CAN201 计网概念收集

Lecture 1 the theoretical basis for networking

Network edge and core

地理覆盖范围:广WAN,城MAN,局LAN,个PAN

交换方式,电路,报文,分组

电路交换vs报文vs分组

Network performance

protocol layers and service models***


OSI七层

TCP/IP四层

···························

e.g 网站访问中不同层所涉及的协议
  1. Application Layer:

    • HTTP (Hypertext Transfer Protocol): This protocol is used for transmitting text, images, and other web page components between your browser and the web server. In this case, when you enter the URL, your browser initiates an HTTP request to the server.
  2. Transport Layer:

    • TCP (Transmission Control Protocol): HTTP typically uses TCP as its transport layer protocol. TCP ensures reliable and ordered delivery of data between your computer and the web server. It establishes a connection, breaks down large messages into smaller packets, and ensures they are delivered without errors.
  3. Network Layer:

    • IP (Internet Protocol): IP is responsible for routing packets between devices across different networks. In this scenario, it helps route the TCP packets containing the HTTP requests and responses between your computer and the university's web server.
  4. Link Layer:

    • Ethernet (or other link layer protocols): At the link layer, Ethernet is often used to transmit frames between devices within the same local network. Your router uses Ethernet to send data to and receive data from your computer.
  5. Physical Layer:

    • Physical medium (e.g., Ethernet cables, Wi-Fi signals): The physical layer deals with the actual hardware transmission of bits over the physical medium. This could be Ethernet cables, Wi-Fi signals, or other physical means connecting your computer to the router and the router to the wider Internet.

In summary, when you enter the URL in your browser, it initiates an HTTP request. This request is encapsulated in TCP, which is then further encapsulated in IP for routing. The data is transmitted over the physical medium using link layer protocols like Ethernet. Finally, your router facilitates the communication between your computer and the web server.

network security

core - package switching 

delay 

分组信息的优缺点

优点

1.Error control: Each packet includes a checksum, which can be used to detect and correct errors that may occur during transmission. If an error is detected in a packet, only that packet needs to be retransmitted, rather than the entire message.

2.Flow control: Network devices such as routers can use the sequence numbers in packets to monitor and control the flow of data through the network.

3.Flexibility: By breaking a message into smaller packets, it can be sent over different paths in a network and reassembled at the destination. This is known as packet switching and enables efficient use of network resources.

4.Reliability: Each packet has a header that contains information about the packet's destination, so if a packet is lost or corrupted in transit, it can be retransmitted without having to retransmit the entire message.

5.Scalability: Segmentation allows messages of any size to be sent, regardless of the maximum packet size that a network can handle.

缺点

1. Increased overhead. Each packet must include additional information, such as a sequence number, for reassembling the original information at the destination. This increases the amount of data that needs to be sent and can reduce the overall efficiency of the network.

2. Processing delays. The process of breaking the message into packets and adding the necessary headers introduces additional latency.

3. Complexity. The process of segmentation and reassembly introduces additional complexity into the system, which can make it more difficult to troubleshoot and maintain.

4. Security risks. As packets travel over the network, they may pass through multiple intermediate devices, which increases the risk of unauthorized access or tampering.

5. Delivery errors: Packets are sent independently and may take different paths through the network, so they may arrive out of order or be lost. These errors can occur due to congestion, routing loops, and other problems.

6. Network congestion. When a large number of packets are transmitted in a short period of time, it can cause network congestion, resulting in delays or even loss of packets.

Lecture 2-3  the application layer

Principle of network application

web application

Domain Name System(DNS)

P2P Applications

Socket Programming

HTTP(协议)

为什么browser信息是需要的

The browser is included as a header field in the HTTP request message because it provides the server with important information about the client making the request. Here are a few reasons why the browser is required in the HTTP request message

Device compatibility. Different browsers have different capabilities and support different technologies, so browser information helps the server determine if the client can handle the requested content.

Security. Different browsers have different levels of security, and the server can use this information to determine if the client is using the latest secure browser before serving content.

Analysis and logging. Browser information is used to analyze the performance of the site and to understand how the site is being used, such as browser type, version, etc.

Content delivery. Depending on the browser, the server may choose to deliver different content, such as images or web styles, to optimize the user experience.

Malicious user agents. Some attackers may use malware, scripts, or malware to make requests that provide a fake user agent to evade detection. User agent strings are useful in detecting such cases

Compliance: Certain regulations, such as GDPR, CCPA, etc., may require logging of user agents for compliance purposes.

In summary, browser information in HTTP request messages is used to provide the server with important information about the client that can be used to optimize user experience, security and performance, and compliance.

Lecture 4-5 the transport layer

Transport-layer services

Multiplexing and demultiplexing

Connectionless Transpor: UDP

Principles of reliable data transfer

Piplined communication

TCP: connection-oriented transport

Principles of congestion control

Lecture 6-8 the network layer

Overview

私有地址通常不被因特网上的路由器所转发

子网划分:主机部分不能全为1

Router

Internet Protocol

IPv4 addressing

NAT

IPv6

Generalized Forward and SDN

Routing - Distance vector algorithm

Intra-AS routing in the Internet: OSPF

Routing among the ISPs: BGP

The SDN control plan

ICMP

是互联网控制消息协议,是网络层(第三层)中的一个协议。它用于在IP网络上发送错误消息和操作信息,通常用于网络诊断和错误报告。一些常见的 ICMP 消息类型包括 Echo Request 和 Echo Reply,它们被用于 Ping 工具,以测试网络连接和测量往返时间(RTT)。

SNMP

SNMP(Simple Network Management Protocol)是一种用于管理和监控网络设备的协议。它允许网络管理员远程监视和管理网络中的设备,包括路由器、交换机、服务器等。SNMP使得管理员可以检索设备的信息、监视网络性能并进行配置更改。 SNMP采用客户端-服务器模型,其中网络中的管理系统(通常是NMS,Network Management System)通过SNMP协议与被管理的设备进行通信。

Lecture 9-10 - The link layer

Service of link layer

Error detction and correction

Multiple access protocols

Addressing and ARP

Ethernet 以太网

 

Switches

交换机域叫广播域,集线器域叫冲突域

VLANs 虚拟局域网

Data center networking

Lecture11-12 Network Security 

Principles of cryptography

消息认证技术

对称加密的优缺点

  1. 效率高: 对称加密算法通常比非对称加密算法更快速,因为它们使用相同的密钥进行加密和解密操作,不涉及复杂的数学运算。

  2. 适合大量数据: 对称加密对于加密大量数据是非常有效的,因为它相对较快且计算成本较低。

  3. 实现简单: 对称加密算法的实现相对简单,容易理解和部署。

缺点:

  1. 密钥管理: 对称加密需要在通信双方共享密钥,这可能涉及到密钥的安全分发和管理问题。如果密钥在传输过程中被拦截或者泄露,整个加密系统可能会受到威胁。

  2. 不适合开放环境: 对称加密在需要在不同实体之间安全地共享密钥时可能会面临困难,特别是在开放环境中,比如互联网。

  3. 密钥数量增长: 在多方通信的情况下,密钥的数量会迅速增长。每对通信实体之间都需要一个独特的密钥,这可能导致密钥管理的复杂性增加。

  4. 不提供身份验证: 对称加密本身不提供身份验证机制,因此在通信的两端之间可能无法确保对方的身份。

Message integrity, authentication

Securing e-mail

Securing TCP connections:SSL (传输层)

Network layer security:IPsec (网络层)

Operational security: firewalls and IDS入侵检测系统()

异常:如异常读取等 

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:/a/311188.html

如若内容造成侵权/违法违规/事实不符,请联系我们进行投诉反馈qq邮箱809451989@qq.com,一经查实,立即删除!

相关文章

[AutoSar]基础部分 RTE 07 VFB虚拟功能总线

目录 关键词平台说明一、VFB1.1VFB是什么1.1VFB的好处1.2VFB的坏处 二、VFB在ECU内部的描述2.1Components2.2 Port-Interfaces2.3 Port2.4 Compositions 关键词 嵌入式、C语言、autosar、VFB 平台说明 项目ValueOSautosar OSautosar厂商vector芯片厂商TI编程语言C&#xff0…

浅析NVMe key per IO加密技术-3

三、Key per IO行业规范支持情况 Key Per I/O功能在行业规范中的支持情况: NVMe标准已经批准并采纳了NVMe TP4055提案,明确支持并定义了如何使用每个I/O操作独立的加密密钥技术。这意味着NVMe设备可以实现对每一个数据传输请求进行单独加密,…

降压恒压 耐压DC60V芯片,SL3037B替代HT7463A、兼容替代HT7463B

在当今的电子设备中,电源管理芯片扮演着至关重要的角色。它们负责为设备提供稳定的电压,确保设备的正常运行。然而,随着技术的不断发展,一些传统的电源管理芯片已经无法满足现代设备的需要。此时,寻找一种能够替代传统…

0111qt

实现闹钟,并播报懒虫...~ daytest.pro: QT core gui texttospeechgreaterThan(QT_MAJOR_VERSION, 4): QT widgetsCONFIG c11# The following define makes your compiler emit warnings if you use # any Qt feature that has been marked deprecated (th…

nginx和CDN应用

一、代理的工作机制 1.代替客户机向网站请求数据,从而可以隐藏用户的真实IP地址。 2.将获得的网页数据(静态 Web 元素)保存到缓存中并发送给客户机,以便下次请求相同的数据时快速响应。 二、代理服务器的…

Windows7共享文档—开启方法及用户权限设置

使用计算机的朋友,在工作中经常需要在局域网中将文件共享给其他用户,这样其他人可以方便的通过局域网查看,甚至修改这些共享文件。当然,根据文件的重要程度,使用等级不同,不同的用户会赋予不同的权限&#…

进行商城的测试用例设计思路是什么?

进行商城的测试用例设计时,可以考虑以下思路: 1. 功能测试:测试商城的基本功能是否正常工作,包括用户注册、登录、浏览商品、搜索商品、添加商品到购物车、下单、支付等。 2. 数据验证测试:验证商城中的数据是否正确…

Linux 配置FTP服务器 + vsftpd服务安装配置 (Good篇)

CSDN 成就一亿技术人! VSFTPD 实现客户端和服务器之间传输文件 CSDN 成就一亿技术人! 目录 什么是VSFTPD? VSFTPD 的特点和功能 1. 设置和使用FTP服务器的步骤 1. 下载vsftpd包 2. 启动服务 开机自启 3. 关闭防火墙 4. 配置vsftpd服…

Base64编码:数据传输的安全使者

Base64编码是一种将二进制数据转换为可传输的文本表示形式的方法,它在全球范围内被广泛应用于网络通信、数据存储和传输等领域。本文将从多个方面介绍Base64编码的原理、应用及其在现实场景中的优势,帮助您深入了解这一重要的编码技术。 Base64编码解码…

MySql workBench客户端菜单汉化最新版

找到Mysql Workbench安装目录 如:D:\soft\MySQL\MySQL Workbench 8.0 CE\ 进入data目录:D:\soft\MySQL\MySQL Workbench 8.0 CE\data 里面有main_menu.xml文件,将汉化文件覆盖即可 main_menu.xml汉化内容 注意篇幅限制请移步下载完整版完…

Window平台安装MongoDB

在部署前需要在官网先确定系统对应的Mongo DB版本。 本机电脑为Window10,所以这里以MongoDB 6.0版本。 1 在官网下载安装包 2 安装MongoDB MongoDB Compass 是一个图形界面管理工具,如果勾选了安装会花费长一点时间,可以取消掉勾选&#xff…

C++ Primer 6.2参数传递 知识点+练习题

C Primer 6.2参数传递 知识点练习题 指针形参使用引用拷贝Const 形参实参尽量使用常量引用数组形参数组引用形参传递多维数组向main函数传参数含有可变形参的函数练习题待更新 指针形参 void reset(int *p) {*p0;//p指向的整型对象变为0p0;//只是对形参改变p,使其为…

NPN PNP SS8050 SS8550 S8050

SS8050的使用及引脚判断方法 今天讲的是NPN型三极管SS8050,主要分为以下几个方面: 一、前言 二、SS8050简介 三、NPN三极管与PNP三极管 四、三极管管脚识别方法 五、不拆卸三极管判断其好坏 六、S8050和SS8050的区别 七、三极管与MOS管的区别 八…

Modern C++ std::mutex底层原理

前言 我时常有这样的疑问: std::mutex怎么就能保证后面的语句100%安全哪?CPU reordering就不会把这些语句重排到mutex前面执行?而且各个CPU都是有L1、L2缓存的,如果mutex后面要访问的的变量在这些缓存中怎么办? 带着…

开启鸿蒙开发探索之旅ArkTS基本语法介绍(3)

上一章简单的介绍了鸿蒙HUAWEI DevEco Studio框架的搭建,这一章讲一下鸿蒙的主要开发一眼ArkTS的基本语法结构 1.ArkTS语法解释 ArkTS是HarmonyOS优选的主力应用开发语言。ArkTS围绕应用开发在TypeScript(简称TS)生态基础上做了进一步扩展&…

信道编码理论【信息论安全】

目录 一. 信道编码模型 二. 信道编码速率与错误译码率 2.1 信道编码速率 2.2 平均错误率 三. 信道容量 四. 小结 一. 信道编码模型 (1)消息 假定消息集合为M,如下: (2)编码 将消息m映射成码字&…

怎么在PDF添加文本框?6种快速向PDF添加文字教程

有时您可能希望填写表格或在 PDF 文件中留下评论。这需要您将文本框和文本添加到 PDF。文本框是一个文本字段,您可以在其中键入文本。但是,除非您使用专用的 PDF 编辑器,否则编辑 PDF 文件具有挑战性。了解正确的 PDF 工具和将文本框添加到 P…

松木和桉木建筑模板:它们的性能和用途有何区别?

在建筑行业中,选择合适的模板材料对于保证施工质量和效率至关重要。松木和桉木是两种常用的建筑模板材料,它们各有特点和优势。特别是桉木,在某些方面相比松木有显著的优势。 松木建筑模板的特点 松木因其广泛的可用性和经济性而被广泛应用…

软件工程各种图

参考视频: 6 分钟学会 UML 类图_哔哩哔哩_bilibili 5 分钟学会 UML 时序图(顺序图、序列图)_哔哩哔哩_bilibili 3 分钟学会 UML 活动图_哔哩哔哩_bilibili 6 分钟学会 UML 用例图_哔哩哔哩_bilibili 是真的讲的非常好!&#…

高保真度与流畅度MagicVideo-V2视频生成模型;3D人形虚拟角色;微调量化的扩散模型;自动给视频配音;非自回归音频生成

本文首发于公众号:机器感知 高保真度与流畅度MagicVideo-V2视频生成模型;3D人形虚拟角色;微调量化的扩散模型;自动给视频配音;非自回归音频生成 MagicVideo-V2: Multi-Stage High-Aesthetic Video Generation 本文提…