CS 465/ Networks Flashcards

1
Q

What are Network Edge?

A

End devices (Computers, smartphones) that interact with the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Network Core?

A

Routers and switch that help route data between network edges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Network Access?

A

How end devices connect to the network (Wire or wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Physical Media?

A

The means which data is transmitted (Copper, fiber, or wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Circuit switching vs. Packet switching (list the pros and cons)

A

Circuit Switching: Fixed bandwidth for duration of the call.

Packet switching: Divides the packets into segments and routes them independently.

  • Pros of packet switching: Efficient use of bandwidth, fault tolerance, and better burst traffic
  • Cons of packets switching: Can lead to congestion and variable delays.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain what Bandwidth is?

A

Bandwidth is the capacity (data rate) a communication channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain what delay?

A

Time it takes for data to travel from source to destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the Throughput Calculation?

A

Actual data rate achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Traffic Intensity?

A

Measure of utilization of a link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Four Source of packet Delay:

A

Process delay: Time it takes router or switch to examine the packet header and forward the packets

Queuing delay: Time spent by a packet in a queue waiting to be transmitted

Transmission delay: Time takes push all the bits of a packet into the link

Propagation delay: Time it takes for a signal or packet to travel from source to destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet Layers (Encapsulation/Decapsulation)

A

Internet uses layer protocol stack (OSI model)
*

Each layer adds it own header information to packets
*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to Encapsulation/Decapsulation

A

Encapsulation:
1) Data is segmented and headers are added to application, transport, network, and data link
2) Entire structure is pass to the physical layer for transmission

Decapsulation:
1) Incoming data is received and convert to physical layer
2) Header are removed at data link, network and transport layer
3) Data payload is pass to application layer for processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Security:

A

Concerned with protecting network assets and data from unauthorize access and vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Client Sever vs Peer-peer architecture

A

Client Sever: Involves the centralized service providing (services to clients).

Peer-Peer: Involves distributed, equal peers sharing resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Principle of Application Layer

A

Defines the protocol and data formats application for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cookies and Web Caches

A
  • Cookies store data on client side for tracking
  • Web caches stores copies of web pages to reduce latency and bandwidth usage.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTP( Simple Mail Transfer Protcol)

A

Use email transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS (Domain Name System)

A
  • Translate domain name into IP address
  • Comprises services, structure and record type
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CDNs (Content Distribution Network)

A

Distribute content to multiple locations from fast access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Transport Layer Servicve

A
  • Responsible for end to end communication
  • TCP (reliable) vs UDP (unrealizable)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP

A

Feature Sequence number, Acknowledgements, RTT, Timeout, Retransmission and Congestion Windows

22
Q

Flow Control

A

Mechanism to prevent sender from overwhelming the receiver

23
Q

Connection Management (3 way handshake & closing connection)

A

Understand how connect are establish and terminated

24
Q

Congestion Control: AIMD,

A

(Add increase, multiplicative Decrease)
Additive Increase: TCP gradually increase its sending rate by a fix amount

25
Q

TCP Cubic and Delay based TCP (Congestion Control)

A

TCP Cubic is a modern TCP congestion control algorithm that is designed to improve the fairness and efficiency of network traffic.

26
Q

TCP Fairness and QUIC

A

Ensuring fair sharing network
* QUIC is new TCP for faster web communication

27
Q

Congestion Control: Slow Star

A

initial phase TCP connection establishment when sender starts with small congestion window (CWND)

28
Q

Congestion Control: Fast Retransmission

A

Trigger the retransmission of missing or out of order packets as soon as possible

29
Q

Congestion Control: (Tahoe vs Reno)

A

Tahoe was early TCP congestion control (reduce value to 1)

Reno: Improvement over TCP Tahoe includes more adaptive approach ( reduced CWND to 1/2 values)

30
Q

Network Layer function

A

Forwarding and routing of packets

31
Q

Router Architecture

A

How do Routers process and forward:

32
Q

Longest Prefix (matching)

A

Longest prefix matching how to work with them in routing table lookup

33
Q

1.What is meant by a packet?

A

A unit of data that travels along a network

34
Q

List the 5 layers to Network Model:

A

Application
Transport
Network
Data Link
Physicals

35
Q

Does DNS protocol use TCP or UDP for queries? Why?

A

“dns uses both user datagram protocol (udp) and transmission control protocol (tcp) for the queries. by default it uses udp for every tasks even for the queries.”

36
Q

Sources:

https://quizlet.com/727790703/chapter-11-1125-practice-questions-flash-cards/

A
37
Q

what are the TCP flags used for connection setup (3-handshake and 4 way closing connection)

A

SYN (Synchronize):

SYN-ACK (Synchronize-Acknowledgment):

ACK (Acknowledgment):

38
Q

Can you explain what Go back-N window protocol and Selective repeat

A
  • GBN is a sliding window protocol for reliable data communication.
  • It allows multiple frames to be in transit without requiring individual acknowledgments.

*If an error is detected or an acknowledgment is not received, GBN discards and retransmits all unacknowledged frames since the last acknowledgment.

39
Q

Can you explain what Selective repeat (window protocol)

A
  • t allows multiple frames to be in transit, but it acknowledges and retransmits only individual frames that are missing or erroneous.
  • It is more efficient when there are occasional frame losses, as it avoids unnecessary retransmissions.
  • SR requires additional bookkeeping to manage individual acknowledgments.
40
Q

When using TCP, two hosts first establish a connection through a three-way handshake.
From the items on the left, drag the three valid steps in the three-way handshake process to the right in the appropriate order.

A

First step:
The first host sends a SYN packet asking to create a new session.

Second step:
The receiving host replies with a SYN-ACK packet acknowledging that the session can be created.

Third step:
The first host replies with the ACK packet, which then opens the session.

41
Q

Which of the following items of information does a packet header contain? (Select three.)
Sender
a) SYN data
B) How to deliver the packet
C) Data chunk order
D) ACK data
E) Receiver
F) TFTP data

A

Receiver
Sender
Data chuck order

42
Q

A company has built a video streaming service that supplies training videos. Quickly transmitting video data to customers is more important than guaranteed delivery.
Which of the following Transport layer IP suite protocols is MOST likely used for this service?
1) Transport Layer Protocol (TCP)

2) File Transfer Protocol (FTP
)
3) User Datagram Protocol (UDP)

4) Internet Control Message Protocol (ICMP)

A

User Datagram Protocol (UDP)

43
Q

A technician has configured a client computer’s network interface to request an IP address.
Which of the following TCP/IP suite protocols does the client computer use to perform the request and receive an IP address from a server?
A) Lightweight Directory Access Protocol (LDAP)

B) Simple Network Management Protocol (SNMP)

C) Domain Name System (DNS)

D) Dynamic Host Configuration Protocol (DHCP)

A

Dynamic Host Configuration Protocol (DHCP)

44
Q

Match each port number on the left with its associated protocol on the right.
Drag
80
443
143
22
445
427
548

1) Secure Shell (SSH)

2) Apple Filing Protocol (AFP)

3) HyperText Transfer
Protocol Secure (HTTPS)

4) Hypertext Transfer Protocol (HTTP)

5) Server Message Block (SMB/CIFS) directly over TCP

6) Service Location Protocol (SLP)

7) Internet Message Access Protocol (IMAP)

8) DNS (Domain Name Service)

9) SMPT (Simple mail Transfer Protocol)

A

SSH: 22

AFP: 548

HTTPS: 443

HTTP: 80

SMB: 445

SLP: 427

IMAP: 143

DNS = 53

SMPT: 25

45
Q

The five non-proprietary Internet applications along with their application layer protocols are as follows:

A
  1. The Webapplication : HTTP ( Hyper Text Transfer Protocol)
  2. e – mail application : SMTP (Simple Mail Transfer Protocol)
  3. Streaming of multimedia Audio and Video : RTP (Real Time Transport Protocol)
  4. Remote login application: TELNET (Telecommunication network protocol)
  5. File transfer application : FTP (File Transfer Protocol)
46
Q

Error Codes:
200
400
403
404
504

A

200: Ok
400: Bad Request
403: Forbidden
404: Not Found
504: Gateway Timeout

47
Q

UDP: Pros/Cons

A

Pros:
* The UDP protocol completes the transaction from a remote client to a server in one roundtrip time (RTT).

  • As it uses one roundtrip time, it requires less time to complete the transaction between the client and server.
  • UDP is an unreliable protocol but usually, it is reliable enough.

Cons:
*Lack of Reliability: UDP is an unreliable protocol. It does not guarantee that data will be delivered, and it does not provide error checking or correction. If data is lost or corrupted in transit, there is no automatic recovery.

*No Flow Control: While the absence of flow control can be an advantage, it can also lead to network congestion and packet loss in situations where congestion control is needed.

*No Order Guarantee: UDP does not ensure the order of data delivery. Packets can arrive out of order, which can be a challenge for applications that rely on sequential data.

*No Congestion Control: UDP does not include congestion control mechanisms, meaning it can contribute to network congestion in high-traffic scenarios.

48
Q

TCP: Pros/Cons

A

Pros (Advantages of TCP):

  • Reliability: TCP ensures accurate and ordered data delivery.
  • Error Detection and Correction: It includes error-checking mechanisms.
  • Flow Control: TCP prevents congestion and manages efficient data transfer.
  • Connection-Oriented:
    Establishes a reliable connection between sender and receiver.
  • Guaranteed Delivery: All data is guaranteed to be delivered.
    Ordered Data: Data is delivered in the same order it was sent.
  • Widely Supported: TCP is a widely adopted and standardized protocol.
    Cons (Disadvantages of TCP):
    —————————————–
    CONS:
    *Higher Overhead: Larger header size may introduce slightly higher latency.
  • Connection Setup and Teardown: Requires a three-way handshake and teardown process.
  • Not Ideal for Real-Time Applications: May not be suitable for applications requiring ultra-low latency.
  • Not Well-Suited for Broadcast/Multicast: Inherently point-to-point.
  • Increased Complexity: More complex to implement compared to UDP.
49
Q

Which of the following would be considered totally reliable network forensic data:

A

Neither

50
Q
A