• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

Application layer

Hold network applications and many related protocols (HTTP for requesting and/or transferring files, SMTP for email, FTP for transferring files between two end systems, SSL, etc.) Another key application-layer protocol, DNS (Domain Name System), works to give Internet end systems more user-friendly names.

Transport layer

Data transfer between processes. Deliver messages from the application layer to the other endpoint(s). Uses either the TCP (connection-focused) or UDP (bandwidth-focused) protocols.

Network layer

Relays datagrams, or network-layer packets, between hosts. Follows the lone IP protocol to ensure that end systems and routers work to receive datagrams. However, also follows many available routing protocols to decide transport paths between sources. Provides logical communication between hosts.

Link layer

Helps the network layer transport a packet from one node to the next. These nodes can include hosts or routers, which are where the link layer takes over from the network layer. These different links may follow different protocols (Ethernet, Wifi, etc.)

Physical layer

Within the link layer, the physical layer works to deliver each bit of data across the link. Depending on the link, different protocols might come into play.

What are the two key network-layer functions?
(most important in datagram network)

* Routing: determine route taken by packets from source to destination (like planning a trip from the source to the destination)

* Forwarding: move packets from router’s input to appropriate router output (like the process of getting through a single interchange)

Some network architectures have a 3rd important function. What is it?
(this and the other two = the three most important in a virtual-circuit network)

* Connection setup: before datagrams flow, two end hosts AND intervening routers establish a virtual connection

In network layer: between two hosts (may also include intervening routers)

In transport layer: between two processes

Network service model

service model for a "channel" transporting datagrams from sender to receiver

Example services for individual datagrams

Example services for a flow of datagrams

individual datagrams: guaranteed delivery, guaranteed delivery with less than 40 msec delay

flow:
In-order datagram delivery, guaranteed minimum bandwidth to flow, restrictions on changes in interpacket spacing

Describe the forwarding tables for both datagram networks and virtual-circuit networks.

Datagram forwarding tables use a routing algorithm and the packet’s destination address to decide the output link.

VC forwarding tables have four sets of data: incoming interface, incoming VC#, outgoing interface, and outgoing VC#. The first two determine the last two.

Compare and contrast link-state and distance-vector routing algorithms.

Link-state routing uses Djikstra’s algorithm to look at all paths and calculate the least-cost paths from a source to the destination. Distance-vector routing uses dynamic programming in the form of the Bellman-Ford Equation: each node periodically sends a distance vector estimate to each of its neighbors. The equation looks at these distances to determine the least-cost path. A malfunctioning router has a different effect in both algorithms. In link-state routing, an error (particularly a node that gives an incorrect link cost) remains with the node and doesn’t propagate. With distance-vector routing, however, the incorrect information would be passed to other nodes.

Inter-autonomous-system routing
(Inter-AS protocol)

The (multiple) administrators want to control how exactly traffic is routed and who routes through the network. Policy can even take precedence over performance.

Intra-autonomous-system routing
(Intra-AS protocol)

Only one administrator, more focused on performance

When a host joins a multicast group, must it change its IP address to that of the multicast group it is joining?

No, the host maintains its own IP address.

Suppose that routers were subject to conditions that might cause them to fail fairly often. Would this argue in favor of a VC or a datagram architecture? Why?

Datagram, because it has “elastic” service and superior flexibility that would be more accommodating to router failure. Datagram architectures provide a connectionless service.

Suppose that a source node and a destination require that a fixed amount of capacity always be available at all routers on the path between the source and destination node, for the exclusive use of traffic flowing between this source and destination node. Would this argue in favor of a VC or a datagram architecture? Why?

VC, because it allows stricter requirements than datagram architecture. VC architectures provide a connection-focused service that allows the fixed capacity described above.

Suppose that the links and routers in the network never fail and that routing paths used between all source/destination pairs remains constant. In this scenario, does a VC or datagram architecture have more control traffic overhead? Why?

Datagram architecture will have more traffic overhead because packets between the same source and destination may take different paths. VC architecture will be more consistent: its connection-based architecture will produce no overhead in this kind of scenario.

How big is the MAC address space? The IPv4 address space? The IPv6 address space?

MAC: 6 bytes / 48 bits
IPv4: 32 bits
IPv6: 128 bits

Virtual circuits

“source-to-dest path behaves much like
telephone circuit”
 performance-wise
 network actions along source-to-dest path

 call setup, teardown for each call before data can flow
 each packet carries VC identifier (not destination host
address)
 every router on source-dest path maintains “state” for
each passing connection
 link, router resources (bandwidth, buffers) may be
allocated to VC (dedicated resources = predictable
service)

Virtual circuit implementation
a VC consists of 3 things:

1. path from source to destination
2. VC numbers, one number for each link
along path
3. entries in forwarding tables in routers
along path

Datagram vs VC end systems

VC: “dumb” end systems
Datagram:  “smart” end systems
(computers)
 can adapt, perform
control, error recovery
 simple inside network,
complexity at “edge”
 many link types
 different characteristics
 uniform service difficult

Two key router functions

1) run routing algorithms/protocol (RIP, OSPF, BGP)
2) forward datagrams from incoming to outgoing
link

switching rate

rate at which packets can transfer from inputs to outputs

often measured as multiple of input/output line rate
 N inputs: switching rate N times line rate desirable

Three types of switching fabrics

Switching Via Memory - first generation routers. traditional computers with switching under
direct control of CPU

Switching Via a Bus - datagram from input port
memory

Switching Via An Interconnection
Network - overcome bus bandwidth
limitations

Head-of-the-Line (HOL) blocking

queued
datagram at front of queue prevents others in
queue from moving forward

An IP address is a 32-bit identifier for...

a host and the router interface

subnet part = high order bits
host part = low order bits

Subnet

device interfaces with same subnet part of IP address

can physically reach 
each other without 
intervening router

device interfaces with same subnet part of IP address

can physically reach
each other without
intervening router

CIDR

CIDR: Classless InterDomain Routing

 subnet portion of address of arbitrary length
 address format: a.b.c.d/x, where x is # bits in
subnet portion of address

DHCP

Dynamic Host Configuration Protocol
dynamically get address from a server
 “plug-and-play”

can return more than just address

address format: a.b.c.d/x, where x is

# of bits in
subnet portion of address