• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/85

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

85 Cards in this Set

  • Front
  • Back

Name 3 characterisitics of a server

* always-on host
* permanent IP address
* data centers for scaling

What are 5 P2P charactersitics?

* no always-on server :arbitrary end systems


directly communicate
* peers request service from
other peers, provide service
in return to other peers


* self scalability – new
peers bring new service
capacity, as well as new
service demands
* peers are intermittently
connected and change IP
addresses

within same host, two processes communicate
using___________ (defined by
OS)

inter-process communication

client process: process that ________

initiates communication


server process: process that ____________

waits to be contacted

"Sockets" are between two layers, which two layers are they?

Application (process) and Transport

A socket is a ____ between application layer and transport layer.

API

In addition to knowing the address of the host to which a message is destined, the sending process must also identify the receiving process. ______ serves this purpose.

Destination port number

Applications that have throughput
requirements are said to be ______.

bandwidth-sensitive applications.

_______________ can make use of as much, or as little, throughput
as happens to be available

elastic applications

What are 5 features of TCP?

* reliable transport between
sending and receiving
process
* flow control: sender wont overwhelm receiver
* congestion control: throttle sender when network overloaded
* does not provide: timing,
minimum throughput
guarantee, security


* connection-oriented: setup
required between client and
server processes


______ control is controlled by the receiving side. It ensures that the sender only sends what the receiver can handle.

flow

In _____ control Sender will reduce the amount of sent packets to avoid overflowing the router's buffer(Queue).


Congestion Control

In ______ control : Sender will send enough data that can be accommodated at the receiver end.

Flow Control

What are two characteristics of UDP?

* unreliable data transfer
between sending and
receiving process



* does not provide:
reliability, flow control,
congestion control,
timing, throughput
guarantee, security,
or connection setup,

web page consists of_____ which
includes several _________

base HTML-file


referenced objects

HTTP is stateless, what does this mean?



server maintains no
information about
past client requests

What is persistent http?

multiple objects can
be sent over single
TCP connection
between client, server

What is non persistent http?

at most one object
sent over TCP
connection
* connection then
closed
* downloading multiple
objects required
multiple connections

non-persistent HTTP requires____ RTTs per object

2

persistent HTTP requires____ RTTs for n objects

near 1 RTT

in non-persistent HTTP, there are roughly ____ RTTs in total

Thus, roughly,
the total response time is two RTTs plus the transmission time at the server of the
HTML file ( 1 RTT for each object)

What are methods used in HTTP1.0?

 GET
 POST
 HEAD

What does HEAD request do?

asks server to leave
requested object out
of response (used for debugging)

What methods does http 1.1 have?

GET, POST, HEAD
 PUT
 uploads file in entity
body to path specified
in URL field
 DELETE

What does 200 response mean?

200 OK
 request succeeded, requested object later in this msg

What does 301 response mean?

301 Moved Permanently
 requested object moved, new location specified later in this msg
(Location:)

What does 400 response mean?

400 Bad Request
 request msg not understood by server

What does 404 response mean?

404 Not Found
 requested document not found on this server

What does 505 response mean?

505 HTTP Version Not Supported

typically cache is
installed by ______

ISP
(university, company,
residential ISP)

web cache acts as client or server?

both

When does 304 response happen?

When we request with If-modified-since: <date>


in header and the object has not been modified

The most striking difference between HTTP and FTP is that FTP _______


uses two parallel TCP connections to transfer a file, a control connection and a data
connection

In FTP a control connection is used to

The control connection is used for sending control information between
the two hosts—information such as user identification, password, commands to
change remote directory, and commands to “put” and “get” files

In FTP: TCP control connection, server port ____

21

In FTP: TCP data connection, server port ____

20

Give an example of out-of-band

Because FTP uses a separate control connection, FTP is
said to send its control information o

Give an example of in-band

HTTP, SMTP

In FTP, are data connections persistent or non-persistent?

data connections are non-persistent

with FTP, the______ connection
remains open throughout the duration of the user session, but a new ________ connection is created for each file transferred within a session

control


data

Is FTP stateless or maintain state?

It maintains state

What are 5 basic FTP commands?

USER username
PASS password
LIST return list of file in
current directory
RETR filename
STOR filename

What are equivalents of get and put in FTP?

RETR and STOR

What is 331 response in FTP?

331 Username OK, password required

What is response 125 in FTP?

• 125 Data connection already open; transfer starting

What is response 425 in FTP?


425 Can’t open data connection

What is response 452 in FTP?

• 452 Error writing file

mailbox contains_____

incoming
messages for user


message queue contains

outgoing
(to be sent) mail messages

What are three major components of email?

user agents, mail servers, and SMTP

SMTP uses ____ to reliably transfer email message from

TCP

SMTP uses port __

25

SMTP restricts the body (not just the headers) of all mail messages to ____


simple 7-bit ASCII

Three phases of SMTP email transfer are :

three phases of transfer
 handshaking (greeting)
 transfer of messages
 closure

What are 6 stages of sending a message from Alice to Bob?

1) Alice uses UA to compose
message


to
bob@someschool.edu
2) Alices UA sends message to
her mail server; message
placed in message queue
3) client side of SMTP opens
TCP connection with Bob's mail server
4) SMTP client sends Alice's message over the TCP connection
5) Bobs mail server places the
message in Bobs mailbox
6) Bob invokes his user agent
to read message

What are 5 SMTP commands?

HELO, MAIL FROM, RCPT TO, DATA, QUIT


HTTP is mainly a push/pull protocol?

pull

SMTP is mainly a push/pull protocol?

push

each object encapsulated in its own response msg: HTTP or SMTP?

HTTP

multiple objects sent in multipart msg, HTTP or SMTP?


SMTP

SMTP uses persistent/non-persistent
connections?

persistent

SMTP server uses _______ to determine end of message

CRLF.CRLF

3 differences between HTML and SMTP

HTML :


pull


ASCII


each object
encapsulated in its own
response msg



SMTP:


push


7 bit ASCII


multiple objects
sent in multipart msg

Does pop3 maintain state or is it stateless?

stateless

What are two modes of POP3?

download and delete


download and keep

Which mail access method allows for creating folders?

IMAP

Which mail access method keeps user state across sessions?

IMAP

DNS is a _____ database

distributed

DNS is a distributed database implemented in _____

hierarchy of many name servers

DNS is a _____ level protocol

application

DNS is an application-layer protocol that allows ______

hosts to query the distributed database

DNS runs on UDP/TCP?

UDP

relay1.west-coast.enterprise.com could have, say, two aliases such as enterprise.com and
www.enterprise.com. In this case, the hostname relay1.westcoast.enterprise.com is said to be a __________

canonical hostname.

_________ is responsible for responsible for com, org, net, edu, aero, jobs, museums, and
all top-level country domains, e.g.: uk, fr, ca, jp

top-level domain (TLD) servers:


If Type=A, then Name is a______ and Value is the_____ address

hostname, IP

Type=NS, then Name is a _____ (such as foo.com) and Value is the ____

domain


host name of an authoritative DNS server that knows how to obtain the IP addresses
for hosts in the domain

If Type=CNAME, then Value is a_____ for the_____ Name.
.

canonical hostname


alias hostname

If Type=MX, then Value is the_____ of a mail server that has an______ Name

canonical name


alias hostname

What is DNS poisoning?


 Send bogus relies to
DNS server, which
caches

In bittorent, which chunks are requested first?

rarest

In bittorent Alice sends chunks to those _______

four peers currently sending her
chunks at highest rate

In bittorent, top 4 peers are evaluated every _____

10 seconds

How often does a peer randomly send chunks to another peer to unchoke them?

every 30 secs: randomly select
another peer, starts sending
chunks

Layers of internet

Application


Transport


Network


Data Link


Physical


A tranny licks puss