• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/139

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

139 Cards in this Set

  • Front
  • Back

What are the units for transmission rate?

Bits/second

True or false: All devices connected to the internet are called server systems.




If false, what is the right answer?

False: All devices connected to the internet are called hosts or end systems.

Home networks are connected to _____________ ISPs and mobile networks are connected to ______________ ISPs.

Home networks are connected to global ISPs and mobile networks are connected to regional ISPs.

The network by which end systems are connected is made up these two things: ______________ & ________________.

Communication links & packet switches.

What does a packet switch do with arriving packets (basically, what is the purpose of packet switches/how do they work)?

Packet switches take an arriving packet from an incoming link and forward it to its outgoing link.

What are the two prominent types of packet switches?

Routers (used in network core) and link-layer switches (used in access networks).

What is the name of the sequence of switches a packet takes from end-to-end?

A route or a path.

How many GB of internet are used per month (globally)?

1 billion GB.

Short Answer: Use a transportation network with trucks as an analogy to describe how packet switch networks work.

You subdivide cargo (the packets) into trucks (the loads). Each 'truck' travels independently to destination along roads (links) & intersections (packet switches). At the final warehouse (end system) the 'truck' (packet) is unloaded.

What does ISP stand for?

Internet Service Provider.

_____________ controls the sending & receiving of information of internet components.

Protocols

What are the two most important types of protocols?

TCP & IP

What does TCP stand for; what does IP stand for?

Transmission Control Protocol; internet protocol.

The IETF (Internet Engineering Task Force) develop internet standards, written in documents called __________.

RFCs (requests for comments).

E-mail, Internet radio and VoIP are all examples of what kind of application?

They are all distributed applications.

Do internet applications run on end systems or packet switches?

Internet applications run on end systems.

What are APIs and what do they do?

Application Programming Interfaces (APIs) specify how end system software asks the Internet to deliver data to other end systems, and are a set of rules that sending software must follow so that the Internet can deliver data to the destination.

In terms of a protocol, what needs to be sent/received before making a get request and getting the requested file?

The end system sends a TCP connection request and must receive a TCP connection response before requesting and getting a file. 

The end system sends a TCP connection request and must receive a TCP connection response before requesting and getting a file.



Define a protocol.

Defines format and order of messages exchanged between two or more communication entities; governs how all network components communicate and behave with each other in delivering packets.

What are the two categories of hosts? Give two examples of each.

Clients, such as cellphones, PCs, and;


Servers, such as web pages, stream video.

What runs on an end system and requests service from server programs?

Client programs.

List some programs using the client-server model.

E-mail, file transfer, websites.

True or false:




Server-side internet applications are distributed applications.

False.




Client-side internet applications are distributed applications.

What's the main difference between P2P (peer-to-peer) file sharing and client-server relationships?

In P2P, end systems act as both clients and servers. For example, BitTorrent.

What is an access network?

Access networks are the link that connect the end system with the first (aka edge) router.

Many access networks use local telco infrastructure where each residence has a twisted-pair copper link directed to where?

Residents are linked by twisted-pair copper link to the nearby telco switch house in the central office (CO).

What are the two types of broadband access?

DSL & Cable

What does DSL stand for?

Digital Subscriber Line

What does DSLAM stand for, where are they located and what do they do?

DSLAM (digital subscriber line access multiplexer) are located in the central office and use existing telephone wire to exchange data with the DSL modem.

Is there a difference between the frequency of downloading vs uploading (toward the customer computer vs away from the customer computer respectively)?

Yes, it is high-speed downstream (downloading, toward the customer computer) at 50kHz to 1 MHz and medium-speed upstream (uploading, away from the customer computer) at 4kHz to 50kHz.

What is required to connect a home phone and a PC to the DSLAM at the CO?

The phone is connected to a splitter, which is connected to the DLSAM. The PC is connected to the same splitter through a DSL modem. 

The phone is connected to a splitter, which is connected to the DLSAM. The PC is connected to the same splitter through a DSL modem.

If multiple households are connected to the same DSLAM, what is a possible issue that could arise?

May be delays due to processing incoming data.

What are two factors affecting upstream/downstream rates?

The distance between the CO & home and the gauge of the telephone wire.

What broadcasts TV channels, and how is it connected to the neighbourhood-level junction? How many homes can this junction support? What is the name of this network?

The cable head end broadcasts TV channels and is connected to the junction through fibre optics. A junction may support 500-5000 homes.




This network is called HFC (hybrid finer coax).

True or false:




Upstream & downstream channels are symmetric.

False. They are asymmetric (downstream is typically a higher rate than upstream).

What does an HFC need to connect to the Internet?

A cable modem.

Why would a packet channel fe faster when fewer people are around?

Packets travel on the same channel and need to coordinate transmissions, this coordination slow with usage.

True or False:




Cable provides faster transmission than DSL.

True, if the HFC network is reasonably dimensioned.

What does it mean for a network to be dimensioned?

Dimensioned networks mean that the capacity of the network components are appropriate for the amount of usage. I.e. 500 homes in a junction is less dimensional than a network with 5000 homes.

Which is fastest in terms of transmission rate: twister-pair copper wire, coaxial cable or fibre optics?

Fiber optics.

What does FTTH stand for?

Fibre-To-The-Home.

True or false: With direct fibre, fibre is shared until split to individual homes.

True.

What are the two optical-distribution network architectures that perform fibre optic splitting?

AONs (active optical networks, a switched Ethernet) & PONs (passive optical networks, used in FIOS).

What is an ONT and what does it do?

An ONT is an optical network terminator and each home has one. An ONT is connected by optical fibres to the optical splitter.

What does a splitter do?

A splitter combines < 100 homes into a single fibre.

What is an OLT and what does it do?

An optical line terminator (OLT) is located at the CO and is connected by a splitter to ONTs at each home by optical fibres.

What is a LAN and what does it do? What is the most common type of LAN?

A local area network connects end systems to the edge router. The most common type of LAN is ethernet.

List and describe the two types of internet access.

Wireless LAN allows users to transmit/receive packets from an access point that is connected to the Internet within a reasonable distance to the access point. A wide-area wireless access networks allows packets to be transmitted to a base station over the cellular phone infrastructure.

Whats the difference between 3G & 4G?

3G (third generation) wireless provides packet-switched wide-area wireless at 1Mbps. 4G (LTE) does his at speeds of 10Mbps.

What does LTE stand for, and what's another name for it?

LTE, or 4G stands for long-term evolution.

Draw a diagram for how a cellphone connects to the internet wirelessly.

What are the two categories of physical media (copper wire, cable, etc)?

Guided media and unguided media.

What is the difference between guided media and unguided media?

In guided media, waves are guided along a solid media (cable/wire). In unguided media, waves propagate in the atmosphere (LAN/satellite).

What is UTP and what is it used for?

UTP or unshielded twisted pair is used for LANs.

What's the difference between coaxial cable and the twister pair?

In coaxial cable, the two copper conductors are concentric; in twister-pair they are parallel.

Fibre optics works by conducting pulses of light. How many bits in a pulse?

Each pulse is one bit.

What type of channel carries signal in the electromagnetic spectrum, requires no physical wire and can penetrate walls?

Terrestrial Radio Channels.

What is shadow fading? What's multi path fading?

Shadow fading, or path loss, is the term to describe how signal strength decreases over distance and obstructing objects. Multi path fading is signal reflection off interfering objects.

What are the two types of satellite radio channels and what does a satellite radio channel do?

A satellite radio channel links two or more ground stations. The two types are geostationary satellites and low-earth orbiting (LEO) satellites.

Are LEOs used to provide internet?

Not currently.

What are the similarities and difference between packet switching and circuit switching?

Both are approaches to moving data. Circuit switching reserve resources in telephone networks which are dedicated for a duration of a session. Packet switches are not reserved but are rather used on demand.

Is the internet packet switched or circuit switched?

The internet is packet switched.

Explain how circuit switching works when a call is made.

In circuit switching, there is an end-to-end connection established between hosts. The network resources are divided into pieces, where a piece is allocated as information is passed when a call is made. When a call is made, a circuit is established and the link bandwidth is divided into pieces.

Define FDM and TDM and their differences.

FDM (frequency-divisor multiplexing) and TDM (time-division multiplexing) are both ways of implementing a circuit. In FDM, frequency is divided amongst connections. In TDM, time frames are divided into slots and each connected is allocated a slot. 

FDM (frequency-divisor multiplexing) and TDM (time-division multiplexing) are both ways of implementing a circuit. In FDM, frequency is divided amongst connections. In TDM, time frames are divided into slots and each connected is allocated a slot.

True or false:




FDM and TDM can be used in tandem.

True.

Which has better flexibility: TDM or FDM? Latency?

TDM has better flexibility but FDM has better latency.

Define silent periods and why they are an issue with circuit switching?

Silent periods are when dedicate circuits are idle (someone stops using the network but the resource cannot be used by someone else).

How long does it take to sent a file of 640,000 bits from host A to host B using circuit switching if the link speeds are 1.536 Mbps, the links use TDM with 24 slots/sec and it takes 500 msec to establish end-to-end circuit.

The time for one file is 10 second (because 1.536 Mb/s * 1 channel/24 slots per sec * 10^6 bits/1MB * 1 file/640000 bits = 10 seconds). Also need an addition .5 seconds to establish the connection. Therefore, the answer is 10.5 sec/file.

What does store-and forward transmission mean? What is the store-and-forward delay?

In packet switching, the entire packet must be received before it can be forwarded which is called store-and-forward transmission. The time spent waiting for the entire packet is called the store-and-forward delay.

If a packet is L bits, how long does it take to send it with Q links between two hosts if each link has a rate of R bps?

L bits * [1 sec/(R bits/secs per link)] * Q links = LQ/R sec

What is an output buffer?

And output buffer or an output queue stores packets when an arriving packet finds the link busy.

What happens if too many packets are waiting in an output buffer?

Buffer space is finite, and if too many packets are waiting they will drop (packet loss).

How do routers determine the next hop (forwarding router)?

Routers examine the packet destination and determine the next hop using a forwarding table.

What tier are internet backbone networks and what are its characteristics? What's the difference between this tier and the others?

Tier 1 ISPs are directly connected to other tier 1 ISPs & have international coverage. Tier 2 ISPs have regional and national coverage and are only connected to a few tier 1 ISPs. Lower tier ISPs are connected to tier 2 ISPs.

What's a POP?

A POP (Point of Presence) is the connection point from one ISP to another.

There are five types of packet-switched delays. Name three.

Total modal delays, nodal processing delay, queuing delay, transmission delay & propagation delay.

What's the difference between a transmission delay and a prorogation delay?

Transmission delay is the time required to push all the packets into the link, whereas prorogation delay is the time required to traverse the link itself.

What is a service model?

Protocols are organized in layers. A service model is the service one layer offers to the layer above.

What are the five layers in the protocol stack?

From top-to-bottom, the layers are: application, transport, network, linke & physical.

What is a datagram?

A network-layer packet is called a datagram.

Give two types of malware and how they work.

Viruses require user interaction (opening an email attachment), worms enter the device without explicit interaction (using a website through which malware is sent) and trojan horse which are hidden in otherwise useful software.

What is a DoS attack?

A denial of service attack prevents otherwise legitimate use of a network to take place.

DoS has three categories. What are they and how do they work?

A vulnerability attack sends a few messages to a vulnerable application in order to crash it. Bandwidth flooding sends a lot of packets to a targeted host so the host becomes clogged. Connection flooding establishes a large number of TCP connections to prevent the target from accepting legitimate connections.

What is packet sniffing?

Packet sniffing is when someone records all packets on a shared media (ethernet, cable, etc).

What is IP spoofing? How can you circumvent it?

IP spoofing is when you mask the source of an IP address. This can be circumvented using end-point authentication to verify source.

What is a man in the middle attack?

A man in the middle attack intercepts communication between two entities to inject, modify and delete packets.

What is an always-on host?

An always-on host is a server.

What end systems use dynamic IP addresses, which have permanent IP addresses?

Servers have permanent IP addresses, clients have dynamic IP addresses.

What's one benefit of P2P? One disadvantage?

P2P are highly scalable and don't need an always-on server, but they are difficult to manage due to arbitrary end systems.

Who initiates communication: the client process or the server process?

Client process.

A socket is the interface between which two layers?

The socket is the interface between the application layer and the transport layer?

Given an example of an application that can tolerate some lot, and an application that require 100% reliable data transfer.

Audio can tolerate loss but file transfer required 100% reliable data transfer.

What is a bandwidth sensitive application?

An application that requires a minimum amount of throughout in order to be effective is bandwidth sensitive.

What's the difference between UDP and TCP?

TCP (transmission control protocol) is reliable transport & UDP (user datagram protocol is unreliable data transfer). In TCP, there is set up required between the client and server and messages flow through 'handshaking'. With UDP, there is no connection setup, reliability, flow control, limiting, etc.

If UDP is unreliable, then why bother using it?

UDP has less overhead because it acts like IP.

What else do you need other than the IP address of a host in order to identify a process running on it?

You need the PID (process ID) & port number as well because there could be more than one process running on the same host.

What's the difference between a host name and a path name in a URL? Explain using an example.

In the URL www.someschool.edu/someDept/pic.gif ... www.someschool.edu is the host name and /someDept/pic.gif is the path name.

True or false:




HTTP is stateless.

True, a server maintains no information about past client requests.

What's the difference between a persistent HTTP connection and a non-persistent one?

In non-persistent, at most one object is sent over the TCP connection and each request/response pair is in a separate TCP connection ('handshake every time').




In a persistent HTTP, multiple objects are sent over a single TCP connection between client & server. The same TCP connection is used for all request/response pairs ('one handshake, send all objects').

Total transmission time = transit time + x(RTT).


What is x?

2

Why would you choose a persistent connection instead of a non-persistent one? Why would you choose a non-persistent one instead of a persistent one?

A persistent connection is preferred because it only requires one RTT for all objects whereas a non-persistent connection needs two per object.




A non-persistent connection may be preferred because it doesn't leave the connection 'open'.

What does a 301 status code mean?

301 Moved Permanently

True or False:




Cache acts as a server.

False. Cache acts as both a client and a server.

Give three reasons why we use web caching.

Web caching reduces response time for client requests, reduces traffic on an institution's access link and enables 'poor' content providers to effectively deliver content.

How does a Conditional Get work with cache?

If the cached copy of the object is up-to-date (if-modified-since: ) then the response from the server will contain no object.

If a Conditional Get is used for cache, and the cache is up to date, what is the status code returned by the server?

304 Not Modified.

What does it mean that FTP maintains 'state'? What's one issue with this?

It remembers current directory, earlier authentication, etc. The issue with this is that it may limit the number of simultaneous FTP connections open at once.

What are the three major components of e-mail?

User agents, mail servers, and simple mail transfer protocol (SMTP).

Explain what a user agent is (for e-mail).

It is aka the mail reader and is used for composing, editing, reading of mail messages. I.e. Outlook.

Is STMP persistent or non-persistent?

Persistent.

Explain how POP3 protocol works.

First, it connects to a mail server on port 110. Then, there is the first authorization phase (where the user enters their username/password). If the authorization goes through OK, next is the transaction phase with the list of message numbers and a retrieval message by number. The final phase is quit where messages marked for delete are deleted.

"Download and Keep" means copies of e-mail messages are saved on different ______________.




A. Clients B. Ports C. Hosts

"Download and Keep" means copies of e-mail messages are saved on different clients.

Which protocol keeps the user state across sessions?

IMAP

DNS services translate _______________ to _____________.

Host names to IP addresses.

Which class of DNS server are TDL servers typically cached in?

Local name servers.

Name the four tuples of RR.

Namee, Value, Type, TLL

What is TTL and what does it do?

TTL is time to live and it determines when a resource should be removed from the cache.

If a DNS' is type A, what is its name and value?

The name will be a hostname and the value will be an IP address.

In terms of P2P, what does it mean to "pull chunks"? In what order are chunks pulled?

Since there are no always-on server, at any given time different peers will have different subsets of 'chunks' or pieces of files periodically. Pulling a chunk means asking each neighbour for a list of chunks they have. This is done by asking for missing chunks in order of rarest first.

What does it mean to "optimistically unchoke"?

In P2P, if you optimistically unchoke, it means that you're checking for other peers every thirty seconds and the newly chosen peer may join the top four peers.

What data type are P2P databases stored in?

DHTs (distributed hash tables).

Define peer churn. How do circular DHTs deal with peer churn?

Peer churn refers to the turnover involved in joining and leaving P2P systems. In a circular DHT, each peer knows the IP of its two successors and periodically pings them to check if they're still alive. If its immediate predecessor is dead upon ping, that peer sets the second predecessor to the primary one.

True or False:




Skype is P2P.

True.

What are the two types of transport services via socket API?

Unreliable diagram (UDP) and reliable (TCP).

Which has no 'connection' / 'pipe' / 'handshaking' between the client and server: UDP or TCP?

UDP.

Do transport protocols run on the end system or the host?

End system.

What's the difference between the transport layer and the network layer?

The transport layer is the logical communication between the processes running that the end host relies on, whereas the network layer is the logical communication between the end hosts themselves.

True or False:




The network layer guarantees delivery, but not orderly delivery.

False.




The network layer uses best-effort delivery service and there are no guarantees on delivery, orderly delivery or data integrity.

What is multiplexing?

Multiplexing means encapsulating chunks at source with header information to be used for demultiplexing, to create segments and passing the segment to the network layer.

One reason for using UDP could be that it has an 8 byte header/segment whereas TCP has a 20 byte header/segment.

True.

What does UDP do to recover from an error?

Nothing. It either discards corrupted segments or passes corrupted segments to the application with a warning.

What's the purpose of ACKs and NAKs?

ACKs are acknowledges to let you know that a packet was received OK and a NAK means it was received with errors.

What is ARQ protocol?

An ARQ (automatic repeat request) is a reliable transfer protocol based on retransmission based on ACKs.

In the "stop and wait" protocol, what does the sender have to receive after sending one packet before sending the next?

An ACK.

Explain the rdt2.2 protocol.

It is a NAK-free protocol, so the receiver of packets just sends back the last packet that had an OK ACK. The receiver must include the sequence number of the packet being ACKed.

If rdt3.0 is being used, with a 1 Gbps link, 15 ms prorogation delay and 8000 bit packet, what is the transmission delay?

L/R = 8 microseconds

True or False:




rdt3.0 uses 'stop and wait' protocol.

True.

What does it mean if a protocol is using 'pipelining' ?

Pipelining means that the sender allows multiple 'in-flight' / 'in progress' / 'yet to be acknowledged' packets.

What is the name of the protocol also known as the 'sliding window' and how does it work?

The go-back-N protocol means the sender can have up to N unacked packets in the pipeline. The receiver only sends cumulative acks and doesn't ack packet if there's a gap. The sender has a timer for the oldest unacked packet and if it times out, it resends all unacked packets.