Comp Network pre-study- Ethernet, wireless LAN, socket programming, & distributed applications Flashcards
Fast Ethernet extends traditional Ethernet performance up to 100 Mbps, and Gigabit Ethernet, up to _____ Mbps. Although they aren’t available to the average consumer, 10 Gigabit Ethernet (10,000 Mbps) now powers the networks of some businesses, data centers, and Internet2 entities. Generally, however, the expense limits its widespread adoption.
1,000
Ethernet cables likewise are manufactured to any of several standard specifications. The most popular Ethernet cable in use, Category 5 (CAT5 cable) supports both traditional and Fast Ethernet. Category 5e (CAT5e) and CAT6 cables support _______ _____.
Some devices without Ethernet support can support Ethernet connections using dongles such as USB-to-Ethernet adapters. Ethernet cables use connectors that look like the RJ-45 connector used with traditional telephones.
Gigabit Ethernet
Traditional Ethernet employs a bus topology, meaning that all devices or hosts on the network use the same shared communication line. Each device possesses an Ethernet address, also known as a ______ _______. Sending devices use Ethernet addresses to specify the intended recipients of messages.
MAC address
Data sent over Ethernet exists in the form of _____. An Ethernet frame contains a header, a data section, and a footer with a combined length of no more than 1,518 bytes. The Ethernet header contains the addresses of both the intended recipient and the sender.
frames
Data sent over the Ethernet is automatically broadcast to all devices on the network. By comparing the Ethernet address against the address in the frame header, each Ethernet device tests each frame to determine if it was intended for it and reads or discards the frame as appropriate. ___ ____ incorporate this function into their hardware.
Network adapters
Devices that want to transmit on an Ethernet network first perform a preliminary check to determine whether the _______ is available or if a transmission is in progress. If the Ethernet is available, the sending device transmits onto the wire. It’s possible, however, that two devices will perform this test at approximately the same time and both _______ simultaneously.
medium
transmit
By design, as a performance tradeoff, the Ethernet standard does not prevent multiple simultaneous transmissions. These so-called collisions, when they occur, cause both transmissions to fail and require both sending devices to retransmit. ______ uses an algorithm based on random delay times to determine the proper waiting period between retransmissions. The network adapter also implements this algorithm.
Ethernet
protocol for broadcasting, listening, and detecting collisions is known as CSMA/CD (carrier sense multiple access/collision detection). Some newer forms of Ethernet do not use CSMA/CD. Instead, they use the _________ Ethernet protocol, which supports point-to-point simultaneous sending and receiving with no listening required.
full-duplex
Ethernet cables are limited in their reach, and those distances (as short as 100 meters) are insufficient to cover medium and large network installations. A repeater in Ethernet networking allows multiple cables to be joined and greater distances to be spanned. A ______ ______ can join an Ethernet to another network of a different type, such as a wireless network. One popular type of repeater device is an ______ _____. Other devices sometimes confused with hubs are switches and routers.
bridge device
Ethernet hub
_____ _____ _____ also exist in multiple forms. Computers and game consoles feature built-in Ethernet adapters. USB-to-Ethernet adapters and wireless Ethernet adapters also can be configured to work with many devices.
Ethernet network adapters
How does a WLAN work?
Like broadcast media, a WLAN transmits information over _____ _____. Data is sent in packets. The packets contain layers with labels and instructions that, along with the unique MAC (Media Access Control) addresses assigned to endpoints, enable ______ to intended locations.
radio waves
routing
A WLAN can be configured in one of two ways:
A home or office Wi-Fi network is an example of a WLAN set up in infrastructure mode. The endpoints are all connected and communicate with each other through a base station, which may also provide internet access.
A basic infrastructure WLAN can be set up with just a few parts: a wireless router, which acts as the base station, and endpoints, which can be computers, mobile devices, printers, and other devices. In most cases, the wireless router is also the internet connection.
A WLAN is more vulnerable to being breached than a physical network. With a wired network, a bad actor must gain physical access to an internal network or breach an external firewall. To access a WLAN, a bad actor must simply be within range of the network.
The most basic method of securing a WLAN is to use _____ addresses to disallow unauthorized stations. However, determined adversaries may be able to join networks by _____ an authorized address.
The most common security method for a WLAN is encryption, including _____ _____ _____ (WEP) and Wi-Fi Protected Access (WPA), with WPA2 as the standard authentication method.
MAC
spoofing
Wired Equivalent Privacy
How does roaming work on a WLAN?
For any sized network, access points can extend the area of access.
Wi-Fi standards are designed to allow a nonstationary user’s connection to jump from one access point to another, though some users and applications may experience brief dropouts. Even with nonoverlapping access points, a user’s connection is simply paused until connection with the next access point.
Additional access points can be wired or wireless. When access points overlap, they can be configured to help optimize the network by sharing and managing loads.
A _____ _____ extends a WLAN’s reach and performance, through the use of numerous access points that connect with each other wirelessly. A mesh network provides multiple transmission paths; with intelligent algorithms, it can manage routing to improve performance.
mesh network
WLAN architecture
_______ are components that connect wirelessly to networks. They are either access points or endpoints, each identified with a unique network address.
Stations
WLAN architecture
A ____ ____ ____ (____) is a group of stations that connects to the network. In ad hoc networks, the group of stations is called an Independent BSS (IBSS). A set of connected BSSs, as in a network with multiple access points, is called an Extended Service Set (ESS).
basic service set (BSS)
WLAN architecture
The _____ ______ connects access points in an ESS. The connections can be wired or wireless. A wireless distribution system (WDS) can use mesh or its own WDS protocol. Fixed wireless is a specialized form of radio transmission for connecting a geographically distant access point.
distribution system
WLAN architecture
The _______ ______ is the base station that serves as a hub to which other stations connect. The “access” is that of the stations to the network, but it may also mean internet access, since many routers double as internet modems. In an ESS, access points may be connected with Ethernet cables or wirelessly.
access point
WLAN architecture
The ______ is used to connect a WLAN to a LAN or to an access point.
bridge
WLAN architecture
The ________ is any end-user station, such as a computer, mobile device, printer, or Internet of Things (IoT) device.
endpoint
________ in computer networks are used for allowing the transmission of information between two processes of the same machines or different machines in the network. The socket is the combination of IP address and software port number used for communication between multiple processes. Socket helps to recognize the address of the application to which data is to be sent using the IP address and port number.
sockets
Sockets allow communication of two processes that are running on the same or different machines. ______ are the end of two-way communication between two programs that are running on the networks.
Sockets
Sockets are mostly used in ____-____ architecture for communication between multiple applications.
client-server
Socket programming tells us how we can use socket _____ for creating communication between local and remote processes.
API
The socket is created by the combination of the IP address and _____ _____ of the software. With this combination, the process knows the system address and address of the application where data is to be sent.
port number
: is used to separate ____ ____ and _____ ______.
For eg: 192.168.1.67:80, 155.2.12.23:77, etc.
IP address and port number
Connection-oriented service involves connection establishment before transmitting the data and connection termination after data transmission. Connection-less service does not require any connection establishment and connection termination for transmitting the data over the network.
For connection-less socket programming, DatagramSocket and DatagramPacket classes are used.
For connection-oriented socket programming, Socket and ServerSocket classes are used.
_____________ class represents a connectionless socket for transmitting datagram packets.
DatagramSocket
____________ is a message transmitted between two communicating parties. DatagramPacket is just like a data container that carries data between two communicating parties. When multiple datagram packets are sent over the network they may arrive in any order irrespective of their sending order.
DatagramPacket
TCP stands for Transmission Control Protocol. TCP is a reliable connection-oriented protocol of the transport layer. TCP establishes the connection before data transmission. Steps for TCP socket programming for establishing TCP socket at the client-side:
The first step is to create a socket and use the socket() function to create a socket.
Use the connect() function for connecting the socket to the server address.
Transmit data between two communicating parties using read() and write() functions.
After data transmission completion close the connection using close() function.
Following are steps to be followed for establishing a TCP socket on the server-side:
Use socket() for establishing a socket.
Use the bind() function for binding the socket to an address.
Then for listening client connections use listen() function.
The accept() function is used for accepting the connection of the client.
Transmit data with the help of the read() and write() function.
UDP stands for User Datagram Protocol. UDP is a connection-less and unreliable protocol of transport layer. UDP does not establish a connection between two communicating parties before transmitting the data. Following are the steps given that are to be followed for establishing UDP socket connection on the client-side
Use socket() function for creating socket;
recvfrom() and sendto() functions are used for transmitting data between two communicating parties.
Steps to be followed for establishing UDP socket connection at the server-side.
Create a socket using the socket() function.
Use the bind() function for the binding socket to an address.
Transmit data with the help of the recvfrom() function and sendto().
Socket Programming Interface Type
______ ______ the most common type of socket programming interface. The communicating parties first establish a socket connection between them, so that any data passed through the connection will arrive in the order in which it was sent by the sender because of the connection-oriented service.
stream socket
Socket Programming Interface Type
_______ _______: Provides connection-less services. No connection is established before data transmission. Communicating party transmits the datagrams as required or waits for the response. Data can be lost during the transmission or may arrive out of order. Implementing a datagram provides more flexibility in comparison to using stream sockets.
Datagram sockets
Socket Programming Interface Type
_____ _____: This socket interface Bypasses the library’s built-in support for standard protocols such as UDP( User Datagram Protocol) and TCP( Transmission Control Protocol). Raw sockets are socket programming interfaces that are used for custom low-level protocol development.
Raw sockets
A _______ _______ is a program that runs on one or more computers simultaneously and communicates through a network
distributed application