Skip to content

Chapter 1 Introduction

Chapter 1

1.1: Person to person communication, Electronic Commerce, The internet of things

1.1.1 Person to person communication(人和人之间的交流):

  • Instant messaging

即时消息

  • Allows two people to type messages at each other in real time

    允许两个人实时向对方发送信息

  • Twitter multi-persion messaging service

Twitter多人消息服务

  • Allows people to send short messages to their circle of friends or other followers or the whole word.

    允许人们向他们的朋友圈或其他追随者或整个世界发送短信

  • Social network applicants

社交网络应用

  • Information flow driven by the relationships that people declare between each other.

    由人们之间声明的关系驱动的信息流

  • Wiki content is a collaborative Web site the members of community edit.

Wiki内容是一个由网站的成员进行社区编辑的协作式网站

1.1.2 Electronic Commerce

  • Online shopping and financial institution transactions follow client-server model

网上购物和金融机构交易遵循客户-服务器模式

  • Online auctions follow peer-to-peer model

在线拍卖遵循点对点模式

  • Consumers act as buyers and sellers

    消费者既是买家又是卖家

  • Central server holds the database of products for sale

    中央服务器保存待售产品的数据库

Tag Full name Example
B2C Bussiness-to-consumer Ordering books online
B2B Bussiness-to-business Car manufacturer ordering tires from a supplier
G2C Government-to-consumer Government distributing tax forms electronically
C2C Consumer-to-consumer Auctioning second-hand products online
P2P Peer-to-peer Music or file sharing: Skype

Some forms of e-commerce have acquired little tags based on the fact that "to" and "2" are pronounced the same.

1.1.3 The Internet of things

  • Ubiquitous computing

无处不在的计算

  • Computing embedded in everyday life

    计算嵌入日常生活

  • Home security systems wired with door and window sensors

    装有门窗传感器的家庭安全系统

  • Sensors folded into a smart home monitor

    可折叠成智能家居监视器的传感器

  • Smart refrigerators

    智能冰箱

  • IoT (Internet of Things)

IoT(物联网)

  • Sensing and communication take place over the Internet

    传感和通信通过互联网进行

  • Poised to connect every electronic device to the Internet

    准备将所有电子设备连接到互联网

  • Power-line networks

电源网络

  • Send information throughout the house over the electric wires

    通过电线将信息传送到整个房子

1.3: PAN, LAN, MAN, WAN

1.3.1 PAN

image-20230920172059235

PANs (Personal Area Networks) let devices communicate over the range of a person. Bluetooth is a short-range wireless network used to connect components without wires.

PANs (个人区域网络) 让设备在一个人的范围内进行通信。蓝牙(Bluetooth)是一种短距离无线网络,用于在没有电线的情况下连接组件。

1.3.2 LAN

image-20230920172200123

The configuration on the left represents a wireless 802.11 network. The configuration on the right represents a wired switched Ethernet network.

左边的配置表示无线802.11网络。右边的配置代表一个有线交换式以太网.

1.3.3 MAN

image-20230920172430305

A MAN (metropolitan area network) where both television signals and the Internet are being fed into the centralized cable head-end (or cable modem termination system) for subsequent distribution to people’s homes.

城域网一种城域网,电视信号和因特网都被送入集中的电缆头端(或电缆调制解调器终端系统),以便随后分配到人们的家中.

1.3.4 WAN

image-20230920172508404

This wide area network illustrates how hosts in Perth, Brisbane, and Melbourne can communicate using leased lines.

这个广域网展示了珀斯、布里斯班和墨尔本的主机如何使用租用线路进行通信.

image-20230920172608842

This wide area network illustrates how hosts in Perth, Brisbane, and Melbourne can communicate via the Internet.

这个广域网展示了珀斯、布里斯班和墨尔本的主机如何通过互联网进行通信。

By using Internet connectivity instead of leasing dedicated transmission lines to connect offices, the wide area network (WAN) connections can be made between the offices as virtual links using the underlying capacity of the Internet.

通过使用因特网连接而不是租用专用传输线路来连接办公室,广域网(WAN)连接可以在办公室之间作为虚拟链路使用因特网的基础能力。

image-20230920172725853

This wide area network illustrates how hosts in Perth, Brisbane, and Melbourne can communicate via an ISP.

这个广域网展示了珀斯、布里斯班和墨尔本的主机如何通过ISP进行通信。

By using a network that is operated by a commercial Internet service provider (ISP), the wide area network (WAN) connections can be made between the offices. This type of set-up may help reduce performance degradation issues that may be seen when connecting over the Internet.

通过使用由商业互联网服务提供商(ISP)运营的网络,可以在办公室之间建立广域网(WAN)连接。这种类型的设置可能有助于减少连接互联网时可能出现的性能下降问题。

1.4: ARPANET, NSFNET, Mobile Network Architecture

1.4.1 ARPANET

image-20230920174210403

The original ARPANET software was split into two parts: subnet and host. The subnet software consisted of the IMP end of the host-IMP connection, the IMP-IMP protocol, and a source IMP to destination IMP protocol designed to improve reliability.

最初的ARPANET软件被分成两个部分:子网和主机。子网软件由主机-IMP连接的IMP端、IMP-IMP协议和旨在提高可靠性的源IMP到目的IMP协议组成.

image-20230920174328131

Growth of the number of nodes on ARPANET. (a) December 1969. (b) July 1970. (c) March 1971. (d) April 1972. (e) September 1972.

1.4.2 NSFNET

image-20230920174405151

NSFNET was a backbone network designed to be a successor to the ARPANET that would be open to all university research groups, allowing them to communicate without having to contract with the Department of Defense.

NSFNET是一个骨干网络,旨在成为阿帕网的继承者,该网络将向所有大学研究小组开放,允许他们不必与国防部签订合同就可以进行交流。

1.4.3 Mobile Network Architecture

image-20230920174640088

The architecture of the mobile phone network has several parts.

移动电话网络的体系结构由几个部分组成.

image-20230920174722039

When a user moves out of the range of one cellular base station and into the range of another one, the flow of data must be re-routed from the old to the new cell base station.

当用户移动出一个蜂窝基站的范围,进入另一个蜂窝基站的范围时,数据流必须从旧的蜂窝基站重新路由到新的蜂窝基站.

  • Packet switching comes from the Internet community

分组交换起源于Internet社区

  • Connectionless networks

    无连接网络

  • Every packet is routed independently

    每个分组都是独立路由的

  • If some routers go down during a session, no harm will be done as long as the system can dynamically reconfigure itself

    如果某些路由器在会话期间发生故障,只要系统能够动态地重新配置自己,就不会造成任何损害

  • Circuit switching comes from telephone companies

电路交换来自电话公司

  • Connection-oriented networks

    面向连接的网络

  • Caller must dial the called party’s number and wait for a connection before talking or sending data

    在通话或发送数据之前,主叫方必须拨打被叫号码并等待连接

  • Route maintained until call is terminated

    路由保持,直到呼叫终止

  • Can support quality of service more easily

    能否更容易地支持服务质量

  • First-generation mobile phone systems

第一代移动电话系统

  • Transmitted voice calls as continuously varying (analog) signals

    传输的语音呼叫为连续变化的(模拟)信号

  • AMPS (Advanced Mobile Phone System)

    AMPS(高级移动电话系统)

  • Second-generation (2G) mobile phone systems

第二代(2G)移动电话系统

  • Transmitted voice calls in digital form to increase capacity, improve security, and offer text messaging

    以数字形式传输语音通话,以增加容量,提高安全性,并提供文本信息

  • GSM (Global System for Mobile communications)

    全球移动通信系统

  • Third generation (3G) offer digital voice and broadband digital data services

第三代(3G)提供数字语音和宽带数字数据服务

  • Spectrum scarcity led to today’s cellular network design

频谱稀缺导致了今天的蜂窝网络设计

image-20230920175632169

To manage the radio interference between users, the coverage area is divided into cells.

为管理用户间的无线电干扰,将覆盖区域划分为小区。

  • 4G

  • Later 4G known as LTE (Long Term Evolution) technology

    后来的4G被称为LTE(长期演进)技术

  • Offers faster speeds

    提供更快的速度

  • Emerged in the late 2000s

    出现于2000年代末

  • Quickly became the predominant mode of mobile Internet access in the late 2000s

    在2000年代末迅速成为移动互联网访问的主要模式

  • Outpacing competitors like 802.16 (WiMiMax)

    超越802.16 (WiMiMax)等竞争对手

  • 5G technologies are promising faster speeds

5G技术有望实现更快的速度

  • Up to 10 Gbps

    高达10 Gbps

  • Set for large-scale deployment in the early 2020s

    将在本世纪20年代初大规模部署

  • Main distinction: frequency spectrum they rely on

主要区别:它们所依赖的频谱

1.5: Design goals, Connections and reliability

1.5.1 Design goals

  • Reliability 可靠性

  • Make a network operate correctly even though it is comprised of a collection of components that are themselves unreliable

    使网络正确地运行,即使它是由一组本身不可靠的组件组成的

    • Error detection finds errors in received information

    错误检测发现接收到的信息存在错误

    • Error correction corrects a message by recovering the possibly incorrect bits

    错误纠正通过恢复可能不正确的位来纠正消息

  • Find a working path through a network using routing

    使用路由找到通过网络的工作路径

    • Routing allows network to automatically make the decision

    路由允许网络自动做出决策

  • Resource allocation 资源分配

  • Scalable designs continue to work well when network gets large

    当网络变得越来越大时,可扩展的设计仍然可以很好地工作

  • Statistical multiplexing: sharing based on the statistics of demand

    统计复用:根据需求的统计进行共享

  • An allocation problem that occurs at every level

每个层次上都存在的分配问题

  • Keeping a fast sender from swamping a slow receiver with data

    避免快速的发送端用数据淹没慢速的接收端

  • Use flow control

    使用流程控制

  • Congestion problem

拥塞问题

  • Occurs when too many computers want to send too much traffic, and the network cannot deliver it all

    当太多计算机想要发送太多流量,而网络无法全部传输时发生

  • Quality of service reconciles competing demands

服务质量协调相互竞争的需求

  • Evolvability 可发展性

  • Design issue concerns the evolution of the network

    设计问题涉及网络的演化

  • Over time, networks grow larger and new designs emerge that need to be connected to the existing network

    随着时间的推移,网络变得越来越大,新的设计需要连接到现有的网络

  • Use protocol layering structuring mechanism to support change by dividing the overall problem and hiding implementation details

    通过划分整体问题并隐藏实现细节,使用协议分层结构机制来支持更改

  • Use addressing or naming mechanism to identify the senders and receivers involved in a particular message

    使用寻址或命名机制来识别特定消息中涉及的发送者和接收者

  • Different network technologies often have different limitations

    不同的网络技术通常有不同的局限性

  • Overall topic is called internetworking

    总体主题是“网络互联”

  • Security

  • Confidentiality mechanisms defend against eavesdropping on communications

    保密机制可以防止通信被窃听

  • Authentication mechanisms prevent someone from impersonating someone else

    身份验证机制可以防止冒充他人

  • Integrity mechanisms prevent surreptitious changes to messages

    完整性机制可以防止对消息的秘密更改

1.5.2 Connections and Reliability

  • Connection-oriented service

面向连接的服务

  • Modeled after the telephone system

    模仿电话系统

  • Service user first establishes a connection, uses the connection, and then releases the connection

    服务用户首先建立连接,使用连接,然后释放连接

  • Can conduct a negotiation about the parameters to be used

    可以协商要使用的参数

  • Connectionless service

无连接服务

  • Modeled after the postal system

    模仿邮政系统

  • Packet is a message at the network layer

    包是网络层的消息

  • Store-and-forward switching: intermediate nodes receive a message in full before sending it on to the next node

    存储转发交换:中间节点在将消息发送给下一个节点之前完整地接收消息

  • Cut-through switching: transmission of a message at a node starts before it is completely received by the node

    直通切换(Cut-through switching):在消息被节点完全接收之前,该节点就开始传输消息

  • Datagram service: Unreliable (not acknowledged) connectionless service

    数据报服务:不可靠(未得到确认)的无连接服务

  • Reliability characterizes connection-oriented and connectionless services

可靠性是面向连接和无连接服务的特征

image-20230920192145819

Six common connection-oriented and connectionless services.

六种常见的面向连接和无连接服务.

1.6: OSI reference model, TCP/IP reference model, critique of the both models

  • The OSI Reference Model

OSI参考模型

  • The TCP/IP Reference Model

TCP/IP参考模型

  • The Link Layer

    链接层

  • The Internet Layer

    互联网层

  • The Transport Layer

    传输层

  • The Application Layer

    应用层

  • A critique of the OSI model and protocols

OSI模型和协议的评论

  • Critique of the TCP/IP reference model and protocols

TCP/IP参考模型和协议的评论

  • The model used in this book

本书中使用的模型

1.6.1 OSI reference model

  • Principles for the seven layers

这7层的原则

  • Layers created for different abstractions

    为不同的抽象创建层

  • Each layer performs well-defined function

    每一层都执行定义良好的功能

  • Function of layer chosen with definition of international standard protocols in mind

    选择层的功能时考虑到国际标准协议的定义

  • Minimize information flow across interfaces between boundaries

    最小化边界之间的信息流动

  • Number of layers should be optimum

    层数应该是最优的

  • Three concepts central to the OSI model:

OSI模型的三个核心概念

  • Services 服务
  • Interfaces 接口
  • Protocols 协议

image-20230920194759612

The OSI model has seven layers.

OSI模型有7层.

1.6.2 TCP/IP reference model

  • The Link Layer

链接层

  • Lowest layer in the model

    模型的最底层

  • Describes what links must do to meet the needs of this connectionless internet layer

    描述了链路必须做什么才能满足无连接的internet层的需求

  • The Internet Layer

互联网层

  • Permits hosts to inject packets into any network and have them travel independently to the destination

    允许主机向任何网络注入数据包,并让它们独立地到达目的地

  • Defines an official packet format and protocol called IP (Internet Protocol)

    定义了一种称为IP (Internet protocol)的官方数据包格式和协议

  • Defines a companion protocol called ICMP (Internet Control Message Protocol) that helps IP function

    定义了一个名为ICMP (Internet Control Message protocol)的伴生协议,帮助实现IP功能

  • The Transport Layer

传输层

  • The layer above the internet layer in the TCP/IP model

    TCP/IP模型中高于internet层的一层

  • Uses two end-to-end transport protocols

    使用两个端到端传输协议

  • TCP (Transmission Control Protocol)

TCP(传输控制协议)

  • UDP (User Datagram Protocol)

UDP(用户数据报协议)

  • The Application Layer

应用层

  • Contains all the higher-level protocols

    包含所有高级协议

image-20230920194942520

The TCP/IP layers loosely align with the OSI model.

TCP/IP层松散地与OSI模型保持一致.

image-20230920195003023

The relation of IP, TCP, and UDP protocols are illustrated. We will study these.

述了IP、TCP和UDP协议之间的关系。我们会研究这些.

1.6.3 critique of the both models

  • Bad timing

糟糕的时机

  • Competing TCP/IP protocols were already in widespread use

    相互竞争的TCP/IP协议已经被广泛使用

  • Bad design

糟糕的设计

  • Both the model and the protocols are flawed

    模型和协议都有缺陷

  • Bad implementations

糟糕的实现

  • Initial implementations were huge, unwieldy, and slow

    最初的实现是巨大的,笨重的,缓慢的

  • Bad politics

糟糕的政治

  • Widely thought to be the creature of the European telecommunication ministries, the European Community, and later the U.S. Government

    被广泛认为是欧洲电信部门、欧洲共同体以及后来的美国政府的产物

image-20230920195123783

It is essential that the standards be written in the trough in between the two ‘‘elephants.’’ If they are written too early (before the research results are well established), the subject may still be poorly understood; the result is a bad standard. If they are written too late, so many companies may have already made major investments in different ways of doing things that the standards are effectively ignored. If the interval between the two elephants is very short (because everyone is in a hurry to get started), the people developing the standards may get crushed.

重要的是,这些标准应该写在两个“大象”之间的槽中。“如果他们写得太早(在研究结果得到充分确立之前),这个主题可能仍然不被理解;结果是一个糟糕的标准。如果制定得太晚,那么许多公司可能已经在不同的做事方式上进行了大量投资,而这些标准实际上被忽略了。如果两头大象之间的时间间隔很短(因为每个人都急于开始),开发标准的人可能会感到崩溃。

  • Model does not clearly distinguish the concepts of services, interfaces, and protocols

Model没有明确区分服务、接口和协议的概念

  • Model is not at all general

Model一点也不通用

  • Poorly suited to describing any other protocol stack

    不适合描述任何其他协议栈

  • The link layer is not really a layer at all in the normal sense of the term

链接层根本不是通常意义上的层

  • Model does not distinguish between the physical and data link layers

Model不区分物理层和数据链路层

  • Other protocol implementations were distributed free

其他协议实现是免费发布的

政策、法律和社会问题

  • Online speech

在线演讲

  • Communications Decency Act protects some platforms from federal criminal prosecution

    《通信体面法》保护一些平台免受联邦刑事起诉

  • DMCA takedown notices (after the Digital Millennium Copyright Act) threaten legal action

    DMCA下架通知(在Digital Millennium Copyright Act之后)威胁要采取法律行动

  • Net neutrality

网络中立性

  • ISPs should provide equal quality of service to a given type of application traffic, regardless of who is sending that content

    无论谁发送内容,isp都应该为给定类型的应用流量提供同等质量的服务

  • No blocking, no throttling, no paid prioritization, transparency

    无阻塞,无节流,无付费优先级,透明

  • Does not prevent an ISP from prioritizing any traffic

    不阻止ISP对任何流量进行优先级设置

  • Zero rating: ISP might charge its subscribers according to data usage but grant an exemption for a particular service

    零费率:ISP可能会根据用户的数据使用情况收取费用,但对特定服务给予豁免

  • Online speech

在线演讲

  • Communications Decency Act protects some platforms from federal criminal prosecution

    《通信体面法》保护一些平台免受联邦刑事起诉

  • DMCA takedown notices (after the Digital Millennium Copyright Act) threaten legal action

    DMCA下架通知(在Digital Millennium Copyright Act之后)威胁要采取法律行动

  • Security

安全

  • DDoS (Distributed Denial of Service) attack

    DDoS(分布式拒绝服务)攻击

  • Botnets

    僵尸网络

  • Spam email

    垃圾邮件

  • Phishing

    钓鱼

  • Privacy

隐私

  • Profiling and tracking users by collecting data about their network behavior over time

    通过收集用户一段时间内的网络行为数据来分析和跟踪用户

  • Storing cookies in Web browser

    在浏览器中存储cookie

  • Browser fingerprinting

    浏览器指纹

  • Mobile services location privacy

    移动服务位置隐私

  • Disinformation

造谣

  • Ill-considered, misleading, or downright wrong information

    欠考虑的、误导性的或完全错误的信息

  • Fake news

    假新闻

  • Challenges

    挑战

    • How does one define disinformation in the first place?

    首先如何定义虚假信息?

    • Can disinformation be reliably detected?

    可以可靠地检测虚假信息吗?

    • What should a network or platform operator do about it once it is detected

    一旦检测到它,网络或平台运营商应该做什么