Computer Networks Exam 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

What is a protocol?

Defines the format and order of messages exchanged between two or more communicating entities, as well as the actions taken upon the transmission and/or receipt of a message or other event

2
New cards

What does a protocol govern?

all activity in the Internet that involves two or more communicating remote entities

3
New cards

Message Exchange and Actions

Protocols specify the precise sequence of messages sent and received, along with the corresponding actions taken by the communicating entities

4
New cards

What happens if entities run different protocols?

They can’t interoperate, and no useful work can be accomplished

5
New cards

Hardware-implemented protocols control…

the flow of bits on a wire

6
New cards

Congestion-control protocols manage…

packet transmission rates

7
New cards

Router protocols determine…

packet paths

8
New cards

What happens when you request a web page?

Your computer sends a connection request to the web server and waits for a reply. After the server returns a connection reply, your computer sends a “GET” message for the page, and the server then sends the Web page back.

9
New cards

Types of application-layer protocols

HTTP and SMTP

10
New cards

Protocol Stack

when the protocols of various layer are taken together

11
New cards

End Systems (Hosts)

the computing devices connected to the internet

12
New cards

Why are they called “end systems”?

they reside at the edge of the Internet

13
New cards

Why are they called “hosts”?

they run application programs

14
New cards

Categories of end systems

Clients and Servers

15
New cards

End systems are connected by…

a network of communication links and packet switches

16
New cards

What are communication links made of?

Various media, including coaxial cable, copper wire, optical fiber, and radio spectrum

17
New cards

Packet Switches

devices that take incoming packets from one communication link and forward them onto an outgoing link

18
New cards

The internet can be broadly divided into…

The Network Edge and The Network Core

19
New cards

Network Edge

consists of end systems and the access networks that connect them to the internet

20
New cards

Access Networks

physically connect an end system to its first router (“edge router”)

21
New cards

Common types of access networks

Digital Subscriber Line (DSL), Cable Internet Access, Fiber to the Home (FTTH), Ethernet, WiFi (IEEE 802.11), Wide-Area Wireless Access (3G, LTE 4G, 5G)

22
New cards

Network Core

mesh of packet switches and communication links that interconnects the Internet’s end systems

23
New cards

Packets

smaller chunks that messages are broken into

24
New cards

Packet Switching

packets are transmitted independently through the network

25
New cards

How is packet switching different from circuit switching?

No link resources are reserved in advance, and packets may experience delays due to congestion.

26
New cards

ISPs (Internet Service Providers)

what end systems access the internet through

27
New cards

Points of Presence (PoPs)

locations within a provider’s network where customer ISPs can connect

28
New cards

Multi-homing

ISPs may connect to two or more provider ISPs to enhance reliability

29
New cards

Internet Exchange Points (IXPs)

meeting points where multiple ISPs can peer together

30
New cards

The 5 layers of the Protocol Stack

Application, Transport, Network, Link, and Physical layer

31
New cards

Application Layer

where network applications and their protocols reside

32
New cards

Transport Layer

transports application-layer messages between application processes running on different hosts

33
New cards

Two main Internet transport protocols

TCP and UDP

34
New cards

Network Layer

responsible for moving “datagrams” from one host to another

35
New cards

Link Layer

moves “framers” from one network element to an adjacent one over a single communication link

36
New cards

Physical Layer

moves individual bits within a frame across the physical transmission medium

37
New cards

If you wanted to send information to a friend over this network, does this information travel directly to them via their address?

No. The information is broken down into smaller pieces and routed through a series of intermediate devices.

38
New cards

What is an end system, or a host?

An end system, or host, is a computing device connected to the Internet.

39
New cards

Clients

initiate communication sessions by contacting server processes

40
New cards

Servers

generally more powerful machines that store and distribute content like Web pages and videos, and relay e-mail

41
New cards

When a packet of information travels from application layer down to the physical layer, it will accumulate headers. Broadly speaking, in what order are the headers attached/detached from the message when the message passes down from the application layer to the physical layer?

The packet of information undergoes a process called encapsulation

  • Application Layer: application creates original message (M)

  • Transport Layer: receives the application-layer and adds its own transport-layer header (Ht). Combined unit is called a segment (Ht + M)

  • Network Layer: receives segment from transport layer and adds its own network-layer header (Hn) to create a datagram (Hn + Ht + M)

  • Link Layer: receives datagram from the network layer and adds its own link-layer header (HI) and often a trailer (Tr) to create a frame (HI + Hn + Ht + M + Tr)

  • Physical Layer: the physical layer takes the frame and converts it into individual bits for transmission across the physical medium

42
New cards

Packet sniffer – what is this?

a tool designed for observing the messages exchanged between executing protocol entities

43
New cards

Packet sniffer — broadly speaking what kinds of information can you view with it?

  • Sensitive Information: passwords, social security numbers, etc.

  • Contents of various protocol fields

  • Application-layer data

  • HTTP message formats: details from web browser

  • HTTP authentication and security

  • DNS queries and replies

  • UDP header fields and checksum calculations

  • TCP segment details

  • ICMP and SNMP messages

44
New cards

What are some ways that functionality like this could be used maliciously?

  1. Theft of Sensitive Information

  2. Reconnaissance for Further Attacks

  3. Impersonation

  4. Woman-in-the-Middle and Reply Attacks

  5. Switching Poisoning in Switched LANs

45
New cards

HTTP (HyperText Transfer Protocol)

defines how Web clients request Web pages from servers and how those servers transfer Web pages back to clients

46
New cards

SMTP (Simple Mail Transfer Protocol)

primary application-layer protocol for Internet electronic mail

47
New cards

What is a socket?

a software interface that serves as the boundary between the application layer and the transport layer within a host (also referred to as the Application Programming Interface (API))

48
New cards

Domain Name System (DNS)

the Internet’s directory service that translates human-friendly hostnames into numerical IP addresses

49
New cards

Why is DNS important in network communication?

It bridges human and machine identification

50
New cards

Without DNS, is it possible to connect to other end systems? What is required?

Yes, it’s possible. To connect to another end system without DNS, the sending process must directly specify the following two pieces of information to identify the receiving process on the destination host.