Applications Chap 2 Flashcards

1
Q

What is the role of the application layer (Layer 7) in the OSI model?

A

interface between users and network services,
providing applications with functionalities to exchange data across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is the application layer defined in the TCP/IP model?

A

presentation + session + application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some protocols in the application layer.

A
  • DNS,
  • HTTP,
  • SMTP,
  • FTP,
  • TELNET,
  • TFTP,
  • SNMP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the client-server paradigm.

A

distributed application architecture where clients initiate requests for services and servers provide those services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of clients in the client-server model?

A
  1. Clients initiate requests,
  2. provide a user interface,
  3. require less processing power
  4. can run on various devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the characteristics of servers in the client-server model?

A
  1. Servers provide services
  2. have powerful hardware and software,
  3. run continuously
  4. serve multiple clients concurrently.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is statelessness in client-server interactions?

A

server does not store information about the client’s state between requests;
* each request is treated independently,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some security considerations in the client-server model?

A
  1. **Authentication and encryption **protect communication.
  2. Access controls manage client access to server resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give examples of applications using the client-server paradigm.

A

World Wide Web (HTTP), Email (SMTP), File sharing (FTP), Printing (LPD), Database access (SQL), Online gaming, and Cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the peer-to-peer (P2P) architecture.

A

A decentralized network model where

  • each participant (peer) has equal status and functionality
  • acting as both client and server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 4 key principles of P2P architecture?

A
  1. Decentralization
  2. resource sharing
  3. direct communication
  4. scalability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 benefits of P2P networks?

A
  1. Robustness
  2. fault tolerance
  3. scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the challenges of P2P networks?

A
  1. Security can be a challenge due to the lack of centralized control.
  2. Dynamic network topology requires efficient protocols for peer discovery and communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give examples of applications using P2P architecture.

A
  • File sharing (e.g., BitTorrent)
  • online gaming
  • cryptocurrency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does file distribution time differ between client-server and P2P?

A
  • Client-server time increases linearly with the number of peers (N)
  • P2P leverages peer upload capacity for better scalability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does BitTorrent work?

A
  1. Files are divided into chunks
  2. peers exchange chunks
  3. tracker monitors peers in the torrent
  4. Peers request rarest chunks first and use a tit-for-tat mechanism for sending chunks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do processes communicate within the same host?

A

Using inter-process communication (IPC) mechanisms defined by the OS, such as

  1. shared memory
  2. message passing
  3. pipes
  4. sockets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do processes communicate in different hosts?

A

By exchanging messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a socket?

A

A bidirectional communication endpoint across networks or within a single machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are processes addressed for communication?

A

Using a combination of the host’s IP address and the port number associated with the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 3 benefits of process communication?

A
  1. Modularity
  2. flexibility
  3. optimized resource utilization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the challenges of process communication?

A
  1. Increased complexity
  2. synchronization overhead
  3. security concerns.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does an application-layer protocol define?

A
  1. Types of messages exchanged
  2. message syntax
  3. message semantics
  4. rules for when and how processes send and respond to messages.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give examples of open and proprietary protocols.

A

Open protocols: HTTP, SMTP.
* available to all
Proprietary protocols: Skype, Zoom.
* controlled by certain entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What 4 transport layer services are provided to the application layer?

A
  1. Data integrity
  2. timing
  3. throughput
  4. security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is data integrity in the transport layer?

A

Ensuring that data remains intact and unaltered during transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the role of timing in the transport layer?

A

Ensuring timely and orderly delivery of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does throughput refer to in the transport layer?

A

The amount of data that can be transmitted over the network in a given time period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What security measures are implemented in the transport layer?

A

Encryption, authentication, and other mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

applications and their transport service requirements.

A

**Data Loss: **Some applications like file transfer and text messaging require 100% reliable data transfer. Others, such as audio and video streaming, can tolerate some data loss.
*
**Throughput: **Some applications (multimedia) need a minimum throughput to be effective, while others (elastic apps) use whatever throughput they get.
*
**Timing: **Some applications such as Internet telephony and interactive games need low delay to be effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Describe the TCP service

A

Reliable transport between sending and receiving processes,
* flow control,
* congestion control,
* connection-oriented setup.
*
It lacks timing guarantees, minimum throughput guarantees and security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Describe the UDP service.

A

Unreliable data transfer without, flow control, congestion control etc.

connectionless and speedy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Why use UDP?

A

UDP provides a lightweight, connectionless service that is useful for applications that do not require the overhead of TCP’s reliability mechanisms

less concerned w reliability, faster, better for video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

examples of applications and their corresponding transport protocols

A

TCP
- FTP
- SMTP
-HTTP

Internet telephony (SIP, RTP) can use TCP or UDP. Streaming audio/video can use HTTP, DASH, WOW, FPS. Interactive games often use UDP, but can use TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How is TCP secured?

A

Transport Layer Security (TLS) provides

  1. encrypted TCP connections,
  2. data integrity
  3. endpoint authentication.

Apps use TLS libraries, which in turn use TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is DNS?

A

Domain Name System. It translates user-friendly domain names into numerical IP addresses, acting as the internet’s phonebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Why is DNS important?

A

enables seamless web browsing and communication by translating domain names to IP addresses, so users don’t have to memorize complex numerical strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How does DNS work?

A
  1. When you enter a domain name, your computer sends a request to a DNS resolver.
  2. The resolver contacts authoritative DNS servers to get the IP address
  3. sends it back to your computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the 4 main components of DNS?

A
  1. Root servers
  2. Top-Level Domain (TLD) servers
  3. Authoritative Name Servers
  4. Resolvers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the role of TLD servers?

A
  • manage specific domain extensions (e.g., .com, .org)
  • direct resolvers to authoritative name servers.
  • They act as section heads, guiding you to the specific bookshelf based on the domain extension
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the role of Authoritative Name Servers?

A

hold the official IP address records for specific domains.
They are the bookshelves holding the actual information (IP address) for the specific domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the role of Resolvers?

A

intermediaries, receiving user requests and querying other DNS servers for IP addresses.
* research assistants, taking your domain name request, consulting the different sections, and bringing you the answer (IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Why is DNS a distributed database?

A

To avoid a single point of failure, handle high traffic volume, and reduce maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What services does DNS provide?

A
  1. Hostname-to-IP-address translation
  2. host aliasing
  3. mail server aliasing
  4. load distribution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are Local DNS name servers?

A
  1. When a host makes a DNS query, it is sent to its local DNS server,
  2. which either answers from its cache or forwards the request into the DNS hierarchy.
  3. Each ISP has a local DNS name server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Describe Iterated query in DNS.

A

The contacted server replies with the name of the server to contact next: “I don’t know this name, but ask this server”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Describe Recursive query in DNS.

A

The contacted server bears the burden of name resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How does caching work in DNS?

A
  1. Once a name server learns a mapping,
  2. it caches the mapping and returns it in response to a query.
  3. Cache entries timeout after some time (TTL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the format of a DNS resource record (RR)?

A

(name, value, type, ttl)

50
Q

What are the different types of DNS records?

A

A: Hostname to IP address

CNAME: Alias name for a canonical name

MX: Mail server associated with name

NS: Domain to authoritative name server for this domain

51
Q

What is the structure of DNS query and reply messages? (5 things)

A

same format:
1. message header (identification, flags),
2. questions
3. answer RRs
4. authority RRs,
5. additional info

52
Q

How do you register a new domain name?

A
  1. Register the name at a DNS registrar (e.g., Network Solutions),
  2. provide names and IP addresses of authoritative name servers
  3. create type A and MX records
53
Q

What are common DNS security threats?

A

DDoS attacks and spoofing attacks (DNS cache poisoning)

54
Q

How can DNS be secured?

A
  1. Traffic filtering,
  2. local DNS servers caching IPs of TLD servers
  3. DNSSEC (DNS Security Extensions)
55
Q

What are the benefits of DNS?

A
  1. Human-readable naming,
  2. simplified Internet navigation,
  3. decentralized and distributed architecture,
  4. scalability,
  5. efficient IP address management,
  6. load balancing,
  7. fault tolerance and redundancy,
  8. global accessibility
  9. dynamic host configuration
56
Q

DNS name resolution process: iterated query

A

I request host
local DNS server to root DNS server
root to local
locl to TLD
TLD to local
LOcal to authoritative
autoritative to local
local to host

57
Q

DNS name resolution process: recursive query

A

I request host
local DNS server to root DNS server
root to TLD
TLD to authoritative
authoritative to TLD
TLD to root
root to local
local to host

58
Q

Describe the function and key characteristics of the DNS protocol within the application layer.

A

DNS translates human-readable domain names into numerical IP addresses.
* uses a distributed database to perform translation,
* host aliasing, mail server aliasing and load distribution.
* DNS protocol is defined in RFCs.
* also used to implement security measures

59
Q

What is HTTP?

A

the foundation of data communication on the World Wide Web. It is used for retrieving web pages, transferring HTML content, and accessing websites via web browsers.

60
Q

How does HTTPS differ from HTTP?

A

HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP, where data exchanged between the client and server is encrypted using SSL/TLS protocols. It is commonly used for secure transactions like online shopping and banking.

61
Q

What is SMTP used for?

A

SMTP (Simple Mail Transfer Protocol) is used for sending email messages between email servers, allowing users to send emails from their clients to the recipient’s email server.

62
Q

What are IMAP and POP3?

A

IMAP (Internet Message Access Protocol) and POP3 (Post Office Protocol v3) are used for retrieving email messages from email servers. IMAP allows access from multiple devices, while POP3 downloads and removes messages from the server.

63
Q

What is SSH, and why is it important?

A

Secure Shell is a network protocol used for secure remote access to computers and servers.
1. It provides encrypted communication for executing commands,
2. transferring files
3. managing remote systems.

64
Q

What are the 5 essential components of the Web?

A

**1. Web Servers: **Store and deliver web content
**2. Web Clients: **Web browsers that access and display content
3. Web Documents: HTML-formatted information
**4. URLs: **Unique resource identifiers
5. HTTP: Governs communication between clients and servers

65
Q

What is a webpage?

A

document written in languages like HTML, CSS, and JavaScript that contains text, images, multimedia, and interactive elements.

66
Q

What do web browsers do?

A

Web browsers (e.g., Chrome, Firefox, Edge, Safari) are software applications that render and display web content to users in a readable format.

67
Q

How does HTTP function as a client-server protocol?

A

where web browsers act as clients, sending requests to web servers, which process and respond with the requested data.

68
Q

What does HTTP GET do?

A
  1. Requests data from a specified resource,
  2. retrieving data from the server without modifying it.
  3. Should be used for safe and idempotent operations. Example: Retrieving a webpage or image
69
Q

What does HTTP PUT do

A
  1. Uploads a representation of the specified resource to the server
  2. replacing the current representation with the provided one.
  3. Used to update existing resources.
  4. Not idempotent and may change the server state. Example: Updating a user profile
70
Q

What does HTTP POST do?

A
  1. submits data to be processed to a specified resource,
  2. sending data to the server in the request body.
  3. Can create new resources or modify existing data.
  4. May have side effects on the server. Example: Submitting a form or uploading a file
71
Q

What are the key parts of an HTTP Request?

A

Method: Specifies the desired action (e.g., GET, POST).

URL: Identifies the requested resource on the server.

Headers: Provide extra info like content type and user agent.

Body (optional): Data sent to the server (e.g., form data)

72
Q

What are the key parts of an HTTP Response?

A

Status Code: Indicates the request outcome (e.g., 200 for success).

Headers: Provide information like content type and server details.

Body (optional): Contains the requested data (e.g., HTML code).

73
Q

HTTP Response Status Codes: 200 OK

A

Request succeeded, and the requested object is included in the message

74
Q

HTTP Response Status Codes: 301 Moved permanently

A

The requested object has moved; the new location is specified in the Location field

75
Q

HTTP Response Status Codes: 400 bad request

A

The request message was not understood by the server

76
Q

HTTP Response Status Codes: 404 not found

A

The requested document was not found on the server

77
Q

HTTP Response Status Codes: 505 http version not supported

A

The server does not support the HTTP version used in the request

78
Q

What are the characteristics of non-persistent HTTP connections?

A
  1. Each request requires a new TCP connection.
  2. The connection ends immediately after each response.
  3. Simpler implementation, but can overload servers with high request frequency
79
Q

What are the characteristics of persistent HTTP connections?

A
  1. A single TCP connection handles multiple requests and responses.
  2. The connection remains open for a specified time.
  3. Reduces connection overhead and improves performance for multiple requests.
  4. Can increase server load if not managed efficiently
80
Q

Describe the steps in a non-persistent HTTP example.

A

1.Client initiates TCP connection to the server.
2.Client sends HTTP request message.
3.Server receives the request, forms a response, and sends it.
4.Server closes the TCP connection.
5.Steps 1-4 are repeated for each object

81
Q

What is the formula for non-persistent HTTP response time?

A

2 RTT + file transmission time

82
Q

What is RTT? ( round trip time)

A

The time for a small packet to travel from client to server and back

83
Q

What contributes to HTTP response time per object?

A
  1. One RTT to initiate TCP connection,
  2. one RTT for HTTP request
  3. and the first bytes of the response,
  4. and the object/file transmission time
84
Q

What are the issues with non-persistent HTTP?

A
  1. Requires 2 RTTs per object,
  2. operating system overhead for each TCP connection.
  3. Browsers often open multiple parallel TCP connections
85
Q

How does HTTPS work?

A

Handshake: Client and server verify identities and establish a secure connection.

Encryption: Data is scrambled using a shared secret key.

Integrity Check: Digital signatures ensure data isn’t tampered with

86
Q

What are some benefits of HTTPS beyond basic security?

A
  1. Browsers inform users about website security, prompting them to prioritize protected interactions.
  2. Visual cues like padlocks indicate secure connections
87
Q

What are the benefits of HTTPS?

A
  1. Protects sensitive information,
  2. provides website authentication,
  3. enhances user trust
  4. improves search engine ranking
88
Q

What are the default ports for HTTP and HTTPS?

A

HTTP uses port 80. HTTPS uses port 443

89
Q

What is a security certificate?

A

A document that verifies the identity of the website you are connected to

90
Q

What are cookies?

A

Small text files stored on a browser by websites to maintain stateful information about users across multiple HTTP requests

91
Q

How are cookies set?

A

A web server includes one or more cookies in the HTTP response headers. Each cookie has a name-value pair and optional attributes.

92
Q

Sending Cookies

A
  1. A user’s web browser sends subsequent HTTP requests to the same server
  2. including any cookies associated with that server in the request headers.
93
Q

How does server-side state management work with cookies?

A
  • Upon receiving a request with cookies, the server reads the cookies from the request headers
  • and uses the information to maintain stateful data about the user.
94
Q

What are the four components that enable websites and browsers to maintain state between transactions?

A

1) cookie header line of HTTP response message
2) 2) cookie header line in next HTTP request message
3) 3) cookie file kept on user’s host, managed by user’s browser
4) 4) back-end database at Web site

95
Q

What are the privacy concerns related to HTTP cookies?

A
  1. pose security risks if not properly handled.
  2. Third-party cookies can track users across multiple websites
96
Q

What can cookies be used for?

A
  1. Track user behavior on a given website (first-party cookies)
  2. track user behavior across multiple websites (third-party cookies)
97
Q

What are the two main types of cookies?

A
  1. Session cookies (temporary, deleted when the browser closes)
  2. persistent cookies (stored on the device until they expire or are manually deleted)
98
Q

What is the main focus of GDPR regarding cookies?

A
  1. Transparency, consent, and control.
  2. Users must give explicit consent before cookies are placed on their devices.
99
Q

What steps ensure GDPR compliance for cookies?

A
  1. Use clear cookie banners,
  2. provide a detailed privacy policy,
  3. implement consent management tools,
  4. conduct regular audits
100
Q

What is web cache?

A
  • A temporary storage location for frequently accessed web content,
  • located closer to users than the original servers
101
Q

What are the different types of web cache?

A
  1. Browser cache,
  2. proxy cache
  3. CDN cache
102
Q

What are the benefits of web cache?

A
  1. Faster loading times,
  2. reduced bandwidth usage,
  3. improved responsiveness
  4. reduced server load
103
Q

What are the limitations of web cache?

A
  1. Cached content can become outdated,
  2. cache size limitations
  3. security measures are needed to prevent unauthorized access
104
Q

What are the three major components of email?

A

User agents, mail servers, and SMTP

105
Q

What do mail servers have?

A

Mailbox containing
1. incoming messages for users
2. a message queue of outgoing mail messages

106
Q

Describe the path an email takes from sender to recipient.

A

1.Sender composes email.
2.Client sends email to mail server (SMTP).
3.SMTP server routes email to recipient’s mail server (POP3 or IMAP).
4.Recipient’s mail server stores the email.
5.Recipient retrieves the email

107
Q

What protocols are used in email communication?

A

SMTP (sending), POP3 (downloading), and IMAP (managing and accessing)

108
Q

What is SMTP, and what are some common commands?

A

SMTP is a protocol for sending email messages between servers.

Common commands include HELO, MAIL FROM, RCPT TO, DATA, and QUIT

109
Q

What are some key characteristics of SMTP?

A
  1. text-based protocol.
  2. It can relay messages to other SMTP servers.
  3. Authentication mechanisms are used.
  4. It uses persistent connections.
110
Q

Give examples of successful completion SMTP response codes.

A
  1. 200 OK: The command was successful.
  2. 220 Service ready: The server is ready to accept commands.
  3. 250 OK: The requested action was successful
111
Q

What is IMAP?

A

A protocol used by email clients to retrieve emails from a mail server,
**allowing emails to be stored on the server **and
synchronized across multiple devices

112
Q

What are the key features of IMAP?

A
  1. Remote access,
  2. message synchronization,
  3. folder management,
  4. message flags and status,
  5. support for MIME
  6. security
113
Q

What are the steps of the IMAP workflow?

A
  1. Email client connects to the mail server (IMAP) on port 143,
  2. authenticates with the server,
  3. selects a specific mailbox or folder for access,
  4. can search, list, read, download, delete, or move emails within the mailbox.
114
Q

What is offline access in the context of IMAP?

A

Some IMAP clients offer offline access capabilities, allowing users t**o access and read emails **even when they are not connected to the internet

115
Q

What is POP3?

A

A protocol used for retrieving email messages from a mail server to a client device

116
Q

What are the characteristics of POP3?

A
  1. Single access,
  2. download and delete,
  3. no folder management
  4. limited message flags
117
Q

What is FTP?

A

A standard network protocol used for transferring files between a client and a server on a computer network

118
Q

What are some key characteristics of FTP?

A
  1. Client-server architecture,
  2. supports active and passive modes,
  3. supports ASCII and binary modes,
  4. and uses authentication
119
Q

What is the general workflow for FTP?

A
  1. Client establishes control and data connections,
  2. logs in,
  3. navigates directories,
  4. selects a file,
  5. transfers data
  6. disconnects
120
Q

What are some common FTP commands?

A
  1. USER,
  2. PASS,
  3. LIST,
  4. RETR,
  5. STOR,
  6. DELE
  7. QUIT.