

Network Security

  • The Internet was originally designed without security in mind, necessitating security at all layers.
  • Security considerations include bad computer attacks, defending networks against attacks, and the architecture design that is immune to attacks.

Security Problems

  • Packet sniffing consists of illicit packet reading, which can harvest passwords.
  • IP spoofing consists of injecting packets with a false source address.
  • Denial of Service(DoS) consists of compromising hosts through the use of botnets, from which illegitimate bogus traffic is sent from.

Lines of Defence for Network Security

  • Authentication can be accomplished prove individuals are who they say via Cellular Networks.
  • Encryption helps with confidentiality.
  • Firewalls acts as specialized middleboxes that filer access.

Protocol Layers and Service Models

  • Protocol layering helps organize complex networks by dividing them into hosts, routers, links of various media, applications, protocols, and hardware/software.
  • The Internet protocol stack consists of application, transport, network, link, and physical layers.

Layer operation

  • Application layer messages exchange to implement applications using services of transport layer
  • Transport layer protocol transfers a message from one process to another and encapsulates it
  • Network Layer encapsulates with layer header and transfers
  • This repeats until the destination is reached

History of Internet

  • 1961-1972 was the early packet switching principles.
  • 1972 consists of initial public presentation of ARPANet.
  • 1972-1980 was the beginning of internetworking.
  • 1974, a new IP architecture was born.
  • 1980-1990 involved prolific production of new protocols and networks
  • 1990 - Present Day involved commericalization.
  • In 2005, there was a rise in mobile devices.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser