Chapter 2 Flashcards

1
Q

What are Characteristics of Clients (client server architecture)

A

Contact/communicate with server
May have infrequent connections
May have dynamic IP addresses
Do not communicate directly with other clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Characteristics of servers in Client-Server architecture

A

Always-on host
Permanent IP address
Often located in data centers for scaling
Examples are HTTP IMAP and FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are characteristics of peer-peer architecture

A

No always-on server

Random end systems directly communicate

Peer request service from other peers, provides service in return to other peers

Self scalability: new peers bring new service capacity,
as well as new service demands

Peers are randomly connected and change IP addresses
Complex management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Client Process

A

it is a process that initiates communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Server Process

A

it is a process that waits to be contacted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Process

A

It is a program running within a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is inter-process communication

A

it is the mechanisms and techniques that allow different programs or processes running on a computer to share data, synchronize their activities, and coordinate their operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Characteristics of Process communicating

A

Within the same host, two processes communicate using inter-process communication which is defined by the OS

Processes in different hosts communicate by exchanging messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Socket

A

it is a software endpoint that allows two programs to communicate over a network, which acts as a unique identifier for each end of a communication link, by combining an IP address and port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an identifier

A

it is any data that uniquely identifies a network entity, like a device, user, or process, which enables communication and resource management across the network. Identifiers include both IP address and port numbers that are associated with the process on host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the type of HTTP message exchanges

A

Request

Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Open Protocols

A

They are publicly accessible, non restricted standards for communication, which allows for devices from different manufacturers for smooth interactions without business restrictions or licensing fees. examples include HTTP and SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Proprietary protocols

A

It is a communication protocol that is owned and controlled by a single organisation or vendor, which makes it not open for public use or implementation without their permission. Examples include Zoom and Microsoft Teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What Transport services does an app require

A

Data Integrity

Timing

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Elastic apps

A

They are applications that can dynamically adjust their data transmission rate to maximise throughput especially when facing network delays, packet loss, or bandwidth limitations. This makes them “TCP-friendly”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Data intergrity

A

It refers to the accuracy, consistency and reliability of data throughout its lifecycle, to ensure it remains unaltered and trustworthy for its intended purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is UDP

A

User Datagram Protocol (UDP) is a connectionless, unreliable transport layer protocol that is used for sending data packets across a network. It prioritises speed and minimizing the resources used by network protocols over guaranteed delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are Characteristics of TCP services

A

Reliable transport between sending and receiving process
Flow control: sender won’t overwhelm receiver
Congestion control: throttle sender when network overloaded
Does not provide: timing, minimum throughput guarantee, security
Connection-oriented: setup required between client and server processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Characteristics of UDP services

A

Unreliable data transfer between sending and receiving process
Does not provide: reliability, flow control, congestion control, timing, throughput guarantee, security, or connection set up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the differences between TCP and UDP

A

TCP is a connection-oriented protocol that is designed to be reliable and ensure data delivery in order. UDP on the other hand is a connectionless protocol that prioritises speed, sacrificing reliability for faster transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some applications UDP used for

A

Online gaming, streaming media, and voice over IP (VoIP) services and applications where speed is prioritised and occasional packet loss is acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some applications TCP is used for

A

applications that require reliable, in-order data delivery such as web browsing (HTTP), email (SMTP), file transfer (FTP), and secure shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is HTTP

A

Hypertext transfer protocol (HTTP) is an application layer protocol that is the primary protocol used for the transmission of data across the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Does HTTP remember/maintain information about past client requests

A

No it is “Stateless” it does not maintain information about previous client requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the two types of HTTP connections
Persistent HTTP Non-Persistent HTTP
26
What is persistent HTTP connection
it is a connection where multiple objects can be sent over a single TCP connection between a client and server
27
What is a Non-persistent HTTP connection
It is where at most one object can be sent over a TCP connection (where the TCP connection is closed) for each request. In order to download multiple objects it requires multiple connections
28
What is RTT
Round Trip Time (RTT) is the time taken for a packet to travel from the client to server and back
29
What is the formula to calculate Total Response time in Persistent HTTP
2RTTS + Tx(HTML file) + RTT + Tx(amount of objects) RTTS: round trip times
30
What is the formula for Non persistent HTTP response times without parallel connections
2RTT + file transmission time x amount of objects RTT: round trip time
31
What is the difference between Persistent HTTP and Non-Persistent HTTP
persistent http (also called as keep-alive) reuses a single TCP connection for multiple requests and responses, whereas non-persistent HTTP close the connection after each transaction which improves the efficiency of transmission by reducing overhead from establishing new connections.
32
What is the formula for Non-persistent HTTP with parallel connections
2RTT + Tx(html file) + 2RTT + Tx(all objects in parallel) RTT is round trip time (note to remember if the amount of objects is larger than the amount of connections then an extra 2RTT is repeated with another round of objects to finish the transaction of objects)
33
What is the HTTP GET method
It is used for getting data, e.g web pages from a server. It includes user data in URL field of HTTP GET request message (following a ‘?’).
34
What is the HTTP POST method
it is used for sending data e.g user inputs to server. Web pages often includes a form of input and the user input is sent from the client to server in the entity body of HTTP POST request message
35
What are the types of status codes in HTTP response messages
200 OK: request succeeded, requested object later in this message 301 Moved Permanently: requested object moved to a new location specified later in this message (in Location: field) 400 Bad Request: request message not understood by the server 404 Not Found: requested document not found on the server 505 HTTP Version is not supported
36
What are cookies (network)
They are small text files that websites store on a user’s computer or device to remember information about the user’s visit. It enables features such as remembering login details or shopping cart contents.
37
What is the keyword for Persistent HTTP in HTTP messages
Connection: Keep-alive (or the absence of Connection: close)
38
What is the keyword for Non-persistent HTTP in HTTP messages
Connection: close
39
How to identify a server's name in HTTP messages
Check the Host header in Request messages Check the Server header in Response messages
40
What is the symbol/keyword for a line break in HTTP messages
41
What can you use Cookies (networking) for
Authorisation Shopping carts Recommendations User session state(Web-email)
42
What are Web Caches
They are temporary storage areas either on a user’s device or on a server that stores copies of frequently accessed web pages and resources to speed up future access and reduce server load. Its aim is to satisfy the client request without involving the origin server.
43
What are the three major components of Emails
User Agent Mail servers Email protocols
44
What are some Email Protocols
SMTP (Simple mail Transfer Protocol) POP3 (Post Office Protocol version 3) IMAP (internet Messaging Access Protocol)
45
What are user agents in Email
User agents also known as email client is a software application that allows users to compose, send, receive and manage emails by interacting with a mail server.
46
What are Mail servers in Email
it is a computer system or software application that acts as a central hub for email communication. It handles the sending, receiving and storage of emails.
47
What is SMTP
Simple mail transfer protocol (SMTP) is the internet standard communication protocol used for sending and receiving email messages. TCP is used to reliably transfer email messages from client (mail server initiating connection) to server, port 25. It also users persistent connections and requires messages (header and body) to be in 7-bit ASCII
48
What is POP3
Post Office Protocol Version 3 (POP3) is a protocol used to retrieve emails from a mail server, downloading them to a local device and typically deletes them from the server after retrieval
49
What is IMAP
Internet Messaging Access Protocol (IMAP) is a standard email protocol that allows users to access their emails from multiple devices.
50
What are the differences between IMAP and POP3
IMAP stores emails on a server and syncs them across devices so that multiple users can access the same mailbox and manage their emails from any devices, whereas POP3 downloads emails from a server to a single device and doesn’t allow the user to organise emails on the server side. POP3 also deletes the emails from the server after downloading them.
51
What are the three phases of transfer
Handshaking Transfer of message Closure
52
What is Handshaking
it is the process where two devices exchange signals before communication to agree on the protocols used for transmission before the actual data transmission begins.
53
Is SMTP Push or Pull?
Push
54
Is HTTP Push or Pull?
Pull
55
Is IMAP Push or Pull?
Pull
56
Is POP3 Push or Pull?
Pull
57
What is SMTP used for? Sending or Receiving?
Sending
58
What is IMAP used for? Sending or Receiving?
Receiving
59
What is POP3 used for? Sending or Receiving?
Receiving
60
What is a DNS
Domain Name System (DNS) is a hierarchical and distributed name service that provides naming systems for computers, services, and other resources on the internet by assigning identifiers called domain names. It is essentially the Internet’s version of a phonebook.
61
What the components of a DNS
Distributed database: They are implemented in the hierarchy of many name servers Application-layer protocol: Hosts, name servers that communicate to resolve names (address/name translation)
62
What is a Distributed database
it is a set of databases that are stored on multiple computers but are presented as one database to the user whereas a Centralized database is stored at a single location.
63
What is a Centralised database
it is a system where all data is stored and managed in a single location which allows multiple users to access and modify the data from different points but with a single point of control and management.
64
What is the difference between Distributed and Centralised Databases
Centralized databases store all data in a single location whereas a distributed database stores the data across multiple locations or nodes.
65
What are some DNS services
Hostname to IP address translation Host aliasing: refers to the ability to assign multiple Domain names (aliases) to a single IP address Mail server aliasing Load distribution Replicated Web servers: many IP addresses correspond to one name
66
Why are centralised Domain systems not used
Single point of failure Traffic volume Distant centralised database maintenance
67
What is the hierarchy of a DNS
Root Top Level Domain Authoritative
68
what is DNSSEC
Domain Name System Security Extensions (DNSSEC) provides security (authentication and message integrity) in a DNS
69
What is ICANN
Internet Corporation for Assigned Names and Numbers manages the root level of the DNS
70
What are Authoritative DNS servers
They are the final authority on DNS records for a specific domain, holding the official and accurate information about that domain's IP addresses and other DNS records
71
What are Characteristics of Authoritative DNS servers
Organisation’s own DNS server(s), providing authoritative hostname to IP mappings for organisation’s named hosts Can be maintained by organisation or service provider
72
What are Local DNS name servers
They are servers that cache and forward DNS queries for local clients, speeding up name resolution and improving network performance.
73
What are Characteristics of Local DNS name servers
Does not strictly belong to hierarchy Each ISP (residential ISP, company, university) has one Also called “default name server” When host makes DNS query, query is sent to its local DNS server Has a local cache of recent name-to-address translation pairs (but may be out of date!) Acts as proxy, forwards query into hierarchy
74
What is an iterated query
it is a method where DNS clients make a request to a DNS server and if they don’t have the answer it refers the client to another that might have it and this process repeats until the client gets the final IP address. Eg: “I don’t know this host ask this server”
75
What are the types of Socket for transport services
UDP: Unreliable Datagram TCP: reliable byte stream-on
76
Characteristics of UDP Socket Programming
No handshaking before sending data Sender explicitly attaches IP destination address and port # to each packet Receiver extracts sender IP address and port# from received packet Transmitted data may be lost or received out of order
77
What are characteristics of TCP Socket Programming
Client must contact the server Server process must first be running Server process must have created socket (door) that welcomes client’s contact Client contacts server by: creating TCP socket, specifying IP address, port number of server process. When client creates socket: client TCP establishes connection to server TCP When contacted by client, server TCP creates new socket for server process to communicate with that particular client. It allows server to talk with multiple clients. Source port numbers used to distinguish clients