%%

{"created":"2023-05-08T10:15:34.739Z","updated":"2023-05-08T10:15:34.739Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":50897,"end":51227},{"type":"TextQuoteSelector","exact":"Internet ­standards are developed by the Internet Engineering Task Force(IETF) [IETF 2016]. The IETF standards documents are called requests for comments (RFCs). RFCsstarted out as general requests for comments (hence the name) to resolve network and protocol designproblems that faced the precursor to the Internet [Allman 2011].","prefix":" wherestandards come into play. ","suffix":" RFCs tend to be quite technical"}]}]}

%% * Internet ­standards are developed by the Internet Engineering Task Force(IETF) [IETF 2016]. The IETF standards documents are called requests for comments (RFCs). RFCsstarted out as general requests for comments (hence the name) to resolve network and protocol designproblems that faced the precursor to the Internet [Allman 2011]. * show annotation

^88vkgagkxv7

%%

{"created":"2023-05-08T10:15:41.970Z","updated":"2023-05-08T10:15:41.970Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":51718,"end":52303},{"type":"TextQuoteSelector","exact":"But we can alsodescribe the Internet from an entirely different angle—namely, as an infrastructure that providesservices to applications. In addition to traditional applications such as e-mail and Web surfing, Internetapplications include mobile smartphone and tablet applications, including Internet messaging, mappingwith real-time road-traffic information, music streaming from the cloud, movie and television streaming,online social networks, video conferencing, multi-person games, and location-based recommendationsystems. The applications are said to be distributed applications","prefix":"eces that make up the Internet. ","suffix":", since they involve multiple en"}]}]}

%% * But we can alsodescribe the Internet from an entirely different angle—namely, as an infrastructure that providesservices to applications. In addition to traditional applications such as e-mail and Web surfing, Internetapplications include mobile smartphone and tablet applications, including Internet messaging, mappingwith real-time road-traffic information, music streaming from the cloud, movie and television streaming,online social networks, video conferencing, multi-person games, and location-based recommendationsystems. The applications are said to be distributed applications * show annotation

^5siqr9a9n0x

%%

{"created":"2023-05-08T10:20:47.519Z","updated":"2023-05-08T10:20:47.519Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":53601,"end":53986},{"type":"TextQuoteSelector","exact":"End systems attached to the Internet provide a socket interface that specifies how a program runningon one end system asks the Internet infrastructure to deliver data to a specific destination programrunning on another end system. This Internet socket interface is a set of rules that the sending programmust follow so that the Internet can deliver the data to the destination program.","prefix":"m running on another end system?","suffix":" We’ll discuss theInternet socke"}]}]}

%% * End systems attached to the Internet provide a socket interface that specifies how a program runningon one end system asks the Internet infrastructure to deliver data to a specific destination programrunning on another end system. This Internet socket interface is a set of rules that the sending programmust follow so that the Internet can deliver the data to the destination program. * show annotation

^zs4cu909d3p

%%

{"created":"2023-05-08T10:26:09.570Z","updated":"2023-05-08T10:26:09.570Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":59343,"end":59453},{"type":"TextQuoteSelector","exact":"All activity in the Internet that involves twoor more communicating remote entities is governed by a protocol.","prefix":" other network-capable device). ","suffix":" For example, hardware-implement"}]}]}

%% * All activity in the Internet that involves twoor more communicating remote entities is governed by a protocol. * show annotation

^qnvokvgz09

%%

{"created":"2023-05-08T10:27:17.470Z","updated":"2023-05-08T10:27:17.470Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":60818,"end":61018},{"type":"TextQuoteSelector","exact":"A protocol defines the format and the order of messages exchanged between two or morecommunicating entities, as well as the actions taken on the transmission and/or receipt of a messageor other event.","prefix":"defining elements of a protocol:","suffix":"The Internet, and computer netwo"}]}]}

%% * A protocol defines the format and the order of messages exchanged between two or morecommunicating entities, as well as the actions taken on the transmission and/or receipt of a messageor other event. * show annotation

^l8e43lnp1fo

%%

{"created":"2023-05-08T11:01:07.499Z","updated":"2023-05-08T11:01:07.499Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":155999,"end":156338},{"type":"TextQuoteSelector","exact":"Each layer provides its service by (1) performing certain actions within that layer (forexample, at the gate layer, loading and unloading people from an airplane) and by (2) using the servicesof the layer directly below it (for example, in the gate layer, using the runway-to-runway passengertransfer service of the takeoff/landing layer).","prefix":" and their bags isaccomplished. ","suffix":"A layered architecture allows us"}]}]}

%% * Each layer provides its service by (1) performing certain actions within that layer (forexample, at the gate layer, loading and unloading people from an airplane) and by (2) using the servicesof the layer directly below it (for example, in the gate layer, using the runway-to-runway passengertransfer service of the takeoff/landing layer). * show annotation

^h8pk1940el

%%

{"created":"2023-05-08T11:02:07.823Z","updated":"2023-05-08T11:02:07.823Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":156607,"end":156814},{"type":"TextQuoteSelector","exact":"As long as the layer provides the sameservice to the layer above it, and uses the same services from the layer below it, the remainder of thesystem remains unchanged when a layer’s implementation is changed.","prefix":" service provided by the layer. ","suffix":" (Note that changing theimplemen"}]}]}

%% * As long as the layer provides the sameservice to the layer above it, and uses the same services from the layer below it, the remainder of thesystem remains unchanged when a layer’s implementation is changed. * show annotation

^3usjrblcns7

%%

{"created":"2023-05-08T11:02:38.183Z","updated":"2023-05-08T11:02:38.183Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":157719,"end":157761},{"type":"TextQuoteSelector","exact":"Each protocol belongs to one of the layers","prefix":"lement the protocols—in layers. ","suffix":", just aseach function in the ai"}]}]}

%% * Each protocol belongs to one of the layers * show annotation

^ibfgw28kcbm

%%

{"created":"2023-05-08T11:07:33.163Z","updated":"2023-05-08T11:07:33.163Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":157966,"end":158153},{"type":"TextQuoteSelector","exact":"Just as inthe case of our airline example, each layer provides its service by (1) performing certain actions withinthat layer and by (2) using the services of the layer directly below it.","prefix":"alled service model of a layer. ","suffix":" For example, the services provi"}]}]}

%% * Just as inthe case of our airline example, each layer provides its service by (1) performing certain actions withinthat layer and by (2) using the services of the layer directly below it. * show annotation

^1ergil5prdl

%%

{"created":"2023-05-08T11:19:25.399Z","updated":"2023-05-08T11:19:25.399Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":158452,"end":158545},{"type":"TextQuoteSelector","exact":"A protocol layer can be implemented in software, in hardware, or in a combination of the two.","prefix":"ct and retransmit lost messages.","suffix":"Application-layer protocols—such"}]}]}

%% * A protocol layer can be implemented in software, in hardware, or in a combination of the two. * show annotation

^z3qxjmxoq2

%%

{"created":"2023-05-08T11:19:44.848Z","updated":"2023-05-08T11:19:44.848Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":158452,"end":159012},{"type":"TextQuoteSelector","exact":"A protocol layer can be implemented in software, in hardware, or in a combination of the two.Application-layer protocols—such as HTTP and SMTP—are almost always implemented in software inthe end systems; so are transport-layer protocols. Because the physical layer and data link layers areresponsible for handling communication over a specific link, they are typically implemented in a networkinterface card (for example, Ethernet or WiFi interface cards) associated with a given link. The networklayer is often a mixed implementation of hardware and software.","prefix":"ct and retransmit lost messages.","suffix":" Also note that just as the func"}]}]}

%% * A protocol layer can be implemented in software, in hardware, or in a combination of the two.Application-layer protocols—such as HTTP and SMTP—are almost always implemented in software inthe end systems; so are transport-layer protocols. Because the physical layer and data link layers areresponsible for handling communication over a specific link, they are typically implemented in a networkinterface card (for example, Ethernet or WiFi interface cards) associated with a given link. The networklayer is often a mixed implementation of hardware and software. * show annotation

^tsoy7llzo1d

%%

{"created":"2023-05-08T11:20:20.972Z","updated":"2023-05-08T11:20:20.972Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":159720,"end":159812},{"type":"TextQuoteSelector","exact":"One potential drawback of layering is that one layer mayduplicate lower-layer functionality.","prefix":"sed to layering [Wakeman 1992]. ","suffix":" For example, many protocol stac"}]}]}

%% * One potential drawback of layering is that one layer mayduplicate lower-layer functionality. * show annotation

^dxacsxj848

%%

{"created":"2023-05-08T11:20:29.644Z","updated":"2023-05-08T11:20:29.644Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":159994,"end":160195},{"type":"TextQuoteSelector","exact":"A second potential drawback is that functionality atone layer may need information (for example, a timestamp value) that is present only in another layer;this violates the goal of separation of layers.","prefix":" basis and an end-to-end basis. ","suffix":"When taken together, the protoco"}]}]}

%% * A second potential drawback is that functionality atone layer may need information (for example, a timestamp value) that is present only in another layer;this violates the goal of separation of layers. * show annotation

^g2x6dm8590s

%%

{"created":"2023-05-08T11:20:43.489Z","updated":"2023-05-08T11:20:43.489Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":160195,"end":160397},{"type":"TextQuoteSelector","exact":"When taken together, the protocols of the various layers are called the protocol stack. The Internetprotocol stack consists of five layers: the physical, link, network, transport, and application layers","prefix":"he goal of separation of layers.","suffix":", asshown in Figure 1.23(a). If "}]}]}

%% * When taken together, the protocols of the various layers are called the protocol stack. The Internetprotocol stack consists of five layers: the physical, link, network, transport, and application layers * show annotation

^s0eldrhbdr

%%

{"created":"2023-05-08T11:21:00.054Z","updated":"2023-05-08T11:21:00.054Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":160775,"end":161045},{"type":"TextQuoteSelector","exact":"TheInternet’s application layer includes many protocols, such as the HTTP protocol (which provides for Webdocument request and transfer), SMTP (which provides for the transfer of e-mail messages), and FTP(which provides for the transfer of files between two end systems)","prefix":"ication-layer protocols reside. ","suffix":". We’ll see that certain network"}]}]}

%% * TheInternet’s application layer includes many protocols, such as the HTTP protocol (which provides for Webdocument request and transfer), SMTP (which provides for the transfer of e-mail messages), and FTP(which provides for the transfer of files between two end systems) * show annotation

^sadxi2vlxah

%%

{"created":"2023-05-08T11:22:04.124Z","updated":"2023-05-08T11:22:04.124Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":161820,"end":161881},{"type":"TextQuoteSelector","exact":"Inthe Internet there are two transport protocols, TCP and UDP","prefix":" between application endpoints. ","suffix":", either of which can transport "}]}]}

%% * Inthe Internet there are two transport protocols, TCP and UDP * show annotation

^apagub9v7sr

%%

{"created":"2023-05-08T11:22:16.580Z","updated":"2023-05-08T11:22:16.580Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":161941,"end":162250},{"type":"TextQuoteSelector","exact":"TCP provides a ­connection-oriented service to its applications. This service includesguaranteed delivery of application-layer messages to the destination and flow control (that is,sender/receiver speed matching). TCP also breaks long messages into shorter ­segments and providesa congestion-control mechanism","prefix":"ort application-layer messages. ","suffix":", so that a source throttles its"}]}]}

%% * TCP provides a ­connection-oriented service to its applications. This service includesguaranteed delivery of application-layer messages to the destination and flow control (that is,sender/receiver speed matching). TCP also breaks long messages into shorter ­segments and providesa congestion-control mechanism * show annotation

^xzdxy8ks88

%%

{"created":"2023-05-08T11:22:22.958Z","updated":"2023-05-08T11:22:22.958Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":162334,"end":162502},{"type":"TextQuoteSelector","exact":" UDP protocol provides a connectionless service to its applications. This is a no-frillsservice that provides no reliability, no flow control, and no congestion control","prefix":"hen the network iscongested. The","suffix":". In this book, we’ll refer toa "}]}]}

%% * UDP protocol provides a connectionless service to its applications. This is a no-frillsservice that provides no reliability, no flow control, and no congestion control * show annotation

^l7t0wsucbv

%%

{"created":"2023-05-08T11:22:42.172Z","updated":"2023-05-08T11:22:42.172Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":162598,"end":162702},{"type":"TextQuoteSelector","exact":"network layer is responsible for moving network-layer packets known as datagrams fromone host to another","prefix":"ent.Network LayerThe Internet’s ","suffix":". The Internet transport-layer p"}]}]}

%% * network layer is responsible for moving network-layer packets known as datagrams fromone host to another * show annotation

^3i8408vrs88

%%

{"created":"2023-05-08T11:23:02.894Z","updated":"2023-05-08T11:23:02.894Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":163046,"end":163110},{"type":"TextQuoteSelector","exact":"The Internet’s network layer includes the celebrated IP protocol","prefix":"t layer in the destination host.","suffix":", which defines the fields in th"}]}]}

%% * The Internet’s network layer includes the celebrated IP protocol * show annotation

^wxbnarxlsbp

%%

{"created":"2023-05-08T11:26:01.852Z","updated":"2023-05-08T11:26:01.852Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":165228,"end":165288},{"type":"TextQuoteSelector","exact":"In this book, we’ll refer to the link-layer packets asframes","prefix":"different link-layer protocols. ","suffix":".Physical LayerWhile the job of "}]}]}

%% * In this book, we’ll refer to the link-layer packets asframes * show annotation

^c0ae7ws88vr

%%

{"created":"2023-05-08T11:26:44.439Z","updated":"2023-05-08T11:26:44.439Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":165303,"end":165519},{"type":"TextQuoteSelector","exact":"While the job of the link layer is to move entire frames from one network element to an adjacent networkelement, the job of the physical layer is to move the individual bits within the frame from one node to thenext.","prefix":" packets asframes.Physical Layer","suffix":" The protocols in this layer are"}]}]}

%% * While the job of the link layer is to move entire frames from one network element to an adjacent networkelement, the job of the physical layer is to move the individual bits within the frame from one node to thenext. * show annotation

^pgqm8cqkew9

%%

{"created":"2023-05-08T11:27:10.641Z","updated":"2023-05-08T11:27:10.641Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":166062,"end":166258},{"type":"TextQuoteSelector","exact":"back in the late 1970s, the International Organization for Standardization(ISO) proposed that computer networks be organized around seven layers, called the Open SystemsInterconnection (OSI) model","prefix":"colstack around. In particular, ","suffix":" [ISO 2016]. The OSI model took "}]}]}

%% * back in the late 1970s, the International Organization for Standardization(ISO) proposed that computer networks be organized around seven layers, called the Open SystemsInterconnection (OSI) model * show annotation

^kasjpi7gkwm

%%

{"created":"2023-05-11T07:54:28.149Z","updated":"2023-05-11T07:54:28.149Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":242121,"end":242546},{"type":"TextQuoteSelector","exact":"you do notneed to write software that runs on network-core devices, such as routers or link-layer switches. Even ifyou wanted to write application software for these network-core devices, you wouldn’t be able to do so.As we learned in Chapter 1, and as shown earlier in Figure 1.24, network-core devices do not functionat the application layer but instead function at lower layers—specifically at the network layer and below.","prefix":", Java, or Python. Importantly, ","suffix":"This basic design—namely, confin"}]}]}

%% * you do notneed to write software that runs on network-core devices, such as routers or link-layer switches. Even ifyou wanted to write application software for these network-core devices, you wouldn’t be able to do so.As we learned in Chapter 1, and as shown earlier in Figure 1.24, network-core devices do not functionat the application layer but instead function at lower layers—specifically at the network layer and below. * show annotation

^4u3wnykjelc

%%

{"created":"2023-05-11T07:55:11.282Z","updated":"2023-05-11T07:55:11.282Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":243551,"end":243696},{"type":"TextQuoteSelector","exact":"two predominant architectural paradigms used inmodern network applications: the client-server architecture or the peer-to-peer (P2P) architecture","prefix":" will likely draw on one of the ","suffix":".In a client-server architecture"}]}]}

%% * two predominant architectural paradigms used inmodern network applications: the client-server architecture or the peer-to-peer (P2P) architecture * show annotation

^4fz7ngdd69j

%%

{"created":"2023-05-11T07:56:03.640Z","updated":"2023-05-11T07:56:03.640Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":243697,"end":243839},{"type":"TextQuoteSelector","exact":"In a client-server architecture, there is an always-on host, called the server, which services requestsfrom many other hosts, called clients. ","prefix":"peer-to-peer (P2P) architecture.","suffix":"A classic example is the Web app"}]}]}

%% * In a client-server architecture, there is an always-on host, called the server, which services requestsfrom many other hosts, called clients. * show annotation

^u4g5r53ymah

%%

{"created":"2023-05-11T07:56:29.770Z","updated":"2023-05-11T07:56:29.770Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":245817,"end":246131},{"type":"TextQuoteSelector","exact":"In a P2P architecture, there is minimal (or no) reliance on dedicated servers in data centers. Insteadthe application exploits direct communication between pairs of intermittently connected hosts, calledpeers. The peers are not owned by the service provider, but are instead desktops and laptops controlledby users","prefix":"ng data from their data centers.","suffix":", with most of thePietra Ferreir"}]}]}

%% * In a P2P architecture, there is minimal (or no) reliance on dedicated servers in data centers. Insteadthe application exploits direct communication between pairs of intermittently connected hosts, calledpeers. The peers are not owned by the service provider, but are instead desktops and laptops controlledby users * show annotation

^bk7sbehl9mg

%%

{"created":"2023-05-11T07:56:55.968Z","updated":"2023-05-11T07:56:55.968Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":246713,"end":246755},{"type":"TextQuoteSelector","exact":"someapplications have hybrid architectures","prefix":" Figure 2.2(b). We mention that ","suffix":", combining both client-server a"}]}]}

%% * someapplications have hybrid architectures * show annotation

^uhw4w5w96mq

%%

{"created":"2023-05-11T07:57:16.289Z","updated":"2023-05-11T07:57:16.289Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":247020,"end":247102},{"type":"TextQuoteSelector","exact":"One of the most compelling features of P2P architectures is their self-scalability","prefix":"g through intermediate servers).","suffix":". For example, in aP2P file-shar"}]}]}

%% * One of the most compelling features of P2P architectures is their self-scalability * show annotation

^anz7tmf6kl

%%

{"created":"2023-05-11T07:57:30.489Z","updated":"2023-05-11T07:57:30.489Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":247487,"end":247614},{"type":"TextQuoteSelector","exact":" However, P2P applications face challenges ofsecurity, performance, and reliability due to their highly decentralized structure","prefix":"erver designs with datacenters).","suffix":".2.1.2 Processes CommunicatingBe"}]}]}

%% * However, P2P applications face challenges ofsecurity, performance, and reliability due to their highly decentralized structure * show annotation

^ks8xjasyiyc

%%

{"created":"2023-05-11T07:58:51.915Z","updated":"2023-05-11T07:58:51.915Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":247840,"end":247975},{"type":"TextQuoteSelector","exact":"it isnot actually programs but processes that communicate. A process can be thought of as a program thatis running within an end system","prefix":"he jargon of operating systems, ","suffix":". When processes are running on "}]}]}

%% * it isnot actually programs but processes that communicate. A process can be thought of as a program thatis running within an end system * show annotation

^4mwj5ubdars

%%

{"created":"2023-05-11T07:59:06.568Z","updated":"2023-05-11T07:59:06.568Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":247977,"end":248063},{"type":"TextQuoteSelector","exact":"When processes are running on the same end system, they cancommunicate with each other","prefix":"s running within an end system. ","suffix":" with interprocess communication"}]}]}

%% * When processes are running on the same end system, they cancommunicate with each other * show annotation

^5hgxypoq14i

%%

{"created":"2023-05-11T08:00:07.275Z","updated":"2023-05-11T08:00:07.275Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":249919,"end":250213},{"type":"TextQuoteSelector","exact":"In the context of a communication session between a pair of processes, the process that initiates thecommunication (that is, initially contacts the other process at the beginning of the session) is labeledas the client. The process that waits to be contacted to begin the session is the server.","prefix":" and serverprocesses as follows:","suffix":"In the Web, a browser process in"}]}]}

%% * In the context of a communication session between a pair of processes, the process that initiates thecommunication (that is, initially contacts the other process at the beginning of the session) is labeledas the client. The process that waits to be contacted to begin the session is the server. * show annotation

^n0vpxdxv8p

%%

{"created":"2023-05-11T08:00:34.198Z","updated":"2023-05-11T08:00:34.198Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":251062,"end":251177},{"type":"TextQuoteSelector","exact":" A process sends messages into, and receives messages from, thenetwork through a software interface called a socket","prefix":"othrough the underlying network.","suffix":". Let’s consider an analogy to h"}]}]}

%% * A process sends messages into, and receives messages from, thenetwork through a software interface called a socket * show annotation

^vd6n8dr7u6

%%

{"created":"2023-05-11T08:00:49.404Z","updated":"2023-05-11T08:00:49.404Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":251248,"end":251324},{"type":"TextQuoteSelector","exact":" A process is analogous to a house and its socket is analogous to its door. ","prefix":"understandprocesses and sockets.","suffix":"Whena process wants to send a me"}]}]}

%% * A process is analogous to a house and its socket is analogous to its door. * show annotation

^b99j7zsgjx8

%%

{"created":"2023-05-11T08:01:52.408Z","updated":"2023-05-11T08:01:52.408Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":252022,"end":252185},{"type":"TextQuoteSelector","exact":"a socket is the interface between the application layer and thetransport layer within a host. It is also referred to as the Application Programming Interface (API)","prefix":"ocol.) As shown in this figure, ","suffix":"Pietra Ferreira22/09/2022, 12:32"}]}]}

%% * a socket is the interface between the application layer and thetransport layer within a host. It is also referred to as the Application Programming Interface (API) * show annotation

^kyy3qxw33g

%%

{"created":"2023-05-11T08:02:02.481Z","updated":"2023-05-11T08:02:02.481Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":252185,"end":252314},{"type":"TextQuoteSelector","exact":"between the application and the network, since the socket is the programming interface with whichnetwork applications are built. ","prefix":"tra Ferreira22/09/2022, 12:34:24","suffix":"The application developer has co"}]}]}

%% * between the application and the network, since the socket is the programming interface with whichnetwork applications are built. * show annotation

^kymhx3f3zdp

%%

{"created":"2023-05-11T08:04:08.243Z","updated":"2023-05-11T08:04:08.243Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":253826,"end":254091},{"type":"TextQuoteSelector","exact":"the sending process must also identify the receiving process (more specifically, the receivingsocket) running in the host. This information is needed because in general a host could be running manynetwork applications. A destination port number serves this purpose.","prefix":" to which a message isdestined, ","suffix":" Popular applications have beenP"}]}]}

%% * the sending process must also identify the receiving process (more specifically, the receivingsocket) running in the host. This information is needed because in general a host could be running manynetwork applications. A destination port number serves this purpose. * show annotation

^twoqsgghkl

%%

{"created":"2023-05-11T08:04:49.068Z","updated":"2023-05-11T08:04:49.068Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":255504,"end":255721},{"type":"TextQuoteSelector","exact":"What are the services that a transport-layer protocol can offer to applications invoking it? We canbroadly classify the possible services along four dimensions: reliable data transfer, throughput, timing,and security.","prefix":"ane offers shorter travel time.)","suffix":"Reliable Data TransferAs discuss"}]}]}

%% * What are the services that a transport-layer protocol can offer to applications invoking it? We canbroadly classify the possible services along four dimensions: reliable data transfer, throughput, timing,and security. * show annotation

^qdab6zubedp

%%

{"created":"2023-05-11T08:05:38.132Z","updated":"2023-05-11T08:05:38.132Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":257350,"end":257536},{"type":"TextQuoteSelector","exact":"throughput, which, in the context of acommunication session between two processes along a network path, is the rate at which the sendingprocess can deliver bits to the receiving process.","prefix":"oduced the concept of available ","suffix":" Because other sessions will be "}]}]}

%% * throughput, which, in the context of acommunication session between two processes along a network path, is the rate at which the sendingprocess can deliver bits to the receiving process. * show annotation

^7hoe9kxq4qu

%%

{"created":"2023-05-11T08:08:28.795Z","text":"- **Available throughput**: The rate at which data can be sent from one process to another process over a network.\n- **Guaranteed available throughput**: A service provided by a transport-layer protocol that ensures a specified minimum throughput rate for an application.\n- **Bandwidth-sensitive applications**: Applications that have specific throughput requirements and require a consistent and reliable throughput.\n- **Elastic applications**: Applications that can adapt to use as much or as little throughput as available, such as email, file transfer, and web transfers.\n- **Key challenge**: Multiple sessions sharing the network's bandwidth, causing available throughput to fluctuate with time.\n- **Benefit of guaranteed throughput**: Allows applications like Internet telephony to maintain a specific encoding and delivery rate, ensuring optimal performance.\n- **Adaptive coding techniques**: Some multimedia applications can adjust their coding rate to match the currently available throughput.\n- **Importance of throughput**: The saying that \"one cannot be too rich, too thin, or have too much throughput\" reflects the general desire for higher throughput in applications.","updated":"2023-05-11T08:08:28.795Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":257288,"end":259353},{"type":"TextQuoteSelector","exact":"ThroughputIn Chapter 1 we introduced the concept of available throughput, which, in the context of acommunication session between two processes along a network path, is the rate at which the sendingprocess can deliver bits to the receiving process. Because other sessions will be sharing the bandwidthalong the network path, and because these other sessions will be coming and going, the availablethroughput can fluctuate with time. These observations lead to another natural service that a transport-layer protocol could provide, namely, guaranteed available throughput at some specified rate. With sucha service, the application could request a guaranteed throughput of r bits/sec, and the transport protocolwould then ensure that the available throughput is always at least r bits/sec. Such a guaranteedthroughput service would appeal to many applications. For example, if an Internet telephony applicationencodes voice at 32 kbps, it needs to send data into the network and have data delivered to thereceiving application at this rate. If the transport protocol cannot provide this throughput, the applicationwould need to encode at a lower rate (and receive enough throughput to sustain this lower coding rate)or may have to give up, since receiving, say, half of the needed throughput is of little or no use to thisInternet telephony application. Applications that have throughput requirements are said to bebandwidth-sensitive applications. Many current multimedia applications are bandwidth sensitive,although some multimedia applications may use adaptive coding techniques to encode digitized voice orvideo at a rate that matches the currently available throughput.While bandwidth-sensitive applications have specific throughput requirements, elastic applications canmake use of as much, or as little, throughput as happens to be available. Electronic mail, file transfer,and Web transfers are all elastic applications. Of course, the more throughput, the better. There’sanadage that says that one cannot be too rich, too thin, or have too much throughput!","prefix":"/video—not a crucial impairment.","suffix":"TimingA transport-layer protocol"}]}]}

%% * ThroughputIn Chapter 1 we introduced the concept of available throughput, which, in the context of acommunication session between two processes along a network path, is the rate at which the sendingprocess can deliver bits to the receiving process. Because other sessions will be sharing the bandwidthalong the network path, and because these other sessions will be coming and going, the availablethroughput can fluctuate with time. These observations lead to another natural service that a transport-layer protocol could provide, namely, guaranteed available throughput at some specified rate. With sucha service, the application could request a guaranteed throughput of r bits/sec, and the transport protocolwould then ensure that the available throughput is always at least r bits/sec. Such a guaranteedthroughput service would appeal to many applications. For example, if an Internet telephony applicationencodes voice at 32 kbps, it needs to send data into the network and have data delivered to thereceiving application at this rate. If the transport protocol cannot provide this throughput, the applicationwould need to encode at a lower rate (and receive enough throughput to sustain this lower coding rate)or may have to give up, since receiving, say, half of the needed throughput is of little or no use to thisInternet telephony application. Applications that have throughput requirements are said to bebandwidth-sensitive applications. Many current multimedia applications are bandwidth sensitive,although some multimedia applications may use adaptive coding techniques to encode digitized voice orvideo at a rate that matches the currently available throughput.While bandwidth-sensitive applications have specific throughput requirements, elastic applications canmake use of as much, or as little, throughput as happens to be available. Electronic mail, file transfer,and Web transfers are all elastic applications. Of course, the more throughput, the better. There’sanadage that says that one cannot be too rich, too thin, or have too much throughput! * show annotation

  • Available throughput: The rate at which data can be sent from one process to another process over a network.
  • Guaranteed available throughput: A service provided by a transport-layer protocol that ensures a specified minimum throughput rate for an application.
  • Bandwidth-sensitive applications: Applications that have specific throughput requirements and require a consistent and reliable throughput.
  • Elastic applications: Applications that can adapt to use as much or as little throughput as available, such as email, file transfer, and web transfers.
  • Key challenge: Multiple sessions sharing the network’s bandwidth, causing available throughput to fluctuate with time.
  • Benefit of guaranteed throughput: Allows applications like Internet telephony to maintain a specific encoding and delivery rate, ensuring optimal performance.
  • Adaptive coding techniques: Some multimedia applications can adjust their coding rate to match the currently available throughput.
  • Importance of throughput: The saying that “one cannot be too rich, too thin, or have too much throughput” reflects the general desire for higher throughput in applications. #chatgpt,#key terms ^1z2rz9zo4de

%%

{"created":"2023-05-11T08:09:52.177Z","updated":"2023-05-11T08:09:52.177Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":259359,"end":259421},{"type":"TextQuoteSelector","exact":"A transport-layer protocol can also provide timing guarantees.","prefix":" have too much throughput!Timing","suffix":" As with throughput guarantees, "}]}]}

%% * A transport-layer protocol can also provide timing guarantees. * show annotation

^v0i3w621ot8

%%

{"created":"2023-05-11T08:10:06.706Z","updated":"2023-05-11T08:10:06.706Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":260461,"end":260783},{"type":"TextQuoteSelector","exact":"a transport protocol can provide an application with one or more security services. For example,in the sending host, a transport protocol can encrypt all data transmitted by the sending process, and inthe receiving host, the transport-layer protocol can decrypt the data before delivering the data to thereceiving process.","prefix":"-to-end delays.SecurityFinally, ","suffix":" Such a service would provide co"}]}]}

%% * a transport protocol can provide an application with one or more security services. For example,in the sending host, a transport protocol can encrypt all data transmitted by the sending process, and inthe receiving host, the transport-layer protocol can decrypt the data before delivering the data to thereceiving process. * show annotation

^kakdr077u1l

%%

{"created":"2023-05-11T08:10:20.809Z","updated":"2023-05-11T08:10:20.809Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":261386,"end":261505},{"type":"TextQuoteSelector","exact":"The Internet (and, more generally, TCP/IP networks) makes two transport protocols available toapplications, UDP and TCP","prefix":"rvices provided by theInternet. ","suffix":". When you (as an application de"}]}]}

%% * The Internet (and, more generally, TCP/IP networks) makes two transport protocols available toapplications, UDP and TCP * show annotation

^gyihn97icf6

%%

{"created":"2023-05-11T08:10:35.907Z","updated":"2023-05-11T08:10:35.907Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":261842,"end":261940},{"type":"TextQuoteSelector","exact":"The TCP service model includes a connection-oriented service and a reliable data transfer service.","prefix":"lected applications.TCP Services","suffix":"When an application invokes TCP "}]}]}

%% * The TCP service model includes a connection-oriented service and a reliable data transfer service. * show annotation

^xcjovm7gipb

%%

{"created":"2023-05-11T08:12:26.759Z","text":"Connection-oriented service:\n- TCP involves a handshaking procedure where the client and server exchange control information before data transfer begins.\n- The handshaking allows both parties to prepare for incoming data.\n- After handshaking, a TCP connection is established between the sockets of the two processes.\n- The connection is full-duplex, allowing simultaneous message exchange.\n\nReliable data transfer service:\n- TCP ensures that all data sent is delivered without errors and in the correct order.\n- It guarantees that the stream of bytes sent from one side of the application is received exactly the same on the other side.\n\nCongestion control mechanism:\n- TCP includes a congestion-control mechanism for the overall welfare of the Internet.\n- This mechanism throttles the sending process (client or server) when network congestion occurs between the sender and receiver.","updated":"2023-05-11T08:12:26.759Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":261830,"end":261842},{"type":"TextQuoteSelector","exact":"TCP Services","prefix":" for some selected applications.","suffix":"The TCP service model includes a"}]}]}

%% * TCP Services * show annotation Connection-oriented service:

  • TCP involves a handshaking procedure where the client and server exchange control information before data transfer begins.
  • The handshaking allows both parties to prepare for incoming data.
  • After handshaking, a TCP connection is established between the sockets of the two processes.
  • The connection is full-duplex, allowing simultaneous message exchange.

Reliable data transfer service:

  • TCP ensures that all data sent is delivered without errors and in the correct order.
  • It guarantees that the stream of bytes sent from one side of the application is received exactly the same on the other side.

Congestion control mechanism:

  • TCP includes a congestion-control mechanism for the overall welfare of the Internet.
  • This mechanism throttles the sending process (client or server) when network congestion occurs between the sender and receiver. #chatgpt,#key terms ^4k3k6xrvwy3

%%

{"created":"2023-05-11T08:13:34.526Z","text":"UDP (User Datagram Protocol):\n- Lightweight and minimal transport protocol.\n- Connectionless, no handshaking before communication.\n- Provides unreliable data transfer service.\n- No guarantee that messages will reach the receiving process.\n- Messages that do arrive may arrive out of order.\n\nLack of congestion control mechanism:\n- UDP does not include congestion control.\n- Sending side can transmit data at any rate.\n- Actual end-to-end throughput may be limited by transmission capacity of links or congestion.","updated":"2023-05-11T08:13:34.526Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":265401,"end":265413},{"type":"TextQuoteSelector","exact":"UDP Services","prefix":" fair share ofnetwork bandwidth.","suffix":"UDP is a no-frills, lightweight "}]}]}

%% * UDP Services * show annotation UDP (User Datagram Protocol):

  • Lightweight and minimal transport protocol.
  • Connectionless, no handshaking before communication.
  • Provides unreliable data transfer service.
  • No guarantee that messages will reach the receiving process.
  • Messages that do arrive may arrive out of order.

Lack of congestion control mechanism:

  • UDP does not include congestion control.
  • Sending side can transmit data at any rate.
  • Actual end-to-end throughput may be limited by transmission capacity of links or congestion. #chatgpt,#key terms ^wvs451ltxwr

%%

{"created":"2023-05-11T08:23:35.076Z","text":"Data encryption and security:\n- Both TCP and UDP do not provide encryption for the data transmitted.\n- Data sent by the sending process travels over the network in its original form (cleartext) and can potentially be intercepted and discovered at any point along the network links.\n- To address security concerns, an enhancement for TCP called Secure Sockets Layer (SSL) has been developed.\n- SSL provides process-to-process security services, including encryption, data integrity, and end-point authentication.\n\nSSL and TCP:\n- SSL is not a separate transport protocol like TCP or UDP, but an enhancement of TCP.\n- SSL is implemented at the application layer, not as a standalone protocol.\n- Applications wishing to use SSL need to include SSL code in both the client and server sides.\n- SSL has its own socket API similar to the traditional TCP socket API.\n- When an application uses SSL, cleartext data is passed to the SSL socket in the sending process.\n- SSL encrypts the data and passes the encrypted data to the TCP socket for transmission.\n- The encrypted data travels over the network to the TCP socket in the receiving process.\n- The receiving socket passes the encrypted data to SSL, which decrypts it.\n- Finally, SSL passes the decrypted data through its SSL socket to the receiving process.","updated":"2023-05-11T08:23:35.076Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":263470,"end":263487},{"type":"TextQuoteSelector","exact":"FOCUS ON SECURITY","prefix":"der and receiver. As we will see","suffix":"SECURING TCPNeither TCP nor UDP "}]}]}

%% * FOCUS ON SECURITY * show annotation Data encryption and security:

  • Both TCP and UDP do not provide encryption for the data transmitted.
  • Data sent by the sending process travels over the network in its original form (cleartext) and can potentially be intercepted and discovered at any point along the network links.
  • To address security concerns, an enhancement for TCP called Secure Sockets Layer (SSL) has been developed.
  • SSL provides process-to-process security services, including encryption, data integrity, and end-point authentication.

SSL and TCP:

  • SSL is not a separate transport protocol like TCP or UDP, but an enhancement of TCP.
  • SSL is implemented at the application layer, not as a standalone protocol.
  • Applications wishing to use SSL need to include SSL code in both the client and server sides.
  • SSL has its own socket API similar to the traditional TCP socket API.
  • When an application uses SSL, cleartext data is passed to the SSL socket in the sending process.
  • SSL encrypts the data and passes the encrypted data to the TCP socket for transmission.
  • The encrypted data travels over the network to the TCP socket in the receiving process.
  • The receiving socket passes the encrypted data to SSL, which decrypts it.
  • Finally, SSL passes the decrypted data through its SSL socket to the receiving process. #chatgpt,#key terms ^y6rxqnnvon

%%

{"created":"2023-05-11T08:25:39.729Z","updated":"2023-05-11T08:25:39.729Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":267316,"end":267459},{"type":"TextQuoteSelector","exact":"today’s Internet can oftenprovide satisfactory service to time-sensitive applications, but it cannot provide any timing or throughputguarantees","prefix":"oughput is limited. In summary, ","suffix":".Figure 2.5 indicates the transp"}]}]}

%% * today’s Internet can oftenprovide satisfactory service to time-sensitive applications, but it cannot provide any timing or throughputguarantees * show annotation

^5qet3bsnbke

%%

{"created":"2023-05-11T08:27:45.922Z","updated":"2023-05-11T08:27:45.922Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":268735,"end":268919},{"type":"TextQuoteSelector","exact":"An application-layer protocol defines how an application’s processes,running on different end systems, pass messages to each other. In particular, an application-layerprotocol defines:","prefix":" ofapplication-layer protocols. ","suffix":"Pietra Ferreira22/09/2022, 18:42"}]}]}

%% * An application-layer protocol defines how an application’s processes,running on different end systems, pass messages to each other. In particular, an application-layerprotocol defines: * show annotation

^055g0hkaaexi

%%

{"created":"2023-05-11T08:27:54.338Z","updated":"2023-05-11T08:27:54.338Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":268919,"end":269276},{"type":"TextQuoteSelector","exact":"The types of messages exchanged, for example, request messages and response messagesThe syntax of the various message types, such as the fields in the message and how the fields aredelineatedThe semantics of the fields, that is, the meaning of the information in the fieldsRules for determining when and how a process sends messages and responds to messages","prefix":"tra Ferreira22/09/2022, 18:49:43","suffix":"Some application-layer protocols"}]}]}

%% * The types of messages exchanged, for example, request messages and response messagesThe syntax of the various message types, such as the fields in the message and how the fields aredelineatedThe semantics of the fields, that is, the meaning of the information in the fieldsRules for determining when and how a process sends messages and responds to messages * show annotation

^im3hu2x4c1b

%%

{"created":"2023-05-11T08:28:30.206Z","updated":"2023-05-11T08:28:30.206Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":269840,"end":270004},{"type":"TextQuoteSelector","exact":"It is important to distinguish between network applications and application-layer protocols. Anapplication-layer protocol is only one piece of a network application","prefix":"ary application-layer protocols.","suffix":" (albeit, a very important piece"}]}]}

%% * It is important to distinguish between network applications and application-layer protocols. Anapplication-layer protocol is only one piece of a network application * show annotation

^1ec0vudh53a

%%

{"created":"2023-05-11T08:29:12.818Z","updated":"2023-05-11T08:29:12.818Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":270117,"end":270695},{"type":"TextQuoteSelector","exact":"The Web is a client-serverapplication that allows users to obtain documents from Web servers on demand. The Web applicationconsists of many components, including a standard for document formats (that is, HTML), Webbrowsers (for example, Firefox and Microsoft Internet Explorer), Web servers (for example, Apache andMicrosoft servers), and an application-layer protocol. The Web’s application-layer protocol, HTTP,defines the format and sequence of messages exchanged between browser and Web server. Thus,HTTP is only one piece (albeit, an important piece) of the Web application","prefix":"s look at a couple of examples. ","suffix":". As another example, anInternet"}]}]}

%% * The Web is a client-serverapplication that allows users to obtain documents from Web servers on demand. The Web applicationconsists of many components, including a standard for document formats (that is, HTML), Webbrowsers (for example, Firefox and Microsoft Internet Explorer), Web servers (for example, Apache andMicrosoft servers), and an application-layer protocol. The Web’s application-layer protocol, HTTP,defines the format and sequence of messages exchanged between browser and Web server. Thus,HTTP is only one piece (albeit, an important piece) of the Web application * show annotation

^s9ror7ajnun

%%

{"created":"2023-05-11T08:31:20.180Z","updated":"2023-05-11T08:31:20.180Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":273809,"end":273883},{"type":"TextQuoteSelector","exact":"Perhaps what appeals the most to users is that the Web operates on demand.","prefix":"ly the one andonly data network.","suffix":" Users receive what theywant, wh"}]}]}

%% * Perhaps what appeals the most to users is that the Web operates on demand. * show annotation

^za84rqr6ks8

%%

{"created":"2023-05-11T08:31:54.219Z","updated":"2023-05-11T08:31:54.219Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":274734,"end":275175},{"type":"TextQuoteSelector","exact":"The HyperText Transfer Protocol (HTTP), the Web’s application-layer protocol, is at the heart of theWeb. It is defined in [RFC 1945] and [RFC 2616]. HTTP is implemented in two programs: a clientprogram and a server program. The client program and server program, executing on different endsystems, talk to each other by exchanging HTTP messages. HTTP defines the structure of thesemessages and how the client and server exchange the messages","prefix":"ogle Maps.2.2.1 Overview of HTTP","suffix":". Before explaining HTTP in deta"}]}]}

%% * The HyperText Transfer Protocol (HTTP), the Web’s application-layer protocol, is at the heart of theWeb. It is defined in [RFC 1945] and [RFC 2616]. HTTP is implemented in two programs: a clientprogram and a server program. The client program and server program, executing on different endsystems, talk to each other by exchanging HTTP messages. HTTP defines the structure of thesemessages and how the client and server exchange the messages * show annotation

^mqdzry3srmi

%%

{"created":"2023-05-11T08:33:00.277Z","updated":"2023-05-11T08:33:00.277Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":275248,"end":275308},{"type":"TextQuoteSelector","exact":"A Web page (also called a document) consists of objects. An ","prefix":"uld review some Web terminology.","suffix":"object is simply a file—such as "}]}]}

%% * A Web page (also called a document) consists of objects. An * show annotation

^so1dvfbjb4

%%

{"created":"2023-05-11T08:33:08.989Z","updated":"2023-05-11T08:33:08.989Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":276180,"end":276277},{"type":"TextQuoteSelector","exact":"Webservers, which implement the server side of HTTP, house Web objects, each addressable by a URL","prefix":"ser and client interchangeably. ","suffix":".Popular Web servers include Apa"}]}]}

%% * Webservers, which implement the server side of HTTP, house Web objects, each addressable by a URL * show annotation

^vtht3wmd73

%%

{"created":"2023-05-11T08:33:27.628Z","updated":"2023-05-11T08:33:27.628Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":276355,"end":276465},{"type":"TextQuoteSelector","exact":"HTTP defines how Web clients request Web pages from Web servers and how servers transfer Webpages to clients. ","prefix":"oft Internet Information Server.","suffix":"We discuss the interaction betwe"}]}]}

%% * HTTP defines how Web clients request Web pages from Web servers and how servers transfer Webpages to clients. * show annotation

^52oa8blslx7

%%

{"created":"2023-05-11T08:34:05.791Z","updated":"2023-05-11T08:34:05.791Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":276835,"end":276886},{"type":"TextQuoteSelector","exact":"HTTP uses TCP as its underlying transport protocol ","prefix":"ssages that contain the objects.","suffix":"(rather than running on top of U"}]}]}

%% * HTTP uses TCP as its underlying transport protocol * show annotation

^h1303zpj2t5

%%

{"created":"2023-05-11T08:34:46.795Z","updated":"2023-05-11T08:34:46.795Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":278700,"end":278806},{"type":"TextQuoteSelector","exact":"Because an HTTP servermaintains no information about the clients, HTTP is said to be a stateless protocol.","prefix":" forgotten what it did earlier. ","suffix":" We also remarkthat the Web uses"}]}]}

%% * Because an HTTP servermaintains no information about the clients, HTTP is said to be a stateless protocol. * show annotation

^lhspmwt0dbj

%%

{"created":"2023-05-11T08:34:56.022Z","updated":"2023-05-11T08:34:56.022Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":278912,"end":278961},{"type":"TextQuoteSelector","exact":"A Web serveris always on, with a fixed IP address","prefix":"e, as described in Section 2.1. ","suffix":", and it services requests from "}]}]}

%% * A Web serveris always on, with a fixed IP address * show annotation

^5hpejpba4u9

%%

{"created":"2023-05-11T08:35:29.338Z","updated":"2023-05-11T08:35:29.338Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":279445,"end":279876},{"type":"TextQuoteSelector","exact":"When this client-server interaction is taking place overTCP, the application developer needs to make an important decision—should each request/responsepair be sent over a separate TCP connection, or should all of the requests and their correspondingresponses be sent over the same TCP connection? In the former approach, the application is said touse non-persistent connections; and in the latter approach, persistent connections. ","prefix":"r intervals, or intermittently. ","suffix":"To gain a deepunderstanding of t"}]}]}

%% * When this client-server interaction is taking place overTCP, the application developer needs to make an important decision—should each request/responsepair be sent over a separate TCP connection, or should all of the requests and their correspondingresponses be sent over the same TCP connection? In the former approach, the application is said touse non-persistent connections; and in the latter approach, persistent connections. * show annotation

^wm352d0tmu

%%

{"created":"2023-05-11T08:37:32.938Z","updated":"2023-05-11T08:37:32.938Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":282350,"end":282719},{"type":"TextQuoteSelector","exact":"The steps above illustrate the use of non-persistent connections, where each TCP connection is closedafter the server sends the object—the connection does not persist for other objects. Note that each TCPconnection transports exactly one request message and one response message. Thus, in this example,when a user requests the Web page, 11 TCP connections are generated","prefix":"gram and the server HTTPprogram.","suffix":".In the steps described above, w"}]}]}

%% * The steps above illustrate the use of non-persistent connections, where each TCP connection is closedafter the server sends the object—the connection does not persist for other objects. Note that each TCPconnection transports exactly one request message and one response message. Thus, in this example,when a user requests the Web page, 11 TCP connections are generated * show annotation

^95pu933wvlb

%%

{"created":"2023-05-11T08:37:57.213Z","updated":"2023-05-11T08:37:57.213Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":283329,"end":283388},{"type":"TextQuoteSelector","exact":" the use of parallel connections shortens the response time","prefix":"As we’ll see inthe next chapter,","suffix":".Before continuing, let’s do a b"}]}]}

%% * the use of parallel connections shortens the response time * show annotation

^6l0s0bi7xrc

%%

{"created":"2023-05-11T08:38:01.007Z","updated":"2023-05-11T08:38:01.007Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":283032,"end":283083},{"type":"TextQuoteSelector","exact":"most browsers open 5 to 10 parallel TCP connections","prefix":"llelism. In theirdefault modes, ","suffix":", and each of these connectionsh"}]}]}

%% * most browsers open 5 to 10 parallel TCP connections * show annotation

^mrhqfpv1e3

%%

{"created":"2023-05-11T08:39:21.165Z","updated":"2023-05-11T08:39:21.165Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":283602,"end":283878},{"type":"TextQuoteSelector","exact":" we define the round-trip time (RTT), which is the time it takes for a small packet to travel fromclient to server and then back to the client. The RTT includes packet-propagation delays, packet-queuing delays in intermediate routers and switches, and packet-processing delays","prefix":"eived by the client. Tothis end,","suffix":". (These delays werediscussed in"}]}]}

%% * we define the round-trip time (RTT), which is the time it takes for a small packet to travel fromclient to server and then back to the client. The RTT includes packet-propagation delays, packet-queuing delays in intermediate routers and switches, and packet-processing delays * show annotation

^qgwvxv2xqgk

%%

{"created":"2023-05-11T08:41:51.582Z","text":"Non-persistent connections:\n- Each requested object requires a new connection to be established and maintained.\n- This places a burden on the Web server, especially when serving requests from multiple clients simultaneously.\n- Each object experiences a delivery delay of two round-trip times (RTTs) due to connection establishment and object request.\n\nPersistent connections in HTTP 1.1:\n- The server keeps the TCP connection open after sending a response.\n- Subsequent requests and responses between the same client and server can be sent over the same connection.\n- Multiple objects, including an entire web page or multiple web pages, can be sent over a single persistent TCP connection.\n- Requests for objects can be made back-to-back without waiting for replies (pipelining).\n- The server closes the connection after a certain idle time.\n- HTTP/2 builds on HTTP 1.1, allowing interleaved requests and replies in the same connection and introducing prioritization.\n\nPerformance comparison:\n- Performance of non-persistent and persistent connections will be quantitatively compared in the homework problems of Chapters 2 and 3.\n- Additional references for further reading: [Heidemann 1997; Nielsen 1997; RFC 7540].","updated":"2023-05-11T08:41:51.582Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":284923,"end":284955},{"type":"TextQuoteSelector","exact":"HTTP with Persistent Connections","prefix":"e at theserver of the HTML file.","suffix":"Non-persistent connections have "}]}]}

%% * HTTP with Persistent Connections * show annotation Non-persistent connections:

  • Each requested object requires a new connection to be established and maintained.
  • This places a burden on the Web server, especially when serving requests from multiple clients simultaneously.
  • Each object experiences a delivery delay of two round-trip times (RTTs) due to connection establishment and object request.

Persistent connections in HTTP 1.1:

  • The server keeps the TCP connection open after sending a response.
  • Subsequent requests and responses between the same client and server can be sent over the same connection.
  • Multiple objects, including an entire web page or multiple web pages, can be sent over a single persistent TCP connection.
  • Requests for objects can be made back-to-back without waiting for replies (pipelining).
  • The server closes the connection after a certain idle time.
  • HTTP/2 builds on HTTP 1.1, allowing interleaved requests and replies in the same connection and introducing prioritization.

Performance comparison:

  • Performance of non-persistent and persistent connections will be quantitatively compared in the homework problems of Chapters 2 and 3.
  • Additional references for further reading: [Heidemann 1997; Nielsen 1997; RFC 7540]. #chatgpt,#key terms ^9goeoejchmv

%%

{"created":"2023-05-11T08:42:12.419Z","updated":"2023-05-11T08:42:12.419Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":286968,"end":287044},{"type":"TextQuoteSelector","exact":"There are two types of HTTP messages, request messages and response messages","prefix":"ons of the HTTPmessage formats. ","suffix":",both of which are discussed bel"}]}]}

%% * There are two types of HTTP messages, request messages and response messages * show annotation

^ajrbj10o7y7

%%

{"created":"2023-05-11T08:43:23.910Z","updated":"2023-05-11T08:43:23.910Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":287773,"end":288086},{"type":"TextQuoteSelector","exact":"The first line of an HTTP request message is called the request line; the subsequent lines are calledthe header lines. The request line has three fields: the method field, the URL field, and the HTTPversion field. The method field can take on several different values, including  GET, POST, HEAD,PUT, and  DELETE.","prefix":"ore lines or as few as one line.","suffix":" The great majority of HTTP requ"}]}]}

%% * The first line of an HTTP request message is called the request line; the subsequent lines are calledthe header lines. The request line has three fields: the method field, the URL field, and the HTTPversion field. The method field can take on several different values, including GET, POST, HEAD,PUT, and DELETE. * show annotation

^vi449ppq2m9

%%

{"created":"2023-05-11T08:43:50.970Z","updated":"2023-05-11T08:43:50.970Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":288800,"end":288939},{"type":"TextQuoteSelector","exact":"By including the  Connection:close header line, the browser is telling the server that it doesn’t want to bother with persistentconnections","prefix":"s required by Web proxy caches. ","suffix":"; it wants the server to close t"}]}]}

%% * By including the Connection:close header line, the browser is telling the server that it doesn’t want to bother with persistentconnections * show annotation

^ivmq7wvke

%%

{"created":"2023-05-11T08:43:57.493Z","updated":"2023-05-11T08:43:57.493Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":287147,"end":287261},{"type":"TextQuoteSelector","exact":"GET /somedir/page.html HTTP/1.1Host: www.someschool.eduConnection: closeUser-agent: Mozilla/5.0Accept-language: fr","prefix":" a typical HTTP request message:","suffix":"We can learn a lot by taking a c"}]}]}

%% * ==GET /somedir/page.html HTTP/1.1Host: www.someschool.eduConnection: closeUser-agent: Mozilla/5.0Accept-language: fr== * show annotation

^1ohkpb72pf7

%%

{"created":"2023-05-11T08:44:48.370Z","updated":"2023-05-11T08:44:48.370Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":290000,"end":290220},{"type":"TextQuoteSelector","exact":"The entity body is empty with the  GET method, but is used with the  POST method. An HTTPclient often uses the  POST method when the user fills out a form—for example, when a user providessearch words to a search engine.","prefix":"feed) there is an “entitybody.” ","suffix":" With a  POST message, the user "}]}]}

%% * The entity body is empty with the GET method, but is used with the POST method. An HTTPclient often uses the POST method when the user fills out a form—for example, when a user providessearch words to a search engine. * show annotation

^vl5swmgcsnq

%%

{"created":"2023-05-11T08:45:15.111Z","updated":"2023-05-11T08:45:15.111Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":291085,"end":291324},{"type":"TextQuoteSelector","exact":"The  HEAD method is similar to the  GET method. When a server receives a request with the  HEADmethod, it responds with an HTTP message but it leaves out the requested object. Applicationdevelopers often use the  HEAD method for debugging.","prefix":"iced extended URLs of this sort.","suffix":" The  PUT method is often used i"}]}]}

%% * The HEAD method is similar to the GET method. When a server receives a request with the HEADmethod, it responds with an HTTP message but it leaves out the requested object. Applicationdevelopers often use the HEAD method for debugging. * show annotation

^guewc1ry108

%%

{"created":"2023-05-11T08:45:22.522Z","updated":"2023-05-11T08:45:22.522Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":291325,"end":291561},{"type":"TextQuoteSelector","exact":"The  PUT method is often used in conjunctionwith Web publishing tools. It allows a user to upload an object to a specific path (directory) on a specificWeb server. The  PUT method is also used by applications that need to upload objects","prefix":"the  HEAD method for debugging. ","suffix":" to Web servers.The  DELETE meth"}]}]}

%% * The PUT method is often used in conjunctionwith Web publishing tools. It allows a user to upload an object to a specific path (directory) on a specificWeb server. The PUT method is also used by applications that need to upload objects * show annotation

^wg6y9pmzd7

%%

{"created":"2023-05-11T08:46:19.112Z","updated":"2023-05-11T08:46:19.112Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":294250,"end":294631},{"type":"TextQuoteSelector","exact":"200 OK: Request succeeded and the information is returned in the response.301 Moved Permanently: Requested object has been permanently moved; the new URL isspecified in  Location: header of the response message. The client software will automaticallyretrieve the new URL.400 Bad Request: This is a generic error code indicating that the request could not beunderstood by the server","prefix":"s andassociated phrases include:","suffix":".Figure 2.9 General format of an"}]}]}

%% * 200 OK: Request succeeded and the information is returned in the response.301 Moved Permanently: Requested object has been permanently moved; the new URL isspecified in Location: header of the response message. The client software will automaticallyretrieve the new URL.400 Bad Request: This is a generic error code indicating that the request could not beunderstood by the server * show annotation

^y5px70efqzc

%%

{"created":"2023-05-11T08:46:31.245Z","updated":"2023-05-11T08:46:31.245Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":294632,"end":294685},{"type":"TextQuoteSelector","exact":"Figure 2.9 General format of an HTTP response message","prefix":" not beunderstood by the server.","suffix":"404 Not Found: The requested doc"}]}]}

%% * Figure 2.9 General format of an HTTP response message * show annotation

^sod57n2sl3q

%%

{"created":"2023-05-11T08:46:38.429Z","updated":"2023-05-11T08:46:38.429Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":294685,"end":294851},{"type":"TextQuoteSelector","exact":"404 Not Found: The requested document does not exist on this server.505 HTTP Version Not Supported: The requested HTTP protocol version is not supportedby the server.","prefix":"rmat of an HTTP response message","suffix":"How would you like to see a real"}]}]}

%% * 404 Not Found: The requested document does not exist on this server.505 HTTP Version Not Supported: The requested HTTP protocol version is not supportedby the server. * show annotation

^c23jma8ix3

%%

{"created":"2023-05-11T08:46:55.488Z","text":"In the case of the HTTP protocol, being stateless means that each request made by a client to a server is independent and carries all the necessary information for the server to process the request. The server does not retain any knowledge of past requests or client state between different requests.","updated":"2023-05-11T08:46:55.488Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":296962,"end":296986},{"type":"TextQuoteSelector","exact":"HTTP server is stateless","prefix":"okiesWe mentioned above that an ","suffix":". This simplifies server design "}]}]}

%% * HTTP server is stateless * show annotation In the case of the HTTP protocol, being stateless means that each request made by a client to a server is independent and carries all the necessary information for the server to process the request. The server does not retain any knowledge of past requests or client state between different requests. #chatgpt ^ixs3zxdkhoo

%%

{"created":"2023-05-11T11:44:30.787Z","updated":"2023-05-11T11:44:30.787Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":297375,"end":297441},{"type":"TextQuoteSelector","exact":"Cookies, defined in [RFC 6265], allow sites to keep track of users","prefix":"se purposes, HTTP uses cookies. ","suffix":".Most major commercial Web sites"}]}]}

%% * Cookies, defined in [RFC 6265], allow sites to keep track of users * show annotation

^0fdpgq4y1gjf

%%

{"created":"2023-05-11T11:44:50.918Z","updated":"2023-05-11T11:44:50.918Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":297517,"end":297693},{"type":"TextQuoteSelector","exact":"cookie technology has four components: (1) a cookie header line in the HTTPresponse message; (2) a cookie header line in the HTTP request message; (3) a cookie file kept on the","prefix":" today.As shown in Figure 2.10, ","suffix":"user’s end system and managed by"}]}]}

%% * cookie technology has four components: (1) a cookie header line in the HTTPresponse message; (2) a cookie header line in the HTTP request message; (3) a cookie file kept on the * show annotation

^pdxpxup762l

%%

{"created":"2023-05-11T11:44:56.367Z","updated":"2023-05-11T11:44:56.367Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":297693,"end":297789},{"type":"TextQuoteSelector","exact":"user’s end system and managed by the user’s browser; and (4) a back-end database at the Web site","prefix":"e; (3) a cookie file kept on the","suffix":".Using Figure 2.10, let’s walk t"}]}]}

%% * user’s end system and managed by the user’s browser; and (4) a back-end database at the Web site * show annotation

^e238bxz5op6

%%

{"created":"2023-05-11T13:54:32.670Z","updated":"2023-05-11T13:54:32.670Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":300437,"end":300475},{"type":"TextQuoteSelector","exact":"cookies can be used to identify a user","prefix":"rom this discussion we see that ","suffix":". The first time a user visits a"}]}]}

%% * cookies can be used to identify a user * show annotation

^rihcu9jpt6

%%

{"created":"2023-05-11T14:03:02.608Z","updated":"2023-05-11T14:03:02.608Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":301474,"end":301701},{"type":"TextQuoteSelector","exact":"A Web cache—also called a proxy server—is a network entity that satisfies HTTP requests on thebehalf of an origin Web server. The Web cache has its own disk storage and keeps copies of recentlyrequested objects in this storage.","prefix":"ie controversy.2.2.5 Web Caching","suffix":" As shown in Figure 2.11, a user"}]}]}

%% * A Web cache—also called a proxy server—is a network entity that satisfies HTTP requests on thebehalf of an origin Web server. The Web cache has its own disk storage and keeps copies of recentlyrequested objects in this storage. * show annotation

^jiyhmxr3yt

%%

{"created":"2023-05-11T14:03:32.790Z","updated":"2023-05-11T14:03:32.790Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":302982,"end":303047},{"type":"TextQuoteSelector","exact":"Note that a cache is both a server and a client at the same time.","prefix":"ient browser and the Web cache).","suffix":" When it receives requests from "}]}]}

%% * Note that a cache is both a server and a client at the same time. * show annotation

^lidko5x91oa

%%

{"created":"2023-05-11T14:03:56.333Z","updated":"2023-05-11T14:03:56.333Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":303634,"end":303715},{"type":"TextQuoteSelector","exact":"First, a Web cache can substantiallyreduce the response time for a client request","prefix":"n the Internet for two reasons. ","suffix":", particularly if the bottleneck"}]}]}

%% * First, a Web cache can substantiallyreduce the response time for a client request * show annotation

^t3hmpuihslc

%%

{"created":"2023-05-11T14:04:06.120Z","updated":"2023-05-11T14:04:06.120Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":304079,"end":304219},{"type":"TextQuoteSelector","exact":"econd,as we will soon illustrate with an example, Web caches can substantially reduce traffic on an institution’saccess link to the Internet","prefix":" object rapidly to the client. S","suffix":". By reducing traffic, the insti"}]}]}

%% * econd,as we will soon illustrate with an example, Web caches can substantially reduce traffic on an institution’saccess link to the Internet * show annotation

^9m3xj5d7kat

%%

{"created":"2023-05-11T14:06:53.582Z","updated":"2023-05-11T14:06:53.582Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":308702,"end":308954},{"type":"TextQuoteSelector","exact":"Through the use of Content Distribution Networks (CDNs), Web caches are increasingly playing animportant role in the Internet. A CDN company installs many geographically distributed cachesthroughout the Internet, thereby localizing much of the traffic.","prefix":"re that runs on inexpensive PCs.","suffix":" There are shared CDNs (such as "}]}]}

%% * Through the use of Content Distribution Networks (CDNs), Web caches are increasingly playing animportant role in the Internet. A CDN company installs many geographically distributed cachesthroughout the Internet, thereby localizing much of the traffic. * show annotation

^r70yqaqrwxd

%%

{"created":"2023-05-11T14:07:18.957Z","updated":"2023-05-11T14:07:18.957Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":309212,"end":309267},{"type":"TextQuoteSelector","exact":"the copy ofan object residing in the cache may be stale","prefix":"es, it introduces a new problem—","suffix":". In other words, the object hou"}]}]}

%% * the copy ofan object residing in the cache may be stale * show annotation

^qcyvdsihtti

%%

{"created":"2023-05-11T14:07:23.885Z","updated":"2023-05-11T14:07:23.885Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":309397,"end":309524},{"type":"TextQuoteSelector","exact":"HTTP has a mechanism thatallows a cache to verify that its objects are up to date. This mechanism is called the conditional GET","prefix":"hed at the client. Fortunately, ","suffix":".An HTTP request message is a so"}]}]}

%% * HTTP has a mechanism thatallows a cache to verify that its objects are up to date. This mechanism is called the conditional GET * show annotation

^l1o83kp0ms

%%

{"created":"2023-05-11T14:08:08.943Z","updated":"2023-05-11T14:08:08.943Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":312560,"end":312606},{"type":"TextQuoteSelector","exact":"e-mail is an asynchronous communication medium","prefix":"s.As with ordinary postal mail, ","suffix":"—people send and readmessages wh"}]}]}

%% * e-mail is an asynchronous communication medium * show annotation

^d2c3pubgzy5

%%

{"created":"2023-05-11T14:08:30.040Z","updated":"2023-05-11T14:08:30.040Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":313324,"end":313395},{"type":"TextQuoteSelector","exact":"user agents, mail servers, and the Simple Mail Transfer Protocol (SMTP)","prefix":"t it hasthree major components: ","suffix":".We now describe each of these c"}]}]}

%% * user agents, mail servers, and the Simple Mail Transfer Protocol (SMTP) * show annotation

^84m7lpni6z6

%%

{"created":"2023-05-11T14:08:44.974Z","updated":"2023-05-11T14:08:44.974Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":313518,"end":313668},{"type":"TextQuoteSelector","exact":"User agents allow users to read, reply to, forward, save, and composemessages. Microsoft Outlook and Apple Mail are examples of user agents for e-mail","prefix":"ailmessage to a recipient, Bob. ","suffix":". When Alice isfinished composin"}]}]}

%% * User agents allow users to read, reply to, forward, save, and composemessages. Microsoft Outlook and Apple Mail are examples of user agents for e-mail * show annotation

^2cxx9657g29

%%

{"created":"2023-05-11T14:09:01.298Z","updated":"2023-05-11T14:09:01.298Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":314038,"end":314079},{"type":"TextQuoteSelector","exact":"mailboxlocated in one of the mail servers","prefix":"h recipient, such as Bob, has a ","suffix":". Bob’s mailbox manages andFigur"}]}]}

%% * mailboxlocated in one of the mail servers * show annotation

^kebmivp50i

%%

{"created":"2023-05-11T14:09:34.089Z","updated":"2023-05-11T14:09:34.089Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":314622,"end":314770},{"type":"TextQuoteSelector","exact":"If Alice’s server cannot deliver mail to Bob’s server,Alice’s server holds the message in a message queue and attempts to transfer the message later","prefix":" failures in Bob’s mail server. ","suffix":".Reattempts are often done every"}]}]}

%% * If Alice’s server cannot deliver mail to Bob’s server,Alice’s server holds the message in a message queue and attempts to transfer the message later * show annotation

^fkgn13plpo7

%%

{"created":"2023-05-11T14:09:44.038Z","updated":"2023-05-11T14:09:44.038Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":314949,"end":315155},{"type":"TextQuoteSelector","exact":"SMTP is the principal application-layer protocol for Internet electronic mail. It uses the reliable datatransfer service of TCP to transfer mail from the sender’s mail server to the recipient’s mail server.","prefix":" (Alice) with an e-mail message.","suffix":" Aswith most application-layer p"}]}]}

%% * SMTP is the principal application-layer protocol for Internet electronic mail. It uses the reliable datatransfer service of TCP to transfer mail from the sender’s mail server to the recipient’s mail server. * show annotation

^koqaa0eatji

%%

{"created":"2023-05-11T14:09:48.588Z","updated":"2023-05-11T14:09:48.588Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":315341,"end":315406},{"type":"TextQuoteSelector","exact":"Both the client and serversides of SMTP run on every mail server.","prefix":"on the recipient’s mail server. ","suffix":" When a mail server sends mail t"}]}]}

%% * Both the client and serversides of SMTP run on every mail server. * show annotation

^3jzgghlwosu

%%

{"created":"2023-05-11T14:09:59.468Z","updated":"2023-05-11T14:09:59.468Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":315673,"end":315753},{"type":"TextQuoteSelector","exact":"MTPtransfers messages from senders’ mail servers to the recipients’ mail servers","prefix":"onic mail. As mentioned above, S","suffix":". SMTP is much older thanHTTP. ("}]}]}

%% * MTPtransfers messages from senders’ mail servers to the recipients’ mail servers * show annotation

^lk92a87q61i

%%

{"created":"2023-05-11T14:13:59.432Z","updated":"2023-05-11T14:13:59.432Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":322335,"end":322525},{"type":"TextQuoteSelector","exact":"HTTP transfers files (also called objects) from a Web server to a Web client (typically abrowser); SMTP transfers files (that is, e-mail messages) from one mail server to another mail server","prefix":" files from one host toanother: ","suffix":".When transferring the files, bo"}]}]}

%% * HTTP transfers files (also called objects) from a Web server to a Web client (typically abrowser); SMTP transfers files (that is, e-mail messages) from one mail server to another mail server * show annotation

^ocih253fkl

%%

{"created":"2023-05-11T14:14:26.175Z","updated":"2023-05-11T14:14:26.175Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":322959,"end":323011},{"type":"TextQuoteSelector","exact":"On the other hand, SMTP is primarily a push protocol","prefix":"that wants to receive the file. ","suffix":"—thesending mail server pushes t"}]}]}

%% * On the other hand, SMTP is primarily a push protocol * show annotation

^tulkqqn2wlo

%%

{"created":"2023-05-11T14:14:29.112Z","updated":"2023-05-11T14:14:29.112Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":323096,"end":323170},{"type":"TextQuoteSelector","exact":"the TCP connection isinitiated by the machine that wants to send the file.","prefix":"ing mail server. In particular, ","suffix":"A second difference, which we al"}]}]}

%% * the TCP connection isinitiated by the machine that wants to send the file. * show annotation

^t09nkx98tq

%%

{"created":"2023-05-11T14:14:32.442Z","updated":"2023-05-11T14:14:32.442Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":322881,"end":322957},{"type":"TextQuoteSelector","exact":"the TCP connection is initiated by themachine that wants to receive the file","prefix":"eir convenience. In particular, ","suffix":". On the other hand, SMTP is pri"}]}]}

%% * the TCP connection is initiated by themachine that wants to receive the file * show annotation

^lv5micq6sm

%%

{"created":"2023-05-11T14:14:44.400Z","updated":"2023-05-11T14:14:44.400Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":322714,"end":322743},{"type":"TextQuoteSelector","exact":"HTTP is mainlya pull protocol","prefix":"e important differences. First, ","suffix":"—someone loads information on a "}]}]}

%% * HTTP is mainlya pull protocol * show annotation

^eo1uik93urc

%%

{"created":"2023-05-11T14:15:09.995Z","updated":"2023-05-11T14:15:09.995Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":323733,"end":323853},{"type":"TextQuoteSelector","exact":"HTTP encapsulates each object in its ownHTTP response message. SMTP places all of the message’s objects into one message","prefix":". As we learned in Section 2.2, ","suffix":".2.3.3 Mail Message FormatsWhen "}]}]}

%% * HTTP encapsulates each object in its ownHTTP response message. SMTP places all of the message’s objects into one message * show annotation

^wlirl365p3c

%%

{"created":"2023-05-11T14:15:55.091Z","updated":"2023-05-11T14:15:55.091Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":326670,"end":326856},{"type":"TextQuoteSelector","exact":"If Bob’s mail server were to reside on his localPC, then Bob’s PC would have to remain always on, and connected to the Internet, in order to receivenew mail, which can arrive at any time","prefix":"lient and server sides of SMTP. ","suffix":". This is impractical for many I"}]}]}

%% * If Bob’s mail server were to reside on his localPC, then Bob’s PC would have to remain always on, and connected to the Internet, in order to receivenew mail, which can arrive at any time * show annotation

^4bbuynwckdf

%%

{"created":"2023-05-11T14:16:29.725Z","updated":"2023-05-11T14:16:29.725Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":328118,"end":328328},{"type":"TextQuoteSelector","exact":"By having Alice first deposit the e-mail in her own mail server, Alice’s mail server canrepeatedly try to send the message to Bob’s mail server, say every 30 minutes, until Bob’s mail serverbecomes operational.","prefix":"municating entitiesmail server. ","suffix":" (And if Alice’s mail server is "}]}]}

%% * By having Alice first deposit the e-mail in her own mail server, Alice’s mail server canrepeatedly try to send the message to Bob’s mail server, say every 30 minutes, until Bob’s mail serverbecomes operational. * show annotation

^hinryiszaz7

%%

{"created":"2023-05-11T14:17:01.506Z","updated":"2023-05-11T14:17:01.506Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":328742,"end":329169},{"type":"TextQuoteSelector","exact":"Bob’suser agent can’t use SMTP to obtain the messages because obtaining the messages is a pull operation,whereas SMTP is a push protocol. The puzzle is completed by introducing a special mail accessprotocol that transfers messages from Bob’s mail server to his local PC. There are currently a number ofpopular mail access protocols, including Post Office Protocol—Version 3 (POP3), Internet MailAccess Protocol (IMAP), and HTTP","prefix":"ver within Bob’s ISP? Note that ","suffix":".Figure 2.16 provides a summary "}]}]}

%% * Bob’suser agent can’t use SMTP to obtain the messages because obtaining the messages is a pull operation,whereas SMTP is a push protocol. The puzzle is completed by introducing a special mail accessprotocol that transfers messages from Bob’s mail server to his local PC. There are currently a number ofpopular mail access protocols, including Post Office Protocol—Version 3 (POP3), Internet MailAccess Protocol (IMAP), and HTTP * show annotation

^6zvmn686cjl

%%

{"created":"2023-05-11T14:17:18.670Z","updated":"2023-05-11T14:17:18.670Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":329563,"end":329611},{"type":"TextQuoteSelector","exact":"POP3 is an extremely simple mail access protocol","prefix":" the recipient’s user agent.POP3","suffix":". It is defined in [RFC 1939], w"}]}]}

%% * POP3 is an extremely simple mail access protocol * show annotation

^xdr35sf1ay

%%

{"created":"2023-05-11T14:17:23.835Z","updated":"2023-05-11T14:17:23.835Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":329896,"end":329972},{"type":"TextQuoteSelector","exact":"POP3 progresses through three phases: authorization, transaction, and update","prefix":" the TCPconnection established, ","suffix":".During the first phase, authori"}]}]}

%% * POP3 progresses through three phases: authorization, transaction, and update * show annotation

^v5e0kfhdkqc

%%

{"created":"2023-05-11T14:17:37.916Z","updated":"2023-05-11T14:17:37.916Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":330100,"end":330393},{"type":"TextQuoteSelector","exact":"uring the second phase, transaction, the user agent retrieves messages; alsoduring this phase, the user agent can mark messages for deletion, remove deletion marks, and obtainmail statistics. The third phase, update, occurs after the client has issued the  quit command, endingthe POP3 session","prefix":"lear) toauthenticate the user. D","suffix":"; at this time, the mail server "}]}]}

%% * uring the second phase, transaction, the user agent retrieves messages; alsoduring this phase, the user agent can mark messages for deletion, remove deletion marks, and obtainmail statistics. The third phase, update, occurs after the client has issued the quit command, endingthe POP3 session * show annotation

^46qv6o9zvcr

%%

{"created":"2023-05-11T14:19:07.295Z","updated":"2023-05-11T14:19:07.295Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":334173,"end":334283},{"type":"TextQuoteSelector","exact":"the POP3 protocol does not provide any means for a user to create remotefolders and assign messages to folders","prefix":". Thisis not possible with POP3—","suffix":".To solve this and other problem"}]}]}

%% * the POP3 protocol does not provide any means for a user to create remotefolders and assign messages to folders * show annotation

^2fcw86j3jnf

%%

{"created":"2023-05-11T14:19:29.547Z","updated":"2023-05-11T14:19:29.547Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":334580,"end":334732},{"type":"TextQuoteSelector","exact":"An IMAP server will associate each message with a folder; when a message first arrives at the server, itis associated with the recipient’s INBOX folder.","prefix":"are significantly more complex.)","suffix":" The recipient can then move the"}]}]}

%% * An IMAP server will associate each message with a folder; when a message first arrives at the server, itis associated with the recipient’s INBOX folder. * show annotation

^qff5aiw4nj

%%

{"created":"2023-05-11T14:19:38.641Z","updated":"2023-05-11T14:19:38.641Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":335088,"end":335259},{"type":"TextQuoteSelector","exact":"unlike POP3, an IMAP server maintains user state information across IMAP sessions—forexample, the names of the folders and which messages are associated with which folders","prefix":"ng specific criteria.Note that, ","suffix":".Another important feature of IM"}]}]}

%% * unlike POP3, an IMAP server maintains user state information across IMAP sessions—forexample, the names of the folders and which messages are associated with which folders * show annotation

^t13hbqx9wym

%%

{"created":"2023-05-11T14:19:45.452Z","updated":"2023-05-11T14:19:45.452Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":335260,"end":335375},{"type":"TextQuoteSelector","exact":"Another important feature of IMAP is that it has commands that permit a user agent to obtaincomponents of messages.","prefix":"e associated with which folders.","suffix":" For example, a user agent can o"}]}]}

%% * Another important feature of IMAP is that it has commands that permit a user agent to obtaincomponents of messages. * show annotation

^zjwulaugf3

%%

{"created":"2023-05-11T14:19:58.134Z","updated":"2023-05-11T14:19:58.134Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":336114,"end":336233},{"type":"TextQuoteSelector","exact":"With this service, the user agent isan ordinary Web browser, and the user communicates with its remote mailbox via HTTP","prefix":"jor university and corporation. ","suffix":". When arecipient, such as Bob, "}]}]}

%% * With this service, the user agent isan ordinary Web browser, and the user communicates with its remote mailbox via HTTP * show annotation

^z4b6my7jmb

%%

{"created":"2023-05-11T14:20:14.108Z","updated":"2023-05-11T14:20:14.108Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":336435,"end":336704},{"type":"TextQuoteSelector","exact":"When a sender, such as Alice, wants to send an e-mail message, the e-mail message is sent from herbrowser to her mail server over HTTP rather than over SMTP. Alice’s mail server, however, still sendsmessages to, and receives messages from, other mail servers using SMTP","prefix":" than the POP3 or IMAP protocol.","suffix":".2.4 DNS—The Internet’s Director"}]}]}

%% * When a sender, such as Alice, wants to send an e-mail message, the e-mail message is sent from herbrowser to her mail server over HTTP rather than over SMTP. Alice’s mail server, however, still sendsmessages to, and receives messages from, other mail servers using SMTP * show annotation

^vkuo5cft8wr

%%

{"created":"2023-05-11T14:20:57.049Z","updated":"2023-05-11T14:20:57.049Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":412334,"end":412646},{"type":"TextQuoteSelector","exact":"a typical network applicationconsists of a pair of programs—a client program and a server program—residing in two different endsystems. When these two programs are executed, a client process and a server process are created,and these processes communicate with each other by reading from, and writing to, sockets","prefix":"d. Recall from Section 2.1 that ","suffix":". Whencreating a network applica"}]}]}

%% * a typical network applicationconsists of a pair of programs—a client program and a server program—residing in two different endsystems. When these two programs are executed, a client process and a server process are created,and these processes communicate with each other by reading from, and writing to, sockets * show annotation

^mcwlbw3jmb9

%%

{"created":"2023-05-11T14:21:06.233Z","updated":"2023-05-11T14:21:06.233Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":412780,"end":412921},{"type":"TextQuoteSelector","exact":"There are two types of network applications. One type is an implementation whose operation isspecified in a protocol standard, such as an RFC","prefix":"h the clientand server programs.","suffix":" or some other standards documen"}]}]}

%% * There are two types of network applications. One type is an implementation whose operation isspecified in a protocol standard, such as an RFC * show annotation

^jzpcj06i23

%%

{"created":"2023-05-11T14:21:31.616Z","updated":"2023-05-11T14:21:31.616Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":413959,"end":414159},{"type":"TextQuoteSelector","exact":"The other type of network application is a proprietary network application. In this case the client andserver programs employ an application-layer protocol that has not been openly published in an RFC","prefix":"nicating withBitTorrent tracker.","suffix":" orelsewhere. A single developer"}]}]}

%% * The other type of network application is a proprietary network application. In this case the client andserver programs employ an application-layer protocol that has not been openly published in an RFC * show annotation

^56xrhr7b98a

%%

{"created":"2023-05-11T14:21:49.757Z","updated":"2023-05-11T14:21:49.757Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":414829,"end":415079},{"type":"TextQuoteSelector","exact":"TCP is connection oriented and provides a reliable byte-streamchannel through which data flows between two end systems. UDP is connectionless and sendsindependent packets of data from one end system to the other, without any guarantees about delivery","prefix":"er TCP or over UDP. Recall that ","suffix":".Recall also that when a client "}]}]}

%% * TCP is connection oriented and provides a reliable byte-streamchannel through which data flows between two end systems. UDP is connectionless and sendsindependent packets of data from one end system to the other, without any guarantees about delivery * show annotation

^5f2wgpy8bb4

%%

{"created":"2023-05-11T14:23:13.315Z","updated":"2023-05-11T14:23:13.315Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":418348,"end":418428},{"type":"TextQuoteSelector","exact":"When a socket is created, an identifier, called a port number, is assignedto it.","prefix":"socket in the destination host. ","suffix":" So, as you might expect, the pa"}]}]}

%% * When a socket is created, an identifier, called a port number, is assignedto it. * show annotation

^qkx6ibte68s

%%

{"created":"2023-05-11T14:23:28.998Z","updated":"2023-05-11T14:23:28.998Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":418886,"end":418977},{"type":"TextQuoteSelector","exact":"attaching the source address to the packet istypically not done by the UDP application code","prefix":"ttached to the packet. However, ","suffix":"; instead it is automatically do"}]}]}

%% * attaching the source address to the packet istypically not done by the UDP application code * show annotation

^z5zgswdpp7h

%%

{"created":"2023-05-11T14:25:27.470Z","updated":"2023-05-11T14:25:27.470Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":427934,"end":428127},{"type":"TextQuoteSelector","exact":"Unlike UDP, TCP is a connection-oriented protocol. This means that before the client and server canstart to send data to each other, they first need to handshake and establish a TCP connection.","prefix":".7.2 Socket Programming with TCP","suffix":" One endof the TCP connection is"}]}]}

%% * Unlike UDP, TCP is a connection-oriented protocol. This means that before the client and server canstart to send data to each other, they first need to handshake and establish a TCP connection. * show annotation

^0timecc58sbj

%%

{"created":"2023-05-11T14:27:07.743Z","updated":"2023-05-11T14:27:07.743Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":428995,"end":429254},{"type":"TextQuoteSelector","exact":"the TCP servermust be running as a process before the client attempts to initiate contact. Second, the server programmust have a special door—more precisely, a special socket—that welcomes some initial contact from aclient process running on an arbitrary host","prefix":". First, as in the case of UDP, ","suffix":". Using our house/door analogy f"}]}]}

%% * the TCP servermust be running as a process before the client attempts to initiate contact. Second, the server programmust have a special door—more precisely, a special socket—that welcomes some initial contact from aclient process running on an arbitrary host * show annotation

^bk69gw3nzm

%%

{"created":"2023-05-11T14:27:43.202Z","updated":"2023-05-11T14:27:43.202Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":430718,"end":430840},{"type":"TextQuoteSelector","exact":"From the application’s perspective, the client’s socket and the server’s connection socket are directlyconnected by a pipe","prefix":" communicating with each client.","suffix":". As shown in Figure 2.28, the c"}]}]}

%% * From the application’s perspective, the client’s socket and the server’s connection socket are directlyconnected by a pipe * show annotation

^ijp25m60a1

%%

{"created":"2023-05-11T14:28:46.728Z","updated":"2023-05-11T14:28:46.728Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":470481,"end":470680},{"type":"TextQuoteSelector","exact":"the transport layer is a central piece of the layerednetwork architecture. It has the critical role of providing communication services directly to theapplication processes running on different hosts","prefix":"application and network layers, ","suffix":". The pedagogic approach we take"}]}]}

%% * the transport layer is a central piece of the layerednetwork architecture. It has the critical role of providing communication services directly to theapplication processes running on different hosts * show annotation

^6b0l7f6frs7

%%

{"created":"2023-05-11T14:29:41.163Z","updated":"2023-05-11T14:29:41.163Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":472563,"end":472822},{"type":"TextQuoteSelector","exact":"A transport-layer protocol provides for logical communication between application processes runningon different hosts. By logical communication, we mean that from an application’s perspective, it is as ifthe hosts running the processes were directly connected","prefix":"arned about the transport layer.","suffix":"; in reality, the hosts may be o"}]}]}

%% * A transport-layer protocol provides for logical communication between application processes runningon different hosts. By logical communication, we mean that from an application’s perspective, it is as ifthe hosts running the processes were directly connected * show annotation

^kk21hh9ozyh

%%

{"created":"2023-05-11T14:30:16.434Z","updated":"2023-05-11T14:30:16.434Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":473240,"end":473541},{"type":"TextQuoteSelector","exact":"transport-layer protocols are implemented in the end systems but not innetwork routers. On the sending side, the transport layer converts the application-layer messages itreceives from a sending application process into transport-layer packets, known as transport-layersegments in Internet terminology","prefix":"ication.As shown in Figure 3.1, ","suffix":". This is done by (possibly) bre"}]}]}

%% * transport-layer protocols are implemented in the end systems but not innetwork routers. On the sending side, the transport layer converts the application-layer messages itreceives from a sending application process into transport-layer packets, known as transport-layersegments in Internet terminology * show annotation

^ipswd2yb1y

%%

{"created":"2023-05-11T14:46:11.002Z","updated":"2023-05-11T14:46:11.002Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":473907,"end":474105},{"type":"TextQuoteSelector","exact":"It’s important to note that network routers act only on the network-layer fields of thedatagram; that is, they do not examine the fields of the transport-layer segment encapsulated with thedatagram.","prefix":"am) and sent to thedestination. ","suffix":" On the receiving side, the netw"}]}]}

%% * It’s important to note that network routers act only on the network-layer fields of thedatagram; that is, they do not examine the fields of the transport-layer segment encapsulated with thedatagram. * show annotation

^fhbajahpcrl

%%

{"created":"2023-05-11T14:46:50.603Z","updated":"2023-05-11T14:46:50.603Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":474763,"end":474835},{"type":"TextQuoteSelector","exact":"Whereas atransport-layer protocol provides logical communication between","prefix":"rk layer in the protocol stack. ","suffix":"Figure 3.1 The transport layer p"}]}]}

%% * Whereas atransport-layer protocol provides logical communication between * show annotation

^frqr7h1zz7b

%%

{"created":"2023-05-11T14:46:55.235Z","updated":"2023-05-11T14:46:55.235Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":474946,"end":475052},{"type":"TextQuoteSelector","exact":"processes running on different hosts, a network-layer protocol provides logical-communication betweenhosts","prefix":"ion betweenapplication processes","suffix":". This distinction is subtle but"}]}]}

%% * processes running on different hosts, a network-layer protocol provides logical-communication betweenhosts * show annotation

^0ga30pm9gdx

%%

{"created":"2023-05-11T14:48:07.996Z","updated":"2023-05-11T14:48:07.996Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":476774,"end":476975},{"type":"TextQuoteSelector","exact":"application messages  letters in envelopesprocesses  cousinshosts (also called end systems)  housestransport-layer protocol  Ann and Billnetwork-layer protocol  postal service (including mail carriers)","prefix":"yer relates to thenetwork layer:","suffix":"Continuing with this analogy, no"}]}]}

%% * application messages letters in envelopesprocesses cousinshosts (also called end systems) housestransport-layer protocol Ann and Billnetwork-layer protocol postal service (including mail carriers) * show annotation

^w5j241bkzrn

%%

{"created":"2023-05-11T14:48:20.680Z","updated":"2023-05-11T14:48:20.680Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":477221,"end":477271},{"type":"TextQuoteSelector","exact":"transport-layer protocols live in the end systems.","prefix":"l center to another. Similarly, ","suffix":" Within an end system,a transpor"}]}]}

%% * transport-layer protocols live in the end systems. * show annotation

^s95y20yi5r

%%

{"created":"2023-05-11T14:48:28.586Z","updated":"2023-05-11T14:48:28.586Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":477293,"end":477375},{"type":"TextQuoteSelector","exact":"a transport protocol moves messages from application processes to the network edge","prefix":"d systems. Within an end system,","suffix":" (that is, thenetwork layer) and"}]}]}

%% * a transport protocol moves messages from application processes to the network edge * show annotation

^0qjwg17fcq

%%

{"created":"2023-05-11T14:48:57.858Z","updated":"2023-05-11T14:48:57.858Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":478907,"end":479040},{"type":"TextQuoteSelector","exact":"the services that a transport protocol can provide are often constrained by the servicemodel of the underlying network-layer protocol","prefix":"usin pairs. In asimilar manner, ","suffix":". If the network-layer protocol "}]}]}

%% * the services that a transport protocol can provide are often constrained by the servicemodel of the underlying network-layer protocol * show annotation

^0q5p6yndj2i

%%

{"created":"2023-05-11T14:49:19.232Z","updated":"2023-05-11T14:49:19.232Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":479505,"end":479639},{"type":"TextQuoteSelector","exact":"a transport protocol can offer reliable data transfer service to an application even when theunderlying network protocol is unreliable","prefix":"e, as we’ll see in thischapter, ","suffix":", that is, even when the network"}]}]}

%% * a transport protocol can offer reliable data transfer service to an application even when theunderlying network protocol is unreliable * show annotation

^lo1ddoppg4b

%%

{"created":"2023-05-11T14:49:27.896Z","updated":"2023-05-11T14:49:27.896Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":479806,"end":479909},{"type":"TextQuoteSelector","exact":"a transport protocol can use encryption to guarantee that application messages are not readby intruders","prefix":"en we discuss networksecurity), ","suffix":", even when the network layer ca"}]}]}

%% * a transport protocol can use encryption to guarantee that application messages are not readby intruders * show annotation

^b6v4g1lq7pp

%%

{"created":"2023-05-11T14:49:42.087Z","updated":"2023-05-11T14:49:42.087Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":480161,"end":480449},{"type":"TextQuoteSelector","exact":"One of these protocols is UDP (User Datagram Protocol), which provides an unreliable, connectionlessservice to the invoking application. The second of these protocols is TCP (Transmission ControlProtocol), which provides a reliable, connection-oriented service to the invoking application","prefix":"ilable to the application layer.","suffix":". Whendesigning a network applic"}]}]}

%% * One of these protocols is UDP (User Datagram Protocol), which provides an unreliable, connectionlessservice to the invoking application. The second of these protocols is TCP (Transmission ControlProtocol), which provides a reliable, connection-oriented service to the invoking application * show annotation

^oh6scrvumce

%%

{"created":"2023-05-11T14:49:49.088Z","updated":"2023-05-11T14:49:49.088Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":480690,"end":480741},{"type":"TextQuoteSelector","exact":"we refer to the transport-layer packet as a segment","prefix":"ockets.To simplify terminology, ","suffix":". We mention, however, thatthe I"}]}]}

%% * we refer to the transport-layer packet as a segment * show annotation

^w8wqxs54ee

%%

{"created":"2023-05-11T14:50:18.962Z","updated":"2023-05-11T14:50:18.962Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":481555,"end":481728},{"type":"TextQuoteSelector","exact":"The IP service model is a best-effort delivery service. This means thatIP makes its “best effort” to deliver segments between communicating hosts, but it makes noguarantees.","prefix":"calcommunication between hosts. ","suffix":" In particular, it does not guar"}]}]}

%% * The IP service model is a best-effort delivery service. This means thatIP makes its “best effort” to deliver segments between communicating hosts, but it makes noguarantees. * show annotation

^a6e6dc9ixhl

%%

{"created":"2023-05-11T14:50:27.329Z","updated":"2023-05-11T14:50:27.329Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":481923,"end":481961},{"type":"TextQuoteSelector","exact":"IPis said to be an unreliable service.","prefix":"he segments. For these reasons, ","suffix":" We also mention here that every"}]}]}

%% * IPis said to be an unreliable service. * show annotation

^jnb3q13994c

%%

{"created":"2023-05-11T14:50:51.776Z","updated":"2023-05-11T14:50:51.776Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":482481,"end":482600},{"type":"TextQuoteSelector","exact":"Extending host-to-host delivery to process-to-process delivery is called transport-layer multiplexingand demultiplexing","prefix":"sses running on the end systems.","suffix":". We’ll discuss transport-layer "}]}]}

%% * Extending host-to-host delivery to process-to-process delivery is called transport-layer multiplexingand demultiplexing * show annotation

^sv1l7mnixwb

%%

{"created":"2023-05-11T14:52:22.857Z","updated":"2023-05-11T14:52:22.857Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":486376,"end":486448},{"type":"TextQuoteSelector","exact":"a process (as part of a network application) can have one or moresockets","prefix":"st recall from Section 2.7 that ","suffix":", doors through which data passe"}]}]}

%% * a process (as part of a network application) can have one or moresockets * show annotation

^hsj8tbixkid

%%

{"created":"2023-05-11T14:53:29.496Z","updated":"2023-05-11T14:53:29.496Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":487159,"end":487667},{"type":"TextQuoteSelector","exact":"At the receivingend, the transport layer examines these fields to identify the receiving socket and then directs thesegment to that socket. This job of delivering the data in a transport-layer segment to the correct socketis called demultiplexing. The job of gathering data chunks at the source host from different sockets,encapsulating each data chunk with header information (that will later be used in demultiplexing) tocreate segments, and passing the segments to the network layer is called multiplexing","prefix":"n the segment for this purpose. ","suffix":". Note that thetransport layer i"}]}]}

%% * At the receivingend, the transport layer examines these fields to identify the receiving socket and then directs thesegment to that socket. This job of delivering the data in a transport-layer segment to the correct socketis called demultiplexing. The job of gathering data chunks at the source host from different sockets,encapsulating each data chunk with header information (that will later be used in demultiplexing) tocreate segments, and passing the segments to the network layer is called multiplexing * show annotation

^iysaq6ydhu

%%

{"created":"2023-05-11T14:55:21.436Z","updated":"2023-05-11T14:55:21.436Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":488581,"end":488926},{"type":"TextQuoteSelector","exact":"When Bill receives a batch of mail from the mail carrier, heperforms a demultiplexing operation by observing to whom the letters are addressed and then handdelivering the mail to his brothers and sisters. Ann performs a multiplexing operation when she collectsletters from her brothers and sisters and gives the collected mail to the mail person","prefix":" identified by his or her name. ","suffix":".Now that we understand the role"}]}]}

%% * When Bill receives a batch of mail from the mail carrier, heperforms a demultiplexing operation by observing to whom the letters are addressed and then handdelivering the mail to his brothers and sisters. Ann performs a multiplexing operation when she collectsletters from her brothers and sisters and gives the collected mail to the mail person * show annotation

^qqgd3o92rsc

%%

{"created":"2023-05-11T14:55:34.257Z","updated":"2023-05-11T14:55:34.257Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":489088,"end":489289},{"type":"TextQuoteSelector","exact":"we know that transport-layer multiplexingrequires (1) that sockets have unique identifiers, and (2) that each segment have special fields thatindicate the socket to which the segment is to be delivered","prefix":"ost. From the discussion above, ","suffix":". These special fields, illustra"}]}]}

%% * we know that transport-layer multiplexingrequires (1) that sockets have unique identifiers, and (2) that each segment have special fields thatindicate the socket to which the segment is to be delivered * show annotation

^saror3lr9h

%%

{"created":"2023-05-11T14:55:46.274Z","updated":"2023-05-11T14:55:46.274Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":489347,"end":489409},{"type":"TextQuoteSelector","exact":"source port number field and the destination port number field","prefix":"lustrated in Figure3.3, are the ","suffix":". (The UDP and TCPsegments have "}]}]}

%% * source port number field and the destination port number field * show annotation

^znm5el7a6n8

%%

{"created":"2023-05-11T14:58:02.340Z","updated":"2023-05-11T14:58:02.340Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":494398,"end":494483},{"type":"TextQuoteSelector","exact":"source IP address, source port number, destination IP address,destination port number","prefix":"is identified by a four-tuple: (","suffix":"). Thus, when a TCP segment arri"}]}]}

%% * source IP address, source port number, destination IP address,destination port number * show annotation

^w7yubkv5rp

%%

{"created":"2023-05-11T14:58:08.145Z","updated":"2023-05-11T14:58:08.145Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":494286,"end":494359},{"type":"TextQuoteSelector","exact":"One subtle difference between a TCP socket and a UDP socket is that a TCP","prefix":"nd TCPconnection establishment. ","suffix":"socket is identified by a four-t"}]}]}

%% * One subtle difference between a TCP socket and a UDP socket is that a TCP * show annotation

^2tat2zz0q86

%%

{"created":"2023-05-11T14:58:10.866Z","updated":"2023-05-11T14:58:10.866Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":494359,"end":494395},{"type":"TextQuoteSelector","exact":"socket is identified by a four-tuple","prefix":"t and a UDP socket is that a TCP","suffix":": (source IP address, source por"}]}]}

%% * socket is identified by a four-tuple * show annotation

^x8fxaomu97q

%%

{"created":"2023-05-11T14:58:37.999Z","updated":"2023-05-11T14:58:37.999Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":494720,"end":494959},{"type":"TextQuoteSelector","exact":"in contrast with UDP, two arriving TCP segments with different source IP addresses orsource port numbers will (with the exception of a TCP segment carrying the original connection-establishment request) be directed to two different sockets","prefix":" port numbersIn particular, and ","suffix":". To gain further insight, let’s"}]}]}

%% * in contrast with UDP, two arriving TCP segments with different source IP addresses orsource port numbers will (with the exception of a TCP segment carrying the original connection-establishment request) be directed to two different sockets * show annotation

^60i2146d1tx

%%

{"created":"2023-05-11T15:00:26.748Z","updated":"2023-05-11T15:00:26.748Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":503309,"end":503534},{"type":"TextQuoteSelector","exact":"UDP takes messages from the application process, attaches source and destination port numberfields for the multiplexing/demultiplexing service, adds two other small fields, and passes the resultingsegment to the network layer","prefix":"almost directly talking withIP. ","suffix":". The network layer encapsulates"}]}]}

%% * UDP takes messages from the application process, attaches source and destination port numberfields for the multiplexing/demultiplexing service, adds two other small fields, and passes the resultingsegment to the network layer * show annotation

^ifa1l973ad8

%%

{"created":"2023-05-11T15:00:54.430Z","updated":"2023-05-11T15:00:54.430Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":504016,"end":504411},{"type":"TextQuoteSelector","exact":"DNS is an example of an application-layer protocol that typically uses UDP. When the DNS applicationin a host wants to make a query, it constructs a DNS query message and passes the message to UDP.Without performing any handshaking with the UDP entity running on the destination end system, thehost-side UDP adds header fields to the message and passes the resulting segment to the networklayer.","prefix":"UDP is said to beconnectionless.","suffix":" The network layer encapsulates "}]}]}

%% * DNS is an example of an application-layer protocol that typically uses UDP. When the DNS applicationin a host wants to make a query, it constructs a DNS query message and passes the message to UDP.Without performing any handshaking with the UDP entity running on the destination end system, thehost-side UDP adds header fields to the message and passes the resulting segment to the networklayer. * show annotation

^7f38uxofdm6

%%

{"created":"2023-05-11T15:01:06.910Z","updated":"2023-05-11T15:01:06.910Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":505151,"end":505215},{"type":"TextQuoteSelector","exact":"Finer application-level control over what data is sent, and when","prefix":"or UDPfor the following reasons:","suffix":". Under UDP, as soon as anapplic"}]}]}

%% * Finer application-level control over what data is sent, and when * show annotation

^x2xpaq1tf4

%%

{"created":"2023-05-11T15:01:12.534Z","updated":"2023-05-11T15:01:12.534Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":506159,"end":506186},{"type":"TextQuoteSelector","exact":"No connection establishment","prefix":"frills segment-delivery service.","suffix":". As we’ll discuss later, TCP us"}]}]}

%% * No connection establishment * show annotation

^34h966p5dzg

%%

{"created":"2023-05-11T15:01:17.029Z","updated":"2023-05-11T15:01:17.029Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":507002,"end":507021},{"type":"TextQuoteSelector","exact":"No connection state","prefix":"on-layer protocol on top of UDP.","suffix":". TCP maintains connection state"}]}]}

%% * No connection state * show annotation

^or1bwwu4ph

%%

{"created":"2023-05-11T15:01:20.659Z","updated":"2023-05-11T15:01:20.659Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":507620,"end":507648},{"type":"TextQuoteSelector","exact":"Small packet header overhead","prefix":"n runs over UDP rather than TCP.","suffix":". The TCP segment has 20 bytes o"}]}]}

%% * Small packet header overhead * show annotation

^bccwause84g

%%

{"created":"2023-05-11T15:02:26.206Z","updated":"2023-05-11T15:02:26.206Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":510567,"end":510716},{"type":"TextQuoteSelector","exact":"it is possible for an application to havereliable data transfer when using UDP. This can be done if reliability is built into the application itself ","prefix":"ment structure, we mention that ","suffix":"(forexample, by adding acknowled"}]}]}

%% * it is possible for an application to havereliable data transfer when using UDP. This can be done if reliability is built into the application itself * show annotation

^yb427q32wb

%%

{"created":"2023-05-11T15:03:25.407Z","updated":"2023-05-11T15:03:25.407Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":512692,"end":512737},{"type":"TextQuoteSelector","exact":"The UDP checksum provides for error detection","prefix":"der, in bytes.3.3.2 UDP Checksum","suffix":". That is, the checksum is used "}]}]}

%% * The UDP checksum provides for error detection * show annotation

^1izhb153goo

%%

{"created":"2023-05-11T15:04:39.983Z","updated":"2023-05-11T15:04:39.983Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":561205,"end":561372},{"type":"TextQuoteSelector","exact":"TCP is said to be connection-oriented because before one application process can begin to send datato another, the two processes must first “handshake” with each other","prefix":"FC 2581.3.5.1 The TCP Connection","suffix":"—that is, they must send somepre"}]}]}

%% * TCP is said to be connection-oriented because before one application process can begin to send datato another, the two processes must first “handshake” with each other * show annotation

^yquc6q4mh78

%%

{"created":"2023-05-11T15:04:52.680Z","updated":"2023-05-11T15:04:52.680Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":561949,"end":562067},{"type":"TextQuoteSelector","exact":"TCP protocol runs only in the end systems and not in theintermediate network elements (routers and link-layer switches","prefix":"ystems. Recall that because the ","suffix":"), the intermediate network elem"}]}]}

%% * TCP protocol runs only in the end systems and not in theintermediate network elements (routers and link-layer switches * show annotation

^k15gxu6tvc7

%%

{"created":"2023-05-11T15:05:10.743Z","updated":"2023-05-11T15:05:10.743Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":562255,"end":562636},{"type":"TextQuoteSelector","exact":"A TCP connection provides a full-duplex service: If there is a TCP connection between Process A onone host and Process B on another host, then application-layer data can flow from Process A toProcess B at the same time as application-layer data flows from Process B to Process A. A TCPconnection is also always point-to-point, that is, between a single sender and a single receiver","prefix":" see datagrams, not connections.","suffix":". So-called “multicasting” (see "}]}]}

%% * A TCP connection provides a full-duplex service: If there is a TCP connection between Process A onone host and Process B on another host, then application-layer data can flow from Process A toProcess B at the same time as application-layer data flows from Process B to Process A. A TCPconnection is also always point-to-point, that is, between a single sender and a single receiver * show annotation

^vy878omb3go

%%

{"created":"2023-05-11T15:05:46.749Z","updated":"2023-05-11T15:05:46.749Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":565679,"end":565698},{"type":"TextQuoteSelector","exact":"three-way handshake","prefix":"cedure is oftenreferred to as a ","suffix":".Once a TCP connection is establ"}]}]}

%% * three-way handshake * show annotation

^ncfqg6lrda

%%

{"created":"2023-05-11T15:06:05.942Z","updated":"2023-05-11T15:06:05.942Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":566111,"end":566249},{"type":"TextQuoteSelector","exact":"TCP directs this data to the connection’s send buffer, which is one of the buffers that is set aside duringthe initial three-way handshake","prefix":"client. As shown in Figure 3.28,","suffix":". From time to time, TCP will gr"}]}]}

%% * TCP directs this data to the connection’s send buffer, which is one of the buffers that is set aside duringthe initial three-way handshake * show annotation

^b01t4jzhwbq

%%

{"created":"2023-05-11T15:06:38.223Z","updated":"2023-05-11T15:06:38.223Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":567586,"end":567793},{"type":"TextQuoteSelector","exact":"TCP pairs each chunk of client data with a TCP header, thereby forming TCP segments. The segmentsare passed down to the network layer, where they are separately encapsulated within network-layer IPdatagrams.","prefix":"h it, as it is well entrenched.)","suffix":" The IP datagrams are then sent "}]}]}

%% * TCP pairs each chunk of client data with a TCP header, thereby forming TCP segments. The segmentsare passed down to the network layer, where they are separately encapsulated within network-layer IPdatagrams. * show annotation

^8yz3gxi453j

%%

{"created":"2023-05-11T15:08:17.827Z","updated":"2023-05-11T15:08:17.827Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":572043,"end":572241},{"type":"TextQuoteSelector","exact":"Two of the most important fields in the TCP segment header are the sequence number field and theacknowledgment number field. These fields are a critical part of TCP’s reliable data transfer service.","prefix":"mbers and Acknowledgment Numbers","suffix":" Butbefore discussing how these "}]}]}

%% * Two of the most important fields in the TCP segment header are the sequence number field and theacknowledgment number field. These fields are a critical part of TCP’s reliable data transfer service. * show annotation

^wsl4m7ajrxm

%%

{"created":"2023-05-11T15:08:34.935Z","updated":"2023-05-11T15:08:34.935Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":572657,"end":572759},{"type":"TextQuoteSelector","exact":"The sequence number for a segment is therefore the byte-streamnumber of the first byte in the segment.","prefix":"series of transmitted segments. ","suffix":" Let’s look at an example. Suppo"}]}]}

%% * The sequence number for a segment is therefore the byte-streamnumber of the first byte in the segment. * show annotation

^qbrag81auj8

%%

{"created":"2023-05-11T15:09:16.726Z","updated":"2023-05-11T15:09:16.726Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":573575,"end":573719},{"type":"TextQuoteSelector","exact":"Recallthat TCP is full-duplex, so that Host A may be receiving data from Host B while it sends data to Host B(as part of the same TCP connection","prefix":"trickier than sequence numbers. ","suffix":"). Each of the segments that arr"}]}]}

%% * Recallthat TCP is full-duplex, so that Host A may be receiving data from Host B while it sends data to Host B(as part of the same TCP connection * show annotation

^e2rzm2utp5f

%%

{"created":"2023-05-11T15:09:28.030Z","updated":"2023-05-11T15:09:28.030Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":573822,"end":573950},{"type":"TextQuoteSelector","exact":"The acknowledgment number that Host A puts in its segment isthe sequence number of the next byte Host A is expecting from Host B","prefix":"r the data flowing from B to A. ","suffix":". It is good to look at a fewexa"}]}]}

%% * The acknowledgment number that Host A puts in its segment isthe sequence number of the next byte Host A is expecting from Host B * show annotation

^anqbts7cyz

%%

{"created":"2023-05-11T15:09:52.395Z","updated":"2023-05-11T15:09:52.395Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":574735,"end":574864},{"type":"TextQuoteSelector","exact":"Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP issaid to provide cumulative acknowledgments.","prefix":"the acknowledgmentnumber field. ","suffix":"This last example also brings up"}]}]}

%% * Because TCP only acknowledges bytes up to the first missing byte in the stream, TCP issaid to provide cumulative acknowledgments. * show annotation

^g67bw9ca4ff

%%

{"created":"2023-05-11T15:25:33.071Z","updated":"2023-05-11T15:25:33.071Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":581411,"end":581593},{"type":"TextQuoteSelector","exact":"The sample RTT, denoted  SampleRTT,for a segment is the amount of time between when the segment is sent (that is, passed to IP) and whenan acknowledgment for the segment is received.","prefix":"his is accomplished as follows. ","suffix":" Instead of measuring a  SampleR"}]}]}

%% * The sample RTT, denoted SampleRTT,for a segment is the amount of time between when the segment is sent (that is, passed to IP) and whenan acknowledgment for the segment is received. * show annotation

^ko2wrz3ey3

%%

{"created":"2023-05-11T15:27:46.148Z","updated":"2023-05-11T15:27:46.148Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":587996,"end":588087},{"type":"TextQuoteSelector","exact":"TCP creates a reliable data transfer service on top of IP’s unreliable best-effort service.","prefix":"fer from these problems as well.","suffix":" TCP’s reliabledata transfer ser"}]}]}

%% * TCP creates a reliable data transfer service on top of IP’s unreliable best-effort service. * show annotation

^4edm3rvrybl

%%

{"created":"2023-05-11T15:27:50.324Z","updated":"2023-05-11T15:27:50.324Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":588185,"end":588270},{"type":"TextQuoteSelector","exact":"TCP receive buffer isuncorrupted, without gaps, without duplication, and in sequence;","prefix":"that a process reads out of its ","suffix":" that is, the byte stream is exa"}]}]}

%% * TCP receive buffer isuncorrupted, without gaps, without duplication, and in sequence; * show annotation

^wtv7uie848l

%%

{"created":"2023-05-11T15:29:19.618Z","updated":"2023-05-11T15:29:19.618Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":595996,"end":596117},{"type":"TextQuoteSelector","exact":" duplicate ACK is an ACKthat reacknowledges a segment for which the sender has already received an earlier acknowledgment","prefix":"ting so-called duplicate ACKs. A","suffix":".To understand the sender’s resp"}]}]}

%% * duplicate ACK is an ACKthat reacknowledges a segment for which the sender has already received an earlier acknowledgment * show annotation

^y68fvv8pm0e

%%

{"created":"2023-05-11T15:31:05.093Z","updated":"2023-05-11T15:31:05.093Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":601481,"end":601575},{"type":"TextQuoteSelector","exact":"TCP’s error-recovery mechanism is probably bestcategorized as a hybrid of GBN and SR protocols","prefix":" our generic SR protocol. Thus, ","suffix":".3.5.5 Flow ControlRecall that t"}]}]}

%% * TCP’s error-recovery mechanism is probably bestcategorized as a hybrid of GBN and SR protocols * show annotation

^fb28aia0fzd

%%

{"created":"2023-05-11T15:31:17.367Z","updated":"2023-05-11T15:31:17.367Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":601086,"end":601473},{"type":"TextQuoteSelector","exact":"selective acknowledgment [RFC 2018], allows a TCPreceiver to acknowledge out-of-order segments selectively rather than just cumulatively acknowledgingthe last correctly received, in-order segment. When combined with selective retransmission—skippingthe retransmission of segments that have already been selectively acknowledged by the receiver—TCPlooks a lot like our generic SR protocol","prefix":"ification to TCP, the so-called ","suffix":". Thus, TCP’s error-recovery mec"}]}]}

%% * selective acknowledgment [RFC 2018], allows a TCPreceiver to acknowledge out-of-order segments selectively rather than just cumulatively acknowledgingthe last correctly received, in-order segment. When combined with selective retransmission—skippingthe retransmission of segments that have already been selectively acknowledged by the receiver—TCPlooks a lot like our generic SR protocol * show annotation

^w4epnh272l8

%%

{"created":"2023-05-11T15:31:48.062Z","updated":"2023-05-11T15:31:48.062Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":602256,"end":602388},{"type":"TextQuoteSelector","exact":"TCP provides a flow-control service to its applications to eliminate the possibility of the senderoverflowing the receiver’s buffer.","prefix":"quickly.n<N N−1n+1,n+2,...,N.n+1","suffix":" Flow control is thus a speed-ma"}]}]}

%% * TCP provides a flow-control service to its applications to eliminate the possibility of the senderoverflowing the receiver’s buffer. * show annotation

^o2ys3hud5yk

%%

{"created":"2023-05-11T15:31:54.326Z","updated":"2023-05-11T15:31:54.326Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":602389,"end":602545},{"type":"TextQuoteSelector","exact":"Flow control is thus a speed-matching service—matching the rate atwhich the sender is sending against the rate at which the receiving application is reading","prefix":"rflowing the receiver’s buffer. ","suffix":". As notedearlier, a TCP sender "}]}]}

%% * Flow control is thus a speed-matching service—matching the rate atwhich the sender is sending against the rate at which the receiving application is reading * show annotation

^4r1hi3a9oh5

%%

{"created":"2023-05-11T15:32:15.420Z","updated":"2023-05-11T15:32:15.420Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":603266,"end":603482},{"type":"TextQuoteSelector","exact":"TCP provides flow control by having the sender maintain a variable called the receive window.Informally, the receive window is used to give the sender an idea of how much free buffer space isavailable at the receiver","prefix":"r discards out-of-ordersegments.","suffix":". Because TCP is full-duplex, th"}]}]}

%% * TCP provides flow control by having the sender maintain a variable called the receive window.Informally, the receive window is used to give the sender an idea of how much free buffer space isavailable at the receiver * show annotation

^x2sohwy30xn

%%

{"created":"2023-05-11T15:33:13.352Z","updated":"2023-05-11T15:33:13.352Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":612398,"end":612516},{"type":"TextQuoteSelector","exact":"During the life of a TCP connection, the TCP protocol running in each host makes transitions throughvarious TCP states","prefix":"e two hosts are now deallocated.","suffix":". Figure 3.41 illustrates a typi"}]}]}

%% * During the life of a TCP connection, the TCP protocol running in each host makes transitions throughvarious TCP states * show annotation

^y39xzlelczh

%%

{"created":"2023-05-11T15:34:49.752Z","updated":"2023-05-11T15:34:49.752Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":636490,"end":636676},{"type":"TextQuoteSelector","exact":"TCP must use end-to-endcongestion control rather than network-assisted congestion control, since the IP layer provides noexplicit feedback to the end systems regarding network congestion","prefix":"icated in the previous section, ","suffix":".The approach taken by TCP is to"}]}]}

%% * TCP must use end-to-endcongestion control rather than network-assisted congestion control, since the IP layer provides noexplicit feedback to the end systems regarding network congestion * show annotation

^aua7v3sy8yu

%%

{"created":"2023-05-11T15:35:02.541Z","updated":"2023-05-11T15:35:02.541Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":636678,"end":636831},{"type":"TextQuoteSelector","exact":"he approach taken by TCP is to have each sender limit the rate at which it sends traffic into itsconnection as a function of perceived network congestion","prefix":"s regarding network congestion.T","suffix":". If a TCP sender perceives that"}]}]}

%% * he approach taken by TCP is to have each sender limit the rate at which it sends traffic into itsconnection as a function of perceived network congestion * show annotation

^qbbvezz6ud

%%

{"created":"2023-05-11T15:35:27.512Z","updated":"2023-05-11T15:35:27.512Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":637705,"end":637952},{"type":"TextQuoteSelector","exact":"The TCP congestion-control mechanismoperating at the sender keeps track of an additional variable, the congestion window. The congestionwindow, denoted  cwnd, imposes a constraint on the rate at which a TCP sender can send traffic intothe network.","prefix":"astByteRead,  rwnd, and so on). ","suffix":" Specifically, the amount of una"}]}]}

%% * The TCP congestion-control mechanismoperating at the sender keeps track of an additional variable, the congestion window. The congestionwindow, denoted cwnd, imposes a constraint on the rate at which a TCP sender can send traffic intothe network. * show annotation

^g9xtsehinuf

%%

{"created":"2023-05-11T15:37:33.221Z","updated":"2023-05-11T15:37:33.221Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":640796,"end":640922},{"type":"TextQuoteSelector","exact":"Because TCP uses acknowledgments to trigger (or clock) its increase in congestion window size, TCPis said to be self-clocking.","prefix":" will be increased more quickly.","suffix":"Given the mechanism of adjusting"}]}]}

%% * Because TCP uses acknowledgments to trigger (or clock) its increase in congestion window size, TCPis said to be self-clocking. * show annotation

^6qv7sbcuz0y

%%

{"created":"2023-05-11T15:37:47.986Z","updated":"2023-05-11T15:37:47.986Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":641993,"end":642103},{"type":"TextQuoteSelector","exact":"A lost segment implies congestion, and hence, the TCP sender’s rate should be decreasedwhen a segment is lost.","prefix":"he following guiding principles:","suffix":" Recall from our discussion in S"}]}]}

%% * A lost segment implies congestion, and hence, the TCP sender’s rate should be decreasedwhen a segment is lost. * show annotation

^f3ckvej3lgl

%%

{"created":"2023-05-11T15:37:55.432Z","updated":"2023-05-11T15:37:55.432Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":642615,"end":642822},{"type":"TextQuoteSelector","exact":"An acknowledged segment indicates that the network is delivering the sender’s segments tothe receiver, and hence, the sender’s rate can be increased when an ACK arrives for apreviously unacknowledged segment","prefix":"nse to this inferred loss event.","suffix":". The arrival of acknowledgments"}]}]}

%% * An acknowledged segment indicates that the network is delivering the sender’s segments tothe receiver, and hence, the sender’s rate can be increased when an ACK arrives for apreviously unacknowledged segment * show annotation

^x71zksyus1q

%%

{"created":"2023-05-11T15:38:09.140Z","updated":"2023-05-11T15:38:09.140Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":643060,"end":643077},{"type":"TextQuoteSelector","exact":"Bandwidth probing","prefix":"ndow size can thus be increased.","suffix":". Given ACKs indicating a conges"}]}]}

%% * Bandwidth probing * show annotation

^138yve5zywak

%%

{"created":"2023-05-11T15:38:18.698Z","updated":"2023-05-11T15:38:18.698Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":644685,"end":644695},{"type":"TextQuoteSelector","exact":"Slow Start","prefix":"t not required, for TCP senders.","suffix":"When a TCP connection begins, th"}]}]}

%% * Slow Start * show annotation

^i1h21dmd64d

%%

{"created":"2023-05-11T15:38:34.755Z","updated":"2023-05-11T15:38:34.755Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":645134,"end":645270},{"type":"TextQuoteSelector","exact":"in the slow-start state, the value of  cwnd begins at 1MSS and increases by 1 MSS every time a transmitted segment is first acknowledged","prefix":"ilable bandwidth quickly. Thus, ","suffix":". In the example ofFigure 3.50, "}]}]}

%% * in the slow-start state, the value of cwnd begins at 1MSS and increases by 1 MSS every time a transmitted segment is first acknowledged * show annotation

^nxd5c2b7lj

%%

{"created":"2023-05-11T15:38:49.987Z","updated":"2023-05-11T15:38:49.987Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":645976,"end":646125},{"type":"TextQuoteSelector","exact":"if there is a loss event (i.e., congestion) indicated by a timeout, the TCP sender sets the value ofcwnd to 1 and begins the slow start process anew.","prefix":"answers to this question.First, ","suffix":" It also sets the value of a sec"}]}]}

%% * if there is a loss event (i.e., congestion) indicated by a timeout, the TCP sender sets the value ofcwnd to 1 and begins the slow start process anew. * show annotation

^3ct00u9alya

%%

{"created":"2023-05-11T15:39:02.553Z","updated":"2023-05-11T15:39:02.553Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":646583,"end":646690},{"type":"TextQuoteSelector","exact":"when the value of  cwnd equals  ssthresh, slow start ends and TCP transitionsinto congestion avoidance mode","prefix":"ses the value ofssthresh. Thus, ","suffix":". As we’ll see, TCP increases  c"}]}]}

%% * when the value of cwnd equals ssthresh, slow start ends and TCP transitionsinto congestion avoidance mode * show annotation

^oqkme12pa4

%%

{"created":"2023-05-11T15:39:20.335Z","updated":"2023-05-11T15:39:20.335Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":647246,"end":647579},{"type":"TextQuoteSelector","exact":"On entry to the congestion-avoidance state, the value of  cwnd is approximately half its value whencongestion was last encountered—congestion could be just around the corner! Thus, rather thandoubling the value of  cwnd every RTT, TCP adopts a more conservative approach and increases thevalue of  cwnd by just a single MSS every RTT","prefix":"[Jain 1986].Congestion Avoidance","suffix":" [RFC 5681]. This can be accompl"}]}]}

%% * On entry to the congestion-avoidance state, the value of cwnd is approximately half its value whencongestion was last encountered—congestion could be just around the corner! Thus, rather thandoubling the value of cwnd every RTT, TCP adopts a more conservative approach and increases thevalue of cwnd by just a single MSS every RTT * show annotation

^aj74h2cmaqn

%%

{"created":"2023-05-11T15:39:38.859Z","updated":"2023-05-11T15:39:38.859Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":649054,"end":649217},{"type":"TextQuoteSelector","exact":"In fast recovery, the value of  cwnd is increased by 1 MSS for every duplicate ACK received for themissing segment that caused TCP to enter the fast-recovery state","prefix":"te is then entered.Fast Recovery","suffix":". Eventually, when an ACK arrive"}]}]}

%% * In fast recovery, the value of cwnd is increased by 1 MSS for every duplicate ACK received for themissing segment that caused TCP to enter the fast-recovery state * show annotation

^xxsqybtwbn

%%

{"created":"2023-05-11T15:41:11.844Z","updated":"2023-05-11T15:41:11.844Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":654671,"end":654769},{"type":"TextQuoteSelector","exact":"TCP congestion control is often referred to as an additive-increase,multiplicative-decrease (AIMD)","prefix":"cate-ACKevent. For this reason, ","suffix":" form of congestion control. AIM"}]}]}

%% * TCP congestion control is often referred to as an additive-increase,multiplicative-decrease (AIMD) * show annotation

^ces08uywihm

%%

{"created":"2023-05-11T15:43:18.328Z","updated":"2023-05-11T15:43:18.328Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":665716,"end":665943},{"type":"TextQuoteSelector","exact":"When running over UDP, applications can pump theiraudio and video into the network at a constant rate and occasionally lose packets, rather than reducetheir rates to “fair” levels at times of congestion and not lose any packets","prefix":"ve built-in congestion control. ","suffix":". From the perspective of TCP,th"}]}]}

%% * When running over UDP, applications can pump theiraudio and video into the network at a constant rate and occasionally lose packets, rather than reducetheir rates to “fair” levels at times of congestion and not lose any packets * show annotation

^zmkbmkekby

%%

{"created":"2023-05-11T15:44:23.036Z","updated":"2023-05-11T15:44:23.036Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":668094,"end":668243},{"type":"TextQuoteSelector","exact":"extensions to both IP and TCP [RFC 3168] have beenproposed, implemented, and deployed that allow the network to explicitly signal congestion to a TCP","prefix":"ved packet loss. More recently, ","suffix":"sender and receiver. This form o"}]}]}

%% * extensions to both IP and TCP [RFC 3168] have beenproposed, implemented, and deployed that allow the network to explicitly signal congestion to a TCP * show annotation

^cw8z7eambv

%%

{"created":"2023-05-11T15:44:26.697Z","updated":"2023-05-11T15:44:26.697Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":668243,"end":668356},{"type":"TextQuoteSelector","exact":"sender and receiver. This form of network-assisted congestion control is known as Explicit CongestionNotification","prefix":"citly signal congestion to a TCP","suffix":". As shown in Figure 3.56, the T"}]}]}

%% * sender and receiver. This form of network-assisted congestion control is known as Explicit CongestionNotification * show annotation

^7mat2cvj37a

%%

{"created":"2023-05-11T15:44:40.001Z","updated":"2023-05-11T15:44:40.001Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":668421,"end":668596},{"type":"TextQuoteSelector","exact":"At the network layer, two bits (with four possible values, overall) in the Type of Service field of the IPdatagram header (which we’ll discuss in Section 4.3) are used for ECN","prefix":"P and IP protocols are involved.","suffix":". One setting of the ECN bits is"}]}]}

%% * At the network layer, two bits (with four possible values, overall) in the Type of Service field of the IPdatagram header (which we’ll discuss in Section 4.3) are used for ECN * show annotation

^xp1a8afc1a9

%%

{"created":"2023-05-11T15:45:36.084Z","updated":"2023-05-11T15:45:36.084Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":725118,"end":725300},{"type":"TextQuoteSelector","exact":"The primary role of the network layer is deceptively simple—to move packets from a sending host to areceiving host. To do so, two important network-layer functions can be identified:","prefix":"ing: The Data and Control Planes","suffix":"Forwarding. When a packet arrive"}]}]}

%% * The primary role of the network layer is deceptively simple—to move packets from a sending host to areceiving host. To do so, two important network-layer functions can be identified: * show annotation

^gu7rujff60e

%%

{"created":"2023-05-11T15:45:46.526Z","updated":"2023-05-11T15:45:46.526Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":725300,"end":725545},{"type":"TextQuoteSelector","exact":"Forwarding. When a packet arrives at a router’s input link, the router must move the packet to theappropriate output link. For example, a packet arriving from Host H1 to Router R1 in Figure 4.1 mustbe forwarded to the next router on a path to H2","prefix":"yer functions can be identified:","suffix":". As we will see, forwarding is "}]}]}

%% * Forwarding. When a packet arrives at a router’s input link, the router must move the packet to theappropriate output link. For example, a packet arriving from Host H1 to Router R1 in Figure 4.1 mustbe forwarded to the next router on a path to H2 * show annotation

^d11d2w52qpb

%%

{"created":"2023-05-11T15:45:55.541Z","updated":"2023-05-11T15:45:55.541Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":725998,"end":726195},{"type":"TextQuoteSelector","exact":"Routing. The network layer must determine the route or path taken by packets as they flow from asender to a receiver. The algorithms that calculate these paths are referred to as routingalgorithms.","prefix":"nt over multiple outgoing links.","suffix":" A routing algorithm would deter"}]}]}

%% * Routing. The network layer must determine the route or path taken by packets as they flow from asender to a receiver. The algorithms that calculate these paths are referred to as routingalgorithms. * show annotation

^macgjxq87np

%%

{"created":"2023-05-11T15:46:16.239Z","updated":"2023-05-11T15:46:16.239Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":726533,"end":726671},{"type":"TextQuoteSelector","exact":"Forwarding refers to the router-localaction of transferring a packet from an input link interface to the appropriate output link interface","prefix":"ch more precisely in this book. ","suffix":".Forwarding takes place at very "}]}]}

%% * Forwarding refers to the router-localaction of transferring a packet from an input link interface to the appropriate output link interface * show annotation

^q1rsv58xfgb

%%

{"created":"2023-05-11T15:46:25.566Z","updated":"2023-05-11T15:46:25.566Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":726797,"end":726920},{"type":"TextQuoteSelector","exact":"Routing refers to the network-wide process that determines the end-to-endpaths that packets take from source to destination","prefix":"picallyimplemented in hardware. ","suffix":". Routing takes place on much lo"}]}]}

%% * Routing refers to the network-wide process that determines the end-to-endpaths that packets take from source to destination * show annotation

^5ih1iiuun88

%%

{"created":"2023-05-11T15:46:29.475Z","updated":"2023-05-11T15:46:29.475Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":726787,"end":726795},{"type":"TextQuoteSelector","exact":"hardware","prefix":"thus is typicallyimplemented in ","suffix":". Routing refers to the network-"}]}]}

%% * hardware * show annotation

^78hyiiadr3r

%%

{"created":"2023-05-11T15:46:31.263Z","updated":"2023-05-11T15:46:31.263Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":727031,"end":727039},{"type":"TextQuoteSelector","exact":"software","prefix":"ill see is often implemented in ","suffix":". Using our driving analogy,cons"}]}]}

%% * software * show annotation

^732g2ijonrs

%%

{"created":"2023-05-11T15:46:45.884Z","updated":"2023-05-11T15:46:45.884Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":727705,"end":727940},{"type":"TextQuoteSelector","exact":"A key element in every network router is its forwarding table. A router forwards a packet by examiningthe value of one or more fields in the arriving packet’s header, and then using these header values toindex into its forwarding table","prefix":"gmentsconnected at interchanges.","suffix":". The value stored in the forwar"}]}]}

%% * A key element in every network router is its forwarding table. A router forwards a packet by examiningthe value of one or more fields in the arriving packet’s header, and then using these header values toindex into its forwarding table * show annotation

^6jk2cw1vveu

%%

{"created":"2023-05-11T15:47:45.584Z","updated":"2023-05-11T15:47:45.584Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":728931,"end":729010},{"type":"TextQuoteSelector","exact":"the routing algorithm determines the contents of the routers’ forwarding tables","prefix":"in forward tablesin Figure 4.2, ","suffix":". In thisexample, a routing algo"}]}]}

%% * the routing algorithm determines the contents of the routers’ forwarding tables * show annotation

^b9ua37zgk1

%%

{"created":"2023-05-11T15:48:44.979Z","updated":"2023-05-11T15:48:44.979Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":731797,"end":731979},{"type":"TextQuoteSelector","exact":" software-defined networking (SDN), where the network is “software-defined”because the controller that computes forwarding tables and interacts with routers is implemented insoftware","prefix":" in Figure4.3 is at the heart of","suffix":". Increasingly, these software i"}]}]}

%% * software-defined networking (SDN), where the network is “software-defined”because the controller that computes forwarding tables and interacts with routers is implemented insoftware * show annotation

^67f7uisn6v

%%

{"created":"2023-05-11T15:49:12.496Z","updated":"2023-05-11T15:49:12.496Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":738717,"end":738756},{"type":"TextQuoteSelector","exact":"Four router components can beidentified","prefix":"tecture is shown in Figure 4.4. ","suffix":":Figure 4.4 Router architectureI"}]}]}

%% * Four router components can beidentified * show annotation

^1mphiuyy95k

%%

{"created":"2023-05-11T15:49:21.559Z","updated":"2023-05-11T15:49:21.559Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":738787,"end":738937},{"type":"TextQuoteSelector","exact":"Input ports. An input port performs several key functions. It performs the physical layer function ofterminating an incoming physical link at a router","prefix":"d:Figure 4.4 Router architecture","suffix":"; this is shown in the leftmost "}]}]}

%% * Input ports. An input port performs several key functions. It performs the physical layer function ofterminating an incoming physical link at a router * show annotation

^x4mtagcvrdn

%%

{"created":"2023-05-11T15:49:30.933Z","updated":"2023-05-11T15:49:30.933Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":740286,"end":740378},{"type":"TextQuoteSelector","exact":"Switching fabric. The switching fabric connects the router’s input ports to its output ports","prefix":" 80 Tbps [Juniper MX 2020 2016].","suffix":". Thisswitching fabric is comple"}]}]}

%% * Switching fabric. The switching fabric connects the router’s input ports to its output ports * show annotation

^cnuzoue418a

%%

{"created":"2023-05-11T15:49:40.358Z","updated":"2023-05-11T15:49:40.358Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":740480,"end":740674},{"type":"TextQuoteSelector","exact":"Output ports. An output port stores packets received from the switching fabric and transmits thesepackets on the outgoing link by performing the necessary link-layer and physical-layer functions","prefix":"work inside of a network router!","suffix":".When a link is bidirectional (t"}]}]}

%% * Output ports. An output port stores packets received from the switching fabric and transmits thesepackets on the outgoing link by performing the necessary link-layer and physical-layer functions * show annotation

^y954dcd4ylo

%%

{"created":"2023-05-11T15:49:54.718Z","updated":"2023-05-11T15:49:54.718Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":740846,"end":741387},{"type":"TextQuoteSelector","exact":"Routing processor. The routing processor performs control-plane functions. In traditional routers, itexecutes the routing protocols (which we’ll study in Sections 5.3 and 5.4), maintains routing tablesand attached link state information, and computes the forwarding table for the router. In SDNrouters, the routing processor is responsible for communicating with the remote controller in order to(among other activities) receive forwarding table entries computed by the remote controller, andinstall these entries in the router’s input ports","prefix":"that link on the same line card.","suffix":". The routing processor also per"}]}]}

%% * Routing processor. The routing processor performs control-plane functions. In traditional routers, itexecutes the routing protocols (which we’ll study in Sections 5.3 and 5.4), maintains routing tablesand attached link state information, and computes the forwarding table for the router. In SDNrouters, the routing processor is responsible for communicating with the remote controller in order to(among other activities) receive forwarding table entries computed by the remote controller, andinstall these entries in the router’s input ports * show annotation

^ab8rms6bml

%%

{"created":"2023-05-11T15:50:13.811Z","updated":"2023-05-11T15:50:13.811Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":743032,"end":743060},{"type":"TextQuoteSelector","exact":"Destination-based forwarding","prefix":"is required for this processing:","suffix":". Suppose the car stops at an en"}]}]}

%% * Destination-based forwarding * show annotation

^cp0glqsu217

%%

{"created":"2023-05-11T15:50:19.480Z","updated":"2023-05-11T15:50:19.480Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":743399,"end":743421},{"type":"TextQuoteSelector","exact":"Generalized forwarding","prefix":"r which roundabout exit to take.","suffix":". The attendant could also deter"}]}]}

%% * Generalized forwarding * show annotation

^ev5ojudt1

%%

{"created":"2023-05-11T16:05:54.632Z","updated":"2023-05-11T16:05:54.632Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":746287,"end":746424},{"type":"TextQuoteSelector","exact":"the input port’s line-termination function and link-layer processing implement the physical and link layers for that individualinput link","prefix":" Figure 4.5. As just discussed, ","suffix":". The lookup performed in the in"}]}]}

%% * the input port’s line-termination function and link-layer processing implement the physical and link layers for that individualinput link * show annotation

^z83mwxuv8hb

%%

{"created":"2023-05-11T16:06:36.402Z","updated":"2023-05-11T16:06:36.402Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":748510,"end":748639},{"type":"TextQuoteSelector","exact":"With this style of forwarding table, the router matches a prefix of the packet’s destination address withthe entries in the table","prefix":"1000 00010111 00011 2Otherwise 3","suffix":"; if there’s a match, the router"}]}]}

%% * With this style of forwarding table, the router matches a prefix of the packet’s destination address withthe entries in the table * show annotation

^5sd2ptxqnsn

%%

{"created":"2023-05-11T16:06:53.150Z","updated":"2023-05-11T16:06:53.150Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":749436,"end":749575},{"type":"TextQuoteSelector","exact":"When there are multiple matches, the router uses the longest prefix matching rule; thatis, it finds the longest matching entry in the table","prefix":"ch the third entryin the table. ","suffix":" and forwards the packet to the "}]}]}

%% * When there are multiple matches, the router uses the longest prefix matching rule; thatis, it finds the longest matching entry in the table * show annotation

^142z5mfwhrlj

%%

{"created":"2023-05-11T16:19:37.373Z","updated":"2023-05-11T16:19:37.373Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":775718,"end":775738},{"type":"TextQuoteSelector","exact":"IPv4 datagram format","prefix":"ly as IPv4 [RFC 791]Figure 4.16 ","suffix":"in Section 4.3.1. We’ll examine "}]}]}

%% * IPv4 datagram format * show annotation

^ll8fcloo8b

%%

{"created":"2023-05-11T16:20:10.412Z","updated":"2023-05-11T16:20:10.412Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":776163,"end":776227},{"type":"TextQuoteSelector","exact":"the Internet’s network-layer packet is referred to as a datagram","prefix":"IPv4 Datagram FormatRecall that ","suffix":". We begin our study of IPwith a"}]}]}

%% * the Internet’s network-layer packet is referred to as a datagram * show annotation

^2nyjg42xwzs

%%

{"created":"2023-05-11T16:20:25.638Z","updated":"2023-05-11T16:20:25.638Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":776710,"end":776763},{"type":"TextQuoteSelector","exact":"The key fields in the IPv4 datagram are thefollowing:","prefix":"format is shown in Figure 4.16. ","suffix":"Version number. These 4 bits spe"}]}]}

%% * The key fields in the IPv4 datagram are thefollowing: * show annotation

^e8jqwbv0luf

%%

{"created":"2023-05-11T16:20:31.183Z","updated":"2023-05-11T16:20:31.183Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":776763,"end":776777},{"type":"TextQuoteSelector","exact":"Version number","prefix":" IPv4 datagram are thefollowing:","suffix":". These 4 bits specify the IP pr"}]}]}

%% * Version number * show annotation

^tcrjfmr8i4

%%

{"created":"2023-05-11T16:20:33.127Z","updated":"2023-05-11T16:20:33.127Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":777142,"end":777155},{"type":"TextQuoteSelector","exact":"Header length","prefix":") is discussed in Section 4.3.5.","suffix":". Because an IPv4 datagram can c"}]}]}

%% * Header length * show annotation

^km9z8kq018f

%%

{"created":"2023-05-11T16:20:38.987Z","updated":"2023-05-11T16:20:38.987Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":777522,"end":777564},{"type":"TextQuoteSelector","exact":"Type of service. The type of service (TOS)","prefix":"IP datagram has a 20-byteheader.","suffix":" bits were included in the IPv4 "}]}]}

%% * Type of service. The type of service (TOS) * show annotation

^w4rk7gdu2tf

%%

{"created":"2023-05-11T16:20:46.670Z","updated":"2023-05-11T16:20:46.670Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":778083,"end":778098},{"type":"TextQuoteSelector","exact":"Datagram length","prefix":"plicit Congestion ­Notification.","suffix":". This is the total length of th"}]}]}

%% * Datagram length * show annotation

^91l05nvazg7

%%

{"created":"2023-05-11T16:20:52.662Z","updated":"2023-05-11T16:20:52.662Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":778426,"end":778465},{"type":"TextQuoteSelector","exact":"Identifier, flags, fragmentation offset","prefix":" maximally sized Ethernet frame.","suffix":". These three fields have to do "}]}]}

%% * Identifier, flags, fragmentation offset * show annotation

^fuv8mbh4n5u

%%

{"created":"2023-05-11T16:20:57.009Z","updated":"2023-05-11T16:20:57.009Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":778639,"end":778742},{"type":"TextQuoteSelector","exact":"Time-to-live. The time-to-live (TTL) field is included to ensure that datagrams do not circulateforever","prefix":"does notallow for fragmentation.","suffix":" (due to, for example, a long-li"}]}]}

%% * Time-to-live. The time-to-live (TTL) field is included to ensure that datagrams do not circulateforever * show annotation

^vcao1rg8jx7

%%

{"created":"2023-05-11T16:21:05.550Z","updated":"2023-05-11T16:21:05.550Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":778949,"end":778958},{"type":"TextQuoteSelector","exact":"Protocol.","prefix":"a router must dropthat datagram.","suffix":" This field is typically used on"}]}]}

%% * Protocol. * show annotation

^t5kx2tq06gm

%%

{"created":"2023-05-11T16:21:15.134Z","updated":"2023-05-11T16:21:15.134Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":779044,"end":779251},{"type":"TextQuoteSelector","exact":"Thevalue of this field indicates the specific transport-layer protocol to which the data portion of this IPdatagram should be passed. For example, a value of 6 indicates that the data portion is passed toTCP","prefix":" reaches its final destination. ","suffix":", while a value of 17 indicates "}]}]}

%% * Thevalue of this field indicates the specific transport-layer protocol to which the data portion of this IPdatagram should be passed. For example, a value of 6 indicates that the data portion is passed toTCP * show annotation

^qdmk11l3nk8

%%

{"created":"2023-05-11T16:21:19.170Z","updated":"2023-05-11T16:21:19.170Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":779828,"end":779929},{"type":"TextQuoteSelector","exact":"Header checksum. The header checksum aids a router in detecting bit errors in a received IPdatagram. ","prefix":"link layer to the network layer.","suffix":"The header checksum is computed "}]}]}

%% * Header checksum. The header checksum aids a router in detecting bit errors in a received IPdatagram. * show annotation

^iw15etcegtr

%%

{"created":"2023-05-11T16:21:25.384Z","updated":"2023-05-11T16:21:25.384Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":781241,"end":781276},{"type":"TextQuoteSelector","exact":"Source and destination IP addresses","prefix":"t will not be passed to TCP/UDP.","suffix":". When a source creates a datagr"}]}]}

%% * Source and destination IP addresses * show annotation

^qxqhzqeczjd

%%

{"created":"2023-05-11T16:21:30.008Z","updated":"2023-05-11T16:21:30.008Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":781616,"end":781623},{"type":"TextQuoteSelector","exact":"Options","prefix":"sing in detail in Section 4.3.3.","suffix":". The options fields allow an IP"}]}]}

%% * Options * show annotation

^y8bvhmwik4n

%%

{"created":"2023-05-11T16:21:37.007Z","updated":"2023-05-11T16:21:37.007Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":782382,"end":782396},{"type":"TextQuoteSelector","exact":"Data (payload)","prefix":", as discussed in Section 4.3.5.","suffix":". Finally, we come to the last a"}]}]}

%% * Data (payload) * show annotation

^mllefsnl8vc

%%

{"created":"2023-05-11T16:21:44.884Z","updated":"2023-05-11T16:21:44.884Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":782761,"end":782809},{"type":"TextQuoteSelector","exact":"an IP datagram has a total of 20 bytes of header","prefix":"ussed in Section 5.6).Note that ","suffix":" (assuming no options). If the d"}]}]}

%% * an IP datagram has a total of 20 bytes of header * show annotation

^u1jcmafew3

%%

{"created":"2023-05-11T16:22:52.265Z","updated":"2023-05-11T16:22:52.265Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":783411,"end":783516},{"type":"TextQuoteSelector","exact":"The maximum amount of data that a link-layer frame can carry iscalled the maximum transmission unit (MTU)","prefix":"n carry no more than 576 bytes. ","suffix":". Because each IP datagram is en"}]}]}

%% * The maximum amount of data that a link-layer frame can carry iscalled the maximum transmission unit (MTU) * show annotation

^4hs9wdp4icn

%%

{"created":"2023-05-11T16:23:45.697Z","updated":"2023-05-11T16:23:45.697Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":784363,"end":784746},{"type":"TextQuoteSelector","exact":"how are you going tosqueeze this oversized IP datagram into the payload field of the link-layer frame? The solution is tofragment the payload in the IP datagram into two or more smaller IP datagrams, encapsulate each ofthese smaller IP datagrams in a separate link-layer frame; and send these frames over the outgoing link.Each of these smaller datagrams is referred to as a fragment","prefix":" the IP datagram. Time to panic—","suffix":".Fragments need to be reassemble"}]}]}

%% * how are you going tosqueeze this oversized IP datagram into the payload field of the link-layer frame? The solution is tofragment the payload in the IP datagram into two or more smaller IP datagrams, encapsulate each ofthese smaller IP datagrams in a separate link-layer frame; and send these frames over the outgoing link.Each of these smaller datagrams is referred to as a fragment * show annotation

^atzrzdi8iep

%%

{"created":"2023-05-11T16:23:51.443Z","updated":"2023-05-11T16:23:51.443Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":784747,"end":784836},{"type":"TextQuoteSelector","exact":"Fragments need to be reassembled before they reach the transport layer at the destination","prefix":"ms is referred to as a fragment.","suffix":". Indeed,both TCP and UDP are ex"}]}]}

%% * Fragments need to be reassembled before they reach the transport layer at the destination * show annotation

^pd0p5zwyu7q

%%

{"created":"2023-05-11T16:24:16.770Z","updated":"2023-05-11T16:24:16.770Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":785834,"end":786278},{"type":"TextQuoteSelector","exact":"the designers of IP (version 4) put identification, flag, andfragmentation offset fields in the IP datagram header. When a datagram is created, the sending hoststamps the datagram with an identification number as well as source and destination addresses.Typically, the sending host increments the identification number for each datagram it sends. When arouter needs to fragment a datagram, each resulting datagram (that is, fragment) is stamped","prefix":"perform these reassembly tasks, ","suffix":" with thesource address, destina"}]}]}

%% * the designers of IP (version 4) put identification, flag, andfragmentation offset fields in the IP datagram header. When a datagram is created, the sending hoststamps the datagram with an identification number as well as source and destination addresses.Typically, the sending host increments the identification number for each datagram it sends. When arouter needs to fragment a datagram, each resulting datagram (that is, fragment) is stamped * show annotation

^jqjmbcjojd9

%%

{"created":"2023-05-11T16:24:50.198Z","updated":"2023-05-11T16:24:50.198Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":787261,"end":787567},{"type":"TextQuoteSelector","exact":"A datagram of 4,000 bytes (20 bytes of IP header plus 3,980 bytesof IP payload) arrives at a router and must be forwarded to a link with an MTU of 1,500 bytes. Thisimplies that the 3,980 data bytes in the original datagram must be allocated to three separate fragments(each of which is also an IP datagram)","prefix":"re 4.17 illustrates an example. ","suffix":".The online material for this bo"}]}]}

%% * A datagram of 4,000 bytes (20 bytes of IP header plus 3,980 bytesof IP payload) arrives at a router and must be forwarded to a link with an MTU of 1,500 bytes. Thisimplies that the 3,980 data bytes in the original datagram must be allocated to three separate fragments(each of which is also an IP datagram) * show annotation

^u6rzrd53bl

%%

{"created":"2023-05-11T16:25:17.768Z","updated":"2023-05-11T16:25:17.768Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":788541,"end":788744},{"type":"TextQuoteSelector","exact":"A host typically has only a single link into the network; when IP in thehost wants to send a datagram, it does so over this link. The boundary between the host and thephysical link is called an interface","prefix":"re connected into the Internet. ","suffix":". Now consider a router and its "}]}]}

%% * A host typically has only a single link into the network; when IP in thehost wants to send a datagram, it does so over this link. The boundary between the host and thephysical link is called an interface * show annotation

^7cdg7ttuinq

%%

{"created":"2023-05-11T16:25:45.493Z","updated":"2023-05-11T16:25:45.493Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":789191,"end":789385},{"type":"TextQuoteSelector","exact":"P requires each host and routerinterface to have its own IP address. Thus, an IP address is technically associated with an interface,rather than with the host or router containing that interface","prefix":"ng and receiving IP datagrams, I","suffix":".Each IP address is 32 bits long"}]}]}

%% * P requires each host and routerinterface to have its own IP address. Thus, an IP address is technically associated with an interface,rather than with the host or router containing that interface * show annotation

^pa00ocjs3r

%%

{"created":"2023-05-11T16:25:55.205Z","updated":"2023-05-11T16:25:55.205Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":789447,"end":789525},{"type":"TextQuoteSelector","exact":"there are thus a total of 2  (or approximately4 billion) possible IP addresses","prefix":"ng (equivalently, 4 bytes), and ","suffix":". These addresses are typically "}]}]}

%% * there are thus a total of 2 (or approximately4 billion) possible IP addresses * show annotation

^o2urxw156u

%%

{"created":"2023-05-11T16:26:12.936Z","updated":"2023-05-11T16:26:12.936Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":789734,"end":789932},{"type":"TextQuoteSelector","exact":"For example, consider the IP address 193.32.216.9. The 193 isthe decimal equivalent of the first 8 bits of the address; the 32 is the decimal equivalent of the second 8bits of the address, and so on","prefix":"rom other bytes in the address. ","suffix":". Thus, the address 193.32.216.9"}]}]}

%% * For example, consider the IP address 193.32.216.9. The 193 isthe decimal equivalent of the first 8 bits of the address; the 32 is the decimal equivalent of the second 8bits of the address, and so on * show annotation

^0z38ijz3cht9

%%

{"created":"2023-05-11T16:26:57.001Z","updated":"2023-05-11T16:26:57.001Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":791346,"end":791436},{"type":"TextQuoteSelector","exact":"this network interconnecting three host interfaces and one router interface forms a subnet","prefix":"n Chapters 6 and 7.In IP terms, ","suffix":"[RFC 950]. (A subnet is also cal"}]}]}

%% * this network interconnecting three host interfaces and one router interface forms a subnet * show annotation

^rqwotat6pf7

%%

{"created":"2023-05-11T16:27:15.891Z","updated":"2023-05-11T16:27:15.891Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":791649,"end":791793},{"type":"TextQuoteSelector","exact":"/24 (“slash-24”) notation, sometimes known as a subnet mask, indicates that the leftmost 24bits of the 32-bit quantity define the subnet address","prefix":" subnet: 223.1.1.0/24,where the ","suffix":". The 223.1.1.0/24 subnet thus c"}]}]}

%% * /24 (“slash-24”) notation, sometimes known as a subnet mask, indicates that the leftmost 24bits of the 32-bit quantity define the subnet address * show annotation

^hsga4557dcb

%%

{"created":"2023-05-11T16:27:52.600Z","updated":"2023-05-11T16:27:52.600Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":794096,"end":794265},{"type":"TextQuoteSelector","exact":"The Internet’s address assignment strategy is known as Classless Interdomain Routing (CIDR—pronounced cider) [RFC 4632]. CIDR generalizes the notion of subnet addressing","prefix":"s handled in the globalInternet.","suffix":". As with subnetaddressing, the "}]}]}

%% * The Internet’s address assignment strategy is known as Classless Interdomain Routing (CIDR—pronounced cider) [RFC 4632]. CIDR generalizes the notion of subnet addressing * show annotation

^07zu8drx5ar7

%%

{"created":"2023-05-11T16:28:03.990Z","updated":"2023-05-11T16:28:03.990Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":794459,"end":794611},{"type":"TextQuoteSelector","exact":"The x most significant bits of an address of the form a.b.c.d/x constitute the network portion of the IPaddress, and are often referred to as the prefix","prefix":"n the first part of the address.","suffix":" (or network prefix) of the addr"}]}]}

%% * The x most significant bits of an address of the form a.b.c.d/x constitute the network portion of the IPaddress, and are often referred to as the prefix * show annotation

^p7nob3yj4m

%%

{"created":"2023-05-11T16:28:42.180Z","updated":"2023-05-11T16:28:42.180Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":800026,"end":800153},{"type":"TextQuoteSelector","exact":"When a host sends a datagram with destination address 255.255.255.255, themessage is delivered to all hosts on the same subnet.","prefix":"oadcast address255.255.255.255. ","suffix":" Routers optionally forward the "}]}]}

%% * When a host sends a datagram with destination address 255.255.255.255, themessage is delivered to all hosts on the same subnet. * show annotation

^hy5w9ycks19

%%

{"created":"2023-05-11T16:29:26.859Z","updated":"2023-05-11T16:29:26.859Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":802010,"end":802121},{"type":"TextQuoteSelector","exact":"IP addresses are managed under the authorityof the Internet Corporation for Assigned Names and Numbers (ICANN) ","prefix":"organizations? Indeed there is! ","suffix":"[ICANN 2016], based onguidelines"}]}]}

%% * IP addresses are managed under the authorityof the Internet Corporation for Assigned Names and Numbers (ICANN) * show annotation

^fahnfsv8zgi

%%

{"created":"2023-05-11T16:29:32.971Z","updated":"2023-05-11T16:29:32.971Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":802179,"end":802312},{"type":"TextQuoteSelector","exact":"The role of the nonprofit ICANN organization [NTIA 1998] is not onlyto allocate IP addresses, but also to manage the DNS root servers","prefix":"elines set forth in [RFC 7020]. ","suffix":". It also has the very contentio"}]}]}

%% * The role of the nonprofit ICANN organization [NTIA 1998] is not onlyto allocate IP addresses, but also to manage the DNS root servers * show annotation

^087kja55entv

%%

{"created":"2023-05-11T16:29:52.155Z","updated":"2023-05-11T16:29:52.155Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":803023,"end":803232},{"type":"TextQuoteSelector","exact":"Host addresses can alsobe configured manually, but typically this is done using the Dynamic Host Configuration Protocol(DHCP) [RFC 2131]. DHCP allows a host to obtain (be allocated) an IP address automatically","prefix":"ith a network management tool). ","suffix":". Anetwork administrator can con"}]}]}

%% * Host addresses can alsobe configured manually, but typically this is done using the Dynamic Host Configuration Protocol(DHCP) [RFC 2131]. DHCP allows a host to obtain (be allocated) an IP address automatically * show annotation

^elf7flnmh9q

%%

{"created":"2023-05-11T16:30:05.557Z","updated":"2023-05-11T16:30:05.557Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":803713,"end":803901},{"type":"TextQuoteSelector","exact":"Because of DHCP’s ability to automate the network-related aspects of connecting a host into a network,it is often referred to as a plug-and-play or zeroconf (zero-configuration) protocol. ","prefix":"address of its local DNS server.","suffix":"This capabilitymakes it very att"}]}]}

%% * Because of DHCP’s ability to automate the network-related aspects of connecting a host into a network,it is often referred to as a plug-and-play or zeroconf (zero-configuration) protocol. * show annotation

^mbsj4c8qrr

%%

{"created":"2023-05-11T16:30:12.587Z","updated":"2023-05-11T16:30:12.587Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":804873,"end":804905},{"type":"TextQuoteSelector","exact":"DHCP is a client-server protocol","prefix":"onfigure their laptops manually.","suffix":". A client is typically a newly "}]}]}

%% * DHCP is a client-server protocol * show annotation

^mic4rfv1xa

%%

{"created":"2023-05-11T16:30:36.090Z","updated":"2023-05-11T16:30:36.090Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":805800,"end":805819},{"type":"TextQuoteSelector","exact":"The four steps are:","prefix":"d to the newly arriving client. ","suffix":"Figure 4.23 DHCP client and serv"}]}]}

%% * The four steps are: * show annotation

^q5vrohgmuxk

%%

{"created":"2023-05-11T16:30:44.814Z","updated":"2023-05-11T16:30:44.814Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":805853,"end":806006},{"type":"TextQuoteSelector","exact":"DHCP server discovery. The first task of a newly arriving host is to find a DHCP server with whichto interact. This is done using a DHCP discover message","prefix":"gure 4.23 DHCP client and server","suffix":", which a client sends within a "}]}]}

%% * DHCP server discovery. The first task of a newly arriving host is to find a DHCP server with whichto interact. This is done using a DHCP discover message * show annotation

^3lyfkavb089

%%

{"created":"2023-05-11T16:30:53.586Z","updated":"2023-05-11T16:30:53.586Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":806686,"end":806904},{"type":"TextQuoteSelector","exact":"DHCP server offer(s). A DHCP server receiving a DHCP discover message responds to the clientwith a DHCP offer message that is broadcast to all nodes on the subnet, again using the IPbroadcast address of 255.255.255.255","prefix":"er broadcasting in Section 6.4).","suffix":". (You might want to think about"}]}]}

%% * DHCP server offer(s). A DHCP server receiving a DHCP discover message responds to the clientwith a DHCP offer message that is broadcast to all nodes on the subnet, again using the IPbroadcast address of 255.255.255.255 * show annotation

^hpeup49nbc9

%%

{"created":"2023-05-11T16:31:01.475Z","updated":"2023-05-11T16:31:01.475Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":807502,"end":807651},{"type":"TextQuoteSelector","exact":"DHCP request. The newly arriving client will choose from among one or more server offers andrespond to its selected offer with a DHCP request message","prefix":"veral hoursor days [Droms 2002].","suffix":", echoing back the configuration"}]}]}

%% * DHCP request. The newly arriving client will choose from among one or more server offers andrespond to its selected offer with a DHCP request message * show annotation

^4oungvqgpm7

%%

{"created":"2023-05-11T16:31:05.113Z","updated":"2023-05-11T16:31:05.113Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":807694,"end":807812},{"type":"TextQuoteSelector","exact":"DHCP ACK. The server responds to the DHCP request message with a DHCP ACK message,confirming the requested parameters.","prefix":"ack the configurationparameters.","suffix":"Once the client receives the DHC"}]}]}

%% * DHCP ACK. The server responds to the DHCP request message with a DHCP ACK message,confirming the requested parameters. * show annotation

^93c53lrvwuu

%%

{"created":"2023-05-11T16:31:19.243Z","updated":"2023-05-11T16:31:19.243Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":808116,"end":808376},{"type":"TextQuoteSelector","exact":"From a mobility aspect, DHCP does have one very significant shortcoming. Since a new IP address isobtained from DHCP each time a node connects to a new subnet, a TCP connection to a remoteapplication cannot be maintained as a mobile node moves between subnets.","prefix":"renew its lease on an IPaddress.","suffix":" In Chapter 6, we willexamine mo"}]}]}

%% * From a mobility aspect, DHCP does have one very significant shortcoming. Since a new IP address isobtained from DHCP each time a node connects to a new subnet, a TCP connection to a remoteapplication cannot be maintained as a mobile node moves between subnets. * show annotation

^5ya9ooyfis9

%%

{"created":"2023-05-11T16:38:57.683Z","updated":"2023-05-11T16:38:57.683Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":820453,"end":820549},{"type":"TextQuoteSelector","exact":"Expanded addressing capabilities. IPv6 increases the size of the IP address from 32 to 128 bits.","prefix":" evident in the datagram format:","suffix":"This ensures that the world won’"}]}]}

%% * Expanded addressing capabilities. IPv6 increases the size of the IP address from 32 to 128 bits. * show annotation

^ocyoucwbr1

%%

{"created":"2023-05-11T16:39:08.910Z","updated":"2023-05-11T16:39:08.910Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":820991,"end":821019},{"type":"TextQuoteSelector","exact":"A streamlined 40-byte header","prefix":" that contain a given document.)","suffix":". As discussed below, a number o"}]}]}

%% * A streamlined 40-byte header * show annotation

^v4uxvy5ykh

%%

{"created":"2023-05-11T16:39:15.872Z","updated":"2023-05-11T16:39:15.872Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":821272,"end":821327},{"type":"TextQuoteSelector","exact":"Flow labeling. IPv6 has an elusive definition of a flow","prefix":"ore flexible options processing.","suffix":". RFC 2460 states that this allo"}]}]}

%% * Flow labeling. IPv6 has an elusive definition of a flow * show annotation

^9sco31wsc3m

%%

{"created":"2023-05-11T16:39:25.199Z","updated":"2023-05-11T16:39:25.199Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":822266,"end":822273},{"type":"TextQuoteSelector","exact":"Version","prefix":"wing fields are defined in IPv6:","suffix":". This 4-bit field identifies th"}]}]}

%% * Version * show annotation

^hf4z2zqdojl

%%

{"created":"2023-05-11T16:39:31.661Z","updated":"2023-05-11T16:39:31.661Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":822567,"end":822703},{"type":"TextQuoteSelector","exact":"Traffic class. The 8-bit traffic class field, like the TOS field in IPv4, can be used to give priority tocertain datagrams within a flow","prefix":"e transition from IPv4 to IPv6.)","suffix":", or it can be used to give prio"}]}]}

%% * Traffic class. The 8-bit traffic class field, like the TOS field in IPv4, can be used to give priority tocertain datagrams within a flow * show annotation

^g77jjyebrzw

%%

{"created":"2023-05-11T16:39:35.396Z","updated":"2023-05-11T16:39:35.396Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":822872,"end":822882},{"type":"TextQuoteSelector","exact":"Flow label","prefix":"tions (for example,SMTP e-mail).","suffix":". As discussed above, this 20-bi"}]}]}

%% * Flow label * show annotation

^rab0f8208cs

%%

{"created":"2023-05-11T16:39:37.886Z","updated":"2023-05-11T16:39:37.886Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":822962,"end":822976},{"type":"TextQuoteSelector","exact":"Payload length","prefix":"to identify a flow of datagrams.","suffix":". This 16-bit value is treated a"}]}]}

%% * Payload length * show annotation

^7fdnxvgzs6m

%%

{"created":"2023-05-11T16:39:42.668Z","updated":"2023-05-11T16:39:42.668Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":823129,"end":823273},{"type":"TextQuoteSelector","exact":"Next header. This field identifies the protocol to which the contents (data field) of this datagram willbe delivered (for example, to TCP or UDP","prefix":"length, 40-byte datagram header.","suffix":"). The field uses the same value"}]}]}

%% * Next header. This field identifies the protocol to which the contents (data field) of this datagram willbe delivered (for example, to TCP or UDP * show annotation

^r6uyvd1no3k

%%

{"created":"2023-05-11T16:39:48.655Z","updated":"2023-05-11T16:39:48.655Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":823347,"end":823513},{"type":"TextQuoteSelector","exact":"Hop limit. The contents of this field are decremented by one by each router that forwards thedatagram. If the hop limit count reaches zero, the datagram is ­discarded","prefix":"rotocol field inthe IPv4 header.","suffix":".Source and destination addresse"}]}]}

%% * Hop limit. The contents of this field are decremented by one by each router that forwards thedatagram. If the hop limit count reaches zero, the datagram is ­discarded * show annotation

^2t5vnipdoej

%%

{"created":"2023-05-11T16:39:53.158Z","updated":"2023-05-11T16:39:53.158Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":823514,"end":823546},{"type":"TextQuoteSelector","exact":"Source and destination addresses","prefix":"ero, the datagram is ­discarded.","suffix":". The various formats of the IPv"}]}]}

%% * Source and destination addresses * show annotation

^drt8a63ygcg

%%

{"created":"2023-05-11T16:39:54.686Z","updated":"2023-05-11T16:39:54.686Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":823621,"end":823625},{"type":"TextQuoteSelector","exact":"Data","prefix":"ddress are describedin RFC 4291.","suffix":". This is the payload portion of"}]}]}

%% * Data * show annotation

^0yvuolqj75b9

%%

{"created":"2023-05-11T16:40:13.924Z","updated":"2023-05-11T16:40:13.924Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":824139,"end":824596},{"type":"TextQuoteSelector","exact":"Fragmentation/reassembly. IPv6 does not allow for fragmentation and reassembly at intermediaterouters; these operations can be performed only by the source and destination. If an IPv6 datagramreceived by a router is too large to be forwarded over the outgoing link, the router simply drops thedatagram and sends a “Packet Too Big” ICMP error message (see Section 5.6) back to the sender.The sender can then resend the data, using a smaller IP datagram size.","prefix":"ger present in theIPv6 datagram:","suffix":" Fragmentation andreassembly is "}]}]}

%% * Fragmentation/reassembly. IPv6 does not allow for fragmentation and reassembly at intermediaterouters; these operations can be performed only by the source and destination. If an IPv6 datagramreceived by a router is too large to be forwarded over the outgoing link, the router simply drops thedatagram and sends a “Packet Too Big” ICMP error message (see Section 5.6) back to the sender.The sender can then resend the data, using a smaller IP datagram size. * show annotation

^c1opyzh5blq

%%

{"created":"2023-05-11T16:40:20.280Z","updated":"2023-05-11T16:40:20.280Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":824799,"end":825093},{"type":"TextQuoteSelector","exact":"Header checksum. Because the transport-layer (for example, TCP and UDP) and link-layer (forexample, Ethernet) protocols in the Internet layers perform checksumming, the designers of IPprobably felt that this functionality was sufficiently redundant in the network layer that it could beremoved.","prefix":"P forwarding within the network.","suffix":" Once again, fast processing of "}]}]}

%% * Header checksum. Because the transport-layer (for example, TCP and UDP) and link-layer (forexample, Ethernet) protocols in the Internet layers perform checksumming, the designers of IPprobably felt that this functionality was sufficiently redundant in the network layer that it could beremoved. * show annotation

^iolwxtvtwzp

%%

{"created":"2023-05-11T16:40:27.335Z","updated":"2023-05-11T16:40:27.335Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":825442,"end":825646},{"type":"TextQuoteSelector","exact":"Options. An options field is no longer a part of the standard IP header. However, it has not goneaway. Instead, the options field is one of the possible next headers pointed to from within the IPv6header.","prefix":" was a costly operation in IPv4.","suffix":" That is, just as TCP or UDP pro"}]}]}

%% * Options. An options field is no longer a part of the standard IP header. However, it has not goneaway. Instead, the options field is one of the possible next headers pointed to from within the IPv6header. * show annotation

^m02k940y55

%%

{"created":"2023-05-11T16:40:52.158Z","updated":"2023-05-11T16:40:52.158Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":873178,"end":873372},{"type":"TextQuoteSelector","exact":"routing algorithms, whose goal is to determine good paths (equivalently,routes), from senders to receivers, through the network of routers. Typically, a “good” path is one that hasthe least cost","prefix":"thmsIn this section we’ll study ","suffix":". We’ll see that in practice, ho"}]}]}

%% * routing algorithms, whose goal is to determine good paths (equivalently,routes), from senders to receivers, through the network of routers. Typically, a “good” path is one that hasthe least cost * show annotation

^fbc213dz9hb

%%

{"created":"2023-05-11T16:41:07.288Z","updated":"2023-05-11T16:41:07.288Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":874840,"end":874911},{"type":"TextQuoteSelector","exact":"an edge’s cost mayreflect the physical length of the corresponding link","prefix":"presenting its cost. Typically, ","suffix":" (for example, a transoceanic li"}]}]}

%% * an edge’s cost mayreflect the physical length of the corresponding link * show annotation

^t4nwm2zmlmo

%%

{"created":"2023-05-11T16:41:13.863Z","updated":"2023-05-11T16:41:13.863Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":875328,"end":875415},{"type":"TextQuoteSelector","exact":"we’ll only consider undirected graphs (i.e., graphs whoseedges do not have a direction)","prefix":" not belong to E, we set  Also, ","suffix":" in our discussion here, so that"}]}]}

%% * we’ll only consider undirected graphs (i.e., graphs whoseedges do not have a direction) * show annotation

^ku3lopdm64

%%

{"created":"2023-05-11T16:41:21.195Z","updated":"2023-05-11T16:41:21.195Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":875625,"end":875696},{"type":"TextQuoteSelector","exact":"Also, a node y is said to be a neighbor of node x if (x, y) belongs toE","prefix":"fferent cost in each direction. ","suffix":".Given that costs are assigned t"}]}]}

%% * Also, a node y is said to be a neighbor of node x if (x, y) belongs toE * show annotation

^9sr92490igd

%%

{"created":"2023-05-11T16:41:37.133Z","updated":"2023-05-11T16:41:37.133Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":876557,"end":876602},{"type":"TextQuoteSelector","exact":"the least-cost path is also the shortest path","prefix":"in the graph havethe same cost, ","suffix":" (that is, the path with the sma"}]}]}

%% * the least-cost path is also the shortest path * show annotation

^roe0v8dqlz

%%

{"created":"2023-05-11T16:41:45.083Z","updated":"2023-05-11T16:41:45.083Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":877305,"end":877427},{"type":"TextQuoteSelector","exact":"Broadly, one way in which we can classify routing algorithms is according to whether they are centralizedor decentralized.","prefix":"e information about the network.","suffix":"A centralized routing algorithm "}]}]}

%% * Broadly, one way in which we can classify routing algorithms is according to whether they are centralizedor decentralized. * show annotation

^sket46k3q4n

%%

{"created":"2023-05-11T16:41:50.242Z","updated":"2023-05-11T16:41:50.242Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":877427,"end":877570},{"type":"TextQuoteSelector","exact":"A centralized routing algorithm computes the least-cost path between a source and destinationusing complete, global knowledge about the network","prefix":"are centralizedor decentralized.","suffix":". That is, the algorithm takes t"}]}]}

%% * A centralized routing algorithm computes the least-cost path between a source and destinationusing complete, global knowledge about the network * show annotation

^j9h2kr35ovs

%%

{"created":"2023-05-11T16:42:01.515Z","updated":"2023-05-11T16:42:01.515Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":878108,"end":878275},{"type":"TextQuoteSelector","exact":"Algorithms with global stateinformation are often referred to as link-state (LS) algorithms, since the algorithm must be aware ofthe cost of each link in the network. ","prefix":"ut connectivity and link costs. ","suffix":"We’ll study LS algorithms in Sec"}]}]}

%% * Algorithms with global stateinformation are often referred to as link-state (LS) algorithms, since the algorithm must be aware ofthe cost of each link in the network. * show annotation

^51ew93hwmh3

%%

{"created":"2023-05-11T16:42:17.558Z","updated":"2023-05-11T16:42:17.558Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":878318,"end":878415},{"type":"TextQuoteSelector","exact":"In a decentralized routing algorithm, the calculation of the least-cost path is carried out in an","prefix":" LS algorithms in Section 5.2.1.","suffix":"c(x, y)=∞.c(x, y)=c(y, x);G=(N, "}]}]}

%% * In a decentralized routing algorithm, the calculation of the least-cost path is carried out in an * show annotation

^mp4bm5vd4fh

%%

{"created":"2023-05-11T16:42:25.123Z","updated":"2023-05-11T16:42:25.123Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":878534,"end":878649},{"type":"TextQuoteSelector","exact":"iterative, distributed manner by the routers. No node has complete information about the costs of allnetwork links.","prefix":")c(x1,x2)+c(x2,x3)+⋯+c(xp−1,xp).","suffix":" Instead, each node begins with "}]}]}

%% * iterative, distributed manner by the routers. No node has complete information about the costs of allnetwork links. * show annotation

^qfvxul2z1ig

%%

{"created":"2023-05-11T16:42:45.620Z","updated":"2023-05-11T16:42:45.620Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":879376,"end":879736},{"type":"TextQuoteSelector","exact":"A second broad way to classify routing algorithms is according to whether they are static or dynamic. Instatic routing algorithms, routes change very slowly over time, often as a result of human intervention(for example, a human manually editing a link costs). Dynamic routing algorithms change the routingpaths as the network traffic loads or topology change.","prefix":"th each other, as in Figure 5.1.","suffix":" A dynamic algorithm can be run "}]}]}

%% * A second broad way to classify routing algorithms is according to whether they are static or dynamic. Instatic routing algorithms, routes change very slowly over time, often as a result of human intervention(for example, a human manually editing a link costs). Dynamic routing algorithms change the routingpaths as the network traffic loads or topology change. * show annotation

^me5voyzpuaj

%%

{"created":"2023-05-11T16:42:58.487Z","updated":"2023-05-11T16:42:58.487Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":879994,"end":880377},{"type":"TextQuoteSelector","exact":"A third way to classify routing algorithms is according to whether they are load-sensitive or load-insensitive. In a load-sensitive algorithm, link costs vary dynamically to reflect the current level ofcongestion in the underlying link. If a high cost is associated with a link that is currently congested, arouting algorithm will tend to choose routes around such a congested link. ","prefix":"ing loops and route oscillation.","suffix":"While early ARPAnet routingalgor"}]}]}

%% * A third way to classify routing algorithms is according to whether they are load-sensitive or load-insensitive. In a load-sensitive algorithm, link costs vary dynamically to reflect the current level ofcongestion in the underlying link. If a high cost is associated with a link that is currently congested, arouting algorithm will tend to choose routes around such a congested link. * show annotation

^yjqh65qufee

%%

{"created":"2023-05-11T16:43:08.614Z","updated":"2023-05-11T16:43:08.614Z","document":{"title":"Computer Networking: A Top-Down Approach, 7th Edition","link":[{"href":"urn:x-pdf:8ab23c2355d202449f37ee1756d29912"},{"href":"vault:/notes/documents/computer-networks.pdf"}],"documentFingerprint":"8ab23c2355d202449f37ee1756d29912"},"uri":"vault:/notes/documents/computer-networks.pdf","target":[{"source":"vault:/notes/documents/computer-networks.pdf","selector":[{"type":"TextPositionSelector","start":880510,"end":880689},{"type":"TextQuoteSelector","exact":"Today’s Internet routing algorithms (such as RIP, OSPF, and BGP) are load-insensitive, as alink’s cost does not explicitly reflect its current (or recent past) level of congestion","prefix":"were encountered [Huitema1998]. ","suffix":".5.2.1 The Link-State (LS) Routi"}]}]}

%% * Today’s Internet routing algorithms (such as RIP, OSPF, and BGP) are load-insensitive, as alink’s cost does not explicitly reflect its current (or recent past) level of congestion * show annotation

^4spjiec1bcy