Devices——hosts or end systems

End systems are connected together by a network of communication links and packet switches.

When one end system has data to send to another end system, the sending end system segments the data and adds header bytes to each segment. The resulting packages of information, known as packets, are then sent through the network to the destination end system, where they are reassembled into the original data.

Two most prominent types of packet switches——routers and link-layer switches. Both types of switches forward packets toward their ultimate destinations. Link-layer switches are typically used in access networks, while routers are typically used in the network core.

The sequence of communication links and packet switches traversed by a packet from the sending end system to the receiving end system is known as a route or path through the network. The

Packet-switched networks (which transport packets) are similar to transportation networks. Packet takes a path through a computer network.

End systems access the Internet through Internet Service Providers(ISP).

Each ISP is in itself a network of packet switches and communication links. ISPs also provide Internet access to content providers, connecting Web sites directly to the Internet.

ISPs that provide access to end systems must also be interconnected. These lower-tier ISPs are interconnected through national and international upper-tier ISPs. An upper-tier ISP consists of high-speed routers interconnected with high-speed fiber-optic links.

Protocols control the sending and receiving of information within the Internet.

The IP protocol specifies the format of the packets that are sent and received among routers and end systems.

peer-to-peer (P2P)

The applications are said to be distributed applications, since they involve multiple end systems that exchange data with each other.

The networking takes two (or more) communicating entities running the same protocol in order to accomplish a task.

All activity in the Internet that involves two or more communicating remote entities is governed by a protocol.

A protocol defines the format and the order of messages exchanged between two or more communicating entities, as well as the actions taken on the transmission and/or receipt of a message or other event.

End systems are also referred to as hosts. Hosts are sometimes further divided into two categories: clients and servers.

The two most prevalent types of broadband residential access are digital subscriber line (DSL) and cable.

A residence typically obtains DSL Internet access from the same local telephone company (telco) that provides its wired local phone access. Thus, when DSL is used, a customer's telco is also its ISP. As each customer's DSL modem uses the existing telephone line (twisted pair copper wire) to exchange data with a digital subscriber line access multiplexer (DSLAM,数字用户线接入复用器) located in the telco's local central office (CO). The home's DSL modem takes digital data and translates it to high frequency tones for transmission over telephone wires to the CO; the analog signals from many such houses are translated back into digital format at the DSLAM.

On the customer side, a splitter separates the data and telephone signals arriving to the home and forwards the data signal to the DSL modem. On the telco side, in the CO, the DSLAM separates the data and phone signals and sends the data into the Internet

Fiber optics connect the cable head end to neighborhood-level junctions, from which traditional coaxial cable is then used to reach individual houses and apartments. Each neighborhood junction typically supports 500 to 5,000 homes. Because both fiber and coaxial cable are employed in this system, it is often referred to as hybrid fiber coax (HFC).

Cable Internet access requires special modems, called cable modems. As with a DSL modem, the cable modem is typically an external device and connects to the home PC through an Ethernet port.

At the cable head end, the cable modem termination system (CMTS) turns the analog signal sent from the cable modems in many downstream homes back into digital format.

Cable modems divide the HFC network into two channels, a downstream and an upstream channel.

As with DSL, access is typically asymmetric, with the downstream channel typically allocated a higher transmission rate than the upstream channel.

Cable Internet access is that it is a shared broadcast medium(介质). In particular, every packet sent by the head end travels downstream on every link to every home and every packet sent by a home travels on the upstream channel to the head end.

FTTH concept— provide an optical fiber path from the CO directly to the home.

It is not until the fiber gets relatively close to the homes that it is split into individual customer-specific fibers. There are two competing optical-distribution network architectures that perform this splitting: active optical networks (AONs) and passive optical networks (PONs). AON is essentially switched Ethernet.

Each home has an optical network terminator (ONT), which is connected by dedicated optical fiber to a neighborhood splitter. The splitter combines a number of homes (typically less than 100) onto a single, shared optical fiber, which connects to an optical line terminator (OLT) in the telco's CO. The OLT, providing conversion between optical and electrical signals, connects to the Internet via a telco router. In the home, users connect a home router to the ONT and access the Internet via this home router. In the PON architecture, all packets sent from OLT to the splitter are replicated at the splitter.

转载于:https://www.cnblogs.com/Hu-Yan/p/8626078.html

Computer Networking A Top-Down Approach 笔记(一)相关推荐

  1. 计算机网络笔记(油管FreeCodeCamp)Computer Networking

    一.Intro to Network Devices (part 1)网络设备介绍1 layer 1 devices (第一层/物理层设备): modem: 将从计算机发出的电子信号转为电话线传送的模 ...

  2. Introduction to Computer Networking学习笔记(十五):Queue Model 包交换中的缓冲模型

    本章知识点比较零散,因此一篇文章进行总结,并且不具有连贯性,仅记录自己认为有价值的内容. 将较大的包拆分为小包进行传输,可以减小端对端延迟,原因如下图: 数据传输时,突发大量的数据包会增加延迟,简单周 ...

  3. Programming Computer Vision with Python (学习笔记一)

    转载自:http://segmentfault.com/a/1190000003941588 介绍 <Programming Computer Vision with Python>是一本 ...

  4. 计算机网络(Computer Networking)基础知识--第一章--计算机网络和因特网

    -> 第二章–应用层 第一章 计算机网络和因特网(Computer Networks and Internet) 首先在这里再次声明一下,本系列博客内容参考北京交通大学软件学院计算机网络课程的教 ...

  5. 《编码:隐匿在计算机软硬件背后的语言(Code:The Hidden Language of Computer Hardware and Software)》读书笔记

    声明 该文章是阅读<编码:隐匿在计算机软硬件背后的语言>一书之后整理出的读书笔记.若有错误,还需继续修正与增删. Preface 作者Charles Petzold是Windows编程界的 ...

  6. 《Deep Learning for Computer Vision with Python》阅读笔记-ImageNetBundle(第7章)-在ImageNet上训练VGGNet

    //2022.2.27日下午18:33开始学习笔记 7.在ImageNet上训练VGGNet 在本章中,我们将学习如何在ImageNet数据集上从零开始训练VGG16网络架构.卷积神经网络的VGG家族 ...

  7. top命令的笔记补充2--如何将top信息后台运行并写入log

    这几天写作2篇关于top的文章了,总是发现刚解决一个问题,第二个问题就出来了,总是不那么完美,好了,上主菜: 我在实验的时候用的脚本如下: #!/bin/bash while true do   ec ...

  8. Programming Computer Vision with Python (学习笔记十二)

    ORB(Oriented FAST and Rotated BRIEF)可用来替代SIFT(或SURF),它对图像更具有抗噪特性,是一种特征检测高效算法,其速度满足实时要求,可用于增强图像匹配应用. ...

  9. Programming Computer Vision with Python (学习笔记十一)

    尺度不变特征变换(Scale-invariant feature transform, 简称SIFT)是图像局部特征提取的现代方法--基于区域/图像块的分析.在上篇笔记里我们使用的图像之间对应点的匹配 ...

最新文章

  1. 容量和速度是选购闪存盘的关键
  2. 挨踢部落直播课堂第一期:起航2017——拥抱大数据
  3. 穿过代理服务器取远程用户真实IP地址
  4. Socket-Client通信
  5. 软测管理工具实践-01
  6. 反向图——dj算法(判断从起点 开始有没有第二条路径能到达)Gym 102501K
  7. 计算机组成原理刘红玲,计算机组成原理/21世纪高等学校规划教材
  8. Flask Middle
  9. Halcon缺陷检测——测量拟合
  10. nginx location 匹配 多个规则_nginx配置location与rewrite规则教程
  11. HTTP请求与响应协议
  12. Windows Live Writer Technical Preview 公布下载
  13. DV、OV、EV :SSL证书那么多,我该选择哪一种?
  14. 启动SQL Server服务器以及新建连接的方法
  15. win7系统iis服务器删除,Win7系统如何卸载iis 删除win7中iis的方法
  16. {king:pagelist/} php sp2,kingcms PHP Sp2留言薄怎么显示不出留言呢?
  17. python图片转文字
  18. ThinkPad E450 最新macOS BigSur黑苹果安装教程(OpenCore引导)
  19. 不用linux转录组数据分析,RNA-seq转录组数据分析
  20. 苹果iPad怎么截图?图文教学,可快速学会

热门文章

  1. python123外汇兑换计算器_Python之计算器
  2. 数据库和表的基础练习之水果商店
  3. 解决Office Excel文档打开显示空白
  4. 课时12 Linux文件系统挂载管理
  5. Android版本中蓝牙简介
  6. 三相永磁同步电机无速度传感器控制仿真模型笔记
  7. JAVA RedisTemplate实现(加锁/解锁) 解决高并发问题
  8. 附上windebug常用调试命令
  9. 共筑数字化未来,金山办公携手华为云完成文档中心和GaussDB适配
  10. Integer类型巨坑