Computer Network

Yuxin Sun ECE6607 Assignment

Get Started. It's Free
or sign up with your email address
Computer Network by Mind Map: Computer Network

1. Internet

1.1. Application

1.2. Classification

1.2.1. WAN

1.2.2. LAN

1.2.3. MAN

1.2.4. WLAN

1.3. Network Core

1.3.1. Circuit Switched

1.3.2. Packet Switched

1.4. Delay

1.4.1. Processing delay

1.4.2. Queueing daly

1.4.3. Transmission delay

1.4.4. Propagation delay

1.5. Structure

1.6. History

2. Application Layer

2.1. Architecture

2.1.1. Client-server

2.1.2. Peer to peer

2.2. HTTP

2.2.1. Using TCP

2.2.2. Stateless

2.2.3. HTTP connection

2.2.3.1. Non-persistent

2.2.3.2. Persistent

2.2.4. Method

2.2.5. Response status code

2.2.6. Web cache

2.2.7. Cookie

2.3. Electronic mail

2.3.1. User agent

2.3.2. Mail server

2.3.3. SMTP

2.3.4. Mail access protocols

2.3.4.1. POP

2.3.4.2. IMAP

2.3.4.3. HTTP

2.3.4.4. FTP

2.4. DNS

2.4.1. DNS: provides translation between host name and IP address

2.4.2. DNS runs over UDP

2.4.3. Services

2.4.3.1. Host aliasing

2.4.3.2. Mail server aliasing

2.4.3.3. Load distribution

2.4.4. Query

2.4.4.1. Iterative

2.4.4.2. Recursive

2.4.5. Cache

2.4.6. Record type

2.4.6.1. A

2.4.6.2. NS

2.4.6.3. CNAME

2.4.6.4. MX

2.5. Bittorent

2.5.1. Components

2.5.1.1. Metadata: .torrent file

2.5.1.2. Tracker: a central server keeping a list of all peers participating in the swarm

2.5.1.3. Swarm: the set of peers that are participating in distributing the same files

2.5.2. PEER-PEER TRANSACTIONS

2.5.2.1. Rarest First

2.5.2.2. Random First Piece

2.5.2.3. End-game mode

2.6. Video streaming

2.6.1. CBR

2.6.2. VBR

2.7. CDN

3. Transportation Layer

3.1. UDP

3.1.1. Best effort

3.1.2. Connectionless

3.1.3. Checksum

3.1.4. Pipelines protocol

3.1.4.1. Go-back-N

3.1.4.2. Selective Repeat

3.1.5. RDT

3.1.5.1. RDT1.0: RELIABLE TRANSFER OVER A RELIABLE CHANNEL

3.1.5.2. RDT2.0: CHANNEL WITH BIT ERRORS

3.1.5.3. RDT2.1: SENDER, HANDLES GARBLED ACK/NAKS

3.1.5.4. RDT2.2: A NAK-FREE PROTOCOL

3.1.5.5. RDT3.0: CHANNELS WITH ERRORS AND LOSS

3.2. TCP

3.2.1. Connection

3.2.1.1. Logical

3.2.1.2. Point to point

3.2.1.3. Reliable

3.2.1.4. Pipelined

3.2.1.5. Connection-oriented

3.2.1.6. Flow control

3.2.2. RTT Estimation and Timeout

3.2.3. TCP reliable data transfer

3.2.3.1. Pipelined segment

3.2.3.2. Cumulative acks

3.2.3.3. Single retransmission timer

3.2.3.4. Fast retransmission

3.2.4. Flow control

3.2.4.1. Receiver “advertises” free buffer space by including rwnd value in TCP header of receiver-to-sender segments

3.2.4.2. Sender limits unACKed data to rwnd

3.2.4.3. 3-way handshake

3.2.5. Congestion control

3.2.5.1. Slow start

3.2.5.2. Congestion avoidance

3.2.5.3. Fast recovery

4. Network Layer

4.1. Data Plane

4.1.1. Switching fabrics

4.1.1.1. memory

4.1.1.2. bus

4.1.1.3. crossbar

4.1.2. Scheduling Mechanism

4.1.2.1. FIFO

4.1.2.2. Priority

4.1.2.3. Round Robin

4.1.2.4. Weighted fair queueing

4.1.3. IP

4.1.3.1. IPv4

4.1.3.1.1. 32-bit identifier for host, router interface

4.1.3.1.2. Subnet

4.1.3.1.3. Classless InterDomain Routing

4.1.3.1.4. Dynamic Host Configuration Protocol

4.1.3.2. NETWORK ADDRESS TRANSLATION

4.1.3.3. IPv6

4.1.3.3.1. 128 bit address

4.1.3.3.2. Types

4.1.3.3.3. Translation from IPv4 to IPv6:tunneling

4.2. Control Plane

4.2.1. Routing algorithm

4.2.1.1. Dijkstra’s algorithm

4.2.1.2. Distance vector algorithm

4.2.2. Intra-AS routing

4.2.2.1. RIP

4.2.2.2. OSPF

4.2.2.3. BGP

4.2.2.4. IS-IS

4.2.3. SDN

4.2.3.1. Traffic engineering

4.2.3.2. Non-standard management

4.2.3.3. OpenFlow

4.2.4. ICMP

4.2.4.1. ICMP msgs carried in IP datagrams

4.2.4.2. PING

4.2.4.3. Error reporting

4.2.5. Network management

4.2.5.1. Structure

4.2.5.1.1. Managing server/entity

4.2.5.1.2. A managed device

4.2.5.1.3. Management Information Base

4.2.5.1.4. Network Management Agent

4.2.5.2. SNMP

4.2.5.2.1. Components

4.2.5.2.2. Types

5. Link Layer

5.1. Services

5.1.1. Framing

5.1.2. Link access

5.1.3. Reliable delivery

5.1.4. Flow Control

5.1.5. Error Detection

5.1.5.1. Parity check

5.1.5.2. Cycle redundancy check

5.1.6. Error Correction

5.2. MAC

5.2.1. Channel Partitioning

5.2.1.1. FDMA

5.2.1.2. TDMA

5.2.1.3. CDMA

5.2.2. Random Access

5.2.2.1. Slotted ALOHA

5.2.2.2. Unslotted ALOHA

5.2.2.3. CSMA

5.2.2.3.1. CA

5.2.2.3.2. CD

5.2.3. “Taking Turns” (Round-robin)

5.2.3.1. Polling

5.2.3.2. Token passing

5.2.3.3. DOCSIS

5.3. LAN

5.3.1. ARP protocol

5.3.2. Ethernet

5.3.2.1. Physical topology

5.3.2.1.1. Star

5.3.2.1.2. Bus

5.3.2.2. CSMA/CD

5.3.2.3. Unreliable/Connectionless

5.3.3. Switches

5.3.3.1. Link-layer device

5.3.3.2. Transparent

5.3.3.3. Plug-and-play & Self-learning

5.3.4. VLAN

5.3.4.1. Port-based

5.3.4.2. MAC address based

5.3.4.3. Protocol based

5.3.5. MPLS

5.3.5.1. Charatersics

5.3.5.1.1. Independent of Layer-2 and Layer-3 protocols

5.3.5.1.2. Maps IP-addresses to fixed length labels

5.3.5.1.3. Supports ATM, Frame-Relay and Ethernet

5.3.5.1.4. Interfaces to existing routing protocols (RSVP, OSPF)

5.3.5.2. Routers

5.3.5.2.1. LSR

5.3.5.2.2. LER

5.3.6. LSP

5.3.6.1. Hop-by-hop routing

5.3.6.2. Explicit routing

5.3.7. LDP

5.3.7.1. Discovery

5.3.7.2. Session

5.3.7.3. Advertisement

5.3.7.4. Notification

5.4. Data center

5.4.1. Deign objective

5.4.1.1. Uniform high capacity

5.4.1.2. Performance isolation

5.4.1.3. Layer-2 semantics

5.4.2. Measurement

5.4.2.1. Data-Center traffic analysis

5.4.2.2. Flow distribution analysis

5.4.2.3. Traffic matrix analysis

5.4.2.4. Failure characteristics

5.4.3. Commodity

5.4.3.1. Rack servers

5.4.3.2. Blade Servers

5.4.3.3. Border router

5.4.3.4. Load balancer

6. Wireless&Mobile Network

6.1. Wireless Network

6.1.1. Elements

6.1.1.1. Wireless Hosts

6.1.1.2. Wireless Link

6.1.1.3. Base Station

6.1.2. Mode

6.1.2.1. Single hop

6.1.2.2. Multiple hop

6.1.2.3. Infrasturcture

6.1.2.4. No infrastructure

6.1.3. Characteristic

6.1.3.1. Hidden terminal problem

6.1.3.2. Signal attenuation/fading

6.1.3.3. CDMA

6.1.4. IEEE 802.11

6.1.4.1. Passive scanning/Active scanning

6.1.4.2. CSMA/CA

6.1.4.3. Frame:addressing

6.1.4.4. Rate adaption

6.1.4.5. Power management

6.1.5. 2G

6.1.5.1. BSC

6.1.5.2. MSC

6.1.5.3. GMSC

6.1.6. 3G

6.1.6.1. General Packet Radio Services

6.1.6.2. WCDMA

6.1.6.3. HSPA

6.1.7. 4G

6.1.7.1. eNodeB:

6.1.7.2. Packet Gateway

6.1.7.3. Serving Gateway

6.1.7.4. All IP core

6.2. Mobility Network

6.2.1. Approaches

6.2.1.1. Let routing handle

6.2.1.2. Let end-systems handle

6.2.1.2.1. Indirect routing

6.2.1.2.2. Direct routing

6.2.2. IP

6.2.2.1. Indirect routing of datagrams

6.2.2.2. Agent discovery

6.2.2.3. Registration with home agent

6.2.3. Mobility in GSM, LTE

6.2.4. Impact on higher-layer protocols

7. Network Security

7.1. Security attack

7.1.1. Interruption

7.1.2. Interception

7.1.3. Modification

7.1.4. Fabrication

7.2. Properties

7.2.1. Confidentiality

7.2.2. Authentication

7.2.3. Message integrity

7.2.4. Access and availability

7.2.5. Accountability and non-repudiation

7.2.6. Privacy of collected information

7.3. Cryptography

7.3.1. Substitution cipher

7.3.2. Mono alphabetic cipher

7.3.3. n substitution ciphers

7.3.4. Data Encryption Standard

7.3.5. Advanced encryption standard

7.3.6. RSA

7.4. Authentication

7.4.1. Goal: Avoid playback attack

7.4.2. Nonce: number (R) used only once-in-a-lifetime

7.5. Message integrity

7.5.1. Digital signature

7.5.2. Message digest

7.5.3. Message authentication code

7.5.4. Hash function

7.6. SSL

7.6.1. Channel

7.6.1.1. Handshake

7.6.1.2. Key derivation

7.6.1.3. Data transfer

7.6.1.4. Connection closure

7.6.2. Ciphers

7.6.2.1. DES

7.6.2.2. 3DES

7.6.2.3. RC2

7.6.2.4. RC4

7.6.3. Cipher suite

7.6.3.1. Public-key algorithm

7.6.3.2. Symmetric encryption algorithm

7.6.3.3. MAC algorithm

7.7. IPsec

7.7.1. Servics

7.7.1.1. Data integrity

7.7.1.2. Origin/Source authentication

7.7.1.3. Replay attack prevention

7.7.1.4. Confidentiality

7.7.1.5. Authentication Header (AH) protocol

7.7.1.6. Encapsulation Security Protocol

7.7.2. Transport model

7.7.2.1. Security Associations

7.7.2.2. Security Association Database

7.7.2.3. Security Policy Database

7.7.2.4. Internet key exchange

7.8. Operational security

7.8.1. Firewalls

7.8.1.1. Goal

7.8.1.1.1. Prevent denial of service attacks

7.8.1.1.2. Prevent illegal modification/access of internal data

7.8.1.1.3. Allow only authorized access to inside network

7.8.1.2. Types

7.8.1.2.1. Stateless packet filters

7.8.1.2.2. Stateful packet filters

7.8.1.2.3. Application gateways

7.8.2. Intrusion detection systems

7.8.2.1. Packet filtering

7.8.2.2. Deep packet inspection

7.8.2.3. Examine correlation among multiple packets