CAN201 计网概念收集

Lecture 1 the theoretical basis for networking

Network edge and core

地理覆盖范围:广WAN,城MAN,局LAN,个PAN

交换方式,电路,报文,分组

电路交换vs报文vs分组

Network performance

protocol layers and service models***


OSI七层

TCP/IP四层

···························

e.g 网站访问中不同层所涉及的协议
  1. Application Layer:

    • HTTP (Hypertext Transfer Protocol): This protocol is used for transmitting text, images, and other web page components between your browser and the web server. In this case, when you enter the URL, your browser initiates an HTTP request to the server.
  2. Transport Layer:

    • TCP (Transmission Control Protocol): HTTP typically uses TCP as its transport layer protocol. TCP ensures reliable and ordered delivery of data between your computer and the web server. It establishes a connection, breaks down large messages into smaller packets, and ensures they are delivered without errors.
  3. Network Layer:

    • IP (Internet Protocol): IP is responsible for routing packets between devices across different networks. In this scenario, it helps route the TCP packets containing the HTTP requests and responses between your computer and the university's web server.
  4. Link Layer:

    • Ethernet (or other link layer protocols): At the link layer, Ethernet is often used to transmit frames between devices within the same local network. Your router uses Ethernet to send data to and receive data from your computer.
  5. Physical Layer:

    • Physical medium (e.g., Ethernet cables, Wi-Fi signals): The physical layer deals with the actual hardware transmission of bits over the physical medium. This could be Ethernet cables, Wi-Fi signals, or other physical means connecting your computer to the router and the router to the wider Internet.

In summary, when you enter the URL in your browser, it initiates an HTTP request. This request is encapsulated in TCP, which is then further encapsulated in IP for routing. The data is transmitted over the physical medium using link layer protocols like Ethernet. Finally, your router facilitates the communication between your computer and the web server.

network security

core - package switching 

delay 

分组信息的优缺点

优点

1.Error control: Each packet includes a checksum, which can be used to detect and correct errors that may occur during transmission. If an error is detected in a packet, only that packet needs to be retransmitted, rather than the entire message.

2.Flow control: Network devices such as routers can use the sequence numbers in packets to monitor and control the flow of data through the network.

3.Flexibility: By breaking a message into smaller packets, it can be sent over different paths in a network and reassembled at the destination. This is known as packet switching and enables efficient use of network resources.

4.Reliability: Each packet has a header that contains information about the packet's destination, so if a packet is lost or corrupted in transit, it can be retransmitted without having to retransmit the entire message.

5.Scalability: Segmentation allows messages of any size to be sent, regardless of the maximum packet size that a network can handle.

缺点

1. Increased overhead. Each packet must include additional information, such as a sequence number, for reassembling the original information at the destination. This increases the amount of data that needs to be sent and can reduce the overall efficiency of the network.

2. Processing delays. The process of breaking the message into packets and adding the necessary headers introduces additional latency.

3. Complexity. The process of segmentation and reassembly introduces additional complexity into the system, which can make it more difficult to troubleshoot and maintain.

4. Security risks. As packets travel over the network, they may pass through multiple intermediate devices, which increases the risk of unauthorized access or tampering.

5. Delivery errors: Packets are sent independently and may take different paths through the network, so they may arrive out of order or be lost. These errors can occur due to congestion, routing loops, and other problems.

6. Network congestion. When a large number of packets are transmitted in a short period of time, it can cause network congestion, resulting in delays or even loss of packets.

Lecture 2-3  the application layer

Principle of network application

web application

Domain Name System(DNS)

P2P Applications

Socket Programming

HTTP(协议)

为什么browser信息是需要的

The browser is included as a header field in the HTTP request message because it provides the server with important information about the client making the request. Here are a few reasons why the browser is required in the HTTP request message

Device compatibility. Different browsers have different capabilities and support different technologies, so browser information helps the server determine if the client can handle the requested content.

Security. Different browsers have different levels of security, and the server can use this information to determine if the client is using the latest secure browser before serving content.

Analysis and logging. Browser information is used to analyze the performance of the site and to understand how the site is being used, such as browser type, version, etc.

Content delivery. Depending on the browser, the server may choose to deliver different content, such as images or web styles, to optimize the user experience.

Malicious user agents. Some attackers may use malware, scripts, or malware to make requests that provide a fake user agent to evade detection. User agent strings are useful in detecting such cases

Compliance: Certain regulations, such as GDPR, CCPA, etc., may require logging of user agents for compliance purposes.

In summary, browser information in HTTP request messages is used to provide the server with important information about the client that can be used to optimize user experience, security and performance, and compliance.

Lecture 4-5 the transport layer

Transport-layer services

Multiplexing and demultiplexing

Connectionless Transpor: UDP

Principles of reliable data transfer

Piplined communication

TCP: connection-oriented transport

Principles of congestion control

Lecture 6-8 the network layer

Overview

私有地址通常不被因特网上的路由器所转发

子网划分:主机部分不能全为1

Router

Internet Protocol

IPv4 addressing

NAT

IPv6

Generalized Forward and SDN

Routing - Distance vector algorithm

Intra-AS routing in the Internet: OSPF

Routing among the ISPs: BGP

The SDN control plan

ICMP

是互联网控制消息协议,是网络层(第三层)中的一个协议。它用于在IP网络上发送错误消息和操作信息,通常用于网络诊断和错误报告。一些常见的 ICMP 消息类型包括 Echo Request 和 Echo Reply,它们被用于 Ping 工具,以测试网络连接和测量往返时间(RTT)。

SNMP

SNMP(Simple Network Management Protocol)是一种用于管理和监控网络设备的协议。它允许网络管理员远程监视和管理网络中的设备,包括路由器、交换机、服务器等。SNMP使得管理员可以检索设备的信息、监视网络性能并进行配置更改。 SNMP采用客户端-服务器模型,其中网络中的管理系统(通常是NMS,Network Management System)通过SNMP协议与被管理的设备进行通信。

Lecture 9-10 - The link layer

Service of link layer

Error detction and correction

Multiple access protocols

Addressing and ARP

Ethernet 以太网

 

Switches

交换机域叫广播域,集线器域叫冲突域

VLANs 虚拟局域网

Data center networking

Lecture11-12 Network Security 

Principles of cryptography

消息认证技术

对称加密的优缺点

  1. 效率高: 对称加密算法通常比非对称加密算法更快速,因为它们使用相同的密钥进行加密和解密操作,不涉及复杂的数学运算。

  2. 适合大量数据: 对称加密对于加密大量数据是非常有效的,因为它相对较快且计算成本较低。

  3. 实现简单: 对称加密算法的实现相对简单,容易理解和部署。

缺点:

  1. 密钥管理: 对称加密需要在通信双方共享密钥,这可能涉及到密钥的安全分发和管理问题。如果密钥在传输过程中被拦截或者泄露,整个加密系统可能会受到威胁。

  2. 不适合开放环境: 对称加密在需要在不同实体之间安全地共享密钥时可能会面临困难,特别是在开放环境中,比如互联网。

  3. 密钥数量增长: 在多方通信的情况下,密钥的数量会迅速增长。每对通信实体之间都需要一个独特的密钥,这可能导致密钥管理的复杂性增加。

  4. 不提供身份验证: 对称加密本身不提供身份验证机制,因此在通信的两端之间可能无法确保对方的身份。

Message integrity, authentication

Securing e-mail

Securing TCP connections:SSL (传输层)

Network layer security:IPsec (网络层)

Operational security: firewalls and IDS入侵检测系统()

异常:如异常读取等 

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.hqwc.cn/news/340922.html

如若内容造成侵权/违法违规/事实不符,请联系编程知识网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

文件上传进阶绕过技巧(一)和靶场实战

★★免责声明★★ 文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与学习之用,读者将信息做其他用途,由Ta承担全部法律及连带责任,文章作者不承担任何法律及连带责任。 0、环境准备 请移步《文件上传靶场实战:upl…

倍福CX8090嵌入式PLC新风控制开发

实现新风系统控制的方法与硬件配置、软件编程以及控制需求等因素有关。以下是一个简化的示例,说明如何使用倍福CX8090 PLC来实现新风系统的控制: 硬件配置: 倍福CX8090 PLC温度和湿度传感器风阀执行器显示屏软件编程: 使用倍福的…

深度解析Java中的ReadWriteLock:高效处理并发读写操作

第1章:引言 大家好,我是小黑,今天咱们聊聊读写锁。当多个线程同时对同一数据进行读写操作时,如果没有合理的管理,那数据就乱套了。就好比小黑在写日记,突然来了一帮朋友,大家都想往日记本上写点…

从头安装与使用一个docker GPU环境

GPU版docker的安装与使用 欢迎使用GPU版docker安装使用说明使用官方教程安装docker新建一个GPU版docker环境调用docker环境执行本地python文件 欢迎使用GPU版docker安装使用说明 使用官方教程安装docker 导入源仓库的GPG key curl -fsSL https://download.docker.com/linux/…

基于 NFS 的文件共享实现

NFS(Network File System)即网络文件系统,它允许网络中的计算机之间通过 TCP/IP 网络共享文件资源,服务端通过 NFS 共享文件目录,客户端将该文件目录挂载在本地文件系统中,就可以像操作本地文件一样读写服务…

【AI之路】使用huggingface_hub通过huggingface镜像站hf-mirror.com下载大模型(附代码,实现大模型自由)

文章目录 前言一、Hugging face是什么?二、huggingface镜像站hf-mirror.com三、大模型一键下载1. 准备工作2. 下载代码 总结后记 前言 要玩AI大模型,Hugging face 不可错过,但资源虽不错,可奈何国内下载速度很慢,动则…

2023年全国职业院校技能大赛(高职组)“云计算应用”赛项赛卷⑦

2023年全国职业院校技能大赛(高职组) “云计算应用”赛项赛卷7 目录 需要竞赛软件包环境以及备赛资源可私信博主!!! 2023年全国职业院校技能大赛(高职组) “云计算应用”赛项赛卷7 模块一 …

数学经典教材有什么?

有本书叫做《自然哲学的数学原理》,是牛顿写的,读完之后你就会感叹牛顿的厉害之处! 原文完整版PDF:https://pan.quark.cn/s/5d5eac2e56af 那玩意真的是人写出来的么… 现代教材把牛顿力学简化成三定律,当然觉得很简单。只有读了原…

算法通关村番外篇-跳表

大家好我是苏麟 , 今天来聊聊调表 . 跳表很少很少实现所以我们只了解就可以了 . 跳表 链表在查找元素的时候,因为需要逐一查找,所以查询效率非常低,时间复杂度是O(N),于是就出现了跳表。跳表是在链表基础上改进过来的&#xff0…

回环屏障CyclicBarrier原理探究

上节介绍的CountDownLatch在解决多个线程同步方面相对于调用线程的join方法已经有了不少优化,但是CountDownLatch的计数器是一次性的,也就是等到计数器值变为0后,再调用CountDownLatch的await和countdown方法都会立刻返回,这就起不…

视图与索引连表查询内/外联和子查询

1.视图 先介绍一下视图: 从SQL的角度来看,视图和表是相同的,两者的区别在于表中存储的是实际的数据,而视图中保存的是SELECT语句(视图本身并不存储数据)。 使用视图可以轻松完成跨多表查询数据等复杂操作…

解析工会排队:动静奖励结合的魅力

每天五分钟讲解一个商业模式知识,大家好我是模式策划啊浩Zeropan_HH。 数字时代数字思想,当你还在苦恼如何让自己的商业城堡扩大时,不如放空思想来看看啊浩的文章,或许可以给你一些启发。今天的给大家分享的模式来源于《微三云赢…