Exam Study Notes Flashcards

1
Q

Explain NAT

A

Network Address Translation.
Motivation: Local network uses just one IP address as far as the outside world is concerned.
Works: All leaving packets have the same source IP (the IP of the router). The router maps the original source IP and port to the NAT IP and a newly created port. Based on this port all incoming traffic can be directed to the correct devices within the network.
Allows: us to cut down on IP addresses, change internal local IP addresses without affecting the world, inside devices can’t be directly accessed from outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Coaxial Cable Attributes

A
  1. Two copper conductors.
  2. Bidirectional
  3. Broadband (multiple channels on cable)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Radio Attributes

A
  1. Bidirectional

2. Environment effects the signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Forms of Radio Transmission

A
  1. Terrestrial Microwave
  2. LAN (Wi-Fi)
  3. Wide-area network (Cellular).
  4. Satellite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Circuit Switching Attributes

A
  1. Dedicated Resources and Guaranteed performance
  2. Idle if not used.
  3. Cannot add more users than the defined limit, once resources have been allocated.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Switching Attributes

A
  1. Allows more users than Circuit Switching
  2. Simpler than Circuit Switching
  3. Excessive congestion possible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Four sources of delay

A
  1. Propagation
  2. Transmission
  3. Nodal Processing
  4. Queuing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Propagation Delay Attributes

A
  1. Nothing can be done about this form of delay

2. Occurs because of the physical distance between the two communicating nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transmission Delay Attributes

A

Key idea: all about the packet size (in bits) and the transmission rate (number of bits per second) the link can deliver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Nodal Processing Delay Attributes

A
  1. Check bit errors

2. Determining output link at each hop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Queuing Delay Attributes

A
  1. Represents the time spent waiting at output link for transmission
  2. Depends on congestion level of router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Traceroute and how does it work

A

Provides network analysis information, E.g. measuring network congestion and delay, etc.
Achieves this by iteratively sending (3) three packets to each of the hosts along the path to the destination and measuring response times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where does throughput bottlenecking usually occur?

A

Client side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Protocol Stack Layers

A
  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISO/OSI Model

A

ISO spelt backwards is OSI

  1. Application
  2. Presentation (allows applications to interpret data)
  3. Session (recovery and syncing of data)
  4. Transport
  5. Network
  6. Link
  7. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP and UDP Socket Attributes

A

TCP sockets are based on a connection
UDP sockets are connectionless
TCP sockets do a 3-way handshake
UDP just sends the sockets straight through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP Socket Identification

A

When creating a TCP socket, need to specify:

  1. Source IP
  2. Source Port Number
  3. Destination IP
  4. Source Port Number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

UDP Socket Identification

A

When creating a UDP socket, need to specify:

  1. Destination IP
  2. Destination Port Number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain Stop and Wait (Reliable Data Transfer UDP)

A

Sender sends a packet and then waits for acknowledgement for the specified packet.
If no acknowledgement is returned, after waiting a ‘reasonable amount of time’ the sender will retransmit the packet once again.
Performance is poor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does the Go-Back-N (GBN) Protocol work

A

Keeps a timer for the oldest transmitted (unacknowledged) bit. Should the timer expire, all bits in the same window size are retransmitted.
Drops all out of order packets, till the next in-order packet is delivered.
No buffer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP Attributes

A
  1. Point-to-Point
  2. Reliable
  3. Connection based
  4. Fully duplex data (bidirectional)
  5. Flow controlled
22
Q

TCP Reliable Transfer Protocols

A

TCP Fast Retransmit (detecting packet loss based on duplicate acknowledgements)
AMID

23
Q

Cookies

A

Permit websites to learn about you. Can be used for:

  1. Personalised Recommendations
  2. Personalised Ads
  3. Authorisation
24
Q

DNS Capabilities

A
  1. Host name to IP translation
  2. Host aliasing (conical name vs alias name)
  3. Mail server aliasing
  4. Load distribution (many IP addresses may correspond to one ‘name’).
25
Q

TLD

A

Top level domain (DNS Server)
These are often cached within the local DNS servers (name servers), so they don’t have to visit the root DNS server that often.

26
Q

How does DNS work

A

Has a hierarchical approach:

  1. Uses Root DNS server to find TLD server
  2. Uses TLD server to find host IP address
  3. Uses Authoritative server to find IP address for main webpage.
27
Q

DNS Caching

A

Once a website is visited, the name server caches the address directly for future uses. This caching has an expiry link (Time to live (TTL)).
Sometimes cached entries can be out of date (should name host change its IP address). Cannot be updated until TTL expires.

28
Q

Authoritative DNS servers (name servers)

A

References the organisation’s own DNS server.

29
Q

Resource Record

A
DNS Server Entry. 
Type = MX (used for Mail Server) 
Type = A (used for website) 
Type = CNAME (used for conical name) 
Format (Name, Value, Type, tt1)
30
Q

IGP

A

Intra Gateway Protocol.
Examples:
1. RIP - Routing Information Protocol (Distance Vector)
2. OSPF - Open Shortest Path First (Link State - Dijkstra’s Algorithm)
3. IGRP - Interior Gateway Routing Protocol (Cisco)

31
Q

Routing Information Protocol (RIP)

A
Uses Distance Vector Algorithm 
Hops used for distance estimations 
Maximum of 15 hops 
Maximum of 25 devices in subnet 
Exchanges distance vector information with neighbours every 30 seconds
32
Q

Open Shortest Path First (OPSF)

A

Uses link state algorithm (Dijkstra’s)
IS-IS routing protocol is nearly identical.
Advertisements flooded to entire AS

33
Q

BGP

A

Border Gateway Protocol (glue that holds the internet together)
eBGP: obtains subnet reachability information
iBGP: distributes the subnet reachability information to the entire AS

34
Q

Where is link layer implemented

A

In the network interface card within a host system

35
Q

Name the different forms of error detection and correction

A
  1. Cyclic Redundancy Check (CRC)
  2. Internet checksum
  3. Parity checking
36
Q

How does Cyclic Redundancy Check (CRC) work

A

Views data as ‘D’ number of bits.
Concatenates ‘R’ bits where (D+R) bits are exactly divisible by G (an R + 1 bits pattern).
Transmit (D+R). If the number if exactly divisible by G (e.g. D+R mod G == 0) no errors have been detected.
Can find up to R errors?

37
Q

CDMA

A

Code Division Multiple Access
All users share the same frequency.
Each user transmitting data encodes his/her data with the code allocated to the device, based on which the router can distinguish them.

38
Q

CSMA

A

Carrier SENSE multiple access

Key idea: listen (SENSE) before you transmit.

39
Q

TDMA

A

Time Division Multiple Access

40
Q

FDMA

A

Frequency Division Multiple Access

41
Q

MAC

A

Media Access Control

Examples: FDMA, TDMA, CDMA

42
Q

Multiple Access Protocols

A
  1. Random Access
  2. Carrier Sense Multiple Access (CSMA)
  3. Taking Turns
43
Q

Collision Avoidance Technique

A

Reserve Channel Resources using RTS; Continue transmitting till complete (other network devices do not make requests for a period of time when this is happening).

44
Q

RTS

A

Request to Send

Able to continually keep transmitting data till acknowledgement is returned

45
Q

CTS

A

Clear to Send

46
Q

Examples of Taking Turns

A

Polling: Computer is delegated as master, and invites other computers to send through any data that they may wish to transmit.
Token passing: control token that allows a device to transmit next is passed from device to device.

47
Q

IP Address Parts

A

Made up of two parts.

  1. Subnet part
  2. Host part
48
Q

Queuing delay and loss

A

Occurs at the input and output ports of the router.
1st reason it occurs is because of HOL (Head of line) blocking in the input ports.
2nd reason it occurs may be because the output port forwarding rate may be slower than the switch fabric’s rate of parsing the bits to it. And so the buffer overflows and packets are lost!

49
Q

How much buffering for input and output ports

A

RTT times link capacity (C)

50
Q

IP Fragmentation

A

Links have a max MTU (Maximum Packet Transmission Size) and if the packet you try to transmit is too large, you need to break into smaller packets before you transmit. They are recombined at the receiver.

51
Q

Distance Vector

A

Key idea: from time to time, each node sends its own distance vector estimate to neighbours.
Neighbour nodes then update their own distance vectors based on the Distance Vector algorithm.

52
Q

2D Parity Checking

A

Can be used to find and correct a single bit error