Monday, November 21, 2016

Chapter 10 - The Internet

A)   Introduction (295 – 331)
a.    ARPANET – first wide area packet-switched network
                                                             a.      Broken into ARPANET and MILNET (military use)
1.    ARPANET phased out for NSFNET with funding from the National Science Foundation for a new high-speed, cross-county network backbone
B)   Internet protocols
a.    Internet Protocol (IP) – provides a connectionless data transfer service over heterogeneous networks by passing and routing IP datagrams
                                                             a.      IP datagram – another name for a data packet
                                                             b.      Router can perform following functions when it has IP datagram
1.    Make routing decisions based on the address portion of the IP datagram
2.    Fragment the datagram into smaller datagrams if the next network to be traversed has a small maximum packet size than the current size of the packet
3.    Decide that the current datagram has been hopping around the network for too long and delete the datagram

                                                             c.      Each IP address consist of three parts
1.    A 1-, 2-, 3-, or 4-bit identifier field (also known as the beginning bit pattern)
2.    A net ID, which indicates a particular network
3.    A host ID, which indicates a particular host, or computer, on that network
                                                             d.      IP multicasting – capability of a network server to transmit a data stream to more than one host at a time
                                                             e.      Subnet masking – taking the host ID portion of an IP address and further dividing it into a subnet ID and a host ID
                                                              f.      Slash notation

1.    /23 indicates how many of the 32 bit in the address are allocated to the network ID portion, 29 = 512 possible host IDs
                                                             g.      Internet Protocol version 6 – modern Internet Protocol that was created to take advantage of the current technology

1.    IPv6 has some advantages over IPv4
a.    Better support for options using the extension headers
b.    Better security, with two extension headers devoted entirely to security
c.     More choices in type of service
b.    The Transmission Control Protocol (TCP) – main job is to turn an unreliable network (such as the one created by IP) into a reliable network that is free from lost and duplicate packets, thus it fills in some holes created by IP
                                                             a.      Functions of TCP
1.    Create a connection
2.    Release a connection – dissolves the connection after all the data has been sent and received
3.    Implement flow control – TCP header includes a field, called the Window Value, that allows the receiver to tell the sender to slow down
4.    Establish multiplexing – multiplexing can be done by creating a different connection that has a port number different from a previous connection
5.    Perform error recovery – includes a sequence number with each packets of bytes, if there is a loss of continuity, the receiving TCP uses an acknowledgement number to inform the sending TCP software of a possible error condition
6.    Establish priority – TCP sets a value in a field (the Urgent Pointer) that indicates that all or a portion of the enclosed data is of an urgent nature
                                                             b.      Socket – made up of both the IP Address and port number which contains a precise identification of a particular application on a particular device
1.    IP address identifies a device connected to the Internet
2.    Port number identifies an application on that device
c.     Internet Control Message Protocol (ICMP) – is used by routers nodes, performs error reporting for the Internet Protocol. Contains a type, a code, and the first eight bytes of the IP datagram that caused the ICMP message to be generated
d.    User Datagram Protocol (UDP) – no-frills transport protocol that does not establish connection, does not attempt to keep data packets in sequences, and does not watch for datagrams that have existed for too long
e.    The Address Resolution Protocol (ARP) – takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network
f.      Dynamic Host Configuration Protocol (DHCP) – protocol issues an IP request, which prompts the DHCP server to look in a static table of IP addresses
g.    Network Address Translation (NAT) – lets a router represent an entire local area network to the Internet as a single IP address
h.    Tunneling protocols and virtual private networks
                                                             a.      Virtual private network (VPN) – a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures
1.    Tunneling protocol – command set that allows an organization to create secure connections using public resources such as the Internet
2.    Point-to-Point Protocol (PPP) – proposed by Cisco Systems, sponsored by Microsoft, and is used for communication between two computers using a serial connection
3.    IPSec (IP security) – set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer. Both sender and receiver must exchange public encryption keys for IPsec to work
C)   The World Wide Web
a.    World Wide Web (WWW) – a vast collection of electronic document that are located on many different Web servers, and contain text, images, and more, that can be accessed by simply clicking links within a browser’s Web page
                                                             a.      Hypertext Markup Language (HTML) – web pages are created by HTML, and can be generated manually with a text-based editor such as Notepad, or through the use of a Web page authoring tool
                                                             b.      Hypertext Transfer Protocol (HTTP) – an application layer protocol
b.    Locating a document on the Internet
                                                             a.      Uniform Resource Locator (URL) – uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet
1.    Consists of:
a.    Hypertext Transfer Protocol (http)
b.    Domain Name – portion of the URL that specifies a particular server at a particular site that contains the requested item
c.     Directory or subdirectory information
d.    Filename of the requested object

c.     Domain Name System (DNS) – a large, distributed database of Internet addresses and domain names
D)   Internet Services
a.    Electronic email (e-mail) – computerized version of writing a letter and mailing it at the local post office
                                                             a.      Multipurpose Internet Mail Extensions (MIME) – used for sending nontext-based items such as a spreadsheet, a database, or an image
                                                             b.      Extended Simple Mail Transfer Protocol (ESMTP) – Internet protocol for sending and receiving e-mail, and is used to perform the transfer
                                                             c.      Post Office Protocol version 3 (POP3) – the software that allows the user to save e-mail messages in a server mailbox and download them when desired from the server
1.    Internet Message Access Protocol (IMAP) – alternative to POP3, a client/server protocol in which e-mail is received and held for you at your Internet server
b.    The File Transfer Protocol (FTP) – allow a user to download a file from a remote site to the user’s computer, and to upload a file from the user’s computer to a remote site
c.     Remote login (Telnet) – terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer
d.    Voice over IP – voice over Internet Protocol
                                                             a.      Private VoIP – when a company uses VoIP for internal communications, but for external communications, regular phone lines are used
                                                             b.      VoIP gateway – can perform the digitization, compression, and encapsulation required, and controls the setup of VoIP calls between the calling device and the called device
1.    H.323 – a set of protocols named packet-based multimedia protocols, and was designed for a wide range of applications (audio and video). Was originally made for X.25 and ATM networks
2.    Session Initiation Protocol (SIP) – application layer protocol that can create, modify, and terminate voice sessions between two or more parties
a.    ENUM – protocol that converts telephone numbers to fully qualified domain name addresses
3.    Voice over wireless LAN (VoWLAN) – similar to Voice over IP
e.    Listservs – popular software program used to create and manage Internet mailing lists. Software maintains a table of e-mail addresses that reflects the current members of the listserv. When an individual sends an e-mail to the listserv address, the listserv sends a copy of this e-mail message to every e-mail address stored in the listserv table
f.      Streaming audio and video – involves the continuous download of a compressed audio or video file, which can be heard or viewed on the user’s workstation
                                                             a.      Real-Time Protocol (RTP) and Real-Time Streaming Protocol (RTSP) – two common application layer protocols that servers and the Internet use to deliver streaming audio and video data to a user’s browser
g.    Instant Messages, tweets, and blogs
                                                             a.      Instant messaging (IM) – allows a user to see if people are currently logged in to the network and, if they are, to send them short messages in real time
                                                             b.      Twitter – a service that allows individual to send short messages to multiple users
1.    Tweets – messages sent on Twitter
                                                             c.      Blog – when an individual posts an ongoing commentary
E)   The Internet and Business
a.    E-commerce – a business’s commercial dealing over the internet
                                                             a.      E-retailing – the electronic selling and buying of merchandise using the Web
                                                             b.      Electronic Data Interchange (EDI) – an electronic commercial interaction between two or more companies. Example: one company trying to buy a stock of cell phones from another company
                                                             c.      Micro-marketing – the gathering and use of the browsing habits of potential and current customers
                                                             d.      Internet security – the security systems that support all Internet transactions are also considered an important part of e-commerce
b.    Cookies and state information
                                                             a.      Cookie – data created by a Web server that is stored on the hard drive of a user’s workstation. This data, called state information, provides a way for the Web site that stored the cookies to track a user’s Web-browsing patterns and preferences
c.     Intranets and Extranets
                                                             a.      Intranet – TCP/IP network inside a company that allows employees to access the company’s information resources through an Internet-like interface
                                                             b.      Extranet – when an intranet is extended outside the corporate walls to include suppliers, customers, or other external agents
F)    The Future of the Internet
a.    Internet2 – new high-speed network with transfer rates up to a gigabit per second (1000 Mbps), created by universities, businesses and the government
b.    Internet of Things (IoT) – the concept that more and more everyday objects and processes will be connected to or accessible through the Internet


Chapter 9 - Introduction to Metropolitan and Wide Area Network

A)      Introduction (267 – 294)
a.       Metropolitan Area Network (MAN) – a network that expands into a metropolitan area and exhibits high data rates, high reliability, and low data loss
                                                             a.      Wide area network – a network that expands beyond a metropolitan area
B)      Metropolitan Area Network Basics
a.       Characteristics of a MAN Network
                                                             a.      Failover – ability to reroute in the event of a failure. High redundant circuits, so that in the event of a component failure, the network can quickly reroute traffic away from the failed component
1.       Failover time – speed at which a failover is performed
                                                             b.      Topology is based on a ring, logically and physically, network routers and switches are interconnected in a ring fashion

                                                             c.      Ability that neither LANs or WANs currently have, is the ability of a user to dynamically allocate more bandwidth on demand
b.       SONET versus Ethernet
                                                             a.      Network topology is a ring that is composed of multiple rings that enable the network to provide backup in the event of a segment failure

                                                             b.      Disadvantages of SONET
1.       Complex, fairly expensive technology that cannot be provisioned dynamically
a.       Designed to support multiple streams of voice channels and thus does not scale nicely
                                                             c.      Ethernet MAN
                                                                     
1.       Metro Ethernet – data transfer service that can connect your business to another business (or businesses) using a standard Ethernet connection
a.       Uses point-to-point connection
b.       Bandwidth profile – describes various characteristics about the connection, such as basic data transfer rates, basic burst rates (a surge of data that is transmitted for a short period of time), excess data transfer rates, and excess burst rates
C)      Wide Area Network Basics
a.       Wide area network (WAN) – a collection of computers and computer-related equipment interconnected to perform a given function or functions, typically using local and long-distance telecommunications systems

                                                             a.      Station – a device that a user interacts with to access a network, and it contains the software application that allows someone to use the network for a particular purpose
                                                             b.      Node – a device that allows one or more stations to access the physical network, and is a transfer point for passing information through the network
1.       Subnetwork (network cloud) – a collection of nodes and interconnecting telecommunications links
b.       Types of network clouds
                                                             a.      Circuit-switched network – a network cloud in which a dedicated circuit is established between the sender and receiver, and all data passes over this circuit
                                                             b.      Packet-switched network – all data messages are transmitted using fixed-sized packages, called packets, and no unique, dedicated physical path is established to transmit the data packets across the subnetwork
1.       Datagram – packet-switched network, each data packet can follow its own, possibly unique, course through the cloud
2.       Virtual circuit packet-switched network – all packets that belong to a logical connection can follow the same path through the network
                                                             c.      Broadcast Network – transmits its data, the data is received by all other nodes
c.       Connection-oriented versus connectionless network applications
                                                             a.      Connection-oriented network application - provide some guarantee that information traveling through the network will not be lost and that the information packets will be delivered to the intended receiver in the same order in which they were transmitted
1.       Reliable service – network that requires that a logical connection be established between two endpoints
                                                             b.      Connectionless network application – does not require a logical connection to be made before the transfer of data. Thus, does not guarantee the delivery of any information or data. Data may be lost, delayed, or even duplicated
D)      Routing
a.       Weighted network graph – network graph in which each pair of nodes can be assigned a weight or associated cost
b.       Dijkstra’s least-cost algorithm – calculates a least-cost path through a network. Executed by each node and results are stored at the node and sometimes shared with the other nodes
c.       Flooding – each nodes takes the incoming packet and retransmits it onto every outgoing link
                                                             a.      Rules for flooding
1.       A node need no send a copy of the packet back to the link from which the packet just arrived
2.       Hop limit (network limit) – can be placed on how many times any packet is copied. Counter is called the hop count
d.       Centralized versus distributed routing
                                                             a.      Centralized routing – involves storing all the routing information at one central location. Rarely used in wide area networks
                                                             b.      Distributed routing – uses a routing algorithm, such as a least-cost algorithm, to generate routing information and dictates that this information be stored at distributed locations – typically, routers – within the network
1.       No single node (or central router) is responsible for maintaining all routing information
a.       If any node crashes, it will probably not disable the entire network
b.       A node will not need to send a request to a central router because each node has its own table
e.       Adaptive versus fixed routing
                                                             a.      Adaptive routing – a dynamic technique in which routing tables react to network fluctuations, such as congestion and node/link failure
                                                             b.      Fixed routing – routing tables are created once, typically when the network is installed, and then never updated again
f.        Routing examples
                                                             a.      ARPANET – distance vector routing algorithm, an adaptive algorithm in which each node maintained a routing table called a vector, the routing algorithm was also a distributed algorithm. Every 30 seconds, each node exchanged its vector with its neighbor. Also called Router information protocol (RIP)
                                                             b.      Link state routing algorithm
1.       Steps
a.       Measure the delay or cost to each neighboring router
b.       Construct a link state packet containing all of this timing information
c.       Distribute the link state packets via flooding
d.       Compute new routes based on the updated
                                                                                                                                       i.      Once a router collects a full set of link state packets from its neighbors, it creates a routing table, usually using Dijkstra’s least-cost algorithm
                                                                                                                                     ii.      Open shorted path first (OSPF) protocol – a link state algorithm that is still used today by many internet routers
E)      Network congestion – when a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded
a.       Possible solutions to congestion
                                                             a.      Implicit congestion control – application is simply observing its own throughput and not relying on any special types of signals coming from the network
                                                             b.      Explicit congestion control – when the network signals the transmitting station to slow down
                                                             c.      Forward explicit congestion notification (FECN) – when a frame relay router experiences congestion, it sends a congestion signal (inside the data frames) forward to the destination station, which in turn tells the originating station to slow down the transfer of data
                                                             d.      Backward explicit congestion notification (BECN) – the frame relay router experiencing congestion sends a signal back to the originating station, which then slows down its transmission
                                                             e.      Buffer preallocation – before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets. If the receiving node has enough buffer space, it sets aside the n buffers and informs the sending node to begin transmission
                                                              f.      Connection admission control – used in Asynchronous transfer mode (ATM), avoid congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user’s needs before the user sends any data. If network cannot satisfy the user’s demands, the user connection is denied

                                                             g.      Service level agreement – a legally binding, written document that can include service parameters offered in the service, various types of service/support options, incentives if the service levels are exceeded, and penalties if service levels are not met