Packets

1145
WiFi
WiFi

Increasingly, people access the Internet wirelessly, either through a laptop computer or from a mobile handheld device, such as an iPhone, Blackberry, or Google phone. Today, there are two common types of wireless Internet access. In a wireless LAN, wireless users

Tags lan, packets, transmission rate
2481
ISPs and Internet Backbones
ISPs and Internet Backbones

We saw earlier that end systems (user PCs, PDAs, Web servers, mail servers, and so on) connect into the Internet via a local ISP. The ISP can supply either wired or wireless connectivity, using an array access technologies including DSL, cable, FTTH, Wi-Fi, cellular, and WiMAX.

Tags end systems, transmission rate, packets
1321
The bad guys can attack servers and network infrastructure
The bad guys can attack servers and network infrastructure

A large class of security threats can be classified as denial-of-service (DoS) attacks. As the name suggests, a DoS attack renders a network, host, or other piece of infrastructure unusable by legitimate users. Web servers, e-mail servers, DNS servers (discussed in "Application

Tags computer network, packets, server
1665
The bad guys can sniff packets
The bad guys can sniff packets

Many users today access the Internet via wireless devices, such as WiFi-connected laptops or handheld devices with cellular Internet connections (covered in “Wireless and Mobile Networks”). While ubiquitous Internet access is very suitable and enables excellent new

Tags packet sniffer, lan, packets
805
The bad guys can masquerade as someone you trust
The bad guys can masquerade as someone you trust

It is amazingly easy (you will have the knowledge to do so shortly as you proceed through this text!) to create a packet with an arbitrary source address, packet content, and destination address and then transmit this hand-crafted packet into the Internet, which will dutifully

Tags ip spoofing, network application, packets
1437
Case Study: P2P Internet Telephony with Skype
Case Study: P2P Internet Telephony with Skype

Skype is an immensely popular P2P application, often with seven or eight million users connected to it at any one time. Besides providing PC-to-PC Internet telephony service, Skype offers PC-to-phone telephony service, phone-to-PC telephony service, and PC-to-PC video

Tags nodes, relays, router, peers, packets, p2p application, protocol
1012
Overview of the Transport Layer in the Internet
Overview of the Transport Layer in the Internet

Recollect that the internet, and more commonly a TCP/IP network, makes available two distinct transport-layer protocols to the application layer. One of these protocols is UDP (User Datagram Protocol), which provides an unreliable, connectionless service to the invoking

Tags application layer, udp, tcp, network application, sockets, datagram, packets, segments
5716
Go-Back-N (GBN)
Go-Back-N (GBN)

In a Go-Back-N (GBN) protocol, the sender is allowed to transmit several packets (when available) without waiting for an acknowledgment, but is constrained to have no more than some maximum allowable number, N, of unacknowledged packets in the pipeline. We describe the

Tags packets, gbn protocol, variables, semaphore, checksums
13065
Selective Repeat (SR)
Selective Repeat (SR)

The GBN protocol allows the sender to potentially "fill the pipeline" in Pipelined Reliable Data Transfer Protocols Figure 2 with packets, therefore avoiding the channel utilization problems we noted with stop-and-wait protocols. There are, on the other hand, scenarios in which

Tags packets, gbn protocol, pipeline, retransmission, sr receiver, sequence numbers
Page 0 of 1 « Previous 1 Next »

Copy Right

The contents available on this website are copyrighted by TechPlus unless otherwise indicated. All rights are reserved by TechPlus, and content may not be reproduced, published, or transferred in any form or by any means, except with the prior written permission of TechPlus.