导图社区 CH1
CH1:Internet、Network Edge、The Network Core、Protocol Layers and Their Service Models、Networks Under Attack……
社区模板帮助中心,点此进入>>
论语孔子简单思维导图
《傅雷家书》思维导图
《童年》读书笔记
《茶馆》思维导图
《朝花夕拾》篇目思维导图
《昆虫记》思维导图
《安徒生童话》思维导图
《鲁滨逊漂流记》读书笔记
《这样读书就够了》读书笔记
妈妈必读:一张0-1岁孩子认知发展的精确时间表
CH1
Internet
The Internet is a computer network that interconnects billions of computing devices throughout the world.
communication links
packet switches
transmission rate
packets
End systems access the Internet through Internet Service Providers
Protocols
Transmission Control Protocol (TCP)
Internet Protocol (IP)
distributed applications
Network Edge
Access Networks
Home Access: DSL, Cable, FTTH, Dial-Up, and Satellite
Access in the Enterprise (and the Home): Ethernet and WiFi
Wide-Area Wireless Access: 3G and LTE
Physical Media
Twisted-Pair Copper Wire
Coaxial Cable
Fiber Optics
Terrestrial Radio Channels
Satellite Radio Channels
The Network Core
Packet Switching
In a network application, end systems exchange messages with each other.
Store-and-Forward Transmission
Most packet switches use store-and-forward transmission at the inputs to the links.
Queuing Delays and Packet Loss
store-and-forward delays
queuing delays
Forwarding Tables and Routing Protocols
Circuit Switching
circuit switching
packet switching
A Network of Networks
Delay, Loss, and Throughput in Packet-Switched Networks
Overview of Delay in Packet-Switched Networks
nodal processing delay
queuing delay
transmission delay
propagation delay
Comparing Transmission and Propagation Delay
Queuing Delay and Packet Loss
Packet Loss
End-to-End Delay
dend-end = N(dproc + dtrans + dprop)
End System, Application, and Other Delays
Throughput in Computer Networks
Protocol Layers and Their Service Models
Layered Architecture
Protocol Layering
Application Layer
Transport Layer
Network Layer
Link Layer
Physical Layer
The OSI Model
Encapsulation
Networks Under Attack
The Bad Guys Can Put Malware into Your Host Via the Internet
self-replicating
Viruses
Worms
The Bad Guys Can Attack Servers and Network Infrastructure
denial-of-service (DoS) attacks
distributed DoS (DDoS)
The Bad Guys Can Sniff Packets
The Bad Guys Can Masquerade as Someone You Trust
IP spoofing
History of Computer Networking and the Internet
1961–1972
The Development of Packet Switching
1972–1980
Proprietary Networks and Internetworking
1980–1990
A Proliferation of Networks
The 1990s
The Internet Explosion
The New Millennium