1.3.3 Flashcards
Networks (57 cards)
Layers of TCP/IP stack
Application
Transport
Internet
Link
Application layer
The application layer collects / delivers data.
It is only concerned with the format and content of the requests and responses that are exchanged and not how the data will be transmitted.
It provides an interface between user applications and the network. For example, the browser translated the URL http://www.example.com/doc/index.html into the following request message (default port: 80)
Transport layer
The transport layer establishes an end-to-end connection
Splits data into packets.
Adds a TCP header with the packet sequence number, source and destination port (so it is handled by the correct application).
Requests transmission of lost packets.
Receipt of packets are acknowledged.
UDP does not do the last two. It is not concerned with reliability.
Internet layer
The Internet layer is concerned with the transmission of the packets. It adds the source and destination IP address to the header. “Time to live” is also added to prevent bouncing packets. Protocols that operate at this layer are IPv4 and IPv6
Link
The data link layer is concerned with the physical transmission of data on the network media. It adds the MAC address from the devices (NICs) of the source and destination devices. Protocols that operates at this layer are Ethernet and ARP (maps IP addresses and MAC addresses).
The Domain Name System
- Humans use memorable names, rather than numeric IP addresses, to request data on a network.
- A Domain Name System (DNS) is used to translate the names into IP addresses.
- This happens in the application layer.
- A domain name identifies the area or domain where an internet resource resides.
- These are structured into a hierarchy of smaller domains and written as a string separated by full stops. For example: mail.google.com
- Each different part of the domain name is separated by a dot.
“com” is the top level domain (TLD), “google” is the second level domain and “mail” is the third level domain or host.
Advantages of DNS
Allows the IP address to change but the domain name to remain the same. The new address is linked to the existing domain name and connectivity is maintained.
DNS allows for unique names. ICANN holds records of all registered domain names.
Steps involved in DNS Resolution
- Client requests the IP address of www.google.co.uk from the DNS resolver (ISP).
- Request is sent to the root server. These hold the locations of all of the top level domains (TLDs) such as .com, .uk, .io, etc.
- Returns the location of the .uk servers.
- Request sent to the TLD for .uk. Each TLD server holds a list of all of the authoritative name servers for each domain in the TLD.
- Responds with a list of .co.uk name servers (2LD).
- Queries one of the .co.uk name servers for the IP address of google.co.uk (3LD).
- Responds with the IP address for google.co.uk. At this stage the google name server will most likely know the IP address of all its hosts but it may also have to query more name servers to find the IP address of www.google.co.uk (the host or 4LD).
- The resolver responds with the IP address of www.google.co.uk to the client.
- The client makes a request using the IP address.
What is a protocol?
A protocol is a set of rules (an agreed-upon format) for transmitting data between two devices. For example IPv4 (Internet Protocol) which used to transfer all packets between routers on the Internet. IPv4 uses 32-bit addresses for Ethernet communication in five classes, named A, B, C, D and E.
What does a TCP protocol determine?
- the type of error checking to be used
- data compression method, if any
- how the sending device will indicate that it has finished sending a message
- how the receiving device will indicate that it has received a message
- type of encryption used
- packet size
What are standards?
A standard is a definition or specification that is an agreed way of doing things. Standards make it easier to build software or hardware that will run (is compatible) on different systems (in different countries). Without standards most devices would not be able to communicate with each other.
De jure (by force of law) standards
These are regulated by official bodies. For example, ICANN provides effective regulation of the names and numbers that are used across the internet. The term JPEG is an acronym for the Joint Photographic Experts Group, which created the image compression standard in 1992 and continues to update and maintain it.
De facto standards
De facto standards are ones that arise through popular use but are not managed or regulated. For example, it may be standard to use sans serif fonts for web pages but no one will stop you if you go wild with Garamond.
Why are standards important?
- Standards form the fundamental building blocks for product development by establishing consistent protocols that can be universally understood and adopted.
- Standards are important in the computer industry because they allow the combination of products from different manufacturers to create a customized system.
- Without standards, only hardware and software from the same company could be used
- For example, ASCII A (01000001) is recognised on all devices using the ASCII standard. HTML is a WWW standard recognised by all browsers.
Why are protocols important?
- Set of rules that allow transmission between devices.
- Allowing devices to communicate
- By ensuring all devices follow the same rules
- So they interpret data/signals in the same way
Local Area Network (LAN)
Geographically small area e.g. buildings or several buildings on the same site (schools, universities, offices etc)
Equipment is generally owned by the company using it
Wide Area Network (WAN)
Geographically remote area e.g. across a country, between continents
Connects LANs together using third party telecommunications equipment (the servers owned by ISPs, he telephone/cable/satellite connections owned by telecommunications
companies such as BT, China Mobile, Vodafone, AT&T etc).
What is packet switching?
A packet takes the best route through the network which may not be the same for every packet.
What happens during packet switching?
- Data to be sent is split into packets (usually between 500 and 1500 bytes)
- Each packet includes a header (see right) including source and destination IP address and sequence number
- The packets are transmitted in order.
- The packets may take different routes across the network as each node determines the best path, eg routing around link failures
- Packets are reordered using the sequence number in the packet header at the destination.
Advantages of packet switching
- It makes very efficient use of the network - no tied-up lines which is particularly good for internet traffic which is bursty (ie lots and then nothing)
- It can easily get around broken bits of the network. The node will simply send the packet a different route.
- Transmission is safer from interception since it is impossible to intercept all packets as they use different routes
Disadvantages of Packet Switching
- The time it takes to put back the data package changes each time, which can be a problem for time-critical information such as an emergency signal. The fancy name is for this is ‘latency’.
- Not very good for small data packages - packet header becomes a considerable overhead.
What is circuit switching?
The participants in a circuit-switching network are electrically connected and remain so until the conversation of data exchange is terminated. Example plain old telephone service (POTS)
Advantages of circuit switching
- Frames will arrive in the order in which they were sent and no data will get lost
- No additional header information needed.
- Dedicated path and guaranteed performance as all bandwidth is reserved
Disadvantages of Circuit Switching
- A portion of the network is made unavailable for the time the connection is made.
- Data may be more easily intercepted if the path used is known
- When resources are not sufficient, the connection will not be made.
- Connection even if no data is sent.