Chapter 1 Flashcards

1
Q

Distributed Applications

A

apps which involve multiple end systems exchanging data with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host vs. End-System

A

interchangeable terms for the agents that operate within the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Technology Examples

A
  1. DSL
  2. Cable
  3. Fibre
  4. 3G
  5. LTE
  6. Ethernet
  7. Wifi
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guided Media vs. Unguided Media

A

solid medium vs. WLAN or satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What speeds of Ethernet LAN are there?

A

10 Mbps, 100 Mpbs, 1 Gbps, 10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Max speeds of access technologies

A

up to 56 Kbps, bandwidth is dedicated; ADSL: up to 24 Mbps downstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20 Mbps download; bandwidth is not shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is store-and-forward?

A

every packet must be received in a node before being transmitted to a subsequent node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Output buffer/queue

A

stores all outgoing packets before sending them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Queuing Delay

A

a delay caused by waiting for a busy link and being stored in a output buffer. can lead to lost packets if it runs out of space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Forwarding Table

A

maps destination addresses to the router’s outbound link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet Switch vs. Circuit Switch

A

packet switch involves a shared medium, where a request/response is important. circuit switch is a direct line between two communicators - more resource heavy, but direct and dependable, with a guaranteed bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Circuit

A

When two end users on a network maintain a persistent connection throughout their communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FDM

A

Frequency-division multiplexing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TDM

A

Time-division multiplexing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the delay components of a packet sending action?

A
  • processing delay
  • transmission delay
  • propagation delay
  • queueing delay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define processing delay

A

time required to examine a packet’s header and determine where it goes

17
Q

Define transmission delay

A

it is L/R where L is the length in bits and R is the transmission rate.

18
Q

define propagation delay

A

Physical movement delay, dependent on the medium. usually between 2e8 m/s or 3e8m/s speed of lightish. it is d/s where d is the distance and s is the speed.

19
Q

define queueing delay

A

the delay a packet experiences while it waits to be transmitted onto the link.

20
Q

name the layers

A
application layer
transport layer
network layer
link layer
physical layer
21
Q

application layer

A

where the network applications reside. includes HTTP, SMTP, and FTP. uses DNS. packets are called a MESSAGE

22
Q

transport layer

A

Transports application-layer messages between app endpoints. Uses TCP and UDP. Packets are called a SEGMENT

23
Q

network layer

A

Uses the IP protocol to move packets from one host to another. Contains the routing protocols. Packets are called DATAGRAMS.

24
Q

link layer

A

Interfaces between the network and physical layer - prepares the DATAGRAM for delivery from the current link to the next link. Ethernet, WiFi are examples of link layer. packets are called FRAMES.

25
Q

physical layer

A

The actual cable or air that the BITS are traveling through.

26
Q

Malware

A

malicious software used to compromise your computer

27
Q

Viruses

A

malware that require some level of user interaction.

28
Q

Worms

A

malware that can enter your computer without any explicit interaction.

29
Q

Name three DDOS attack examples

A
  • Vulnerability attack
  • Bandwidth Flooding
  • Connecting flooding
30
Q

HFC

A

Hybrid-fibre-coaxial - many cable connections to the home are a combo of fibre and coax

31
Q

What are valid ethernet physical forms?

A

Twisted-pair copper wire

fibre optic