네트워크24 네트워크란? ip란? 서브넷마스크란? 컴퓨터들이 통신 기술을 이용하여 그물망처럼 연결된 통신 이용 형태 LAN : 근거리 통신망, 로컬 영역 네트워크(영어: local area network, LAN), 구내 정보 통신망은 네트워크 매체를 이용하여 집, 사무실, 학교 등의 건물과 같은 가까운 지역을 한데 묶는 컴퓨터 네트워크이다. 광역 통신망(WAN)은 더 넓은 지역 범위를 아우를뿐 아니라 일반적으로 전용선 또한 동반하기도 한다.이더넷과 와이파이는 근거리 통신망에 사용하기 위해 흔히 쓰이는 기술 2가지이다. 역사적으로는 ARCNET, 토큰링, 애플토크 등의 기술이 사용되었다. 인터넷에 연결된 각 기기를 구별하기 위해 사용되는 고유한 번호 기존 ipv4 에서 ip주소가 모자라서 발전된 형태가 ipv6 ip 주소는 32자리 2진수로 구성되어 있.. 2023. 10. 15. 2.2 The Web and HTTP 2.2.1 Overview of HTTP The HyperText Transfer Protocol (HTTP), the Web’s application-layer protocol, is at the heart of the Web. HTTP is implemented in two programs: a client program and a server program. The client program and server program, executing on different end systems, talk to each other by exchanging HTTP messages A Web page (also called a document) consists of objects. An object is s.. 2023. 7. 19. 2.1.3 Transport Services Available to Applications Many networks, including the Internet, provide more than one transport-layer protocol. When you develop an application, you must choose one of the available transport-layer protocols The situation is similar to choosing either train or airplane transport for travel between two cities. We can broadly classify the possible services along four dimensions: reliable data transfer, throughput, timing,.. 2023. 7. 18. Chapter 2 Application Layer 2.1 Principles of Network Applications Thus, when developing your new application, you need to write software that will run on multiple end systems. Keep in mind that an application’s architecture is distinctly different from the network architecture From the application developer’s perspective, the network architecture is fixed and provides a specific set of services to applications. The applic.. 2023. 7. 15. 1.6 Networks Under Attack The Bad Guys Can Put Malware into Your Host Via the Internet Once malware infects our device it can do all kinds of devious things, including deleting our files and installing spyware that collects our private information such as social security numbers, passwords, and keystrokes, and then sends this (over the Internet, of course!) back to the bad guys. Viruses are malware that require some form.. 2023. 7. 13. Protocol Layering each layer provides its service by (1) performing certain actions within that layer and by (2) using the services of the layer directly below it. The application layer is where network applications and their protocols reside, such as HTTP for web document transfer, SMTP for email transfer, and FTP for file transfer. It also includes the domain name system (DNS) for translating human-friendly nam.. 2023. 7. 13. 1.4.4 Throughput in Computer Networks The instantaneous throughput at any instant of time is the rate (in bits/sec) at which Host B is receiving the file. If the file consists of F bits and the transfer takes T seconds for Host B to receive all F bits the average throughput of the file transfer == F/T bits/sec. Rs < Rc : the bits pumped by the server will “flow” right through the router and arrive at the client at a rate of Rs bps, .. 2023. 6. 20. 1.4 Delay, Loss, and Throughput in Packet-Switched Networks 1.4.1 Overview of Delay in Packet-Switched Networks The most important of these delays are the nodal processing delay, queuing delay, transmission delay, and propagation delay; together, these delays accumulate to give a total nodal delay. Processing Delay The time required to examine the packet’s header and determine where to direct the packet is part of the processing delay. Queuing Delay At t.. 2023. 6. 11. 1.3.3 A Network of Networks (p.58~) The access ISP can provide either wired or wireless connectivity, using an array of access technologies including DSL, cable, FTTH, Wi-Fi, and cellular. access ISP does not have to be a telco or a cable company; instead it can be, for example, a university (providing Internet access to students, staff, and faculty), or a company (providing access for its employees). Network Structure 1, intercon.. 2023. 6. 11. Queuing Delays and Packet Loss p.51~ The output buffers play a key role in packet switching in addition to the store-and-forward delays, packets suffer output buffer queuing delays Forwarding Tables and Routing Protocols how does the router determine which link it should forward the packet onto? Packet forwarding is actually done in different ways in different types of computer networks. When a source end system wants to send a pac.. 2023. 6. 7. 이전 1 2 3 다음 728x90