types of networks social networks computer networks
play

Types of networks (social networks, computer networks, entity- - PowerPoint PPT Presentation

Networks Types of networks (social networks, computer networks, entity- relationship networks, ) Node-link diagrams Layered Internet architecture (encapsulation) The Internet Structure of the Internet core


  1. • Networks • Types of networks (social networks, computer networks, entity- relationship networks, …) • Node-link diagrams • Layered Internet architecture (encapsulation)

  2. • The Internet • Structure of the “Internet core” (ISPs, IXP’s, CDN’s) • Packet switching (store and forward, routing) • Types of delays (transmission, propagation, queueing, processing) • Computing throughput • Causes of packet loss (buffer overflow, bit errors, excessive delay) • Traceroute

  3. App Layer

  4. • Service Model • SMTP (message format, interaction) • • Example applications (Web, email, streaming video, …) POP3 (message format, iteraction) • • Client-server architecture Interaction scenario • • Processes 7-bit ASCII limitation • • Socket Programming Sockets • • Port numbers Creating sockets in Python 3 (UDP, TCP) • • Domain Name System Designing an application level protocol • The Web • Application “stacking” (one application layer protocol using another) • HTTP message formats (GET, Conditional GET, HEAD, POST, • DELETE, response) Distributed hierarchical architecture (root servers, TLD servers, authoritative servers) • HTTP interaction • Resource records • Sequence diagrams • DNS message format • HTTP use of TCP (persistent, non-persistent) • Streaming • Cookies • Media coding (audio, video) • Proxy servers • Quality of service requirements (continuous replay, packet loss, • Email latency, adaptation) • • Email architecture (mail servers, “user agents”) Clint-side buffering • • DASH Mail message format

  5. Transport Layer

  6. • Common Transport Pieces • Adaptation (timeout tuning, flow control) • • Overarching skills Socket addressing (UDP, TCP) • • Checksums Timing analysis • UDP • Protocol inspection using Wireshark • • UDP service goals (unordered, unguaranteed “best Understanding how protocol layers work together effort” delivery) • Understanding why protocols differ • Applications that use UDP • Designing new protocols • UDP message format • Protocol implementation • TCP • Understanding the consequences of design • TCP service goals (ordered, guaranteed, eventual decisions (technical, social) delivery) • TCP (Only the following topics, which were not on • Applications that use TCP Exam 1) • • Reliable data transfer (checksums, Flow control acknowledgement, timeouts, pipelining) • Setting the timeout • Reading Finite State Model diagrams • Connection close • TCP message format

  7. Network Layer

  8. • Routers • Fragmentation • • Separation of data and control Network address translation planes • IPv6 • Data plane design (input buffer, • bus switch, output buffer) Tunneling • • Routing Queueing (FIFO, weighted fair queueing) • Routing tables (longest prefix • IP matching) • • Hierarchical IP address space Autonomous systems • • DHCP Shortest path routing • • IPv4 addresses and “Datagram” Border Gateway Protocol (BGP) format

  9. Link Layer

  10. • Point to Point • Physical layer (twisted pair, coaxial cable, fiber, microwave, satellite) • Error detection (CRC) • Error correction • Ethernet • Subnets • CSMA/CD • MAC addresses • ARP • Ethernet frame structure • Switched Ethernet

  11. Wireless

  12. • WiFi • Power management • • Mobile Data CSMA/CA (SIFS, DIFS, RTS, CTS) • 4G architecture • Physical layer issues • (signal strength, multipath, Combination of FDMA interference, hidden and TDMA terminal) • CDMA • Adaptive rate selection • Handoffs • Association (SSID) • Roaming mobility (indirect • 802.11 frame structure routing)

  13. Security

  14. • Hacking • Encryption • • Bots and botnets Symmetric key encryption • • Distributed denial of service attacks Public key encryption • • Ransomware PGP for email • • Social attacks SSL (and TLS) • • Authentication Disinformation • Firewalls • Hash • • Firewalls (stateful, stateless) Message Authentication Codes • • Gateways Digital signatures • • Intrusion detection Man-in-the-middle attacks • Certificate authorities

  15. Social Issues

  16. • Appropriate Use • Twitter • • Legal system (constitution, laws, regulations, treaties) Agile development methods • • Contracts (e.g., terms of service) Adoption of innovation (social structure, social structure, predictors) • Policy (e.g., privacy policies) • Financing • Norms • The Interplanetary Internet • Technical means • Interplanetary propagation delays • Jurisdiction • Interplanetary queueing delays • Controlling collection vs. controlling use • Delay tolerant networking • Balancing interests • Sneakernet • Privacy • Edge caching • FISA Section 702 • Global Internet Access • Upstream collection • Demographic challenges • About collection • Spatial challenges • Multi-communication transactions • Last- mile technology (Fiber, radio, drones, balloons, …) • Context-sensitive design

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend