100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Samenvatting Computer Networks A Top Down Approach Hoofdstuk 1 en 2 door Kurose en Ross, Bachelor Informatica, UvA €7,99   In winkelwagen

Samenvatting

Samenvatting Computer Networks A Top Down Approach Hoofdstuk 1 en 2 door Kurose en Ross, Bachelor Informatica, UvA

 7 keer bekeken  0 keer verkocht

Samenvatting van het boek Computer Networks A Top Down Approach door Kurose en Ross Hoofdstuk 1 en 2, voor het vak Networks and Network Security in het 2de jaar van de bachelor Informatica aan de Universiteit van Amsterdam. Daarnaast zijn ook aantekeningen van alle hoorcolleges aangevuld.

Voorbeeld 3 van de 20  pagina's

  • Onbekend
  • 9 augustus 2023
  • 20
  • 2020/2021
  • Samenvatting
book image

Titel boek:

Auteur(s):

  • Uitgave:
  • ISBN:
  • Druk:
Alle documenten voor dit vak (5)
avatar-seller
charhoog
Network and Network Security Summary CHoogteijling


1 Computer Networks and the Internet

1.1 What is the Internet?
1.1.1 A Nuts-and-Bolts Description

The Internet is a computer network that connects billions of computing devices around the
world. Hosts, or end systems, are the devices that connect to the Internet. Communication
links and packet switches connect the end systems to each other. Packets are the data that
is send over these links. The transmission rate is the amount of bits per second that can
travel over a link.
A packet switch collects a packet arriving on its incoming communication link and forwards
the packet on its outgoing communication link. A router is a packet switch mostly used in
the network core. A link-layer switch is a packet switch mostly used in access networks. A
route, or path, is the sequence of communication links and packet switches traversed by a
packet from the sending end system to the receiving end system.
An Internet Service Provider (ISP) is a system through which end systems access the Inter-
net. It provides a variety of types of network access, such as DSL, and mobile wireless access.
All ISPs in the Internet are interconnected and have a hierarchical structure. Each ISP net-
work is managed independently, runs the IP protocol, and conforms to certain naming and
address conventions.
All pieces of the Internet run protocols that control the sending and receiving of information
within the Internet, such as the Transmission Control Protocol (TCP), and the Internet
Protocol (IP).
The requests for comments (RFCs) are the Internet standards that are developed by the
Internet Engineering Task Force (IETF). They describe what each and every protocol does,
so that people can create systems and products that interoperate. The IEEE 802 LAN/MAN
Standards Committee specifies the Ethernet and wireless WiFi standards.


1.1.2 A Services Description

Distributed applications are applications that involve multiple end systems that exchange
data with each other. A socket interface specifies how a program running on one end system
asks the Internet infrastructure to deliver data to a specific destination program running on
another end system.


1.1.3 What Is a Protocol?

Network Protocols

A protocol defines the format and the order of messages exchanged between two or more
communicating entities, as well as the actions taken on the transmission and/or receipt of a
message or other event. All activity in the Internet that involves two or more communicating
remote entities is governed by a protocol.


1.2 The Network Edge
Hosts are sometimes divided as clients and servers, where a client can be a desktop and a
server can be a data center.



, page 3 of 83

,Network and Network Security Summary CHoogteijling


1.2.1 Access Networks

See figure 1.4 Access networks in the book Computer Networking A Top Down Approach
by Kurose and Ross 7th edition.


Home Access: DSL, Cable, FTTH, Dial-Up, and Satellite

A digital subscriber line (DSL) runs over the telephone line simultaneously, but at different
frequencies.

• A high-speed downstream channel, in the 50 kHz to 1 MHz band.
• A medium-speed upstream channel, in the 4 kHz to 50 kHz band.
• A two-way telephone channel, in the 0 to 4 kHz band.

Cable Internet access makes use of the cable television company’s cable television infrastruc-
ture. It is a shared broadcast medium, every packet sent by the head end travels downstream
on every link to every home and every packet sent by a home travels on the upstream channel
to the head end.
Fiber to the home (FTTH) provides an optical fiber path from the CO directly to the home.
It can provide Internet access rates in the gigabits per second range.
A satellite link or dial-up access can be used in locations where DSL, cable, and FTTH are
not available, but are extremely slow in comparison.


Access in the Enterprise (and the Home): Ethernet and WiFi

A local area network (LAN) is used to connect an end system to the edge router. Ethernet
is the most prevalent access technology in corporate, university, and home networks.
In a wireless LAN, users transmit and receive packets on an access point that is connected
into the enterprise’s network, which is connected to the wired Internet. It is based on IEEE
802.11 technology, also know as WiFi.


1.2.2 Physical Media

Physical media has two categories: guided media and unguided media. With guided media,
the waves are guided along a solid medium. With unguided media, the waves propagate in
the atmosphere and in outer space.


Twisted-Pair Copper Wire

Twisted pair copper wire is the least expensive and most commonly used guided transmission
medium. It consists of two insulated copper wires arranged in a regular spiral pattern.
They are twisted together to reduce the electrical interference from similar pairs close by.
Unshielded twisted pair (UTP) is commonly used for computer networks within a building.
It can achieve data rates of 10 Gbps.


Coaxial Cable

Coaxial cable consists of two copper conductor that are concentric. It is commonly used in
cable television systems and can be used as a guided shared medium.

, page 4 of 83

, Network and Network Security Summary CHoogteijling


Fiber Optics

An optical fiber is a thin, flexible medium that conducts pulses of light, with each pulse
representing a bit. It can support large bit rates, is immune to electromagnetic interference,
and is very hard to tap. These characteristics have made fiber optics the preferred long-
haul guided transmission media. Optical fiber is very expensive, so it is not deployed in
short-distance links.


Terrestrial Radio Channels

Radio channels carry signals in the electromagnetic spectrum and do no require physical
wire to be installed. Terrestrial radio channels have three groups: those that operate over
very short distance, those that operate in local areas, and those that operate in the wide
area.


Satellite Radio Channels

Geostationary satellites permanently remain above the same spot on Earth. Low-earth orbit-
ing (LEO) satellites are placed close to Earth and rotate around it. They may communicate
with each other, as well as with ground stations


1.3 The Network Core
See figure 1.10 The network core in the book Computer Networking A Top Down Approach
by Kurose and Ross 7th edition.


1.3.1 Packet Switching

A packet is a (part of a) message that is send in a network application. Each packet travels
through packet switches. Packets are transmitted over each communication link at a rate
equal to the full transmission rate of the link.


Store-and-Forward Transmission

Store-and-forward transmission is that the packet switch must receive the entire packet
before it can begin to transmit the first bit of the packet onto the outbound link. The delay
bits
is 2 ∗ bits/rate and the end-to-end delay is: dend−to−end = links rate . The delay without
buffering the packets is bits/rate, but a complete message must be processed before it can
be send.


Queueing Delays and Packet Loss

An output buffer, or output queue, stores packets that the router is about to send into that
link. This means that packets also suffer from queueing delays. Queueing delays are variable
and depend on the level of congestion in the network. Packet loss occurs when either the
arriving packet or one of the already-queued packets is dropped because the buffer is full.




, page 5 of 83

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper charhoog. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €7,99. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 70055 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€7,99
  • (0)
  Kopen