Computer Network: A top-down approach

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/119

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

120 Terms

1
New cards

Whats a route/path in the Internet infrastructure?

A sequence of communication links and packet switches traversed by sending a packet from one end system to another

2
New cards

Five network access technologies for the home

F.x. DSL, cable, FTTH (fiber to the home), satellite links and dial-up access

3
New cards

fiber-to-the-home (FTTH)

Optical fiber path is provided from the central office to the home. The fiber near the central office is shared by many homes then split into individual customer-specific fibers once relatively close to a home.

4
New cards

What types of network access do DSL (digital subscriber line) and cable modem provide?

Residential broadband access

5
New cards

What are the two main purposes of a protocol?

Defining the format and order of messages exchanged between two or more communicating entities and defining the action taken on transmission and/or reciept of a message or an event

6
New cards

What is a cable modem?

An external device that connects to the home PC via an Ethernet port

7
New cards

What is the purpose of a multiple access protocol?

To coordinate transmissions and avoid collisions on a shared upstream link

8
New cards

What are access networks?

Networks physically connecting end systems to an edge router (first router)

9
New cards

What is a data center?

Pool of resources that are interconnected by a communication network. Most of today's web servers reside in such data centers

10
New cards

What is the purpose of an Application Programming Interface?

A set of rules the sending program must follow. Specifying how a program running on one end system asks the Internet infrastructure to deliver data to a specific destination program running on another end system

11
New cards

What are distributed applications?

Applications involving multiple end systems that exhange data with each other

12
New cards

What's an ISP?

An Internet Service Provider. Simply put, a network of packet switches and communication links

13
New cards

What are routers and link-layer switches?

They are today's most prominient types of packet switches

14
New cards

Whats an host/end system?

Devices that connect to a network, typically the Internet, whether directly by users or not. Examples: PCs, web servers, PDAs, email servers, cell phones, TVs etc.

15
New cards

In what unit is transmission rate measured?

In bits per second

16
New cards

List the four types of delay in packet switching networks and briefly describe why they occur

1. Processing delays: time required to read packet header to determine destination (or other information) relevant to transfer

2. Queueing delays: when packet waits for link to be available if it's busy transmitting another packet

3. Propagation delays: time it takes for a bit, once pushed onto link, to propagate to next router. Depends on propagation speed.

4. Transmission delays: delays due to packet having to arrive in it's entirety before forwarding to outbound link.

17
New cards

What's the basic difference between packet switching and circuit switching?

Circuit switching reserves resources needed for each communication (f.x. transmission rate, links, buffers etc) whereas packet switching uses resources on demand and as a consequence messages may need to wait for accessing a communication link

18
New cards

Name two fundamental approaches of moving data through network of links and switches

Circuit switching and packet switching

19
New cards

What is the purpose of a forwarding table?

To map destination IP-addresses to router's outbound links. When a router receives a packet it searches it's forwarding table using packet's destination address to determine which outbound link to forward the packet on

20
New cards

Why might packet loss occur?

Output buffer space is finite. Overfull output buffer results in dropped arriving packet or dropped packets in buffer queue.

21
New cards

Why can packets experience a. store and forward delays and b. queueing delays

a. Due to router receving entire packet before forwarding it to outbound link

b. If a link is busy with transmission of another packet, the arriving packet must wait in output buffer queue for the link to finish transmission

22
New cards

Describe store-and-forward transmission

Packet switch must receive entire packet before forwarding it to outbound link

23
New cards

Suppose packet is L bits and sent over link with R bit/seconds transmission rate. How long does the transmission take?

L/R seconds

24
New cards

Describe packet-sniffing and IP-spoofing

PS: View packet traffic to extract vulnerable information such as passwords passed between sender and receiver

IP-S: Hand-craft packets with arbitary source address, content or destination address. Can work as a masquerade for another user.

25
New cards

What's the difference between worms and viruses malwares?

Viruses require host interaction and/or information to infect device, f.x. an email with a link can infect a device with virus.

Worms don't necessarily require such things, but can be sent to host when host is f.x. running a network application

26
New cards

What's a packet called in the:

a. Application layer

b. Transport layer

c. Network layer

d. Link layer

a. Message

b. Segment

c. Datagram

d. Frame

27
New cards

Throughput

Rate at which host recieves a file in bps

28
New cards

What is the difference between the transport layer and the network layer?

Transport layer:

Provides logical communication between processes, acting as they have a direct path between each other even though they could be on separate sides of the planet

Network layer:

Provides logical communication between hosts, difference being that hosts can run multiple processes.

29
New cards

What is transport layer multiplexing/demultipexing?

The extension of host-to-host delivery to process-to-process delivery

30
New cards

Describe how multiplexing is achieved in UDP

- A process in host A wants to send application data chunk to process in host B

- Transport layer of process A creates a segment with data, source and destination port and passes it to network layer

- Network layer encapsulates segment and attempts to send it to Host B

- If segment arrives at Host B the transport layer examines the destination port of segment and delivers segment to the socket assigned to the port

- Numerous processes could be running on B so the host directs (demultiplexes) each segment to appropriate socket

31
New cards

Describe how multiplexing is achieved in TCP

A TCP socket is a 4-tuple with source and destination IP and Port.

The welcoming socket creates a socket with these 4 values and as such segments are delivered to a socket with these 4 values

32
New cards

What does a UDP segment contain (headers and body)

- Source port

- Destination port

- Length

- Checksum

- Application Data

33
New cards

Why use UDP over TCP

- Finer application level control of data sent:

TCP might delay do to congestion or flow

control. Also TCP retransmits packets that fail

to send which is tolerable in some

applications

- No connection establishment:

No handshake establishment that takes

additional time

- No connection state:

TCP maintains the state of each connection,

UDP does not

- Small packet overhead:

TCP header - 20 bytes

UDP header- 8 bytes

(Basically, it's faster)

34
New cards

Can UDP be reliable?

Yes if reliability is built into the application itself

35
New cards

Why is reliable data transfer not ensured?

The layer below the transport layer (network layer) might be unreliable (e.g. IP is unreliable and TCP is reliable).

36
New cards

What are distributed hash tables?

Tables accessible to peers in a peer-to-peer network architecture with mappings of files/packets to IP addresses of owner peers

37
New cards

Briefly describe the four DNS server types

1. Root DNS servers: On top of the hierarchy and provide access to lover level servers. 13 root servers exists

2. Top Level Domain (TLD): Contain information on hostname (f.x. if it's a .com, .org, .net domain)

3. Authorative DNS server: Every organization with publicly accessable hosts have their own such server (f.x. xxx.ru.is is for HR)

4. Locale DNS server: Not part of hierarchy, but caches IPs and forwards queries into hierarchy if it doesn't contain requested IP

38
New cards

DNS maps hostnames to IP addresses. Name three additional features of DNS.

Host aliasing: Website can have many aliases along with it's regular hostname

Mail server ailiasing: Hostname after the @ in email addresses can have ailiases as well

Load distribution: Distributing traffic if website is available on multiple servers

39
New cards

What exacty is DNS? (2 things)

1. A database in hierarchy of DNS servers with website hostnames and their IP addresses

2. An application layer protocol that allows host to query that database

40
New cards

Describe briefly the three major components of the mail system

1. User agent: Allows users to interact with mail server, f.x. read or write an email

2. Mail servers: Have mailboxes for every user and message queues

3. Simple Mail Transport Protocol (SMTP): Sends mail between hosts

41
New cards

What two parallel connections does FTP run on? Describe their different purposes briefly.

1. Control connection: used to send information, often sensitive like user IDs and passwords between client and server on a dedicated port number 21

2. Data connection: Used to send files between client and server

42
New cards

What is the purpose of the conditional GET request conducted by web cache?

On every request from a client for a resource to web cache, the web cache sends a conditional GET request to web server with the header field if-modified-since with the date and time when resource was stored in web cache. If it has been modified since then, web server sends it to web cache in an HTTP request which stores it locally and sends it to client. If not web server responds with only a status line with the status code 304: NOT MODIFIED indicating that web cache's resource is not outdated and that he can use his own resource to send back to client (much faster)

43
New cards

Name the three delays that make up total response time and describe them briefly

1. Internet delay: Time it takes for a internet-side edge router to transmit to web server or host and receive request

2. Access delay: Time it takes to travel between two routers

3. LAN delay: Time it takes for a host to travel to it's access link

44
New cards

Define round trip time

Time it takes for a small packet to travel from client to server and come back

45
New cards

What does it mean for HTTP to be stateless?

It doesn't store any information on client or on requests

46
New cards

Upon an HTTP request, are objects returned immediately that make up an HTML page?

No, a base HTML page is returned with only references to objects. These objects are requested after the base HTML page is returned

47
New cards

Name at least 4 examples of application layer protocols

SMTP

HTTP

DNS

FTP

Telnet

SNMP

48
New cards

What does an application layer protocol define?

Types of messages exchanged (request/response)

Syntax of message type (f.x. fields)

Semantics of fields

Rules (how and why messages are sent)

49
New cards

What's a socket?

An interface between application layer and the transport layer - an interface into which messages are sent to and received from

50
New cards

What distinguishes a client from a server

Client initiates communication and server waits for communication. Server DOES NOT need to be a dedicated one, f.x. in P2P architechture, both end systems can be client and server

51
New cards

Describe client-server architecture and P2P architecture

Client-Server: Based on an always-on dedicated server/s that serves multiple clients in parallel. No direct communication of clients

P2P: No dedicated servers and direct communication between client pairs end systems called peers. It is self scalable and bases on trading.

52
New cards

Define a. end-to-end congestion control and b. network-assisted congestion control

a. End systems detect congestion without the help of the network layer, f.x. with detecting segment loss on timeout or negative-acknowledgements

b. Network layer components such as routers provide information feedback regarding congestion state

53
New cards

What is a bus?

A bus is a type of computer network architecture that uses a shared system bus to transfer data between different components of a computer system.

54
New cards

What's the purpose of doubling the timeout interval in TCP on lost packets?

Congestion control. This way if system is congested it gets more time to "correct" itself with more timeout interval and isn't bombarded with packets

55
New cards

What is a maximum transmission unit (MTU)?

Maximum size of a link-layer frame that local host is able to send

56
New cards

What's a stop and wait protocol?

A protocol that sends a packet and awaits acknowledgement before resolving other queries or transmissions

57
New cards

What precautions are needed when a reliable transfer is conducted over a lossy channel with possible bit errors?

1. Error detection (f.x. checksum)

2. Sender feedback (ACKs and NAKs)

3. Retransmission if NAK

4. Timer as timeout value set to at least the round trip time of a packet

5. Retransmission on timeout - LOSS

6. Sequence numbers for receiver to detect possible duplicate packets

58
New cards

Explain the difference between forwarding and routing

Forwarding: transferring a packet from incoming link to the appropriate outgoing link within a single router

Routing: involves all routers in network that use routing protocols to determine paths packets take from source to destination

59
New cards

Define connection setup

a feature that enables router to establish connections with other routers, essentially a handshake between routers

60
New cards

What services can network layer provide to:

a) sender

b) flow-of-packets

a) Guaranteed delivery

Guaranteed delivery with bounded delay

b) Inorder delivery

Guaranteed minimal bandwidth

Guaranteed maximum jitter

Security services

61
New cards

What is the one service the Internet's network layer implements

The Best effort service (the I tried service)

62
New cards

What is the difference between virtual networks and datagram networks

VN: Only connection service

DN Only connectionless service

63
New cards

What does a virtual circuit consist of?

- Path (links & routers) between hosts

- A virtual circuit number

- Each router in path's forwarding table entries

64
New cards

What are the three phases that occur in the lifetime of a virtual circuit

Virtual Circuit Setup:

Network layer finds path between hosts,

dedicates virtual circuit numbers for each link,

then adds forwarding table entries to each

router along the path

Data transfer:

Transfers data (duh)

Virtual Circuit Teardown:

Network layer informs other host of shutdown and removes all forwarding table entries in routers along the VC path

65
New cards

Of what four components does a generic router architecture consist of? Describe briefly

Input ports: receives packet from inbound link,

performs necessary link layer

functions/decapsulation, indexes

forwarding table for outgoing link

interface

Switching fabric: Connects input & output ports

Output ports: transmits outgoing packets

Routing processor: executes routing protocols,

maintains routing tables and forwarding

tables

66
New cards

Describe the the five layers of the Internet protocol?

5.

4.

3.

2.

1.

5. Application layer

4. Transport layer

3. Network Layer

2. Data link layer

1. Physical Layer

67
New cards

6 type of protocols on the application layer

HTTP, SMTP, FTP, DNS, DHCP, SNMP

68
New cards

2 types of protocols on the transport layer

TCP and UDP

69
New cards

4 types of protocols on the network layer

IPv4, IPv6, OSPF, BGP

70
New cards

2 types of protocols on the data link layer

Ethernet (ARP) and Wifi

71
New cards

On the transport layer a packet is called a ...

segment. datagram

72
New cards

On the network layer a packet is called a ...

packet

73
New cards

On the data link layer a packet is called a ...

frame

74
New cards

TCP protocol : Congestion control

Aims to prevent network congestion and ensure that data transmission is reliable and efficient. Monitors the network traffic, adjusting the rate. When congestion is detected, the sending rate is reduced, (minus the amount of data or plus time between sending packets).

75
New cards

TCP (Transmission Control Protocol)

- rdt, reliable data transfer

- connection-oriented

- flow and congestion control

76
New cards

UDP (User Datagram Protocol)

- unreliable, unordered delivery

- connectionless

- no-frills extension of "best-effort" IP

77
New cards

NAT (Network Address Translation)

A means of translating a system's IP address into another IP address before sending it out to a larger network. NAT manifests itself by a NAT program that runs on a system or a router. A network using NAT provides the systems on the network with private IP addresses. The system running the NAT software has two interfaces: one connected to the network and the other connected to the larger network. The NAT program takes packets from the client systems bound for the larger network and translates their internal private IP addresses to its own public IP address, enabling many systems to share a single IP address.

78
New cards

Two PROs of NAT

Address conservation: allows multiple devices on a private network to share a single public IP address. Reducing the number of public IP addresses needed to connect to the Internet

Security: hiding the private IP addresses needed to connect to the Internet. More difficult for attackers to target individual devices on a private network.

.

79
New cards

Two CONS of NAT

Limited inbound connectivity: Since the public IP address is shared by multiple devices, it makes it difficult to direct traffic to a specific device on the network. Certain apps, such as servers, that require this could have difficulties.

Network configuration complexity: NAT changes the IP addresses of packets, as they pass through the network, this makes it challenging to configure network devices and troubleshoot issues. It also requires additional hardware/software which adds to the complexity.

80
New cards

How could a server reach a private address?

Port Forwarding

The process of redirecting traffic from its normally assigned port to a different port, either on the client or server. In the case of using SSH, port forwarding can send data exchanges that are normally insecure through encrypted tunnels.

81
New cards

How could a server reach a private address?

Connection Reversal

A reverse connection is usually used to bypass firewall restrictions on open ports. A firewall usually blocks open ports, but does not block outgoing traffic. In a normal forward connection, a client connects to a server through the server's open port, but in the case of a reverse connection, the client opens the port that the server connects to. The most common way a reverse connection is used is to bypass firewall and router security restrictions.

82
New cards

Two PROs of WIFI

Convenience: Wi-Fi allows users to connect to a network without the need for physical cables, making it a convenient option for devices such as laptops, smartphones, and tablets. This allows users to move around freely and still maintain an internet connection.

Cost-effective: Wi-Fi can be a cost-effective alternative to traditional wired networks as it eliminates the need for expensive cabling and associated hardware. Wi-Fi access points are relatively inexpensive and easy to install, making it a popular choice for both personal and commercial use.

83
New cards

Two CONs of the Wifi

Limited range: Wi-Fi signals are limited in range and can be easily obstructed by walls, furniture, and other objects. This can result in weaker signals, slower speeds, and unreliable connections.

Security risks: Wi-Fi networks can be vulnerable to security breaches, including unauthorized access to sensitive data, viruses, and malware. Wi-Fi signals can also be intercepted by hackers, especially if the network is not properly secured with strong passwords and encryption.

84
New cards

Mobile network: what does mobile stand for?

The term "mobile" in mobile network refers to the ability to use wireless communication technology to access the network and services from different physical locations, without being limited to a fixed location or wired connection. In other words, it allows users to access network resources and services while on the move, using mobile devices such as smartphones, tablets, or laptops.

85
New cards

How many addresses are in a subnet prefix ?

addresses = 2^(32 - prefix)

IPv4 - 32 , IPv6

86
New cards

Internet Protocol: IPv4

- 32 adresses

- decimal format

- Header: 20 bytes

87
New cards

Internet Protocol: IPv6

- 128 addresses

- hexadecimal

- Header: 40 bytes

- no fragmentation

88
New cards

Traceroute

A program that shows the route a packet takes across the Internet

89
New cards

What would a traceroute return?

- the list of routers and hosts that a packet passes through on its way from the source to the destination.

- The IP address of each router or host.

- The time it took for the packet to reach that router or host.

- The total time it took for the packet to reach the destination

90
New cards

How does traceroute work?

A traceroute obtains information by sending a series of packets with increasing time-to-live (TTL) values to a destination. Each time a packet is sent, the TTL value is incremented. When a packet reaches a router, the router decrements the TTL value by one and then forwards the packet to the next router. If the TTL value reaches zero, the router sends an ICMP Time Exceeded message back to the source. The traceroute utility uses the ICMP Time Exceeded messages to determine the route taken by the packets and the amount of time it takes for a packet to reach each router.

91
New cards

Describe two reasons a packet can be delayed.

1. Queuing Delay: Queuing delay occurs when packets are waiting in a queue to be transmitted onto the link. This delay is caused by the fact that the link can only transmit a certain number of packets per second, and if the rate of incoming packets exceeds this rate, then packets will have to wait in the queue until the link is ready to transmit them.

2. Transmission Delay: Transmission delay occurs when a packet is actually being transmitted onto the link. This delay is caused by the fact that the link has a finite transmission speed, and it takes a certain amount of time for the packet to be transmitted onto the link.

92
New cards

What function does the HOP limit field in the IPv6s packet header have?

The HOP limit field in the IPv6 packet header is used to limit the number of routers that a packet can traverse before it is discarded. This field is used to prevent packets from cycling endlessly through the network, which can cause congestion and other problems. The HOP limit field is set to a specific value by the sender, and each router decrements the value by one as the packet passes through. If the value reaches zero, the packet is discarded. This ensures that packets are not forwarded through more than the specified number of routers.

93
New cards

What technique is used to divide networks into logical LANs?

The technique used to divide networks into logical LANs is called link-layer switching. Link-layer switches are typically used in access networks, while routers are typically used in the network core. Link-layer switches are used to connect multiple devices on a single network, such as computers, printers, and other devices. The switch acts as a bridge between the devices, allowing them to communicate with each other. The switch also provides a layer of security, as it can be configured to only allow certain types of traffic to pass through. This helps to ensure that only authorized users can access the network. Link-layer switching also allows for the creation of virtual LANs (VLANs), which are logical divisions of a single physical network. VLANs can be used to segment a network into different departments or user groups, allowing for more efficient use of resources and better security.

94
New cards

Which routing protocol does the inter-AS communication support?

The inter-AS communication supports the Border Gateway Protocol (BGP). BGP is an inter-AS routing protocol that is used to exchange routing information between autonomous systems (ASs). BGP is used to determine the best path for routing traffic between different ASs.

95
New cards

In order to send a data stream to a selected group of receivers, what casting is used?

Multicasting is a type of network communication where a single source sends data to a group of receivers.

96
New cards

The purpose of a TLD server within a DNS system is?

The purpose of a TLD server within a DNS-system is to provide the IP address of the authoritative DNS server for a given domain name. TLD servers are responsible for maintaining the resource records for the top-level domains such as com, org, net, edu, and gov, and all of the country top-level domains such as uk, fr, ca, and jp.

97
New cards

What is 802.11 standard for?

The 802.11 standard is a set of specifications for wireless local area networks (WLANs) developed by the Institute of Electrical and Electronics Engineers (IEEE).

98
New cards

What is IMAP used for?

IMAP (Internet Mail Access Protocol) is a mail access protocol used to access and manage email messages stored on a remote mail server. It is an alternative to the more commonly used POP3 (Post Office Protocol) protocol.

99
New cards

What is an HTTP cookie?

An HTTP cookie is a small piece of data sent from a website and stored in a user's web browser while the user is browsing. It is used to remember information about the user, such as their preferences and browsing history.

100
New cards

How does the TCP protocol discover and then help a congested receiver?

The TCP protocol discovers a congested receiver by monitoring the rate of acknowledgments (ACKs) that the receiver sends back to the sender. If the rate of ACKs is lower than expected, this indicates that the receiver is congested. To help the congested receiver, the TCP protocol implements congestion control mechanisms such as slow start, congestion avoidance, and fast retransmitting.