码迷,mamicode.com
首页 > Web开发 > 详细

Note for Computer Networks_1

时间:2016-04-25 08:02:11      阅读:288      评论:0      收藏:0      [点我收藏+]

标签:

Network Hardware

 

1. A computer network is a collection of computers connected by communication links

2. communication link:

  1.Point to Point

  2.Broadcast

3. Nodes: the entities in  the network(hosts, routers, servers, devices, programs, etc)

    Edges/Links: the connections between entities

4. Topology: a topologyrefers to the physical layout of the network.

技术分享

5.Network hardware:

 1m: Personal area network

    Point-to-point: USB/Serial/Parallel/Infrared

    Boradcast: Bluetooth

  10m to 1km: Local area network(LAN)

    Boradcast:

    1.Cable 100Mbps to 10Gbps (Switched Ethernet)

    2.Radio(Wlan) 11Mbps to hundreds Mbps (Wifi)

  10km: Metropolitan area network

  100km to 1000km: Wide area network(WAN)

  技术分享

    Router: A computer that provde communications service

    Subnet: Collection of routers

    Host: Send packets of data to each other via LAN and Rounter

    ---

    SubNet: End systems (hosts) are interconnected via a communication sub-network

    SubNet is composed of lines (wires) and switches

    SubNet may be based on packet-switched and/or circuit-switched technologies

    –Packet switched means users compete for bandwidth
    –Circuit-switched means users are guaranteed bandwidth

  10000km: The Internet 

    Connecting networks together to form a network of networks is called an internet

    *The largest (worldwide) internet is called the Internet

6. The Internet is an infrastructure

  The World Wide Web is just another service that uses The Internet

-----------------------------------------------------------------------

Network Software

 

1. Communication protocols

  Communication protocols consist of a set of rules governing the interaction of processes in a network

  Communication protocols define:

    1. The service it provides

    2. The assumptions about the environment where it executes, including the services it uses

    3. The type and format of the messages (called frames or packets) used to implement it

    4. The rules (algorithms) guarding the consistency of message exchanges and the integrity of the service provided

 

2. Connection-oriented service protocol:

  1. Connection-oriented Packet Switching(Virtual Circuit Switching)

    Establish a connection→Use it for data transfer(if the connection is established)→Release the connection

    *Data is always delivered and in the order sent

3. Connectionless service protocol:

  1. Connectionless packet switching(Datagram Switching)

    1.There is no attempt to set up a connection

    2.Each message carries the full destination address

    3.Each message is routed through the network independent of all the others

4. Protocol/service hierarchies

  技术分享

  1. Networks are organised as a series of layers, each one built on the one below it

  2. The lower layers provide services to the upper layers, the upper layers are shielded how the services implemented

  3. When Layer N in one machine holds a conversation with Layer N in another machine(peer):

    The rules and conventions are called protocols.

    Data is send indirectly between the peers, by using the services of the lower layers

  4. The interface between adjacent layers defines the primitive operations and services offered

5. OSI Reference Model

  技术分享

  1. The data switch between appliction is translated as following:

    Layer 7 → Layer 3(Then packed) → Layer 1 → Layer 3 in router this side → Layer 3 in router target side → Layer 3 target side(unpacking)  → Layer 7

  2. Layer

    1. Layer 1 (Physical layer) defines the electrical, mechanical, procedural, and functional specifications

      –activating the physical link between end systems
      –maintaining the physical link between end systems
      –deactivating the physical link between end systems

    2. Layer 2 (Data Link Layer) provides a data transmission service free of transmission errors between adjacent nodesusing the physical layer

      Layer 2 breaks data from the network layer into frames

      –process acknowledgements
      –detect and recover from damaged, lost and duplicate frame problems
      –make sure the transmitter does not drown the receiver (flow control)
      –control the access to the medium in broadcast networks(MAC-Medium Access Control sublayer)

    3. Layer 3 (Network Layer) controls how a packet is routed from source to destination through a subnet

      –determine the route for each source/destination pair
      –perform congestion control (when there are too many messages in transit)
      –maintain accounting information
      –overcome the problem of interconnecting heterogeneous subnets (LANs and WANs, each with different protocols)

    4. Layer 4 (Transport Layer) creates a distinct network connection for each transport connection

      1.Layer 4 is the real (lowest) end-to-end layer between source and destination applications

      2.It creates a distinct network connection for each transport connection  

        –or creates multiple connections and divides the data among those connections to improve performance
        –or shares several transport connections onto the same network connection to reduce cost

      3.It provides end to end flow control (data link layer only deals with adjacent nodes)

      4.It provides end to end error detection and correction

      5.It may provide additional congestion control

    5. Layer 5 (Session Layer) 

      1.Performs dialogue control(Who’s turn is it to talk?)

      2.Token management(Who has access to shared resource?)

      3.Data synchronisation(Where were we before the line went down?)

    6. Layer 6(Presentation Layer)

      1.Concerned with syntax and semantics of data rather than it’s transmission

      2.Provides common data abstractions to allow communication between heterogeneous computers

    7. Layer 7(Application Layer) is where the applications reside

      –Network virtual terminals (TELNET)
      –File transfer (FTP)
      –Electronic mail (SMTP)
      –Newsgroups (NNTP)
      –Web (HTTP)
      –Directory lookup (DNS)
      –Electronic commerce

  3. Terminology

    1. Entities : Active elements in each layer

    2. Entities in the same layer on different machines are called peer entities. They exchange Protocol Data Units (PDU)

    3. Entities in layer N implement a service used by layer N+1. Layer N is the “service provider”, Layer N+1 is the “service user

    4. Layers N and N+1 exchange Interface Data Units (IDU), containing Interface Control Information (ICI) and Service Data Units (SDU)

    5. Services are accessible at a SAP (Service Access Point)

     技术分享

  4. OSI encapsulation

    1. As each data unit is passed down the layers, moreheaders are added

    2. As each data unit is passed up the layers, headers are removed

    *ICIs do not form part of message or header and do not propagate

    技术分享

6. TCP/IP(Transmission Control Protocol/Internet Protocol) Reference Model

  1.The difference between  TCP/IP and OSI

  技术分享

  2. The different Layers

    1. Host-to-network layer ( = OSI physical+ data link layers):  

    –The reference model does not really say much about this layer
    –TCP/IP runs over almost any layer 1-2 protocols (egEthernet, Frame relay, ATM)

    2. Internet layer (=OSI network layer):

    –This is a packet-switching network based on a connectionless layer
    –Packets travel independently to the destination (could arrive out of sequence)
    –The official packet format and protocol is called IP
    –Packet routing and congestion control are the major issues here

    3. Transport layer

    –Designed to allow peer entities on the source and destination hosts to exchange data

    –Two end-to-end protocols are defined: TCP and UDP

    –TCP (Transmission Control Protocol) is a reliable connection-oriented protocol:

      »it works on byte stream
      »it can fragment application data before sending it to the network layer
      »it handles flow control

    –UDP (User Datagram Protocol) is an unreliable connectionless protocol, used for client-server type request-reply queries and applications which require prompt delivery (egspeech and video)

    技术分享

Note for Computer Networks_1

标签:

原文地址:http://www.cnblogs.com/eli-ayase/p/5429221.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!