100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Samenvatting Computer Networking: A Top-Down Approach 8th Edition

Rating
-
Sold
1
Pages
38
Uploaded on
11-11-2025
Written in
2025/2026

Superduidelijke samenvatting van alle hoofdstukken uit Computer Networking: A Top-Down Approach (8th Edition), afgestemd op het vak Netwerken Theorie. Alles is overzichtelijk uitgelegd in eigen woorden met tabellen, formules, voorbeelden, Python-fragmenten en examenvuistregels. Bevat o.a.: Uitleg van alle lagen (OSI & TCP/IP) Voorbeelden van subnetting, VLAN’s, NAT, DHCP en ARP Diepgaande uitleg van TCP, UDP, flow & congestion control Security-onderwerpen zoals firewalls, VPN, ACL’s en aanvallen Volledige examenchecklist en multiplechoicevragen met uitleg Perfect om te leren voor tentamens of als naslagwerk bij projecten. Geschreven in duidelijk Nederlands, kort maar volledig — precies wat je nodig hebt om te slagen zonder het boek helemaal te hoeven lezen.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Study
Course

Document information

Summarized whole book?
Yes
Uploaded on
November 11, 2025
Number of pages
38
Written in
2025/2026
Type
Summary

Subjects

Content preview

11 NOVEMBER 2025




SAMENVATTING NETWERKEN THEORIE
COMPUTER NETWORKING: A TOP-DOWN APPROACH 8TH ED.


YEREMEY STEINHAUS

,Inhoud
Hoofdstuk 1 – Introductie tot Computernetwerken ..................................................................................6
1.1 Wat is een computernetwerk? ................................................................................................................7
1.2 Soorten netwerken ......................................................................................................................................8
1.3 Packet switching vs Circuit switching..................................................................................................8
1.4 Belangrijke netwerkcomponenten........................................................................................................8
1.5 Protocollen en lagen ....................................................................................................................................9
OSI-model (7 lagen) .......................................................................................................................................9
TCP/IP-model (4 lagen) ...............................................................................................................................9
1.6 Vertraging in netwerken (Delay) ........................................................................................................ 10
Voorbeeldberekening ................................................................................................................................. 10
Hoofdstuk 2 – Applicatielaag ............................................................................................................................ 10
2.1 Rol van de applicatielaag ........................................................................................................................ 10
2.2 Architectuurmodellen: Client–Server vs Peer-to-Peer (P2P) ................................................. 11
2.3 Sockets: de API tussen applicatie- en transportlaag ................................................................... 11
Voorbeeld: TCP-client (Python) – HTTP GET ................................................................................... 11
Voorbeeld: UDP-client (Python) – eenvoudige echo ..................................................................... 12
2.4 HTTP: HyperText Transfer Protocol ................................................................................................. 12
HTTP/1.1 – non-persistent vs persistent........................................................................................... 12
HTTP/2 – multiplexing en server push .............................................................................................. 12
Berichtformaat (vereenvoudigd) .......................................................................................................... 12
Voorbeeld: ruwe HTTP-aanvraag.......................................................................................................... 13
HTTP-caching (vereenvoudigd) ............................................................................................................. 13
2.5 DNS: Domain Name System .................................................................................................................. 13
Belangrijke DNS-recordtypes ................................................................................................................. 14
Voorbeeld: nslookup / dig interpretatie (conceptueel) ............................................................... 14
DNS en transportlaag ................................................................................................................................. 14
2.6 Samenvatting & examenfocus .............................................................................................................. 14
Hoofdstuk 3 – Transportlaag ............................................................................................................................ 15
3.1 Functie van de transportlaag ................................................................................................................ 15
3.2 User Datagram Protocol (UDP)............................................................................................................ 15
UDP-headerstructuur ................................................................................................................................. 15
3.3 Transmission Control Protocol (TCP)............................................................................................... 15

, TCP-headerstructuur.................................................................................................................................. 16
3.4 TCP 3-Way Handshake ............................................................................................................................ 16
Verbindingsafbouw ..................................................................................................................................... 16
3.5 Flow control – RWND .............................................................................................................................. 17
Voorbeeld ........................................................................................................................................................ 17
3.6 Congestion control – CWND, Slow Start, AIMD ............................................................................. 17
3.7 RTT en RTO – Round Trip en Retransmission Timeout ............................................................ 17
3.8 Betrouwbare overdracht: Go‑Back‑N en Selective Repeat....................................................... 17
3.9 Checksum...................................................................................................................................................... 18
Checksum pseudo‑header (conceptueel)........................................................................................... 18
3.10 Samenvatting & examenfocus ........................................................................................................... 18
Hoofdstuk 4 – Netwerklaag ............................................................................................................................... 18
4.1 Functie van de netwerklaag .................................................................................................................. 18
4.2 IPv4-headerstructuur .............................................................................................................................. 19
4.3 Routering en forwarding ........................................................................................................................ 19
4.4 ARP – Address Resolution Protocol ................................................................................................... 20
ARP-voorbeeld .............................................................................................................................................. 20
4.5 DHCP – Dynamic Host Configuration Protocol.............................................................................. 20
DHCP-berichtvolgorde ............................................................................................................................... 20
4.6 NAT – Network Address Translation ................................................................................................ 20
4.7 ICMP – Internet Control Message Protocol ..................................................................................... 21
4.8 Subnetting en CIDR ................................................................................................................................... 21
Voorbeeld: Subnetten berekenen.......................................................................................................... 21
4.9 VLSM – Variable Length Subnet Masking ........................................................................................ 21
Voorbeeld: VLSM .......................................................................................................................................... 22
4.10 IP-fragmentatie en MTU....................................................................................................................... 22
Voorbeeld: Fragmentatieberekening ................................................................................................... 22
4.11 Examenvuistregels ................................................................................................................................. 22
Hoofdstuk 5 – Datalink- en Fysieke laag ...................................................................................................... 23
5.1 Functie van de datalinklaag .................................................................................................................. 23
5.2 Ethernet-frame structuur ...................................................................................................................... 23
5.3 MAC-adressering ....................................................................................................................................... 23
5.4 CSMA/CD – Carrier Sense Multiple Access / Collision Detection .......................................... 24

, 5.5 Collision en Broadcast Domains .......................................................................................................... 24
5.6 VLAN’s – Virtual LANs (IEEE 802.1Q)............................................................................................... 24
Voorbeeld VLAN-tag (802.1Q)................................................................................................................ 25
5.7 CRC – Cyclic Redundancy Check.......................................................................................................... 25
5.8 MTU en framelimieten............................................................................................................................. 25
Voorbeeld ........................................................................................................................................................ 25
5.9 Bekabeling en media ................................................................................................................................ 25
5.10 Signaaloverdracht en interferentie ................................................................................................. 25
5.11 Examenvuistregels ................................................................................................................................. 26
Hoofdstuk 6 – Netwerksecurity & Troubleshooting ............................................................................... 26
6.1 Beveiliging in computernetwerken ................................................................................................... 26
6.2 Veelvoorkomende netwerkaanvallen ............................................................................................... 26
6.3 Beveiligingsmaatregelen ........................................................................................................................ 27
6.4 Firewalls en ACL’s ..................................................................................................................................... 27
Voorbeeld ACL-configuratie (conceptueel)....................................................................................... 27
6.5 VPN – Virtual Private Network ............................................................................................................ 28
6.6 Troubleshootingtools .............................................................................................................................. 28
6.7 Typische netwerkfouten en hun oorzaak ........................................................................................ 28
6.8 Analysevoorbeelden................................................................................................................................. 29
Voorbeeld ping-trace .................................................................................................................................. 29
Voorbeeld traceroute ................................................................................................................................. 29
6.9 Latency, jitter en pakketverlies ........................................................................................................... 29
6.10 Samenvatting & examenfocus ........................................................................................................... 29
Hoofdstuk 7 – Toepassingen, IPv6 & Samenvatting ................................................................................ 30
7.1 End‑to‑End communicatie & OSI-overzicht ................................................................................... 30
7.2 OSI‑model vs TCP/IP‑model ................................................................................................................. 30
7.3 Quality of Service (QoS) en real‑time verkeer ............................................................................... 31
7.4 VoIP, RTP en RTCP .................................................................................................................................... 31
7.5 IPv6 – Introductie...................................................................................................................................... 31
7.6 IPv6‑headerstructuur .............................................................................................................................. 31
7.7 IPv6‑adressoorten .................................................................................................................................... 32
7.8 Overgang van IPv4 naar IPv6 ............................................................................................................... 32
7.9 Overzicht per OSI‑laag............................................................................................................................. 33
$6.77
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
yeremeysteinhaus

Get to know the seller

Seller avatar
yeremeysteinhaus Hanzehogeschool Groningen
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
4 weeks
Number of followers
0
Documents
1
Last sold
3 weeks ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions