控制网络技术(英文三)Computer network foundation

一、development

1、terminal oriented

2、Circuit switching network
(1)Characteristics of circuit switching

Circuit switching must be connection oriented.
The three stages of circuit switching:
Establish a connection
Signal communication
Release the connection

(2)Problems in circuit switching

The computer's digital signal is burst and intermittent.
Circuit switching has long access time (10s to 20s).
different types, specifications and rates between terminals and computers of Reliability is not high

3、Packet switching network
(1) ARPANET is a milestone in the history of computer network development. Milestone marks the birth of modern computer network with the purpose of resource sharing.
Contribution to computer network technology:packet switching ,the layered network model,communication subnet and resource subnet
(2)The main features of packet switching

At the transmitter side, the long message is first divided into shorter and fixed length data segments.
Each data segment is added with a header to form a group.
Packet switching transmission unit
The head of each group contains control information such as address.
The first part was stripped from the group,finally restore to the original message

4、 Network architecture
(1) Different standardization
(2)The standardization of the network architecture
(3)Network function

data transmission--basic functions
sharing of resources-- the most attractive function
sharing hardware, software and data
improving the reliability and availability
carry out distributed processing

5、Network topology
(1)Network topology refers to the physical connection form of nodes in the network.
(2)Network topology --Geometric figures of network nodes and links
(3)The classification of computer network

the topology :  star network, tree network, bus network, ring network, mesh network and so on.
users:: public network, private network
the way of information exchange: circuit switching network, packet switching network and integrated switching network.
medium: twisted pair network, coaxial cable network, optical fiber network, wireless network and satellite network.
the transmission type:  broadcast network, point-to-point network
size: local area network、metropolitan area network、wide area network

二、Network hardware

1、LAN
(1) LAN , Privately-owned networks, Geographic range is usually from tens of meters to a few kilometers. It belongs to a small network built by a department or unit. Broadcasts are widely used in local area network.
(2)The characteristics of LAN

size:  restricted in size
transmission technology: 10-100Mbps,low delay,few errors
topology:various topology (bus , star,ring )

2、MAN
MAN (Metropolitan area networks), A bigger version of a LAN, normal uses similar technology, between LAN and WAN, usually not more than a city or region. It is a network that can cover a city range.

3、WAN
WAN(Wide area networks), spans a large geographical area (a country or continent), also known as remote network, usually covers 10 kms-106 kms, such as crossing several cities or several national networks.

4、OSI/RM
(1)As long as we follow the OSI standard, a system can communicate with any other system that is following the same standard anywhere in the world.OSI failed in the market.OSI experts have no commercial driving force when they finish the OSI standard.The implementation of OSI protocol is too complex and inefficient.
(2)The establishment period of OSI standard is too long, so that the equipment produced by OSI standard can not enter the market in time.The level division of OSI is not very reasonable, and some functions are repeated at multiple levels.

5、Two international standards
(1)The legal international standard OSI has not been recognized by the market.The international standard TCP/IP is now the most widely used. TCP/IP is often referred to as the international standard.
(2)Protocol hierarchies

Data exchange in computer network must obey the rules agreed before.
These rules clearly specify the format of the exchanged data and the synchronization problem.
Network protocol, simple as protocol, is a rule, standard or convention for data exchange in network.

(3)The benefits of stratification
Each layer is independent.The flexibility is good.Structure can be split open.Easy to implement and maintain.
It can promote standardization work.

三、The OSI reference model

1、Physical layer—— How to make use of the physical media
(1)main function – provide a physical connection for the data link layer, to ensure that information is entered into the channel and taken down by the receiver, so that the bit stream can be transparently transmitted.
data unit – bit. the lowest level of OSI, the interface between network physical devices, not the transmission medium, but only the physical devices: the data terminal device DTE (such as displays, PC, workstations, etc.) and the data circuit end connection device DCE (such as a modem).
(2)Typical tasks of the physical layer
The voltage level of “0” and “1” . How long each one lasts . Full duplex synchronization . How to establish connections and disconnect connections . Mechanical interface, Pins; Transmission medium

2、Data link layer – how to go every step
(1)main function–establish, maintain and disconnect links between two adjacent nodes, and to transform unreliable physical links into error free data links through error control and flow control.
(2)data unit --frame

3、Network layer – which way to get to the other side
(1)main function – responsible for selecting an optimal path. how to select packets from source to destination.
(2)data units - packet
(3)Typical tasks of the network layer

routing – optimality、fairness、 simplicity、adaptability and stability.
congestion control – solve the problem of resource congestion in network.
network addressing -- routers are used to connect two or more different logical networks.
network interconnection -- when groups cross a network to reach their destination, the addressing methods, the limit of packet length, and protocols are different, network interconnections needs to be solved.

4、Transport layer transport layer – where is the other
(1)The main function – the level of main computer, the best use of the network resources according to the characteristics of the communication subnet, and the establishment of a transmission channel between the session layer of the source host and the destination host and economical way for transparent transmission of the message.
(2)Data unit – message
(3)The basic function is to accept data from the session layer, split it up into smaller units if needed, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end.

5、Session layer–Who should speak and where to speak
(1)The main function–manage dialogue control, user interface. Although the session layer does not participate in the specific data transmission, it manages the data transmission. establishes, coordinates between two communication applications.
(2)Data unit – message
(3)The layers above the session layer are application oriented
The layers below the session layer are communication oriented, providing transparent and reliable data transmission for the upper level of the two session entities

6、Presentation layer–What does the other person look like
(1)The main function – data encryption and decryption、data compression and data transformation.
(2)Data encryption and decryption–In order to protect data security, the sender encrypts the message and the receiver decrypts it.
(3)Data compression – data compression can effectively use bandwidth, reduce delay and reduce communication cost.

7、Application layer–What to do
(1)The main function,–a direct user oriented layer that provides access to the process and system processes management. It contains a variety of protocols needed.
(2)The common network services – file service, e-mail service, virtual terminal service, network management service, printing service, integrated communication service, directory service, security service and so on.

四、5-layer protocol

1、point
5 (application layer)
4 (transport layer)
3 (network layer)
2 (data link layer)
1 (physical layer)

2、TCP/IP
(1)TCP/IP is the 4-layer architecture: application layer, transport layer, Internet layer and network interface layer.But the bottom layer of network interface is not defined.Therefore, combine the advantages of OSI and TCP/IP, propose a 5-layer protocol.
(2)Two services provided by transport layer

connection - oriented services(TCP):Take the telephone system as a model. Establish connections, use connections, release connections
connectionless service(UDP):Take the postal system as a model. Each message has a complete destination address, and each message is independent of other packets, passing through the selected route.

(3)Service primitives: the necessary information exchanged between the service user (N+1 entity) and the service provider (N entity) is used to notify the service user to take some action or to report the action of the service provider to the service provider’s peer entity.
(4)

  Request    ——An entity wants the service to do some workIndication ——An entity is to be informed about an eventResponse  ——An entity wants to respond to an eventConfirm    ——The response to an earlier request has come back

(5)Conclusion
In this way, the blue army on both sides is always unable to decide whether the last message has been received by the two sides.There is no agreement that will enable the blues to win 100%.

五、Composition of the Internet

1、The edge and core of the Internet
From the way of the Internet work, it can be divided into two parts.
(1)the edge part is composed of all hosts connected to the Internet. This part is directly used by users to communicate (transmit data, audio or video) and share resources.
(2)the core part is composed of a large number of routers connected to these networks. This part is to provide services for the edge part (providing connectivity and exchange).

2、The core part of the Internet
(1)most complex part of the Internet.
(2)provides connectivity to hosts,various forms of data.
(3)Routers play a vital role .
(4)Routers are key part to realize packet switching.

3、The role of the host and the router is different
(1)The host is to process information for users, send packets to the network and receive packets from the network.
(2)Routers store and forward packets, and finally deliver packets to the destination host.

4、The advantages of packet switching
(1)High efficiency: dynamic allocation of transmission bandwidth, and communication link is occupied by steps.
(2)Flexibility: group transfer unit
(3)Fast: no need to establish connection first
(4)Reliable: network protocol that guarantees reliability; distributed routing protocol enables network to have good survivability.

5、Problems brought by packet switching
(1)Packets need to be queued at nodes when they are stored and forwarded, which will cause a certain delay.
(2)Packets must carry the header (which contains essential control information), which also causes a certain cost.

6、Indexs of computer network
(1)rate

Bit is the unit of data in computer, and it is also the unit of information quantity used in information theory.
Speed, data rate or bit rate is the most important performance index in computer networks. b/s, or kb/s, Mb/s, Gb/s, etc.

(2)bandwidth

Bandwidth means the band width of a signal. The unit is Hz (or kHz, mHz, GHz, etc.).
Now bandwidth is synonymous with the highest data rate that the digital channel can transmit.

(3)The common mistake is to confuse two rates

There are two different rates in the network:The propagation rate of signal (electromagnetic wave) on transmission media (m/sec, or km/sec).The bit rate is sent to the network by computer.
The meaning and unit of the two rates are completely different.Broadband transmission:  refers to the higher rate of sending bits by computers .

(4)Broadband line: there are more bits per second from computer to line.The propagation speed of bits is the same on broadband and narrowband lines.Broadband and narrowband lines: the same speed. Broadband line: shortening of vehicle distance
(5)throughput

Throughput represents the amount of data that is passed through a network (or channel and interface) in a unit time.
Throughput is more often used for a measurement of the real world network in order to know how much data actually can be passed through the network.
Throughput is limited by the bandwidth of the network or the rated speed of the network.

(6)delay

Sending delay (transmission delay), when data is transmitted, the time that data blocks enter from node to transmit media.
That is, the time required from the first bit of the transmitted data frame to the last bit of the frame.
Propagation delay: electromagnetic wave needs to propagate a certain distance in the channel and the time it takes.
Signal transmission rate (i.e. transmission rate) and signal propagation speed on channel are completely different concepts.
Processing delay: the time spent by switching nodes for storing and forwarding necessary processing.
Queuing delay: the delay experienced by packet queuing in node cache queue.The length of queuing delay depends on the traffic in the network at that time.
The total delay experienced by data is the sum of transmission delay, propagation delay, processing delay and queuing delay.

(7) utilization ratio

Channel utilization indicates that a few times of a channel is utilized.
The utilization rate of the fully idle channel is zero.Network utilization is the weighted average of channel utilization of the whole network.
Channel utilization is not higher and better.

控制网络技术(英文三)相关推荐

  1. 控制网络技术(英文二)

    控制网络技术(英文二)Data communication base 一.Theoretical basis 1.basis (1)Fourier Analysis (2)Bandwidth-Limi ...

  2. 控制网络技术(英文一)

    控制网络技术(英文一) 一.Concept of control network 1. A layered architecture (1)FCS(Fieldbus Control System) ( ...

  3. 计算机接口及应用技术,计算机接口技术及应用 第9讲 控制网络技术(2 现场总线).pdf...

    计算机接口技术及应用 第9讲 控制网络技术(2 现场总线).pdf (9页) 本资源提供全文预览,点击全文预览即可全文预览,如果喜欢文档就下载吧,查找使用更方便哦! 15.9 积分 1<计算机接 ...

  4. 计算机国三网络技术,计算机国三网络技术.doc

    计算机国三网络技术计算机国三网络技术 第一章 计算机基础 1.1 计算机系统的组成 <1>年份事件: 1946 ENIAC 第一台计算机诞生 1969 ARPNET产生 互联网的诞生 19 ...

  5. 网络技术独立的×××-SDN和三个问题

    网络技术就是电脑技术么?CPU和操作系统已经牢牢占有了PC,服务器的领地,每个PC,服务器上都会有一个或者多个CPU,都会跑一个OS,甚至如今的手持设备也被灌入了PC的影子,实则一个缩小版的PC,当年 ...

  6. 移动通信核心网络技术总结(三)EPC网络的结构及原理

    核心网络技术总结(三) EPC网络原理 EPC网络结构及功能 EPC网络中存在着以下几个网元: eNodeB.MME.HSS.PCRF.SGW.PGW 我们可以拿坐火车的过程进行类比,我们把数据比作乘 ...

  7. 计算机引领未来的趋势,引领未来网络发展之路,新华三提出确定性网络的第三种技术路径...

    6月18日,第五届未来网络发展大会迎来第二天的技术盛会.作为网络领域的技术创新者与探索者,紫光股份旗下新华三集团副总裁.技术战略部总裁刘新民应邀出席"未来网络技术发展与变革"主题论 ...

  8. 网络技术独立的导火索-SDN和三个问题

    网络技术就是电脑技术么?CPU和操作系统已经牢牢占有了PC,服务器的领地,每个PC,服务器上都会有一个或者多个CPU,都会跑一个OS,甚至如今的手持设备也被灌入了PC的影子,实则一个缩小版的PC,当年 ...

  9. 《工业控制网络安全技术与实践》一2.1.3 SCADA 系统未来的技术发展

    2.1.3 SCADA 系统未来的技术发展 本文讲的是工业控制网络安全技术与实践一2.1.3 SCADA 系统未来的技术发展 ,随着计算机技术和通信技术的快速发展,SCADA 系统也将不断发展.总体趋 ...

最新文章

  1. CEGUI-----动画
  2. Attention! .net 持久层正式发布 :Noebe
  3. MongoDB 是如何鼓励和激励开发者社区的
  4. oracle 三表关联更新_Oracle数据库入门
  5. C++const与#define 相比,有何优点?
  6. brew 镜像_Docker牛刀小试:安装及常用的镜像命令和容器命令
  7. ORACLE中表死锁的处理
  8. iphone屏幕录制_iphone投屏到电脑详细教程
  9. 又一家知名社交电商平台倒下:并购重组失败,将启动破产清算或重整
  10. 关于JSON的那些事儿
  11. 热修复 阿里的AndFix
  12. shell脚本编写_shell脚本编写事例(dhcp自动安装和自动配置)
  13. 苹果安卓最新看片神器各种实用功能,帮你一年省下上千块!
  14. 简单的jsp代码(登录界面)
  15. 什么是LSI关键词?LSI关键词怎么用?2019
  16. 区块链骇客第二讲: 自毁攻击
  17. 5G技术详解系列-PDU会话签约数据(6)
  18. push msg php_php进程通信-消息队列
  19. 海德汉LSV2通讯协议
  20. 【操作系统】设备管理

热门文章

  1. 计算机图形学【GAMES-101】1、矩阵变换原理Transform(旋转、位移、缩放、正交投影、透视投影)
  2. cocos creator麻将教程系列(六)—— 达达麻将的游戏流程
  3. [公告] 2017年9月装机员系统更新
  4. 单片机节日彩灯实训报告_基于单片机的节日彩灯设计论文课程设计.doc
  5. 全国计算机软考长沙考点,湖南软考考点在哪?湖南软考考点安排表
  6. 科比投篮预测,可视化与探索性数据分析(二)
  7. 后李健熙时代的三星,将迎来怎样变局?
  8. 好未来单季营收2.24亿美元:同比降84% 张邦鑫持股26.3%
  9. J2ME学习笔记(八)(转)
  10. 红蓝对抗之蓝队防守:ATTCK框架的应用