Chapter1_Computer Networks and the Internet

合集下载

计算机网络与互联网(英语)chap1-3

计算机网络与互联网(英语)chap1-3

Server Station
What is a Computer Network?
Switch
Switch Server Station
Frame Client Station Switch
Switch
Mobile Client Station
Frames may pass through multiple switches; Each switch reads the frame And passes it on
Server Station
What is a Computer Network?
Access links connect stations to the first switch Usually copper wire
Access Link Access Link Access Link
Access Link
What is asummary, a network is a system of hardware, software and transmission components that collectively(共同地) allow two application programs on two different stations connected to the network to communicate well
You Will Learn (continued)

Network applications




Client-server paradigm(范例) Domain name system (DNS) File transfer (FTP) Remote login (TELNET) Email transfer (SMTP) Web technologies and protocols

计算机网络英文版课件1

计算机网络英文版课件1

Development of computer network
T
T
HOST
T
T
T
T
T
HOST

TTT
T
T
HOST CCP
T
T
H
T
T
C
CCP
T
HOST
T
T
CCP
C CommunicaCt
T
HOST
T T
ion subnet
H
H
T
T
T
T
Resource subnet
T
computer network vs. distributed system
Wide Area Networks(2)
❖A stream of packets from sender to receiver. ❖Store-and-forward (packet-switched): a packet
is stored in an intermediate router in its entirety, stored there until the required output line is free, and then forwarded.
❖ Software: This is what actually makes computer networks–not the hardware!
➢ Protocols: describe how two communicating parties exchange
information.
➢ Services: describe what a network offers to parties that want

计算机网络(第四版)英文原版Chapter1.Introduction

计算机网络(第四版)英文原版Chapter1.Introduction

计算机网络(第四版)英文原版Chapter1.Introduction[ Team LiB ]Chapter 1. IntroductionEach of the past three centuries has been dominated by a single technology. The 18th century was the era of the great mechanical systems accompanying the Industrial Revolution. The 19th century was the age of the steam engine. During the 20th century, the key technology was information gathering, processing, and distribution. Among other developments, we saw the installation of worldwide telephone networks, the invention of radio and television, the birth and unprecedented growth of the computer industry, and the launching of communication satellites.As a result of rapid technological progress, these areas are rapidly converging and the differences between collecting, transporting, storing, and processing information are quickly disappearing. Organizations with hundreds of offices spread over a wide geographical area routinely expect to be able to examine the current status of even their most remote outpost at the push of a button. As our ability to gather, process, and distribute information grows, the demand for ever more sophisticated information processing grows even faster.Although the computer industry is still young compared to other industries (e.g., automobiles and air transportation), computers have made spectacular progress in a short time. During the first two decades of their existence, computer systems were highly centralized, usually within a single large room. Not infrequently, this room had glass walls, through which visitorscould gawk at the great electronic wonder inside. A medium-sized company or university might have had one or two computers, while large institutions had at most a few dozen. The idea that within twenty years equally powerful computers smaller than postage stamps would be mass produced by the millions was pure science fiction.The merging of computers and communications has had a profound influence on the way computer systems are organized. The concept of the ''computer center'' as a room with a large computer to which users bring their work for processing is now totally obsolete. The old model of a single computer serving all of the organization's computational needs has been replaced by one in which a large number of separate but interconnected computers do the job. These systems are called computer networks. The design and organization of these networks are the subjects of this book.Throughout the book we will use the term ''computer network'' to mean a collection of autonomous computers interconnected by a single technology. Two computers are said to be interconnected if they are able to exchange information. The connection need not be via a copper wire; fiber optics, microwaves, infrared, and communication satellites can also be used. Networks come in many sizes, shapes and forms, as we will see later. Although it may sound strange to some people, neither the Internet nor the World Wide Web is a computer network. By the end of this book, it should be clear why. The quick answer is: the Internet is not a single network but a network of networks and the Web is a distributed system that runs on top of the Internet.There is considerable confusion in the literature between acomputer network and a distributed system. The key distinction is that in a distributed system, a collection of independent computers appears to its users as a single coherent system. Usually, it has a single model or paradigm that it presents to the users. Often a layer of software on top of the operating system, called middleware, is responsible for implementing this model. A well-known example of a distributed system is the World Wide Web, in which everything looks like a document (Web page).In a computer network, this coherence, model, and software are absent. Users are exposed to the actual machines, without any attempt by the system to make the machines look and act in a coherent way. If the machines have different hardware and different operating systems, that is fully visible to the users. If a user wants to run a program on a remote machine, he [] has to log onto that machine and run it there.[] ''He'' should be read as ''he or she'' throughout this book.In effect, a distributed system is a software system built on top of a network. The software gives it a high degree of cohesiveness and transparency. Thus, the distinction between a network and a distributed system lies with the software (especially the operating system), rather than with the hardware.Nevertheless, there is considerable overlap between the two subjects. For example, both distributed systems and computer networks need to move files around. The difference lies in who invokes the movement, the system or the user. Although this book primarily focuses on networks, many of the topics are also important in distributed systems. For more information about distributed systems, see (Tanenbaum and Van Steen, 2002).[ Team LiB ]。

复习题chapter1

复习题chapter1

Chapter 1 Computer Networks and the Internet1.The ( ) is a worldwide computer network, that is, a network that interconnects millions of computing devices throughout the world.ppt3A public Internet 公共网络B Intranet 企业内部互联网C switch net 交换网D television net 电视网2.Which kind of media is not a guided media(引导媒体)? ( )A twisted-pair copper wire 双绞线铜线B a coaxial cable 同轴电缆C fiber optics 纤维光学D digital satellite channel 数字卫星频道3.Which kind of media is a guided media? ( )A geostationary satellite 地球同步卫星B low-altitude satellite 低空卫星C fiber optics 纤维光学D wireless LAN 无线局域网4.The units of data exchanged by a link-layer protocol are called ( ).A FramesB SegmentsC DatagramsD bit streams5.Which of the following option belongs to the circuit-switched(电路交换) networks? ( )A FDMB TDMC VC networksD both A and B6.( )makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast.A Reliable data transferB Flow controlC Congestion controlD Handshaking procedure8.Datagram networks and virtual-circuit networks differ in that ( ).A datagram networks are circuit-switched networks, andvirtual-circuit networks are packet-switched networks.B datagram networks are packet-switched networks, andvirtual-circuit networks are circuit-switched networks.C datagram networks use destination addresses and virtual-circuitnetworks use VC. numbers to forward packets toward theirdestination.D datagram networks use VC. numbers and virtual-circuit networksuse destination addresses to forward packets toward their destination. 9.In the following options, which one is not a guided media? ( )A twisted-pair wireB fiber opticsC coaxial cableD satellite10.Processing delay does not include the time to ( ).A examine the packet’s headerB wait to transmit the packet onto the linkC determine where to direct the packetD check bit-error in the packet12.The Internet’s network layer is responsible for moving network-layer packets known as ( ) from one host to another.A frameB datagramC segmentD message13.The protocols of various layers are called ( ).A the protocol stackB TCP/IPC ISPD network protocol14.There are two classes of packet-switched networks: ( ) networks and virtual-circuit networks.A datagramB circuit-switchedC televisionD telephone15.Access networks can be loosely classified into three categories: residential access, company access and ( ) access.A cabledB wirelessC campusD city area18.In the Internet, the equivalent concept to end systems is ( ).A hostsB serversC clientsD routers19.In the Internet, end systems are connected together by ( ).A copper wireB coaxial cableC communication links 通信链路D fiber optics20.End systems access to the Internet through its ( ).A modemsB protocolsC ISP 网络运营商D sockets121.End systems, packet switches, and other pieces of the Internet, run ( ) that control the sending and receiving of information within theInternet.A programsB processesC applicationsD protocols22.There are many private networks, such as many corporate and government networks, whose hosts cannot exchange messages withhosts outside of the private network. These private networks are often referred to as ( ).A internetsB LANC intranetsD WAN23.The internet allows ( ) running on its end systems to exchange data with each other.A clients applicationsB server applicationsC P2P applicationsD distributed applications24.The Internet provides two services to its distributed applications: a connectionless unreliable service and () service.A flow controlB connection-oriented reliableC congestion controlD TCP25.It defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on thetransmission and/or receipt of a message or other event. The sentence describes ( ).A InternetB protocolC intranetD network26.In the following options, which does not define in protocol? ( )A the format of messages exchanged between two or morecommunicating entitiesB the order of messages exchanged between two or morecommunicating entitiesC the actions taken on the transmission of a message or other eventD the transmission signals are digital signals or analog(模拟)signals27.In the following options, which is defined in protocol? ( )A the actions taken on the transmission and/or receipt of a message orother eventB the objects exchanged between communicating entitiesC the content in the exchanged messagesD the location of the hosts28.In the following options, which does not belong to the network edge?( )A end systemsB routersC clientsD servers29.In the following options, which belongs to the network core? ( )A end systemsB routersC clientsD servers30.In the following options, which is not the bundled with the Internet’s connection-oriented service? (在下面选择,哪一个不是捆绑了互联网的面向连接的服务?)A reliable data transferB guarantee of the transmission timeC flow controlD congestion-control31.An application can rely on the connection to deliver all of its data without error and in the proper order. The sentence describes ( ).A flow controlB congestion-controlC reliable data transferD connection-oriented service32.It makes sure that neither side of a connection overwhelms the other side by sending too many packets too fast. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer33.It helps prevent the Internet from entering a state of gridlock. When a packet switch becomes congested, its buffers can overflow and packetloss can occur. The sentence describes ( ).A flow controlB congestion-controlC connection-oriented serviceD reliable data transfer34.The Internet’s connection-oriented service has a name, it is ( ).A TCPB UDPC TCP/IPD IP35.In the following options, which service does not be provided to an application by TCP?( )A reliable transportB flow controlC video conferencing 视频会议2D congestion control36.The Internet’s connectionless service is called ( ).A TCPB UDPC TCP/IPD IP37.In the following options, which does not use TCP?( )A SMTPB internet telephoneC FTPD HTTP38.In the following options, which does not use UDP?( )A Internet phoneB video conferencingC streaming multimediaD telnet39.There are two fundamental approaches to building a network core(有2个基本方法建立一个网络核心),()and packet switching.A electrical current switchingB circuit switchingC data switchingD message switching40.In ( ) networks, the resources needed along a path to provide for communication between the end system are reserved for the duration of the communication session.A packet-switchedB data-switchedC circuit-switchedD message-switched41.In ( ) networks, the resources are not reserved; a session’s messages use the resources on demand, and as a consequence, may have to wait for access to communication link.A packet-switchedB data-switchedC circuit-switchedD message-switched44.( )(是指交换机必须接收整个数据包之前就可以开始传递的第一位的数据包上出站链接。

计算机网络与技术(双语)课程计算机网络教学大纲(双语)

计算机网络与技术(双语)课程计算机网络教学大纲(双语)

《Computer Network》课程教学大纲二、课堂教学时数及课后作业题数分配三、单元教学目的、教学重难点和内容设置L1 Course Preparation【teaching objective】to help students know Sentence analyzing of the scientific English and some terms of the computer and communication technology.【keys and difficulties 】Long Sentence analyzing and terms memorizingL2 Introduction of the computer networks【teaching objective】to help students know the basic knowledge of network applications and Communication media, local asynchronous communication and long distance communication. 【keys and difficulties 】understanding the concept and principal of local asynchronous communication and long distance communication.L3 Packet transmission 1【teaching objective】to help students know the basic concept of transmission errors and error detection , LAN topologies, Addressing principal.【keys and difficulties 】understanding the concept of error detection the method to avoid transmission error.L4 Packet transmission 2【teaching objective】to help students know the basic concept fiber modems, repeater, bridges switches ATM technology and W AN technology, to understand the principal of the loop digital technology and Routing ,【keys and difficulties 】understanding the Routing principal and applications of WANL5 Packet transmission 3【teaching objective】to help students know network Characteristics, to understand the relation of the seven layers【keys and difficulties 】understanding the sketch of Information transmission among layers.L6 Internetworking1【teaching objective】to help students know network concepts architecture and protocols, and understand the address resolution.【keys and difficulties 】understanding the principal and work mechanism of ARP protocol.L7 Internetworking2【teaching objective】to help students know concepts of IP datagram, datagram forwarding, IP encapsulation, fragmentation and reassembly, and understand the mechanism of error reporting. 【keys and difficulties 】understanding the principal and work mechanism of error reporting and correcting.L8 Internetworking3【teaching objective】to help students know how to guarantee the reliable transport service andunderstand the mechanism of the address translation and internet routing.【keys and difficulties 】understanding t he mechanism of the address translation and internet routing.L9 and L10 work Application1【teaching objective】to help students know some applications of the computer networks and improve scientific English reading ability.【keys and difficulties 】understanding the concept and use of Computer security。

Homework Chapter 2

Homework Chapter 2

《Computer Networks and Internet》Chapter 21. Consider the following string of ASCII characters that were captured by Wireshark when the browser sent an HTTP GET message (i.e., this is the actual content of an HTTP GET message). The characters <cr><lf> are carriage return and line-feed characters (that is, the italized character string <cr> in the text below represents the single carriage-return character that was contained at that point in the HTTP header). Answer the following questions, indicating where in the HTTP GET message below you find the answer.GET /cs453/index.html HTTP/1.1<cr><lf>Host: <cr><lf>User-Agent: Mozilla/5.0 (Windows;U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax) <cr><lf>Accept:ext/xml, application/xml, application/xhtml+xml, text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5<cr><lf>Accept-Language:en-us,en;q=0.5<cr><lf>Accept-Encoding: zip,deflate<cr><lf>Accept-Charset:ISO-8859-1,utf-8;q=0.7,*;q=0.7<cr><lf>Keep-Alive:300<cr><lf>Connection:keep-alive<cr><lf><cr><lf>a. What is the URL of the document requested by the browser?b. What version of HTTP is the browser running?c. Does the browser request a non-persistent or a persistent connection?d. What is the IP address of the host on which the browser is running?e. What type of browser initiates this message? Why is the browser type needed in anHTTP request message?考虑以下的ASCII字符字符串被Wireshark当浏览器发送一个HTTP GET消息(即。

ComputerNetworksandInternets[001]

ComputerNetworksandInternets[001]

– 然后二者按管理协议交换请求和响应信息
为避免产生混淆,使用其它术语
– 管理员(Manager) == 客户; 运行于网管机上的客户应用
– 代理(Agent) == 服务器; 运行于网络设备上的应用
7 管理员向代理提出请求,代理响应
2020/8/13
网管 为何使用传统网络和传统通信协议?
坏处:协议失效或底层硬件失效均会阻止设备发 出或接收数据,从而失去对它的控制。
– 诊断困难
4
2020/8/13
间歇性隐性实效的问题 Problem with hidden failures
隐匿问题
– 硬件丢弃了错误帧 – 网络协议可以重传坏帧
尽管网络硬件和协议软件含有自动检测失效并重 传数据包的机制,但仍然需要网管检测并改正底 层问题,因为重新传输降低了共享网络中所有计 算机的性能。
索引是隐含的
– 管理者必须知道所操作的对象是一个数组 – 管理者必须将索引信息附加到对象名称后以正确存取数组的表

19
2020/8/13
数组例子 Array example
路由表是一个数组: ip.ipRoutingTable
路由表入口列表以 IP 地址 为了标识一个表值:
– ip.ipRoutingTable.ipRouteEntry.ipRouteNextHop.IPdestaddr – ipRouteEntry :索引 – ipRouteNextHop :路由表入口中的一个字段 – IPdestaddr : 32-bit IP address
– 获取(Fetch) 从设备处获得一个值 – 存储(Store) 在设备中设置一个值
– 每个对象均可通过唯一的名称进行获取或存储

chapter 1 computer networks and the Internet

chapter 1 computer networks and the Internet

描述Tier-1 ISP的四个特点。

1)链路速率高,一般为Gbps。

2)到所有其他Tier-1 ISP有直接连接。

3)与多数Tier-2 ISP有连接。

4)覆盖国际范围传播延迟:一个长度为1000字节的分组在距离为5000Km的链路上传播,其传播延迟是多大?假设传播速度为2.5×108m/s,链路的传输速率为1Mbps。

一般化,如果链路的长度为d公里,传输速率为R bps,传播速率为s米/秒。

则长度为L字节分组的传播延迟为多少?传播延迟与分组的长度L有关系吗?传播延迟与链路的传输速率有关系吗?20mses; d/s; no;no。

传输延迟:一个长度为1000字节的分组在距离为5000Km的链路上传播,其传输延迟是多大?假设传播速度为2.5×108m/s,链路的传输速率为1Mbps。

一般化,如果链路的长度为d公里,传输速率为R bps,传播速率为s米/秒。

则长度为L字节的分组的传输播延迟为多少?传输延迟与分组的长度L有关系吗?传输延迟与链路的传输速率有关系吗?8msec;L/R;no;no;传输延迟和传播延迟:假设两台分组交换机之间利用长度为5000Km的链路直接互连,信号传播速度为2.5×108m/s,链路的传输速率为1Mbps。

将长度为1000字节的分组从一个交换机传输到另一台交换机需要多长时间?一般化,在长度为d、传播速度为s、传输速率为R bps传输长度为L的分组需要耗费多长时间?端到端延迟等于传输延迟和传播延迟之和。

更准确点,总的延迟等于向输出链路发送分组的时间加上分组的最后一位在链路上传播所需时间之和。

根据第8和9题知,总延迟为28msec;L/R+d/s。

多条链路上的延迟:考虑从端系统发送长度为L的分组开始,通过第1条链路到达一台交换机,再经过第2条链路到达目的端系统。

设d i、S i、R i分别表示链路i的长度、传播速度和传输速率,其中i=1,2。

设分组在交换机中的处理延迟为d proc。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Chapter 1: Introduction
Our goal:
get “feel” and
Overview:
what’s the Internet?
what’s a protocol? network edge; hosts, access
terminology more depth, detail later in course approach: use Internet as example
Introduction
1-2
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network structure
Introduction 1-11
A closer look at network structure:
network edge:
applications and hosts access networks, physical media: wired, wireless communication links
networks”

loosely hierarchical public Internet versus private intranet
Institutional network
Introduction
1-7
1.1.2 What’s the Internet: a service view
COMPUTER NETWORKING
A Top Down Approach , 4th edition.
Jim Kurose, Keith Ross
张雪 E-mail: snow_wonder@ Tel: 86223623 Office:A302 网络教研室
Introduction
1-1
end systems, access networks, links
1.3 Network core
circuit switching, packet switching, network
structure
1.4 Delay, loss and throughput in packetswitched networks 1.5 Protocol layers, service models
that interconnects millions of computing devices throughout the world. A nuts-and-Bolts description A services description
Introduction
1-4
1.1.1 What’s the Internet: “nuts and bolts” view

Introduction
1-13
1.2.1 Client and Server Programs
client/server
model(C/S)


client host requests, receives service from always-on server Server host provides service e.g. Web browser/server; peer-peer email client/server client/server
Internet standards RFC: Request for comments IETF: Internet Engineering Task Force
Mobile network Global ISP
Home network Regional ISP

Internet: “network of
Goal: data transfer

between end systems
same as before!
App’s using TCP:
HTTP (Web), FTP (file
UDP - User Datagram
Protocol [RFC 768]: connectionless unreliable data transfer no flow control no congestion control
Get /kurose-ross
2:00
<file>
time Q: Other human protocols?
Introduction 1-10
Chapter 1: roadmap
1.1 What is the Internet? 1.2 Network edge
1.4 Delay, loss and throughput in packetswitched networks 1.5 Protocol layers, service models
Introduction 1-3
1.1 What’s the Internet?
The Internet is a computer network
Home network Regional ISP
Institutional network
TCP/IP

e.g., TCP, IP, HTTP, SMTP, ARP, ICMP, RIP
Introduction 1-6
1.1.1 What’s the Internet: “nuts and bolts” view
network core:
interconnected routers network of networks

Introduction
1-12
1.2 The network edge:
end systems (hosts):
Computers and other devices connected to the Internet run application programs e.g. Web, email at “edge of network”
Introduction 1-8
infrastructure enables
1.1.3 What’s a protocol?
human protocols: “what’s the time?” “I have a question” introductions network protocols: machines rather than humans all communication activity in Internet governed by protocols
Goal: data transfer
between end systems handshaking: setup (prepare for) data transfer ahead of time

TCP service [RFC 793]

reliable, in-order bytestream data transfer
Introduction 1-9
1.1.3 What’s a protocol?
a human protocol and a computer network protocol: Hi Hi
Got the time?
TCP connection request TCP connection response
Introduction 1-15
TCP - Transmission

congestion control:

Control Protocol

Internet’s reliable data transfer service
Network edge: best effort (unreliable) data transfer service
transfer), Telnet (remote login), SMTP (email)
App’s using UDP:
PC server
millions of connected
Mobile network Global ISP
wireless laptop cellular handheld
hosts = end systems running network apps communication links
Internet through ISP (Internet Service Provider)


Protocols controlling the
sending and receiving of information within the Internet.

Local ISP Regional ISP
fiber, copper, radio, satellite transmission rate = bandwidth routers: forward packets (chunks of data)

computing devices:
Home network Regional ISP

Hello, hello back human protocol set up “state” in two communicating hosts
相关文档
最新文档