Final Flashcards

1
Q

Put the steps in the most correct order for closing TCP Connection.

A
  1. Client Sends segment with FIN bit set; 2. Server sends ACK of received segment; 3. Server sends segment with FIN bit set; 4. Client sends ACK of received segment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How might authentication work with public key encryption?

A

Sender encrypts a signature with a registered private key and distributes public key. If public key decrypts signature, we know the sender is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

f. Kprivate(Kpublic(m)) = ?

A

m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

e. Kprivate(c) = ?

A

(c^d) % n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

d. c = Kpublic(m) = ?

A

(m^e) % n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

c) d = ?

A

23

There are several possibilities. Choose d so that ed-1 is exactly divisible by z. If we choose d = 23, ed-1 = 7 x 23 - 1 = 160, which is divisible by 40.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

b) z = ?

A

(p-1)(q-1) = 4 x 10 = 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

a) n = ?

A

pq = 5 x 11 = 55

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the major components of networking security?

A

Confidentiality: Intruders should not be able to understand the contents of a message.

Integrity: Intruders should not be able to change the contents of a message, without the end users being aware of it.

Authentication: End users should be able to verify they are actually speaking to whom they think they are speaking to. Availability: Services should be accessible, and not interrupted by attacks (resilience to DDoS, etc…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some considerations which might be made before instituting a security policy at a company?

A

Cost vs. Benefit - How much are we willing to spend to achieve a certain level of security?

Will we secure stored information and transmitted information, or just one or the other?

How will we educate our users so that our policy is not breached from the inside? Each computer is attached to a shared medium, with a terminator on each end to absorb signal and prevent reflections. A ring topology does not have a terminator. Rather, its “ends” are connected to each other to form a ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the performance issues involved with mobility?

A

Data loss due to transmission medium and hand-offs - interpreted as congestion.

Additional overhead

Overall lower throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In ____________ routing, the correspondent contacts the home agent to get the mobile device’s care-of address, and sends packets to the visited network

A

Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DevRTT formula

A

(1 - β) ⋅ DevRTT + β ⋅ | SampleRtt - EstimatedRtt |

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is network congestion? What causes it?

A

In the simplest terms, network congestion is the increase in end-to-end delay due to high bandwidth utilization at some point in the network. It is caused by end systems sending data faster than the network is capable of handling (those darned routers!).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some consequences of a congested network?

A

Packets are dropped, delayed, or routed through a non-optimal path. Because of this, sending hosts will attempt to retransmit (if using TCP), which causes an increase in network congestion. If this were to continue, there would be a congestion collapse (essentially a network super-slow-down).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Given a nodal delay of 3 ms when there is no traffic on the network (i.e., when usage = 0%).

What is the effective delay when network usage is 25%? 75%? 99%?

A

(Nodal Delay / (1-usage) = 3ms/(1-.25) = 4ms
(Nodal Delay / (1-usage) = 3ms/(1-.75) = 12ms
(Nodal Delay / (1-usage) = 3ms/(1-.99) = 300ms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the goal of congestion control? What, in general, is used to do this?

A

To optimizing network utilization, such that a high throughput is ensured, with the restriction that utilization is not pushed so high that delay and packet loss become major factors. This is accomplished by attempting to detect and avoid congestion, and if congestion is un-avoidable, the sender should reduce their data output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is TCP’s timeout interval set?

A

TimeoutInterval = EstimatedRTT + (4 * DevRTT)

EstimatedRTT is an exponential weighted moving average based on recent and past sampled round trip time values.

EstimatedRTT(n) = (1 - α)EstimatedRTT(n-1) + (α)SampleRTT(new)

DevRTT is a factor which increases when the most recent sampled round trip time is different from the most recent estimated round trip time. It is another exponential weighted moving average, strongly weighted toward the most recent deviation value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two major approaches to network congestion control?

A

Network core assistance: The network core senses when congestion is an issue - directly - and sends messages (either to the destination host, which bounces it back to the source host, or directly back to the source host) indicating congestion in the core, and possibly advising on a course of action.

Host inference: A source host attempts to infer congestion in the network core based on observables (e.g. round trip time, dropped packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In basic terms, how is congestion control implemented in TCP? What is this method called?

A

When no congestion is perceived, the sliding window size gradually increases (additive increase).

When there is perceived congestion, the sliding window size is drastically reduced (multiplicative decrease).

Together this makes up an additive-increase multiplicative-decrease (AIMD) scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an MSS?

A

Maximum Segment Size. This is the maximum amount of transport-layer data which can be sent, such that it will fit within one link-layer data frame. This ranges from the 500’s for a dial-up modem to around 1460 for cable internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe TCP’s “Slow Start” mode. What is its purpose?

A

The purpose of TCP Slow Start is that it allows for a very slow start, but a rapid increase, in the size of the congestion window. By doubling the CongWin every time the transmitted packets ACK within the timeout interval, there is an exponential increase in the rate of transmission (until a threshold is reached).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe TCP’s “Fast Retransmit” technique. What is its purpose? What affect does this have on congestion control?

A

TCP’s fast retransmit (from RDT) is intended to more quickly infer the loss of a packet, and retransmit it, to increase data throughput. If a host receives three duplicate (so four total) ACKs “requesting” the same segment number, it assumes the segment starting with that sequence number was dropped, and retransmits the segment, even if the timer for that segment has not expired.

In terms of congestion control, this assumed loss is perceived as congestion, but given less weight than a full timeout. The CongWin is cut in half, rather than set to 1 MSS (as in a timeout).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the steps of the TCP connection setup.

A

1) SYN: Client host sends a segment to the Server host with the SYN bit set, the ACK bit cleared, and some pre-generated sequence number.

2) SYN ACK: Server host sends a segment to the Client host with the SYN and ACK bits set, a locally generated sequence number, and an ACK number equal to the first segment’s sequence number plus one.

3) ACK: Client host sends a segment to the Server host with the ACK bit set, the SYN bit cleared, and the ACK number is the previous segment’s sequence number plus one. Note that this segment may contain actual application data in the payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Describe the steps of the TCP connection takedown

A

1) FIN: Client host sends a segment to the Server host with the FIN bit set, the ACK bit cleared, and its next sequence number.

2) FIN ACK: Server host sends a segment to the Client host with the ACK bit set and Fin bit cleared. The ACK number is the next expected sequence number. (This is a normal TCP ACK segment).

3) FIN: Server host sends a segment to the Client host with the FIN bit set, the ACK bit cleared, and its next sequence number.

4) FIN ACK: Client host sends a segment to the Server host with the ACK bit set and the FIN bit cleared, and the ACK number is the previous segment’s sequence number plus one. (This is a normal TCP ACK segment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is fairness in TCP?

A

The goal is to share bandwidth evenly amongst all connections through a router. TCP works toward fairness due entirely to its congestion window size algorithm. This is on a per-connection basis, so for example a web browser which spins off a connection for every image it has to download (in parallel) would not be “fair” to a single-connection FTP transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Is the UDP protocol fair?

A

No, UDP does not utilize any fairness-allowing schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does TCP do better than UDP?

A

While there are quite a number of answers to this question, the basics are that TCP’s reliable data transfer is the most endearing aspect it has to an end user, and congestion control for the network core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does UDP do better than TCP?

A

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Where do Network-layer protocols run?

A

Everywhere in the internet! At the edge (host systems) and in the core (routers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the purpose of the network layer?

A

At a very high level, the purpose is to ensure logical communication from host to host. In a more nuts-and-bolts view, the purpose is to determine a path from source to destination that a datagram can take, and to move it on that path (within the network layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the difference between routing and forwarding?

A

Routing is the process of determining the path a datagram will take from source to destination in the internet, whereas forwarding is the process within a router of moving a datagram from an input port to the appropriate output port, so that it may take the next step in its journey from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a “first hop” router?

A

The “first hop” router is the first router a datagram is passed to from the source host on the path to the destination host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a virtual-circuit network? What are some benefits of this type of network?

A

A connection-oriented network layer implies a virtual-circuit network. This type of network has a call setup at the beginning of a host-to-host connection, and from that point the state of the connection is preserved in all routers from source to destination, until the call is taken down. Some primary benefits of VC networks are guaranteed bandwidth and timing (jitter), which makes them ideal for streaming audio/video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a datagram network? What are some benefits of this type of network?

A

A connectionless network layer implies a datagram network. The internet is a datagram network. The advantages are similar to those of UDP - there is FAR less overhead. Each network need not preserve the state for every host-to-host communication passing through it. With the billions of devices on the internet, this would be terribly implausible regardless of the rapid development of storage space and access times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How does a router know which output port each one of the billions of IP addresses are located at?

A

The forwarding table in a datagram network’s router matches ranges of addresses to output ports, rather than matching each address to its own output port. By doing this, it saves tremendously on time and required storage/access capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does a routing algorithm do? Where is the output of a routing algorithm stored?

A

Finds a path from a router to destination, and selecting it appropriately. The result of the algorithm is used to construct the router forwarding table (or routing table), which is stored in the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is switching fabric in terms of networking? How is it controlled?

A

The hardware switching circuitry used, within routers, to switch datagrams from an input port to an output port (or queue) without any collisions occurring. This is controlled by the routing processor, which utilizes the stored routing table. The IP address of incoming datagrams are used to determine the output port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Is it possible to have a queueing delay at the output port of a router? How? What about packet loss?

A

Yes, due to transmission rate limitations on the output port link: if several datagrams were switched to the same output port, they will have to wait for access to the transmission medium. Packet loss can also occur, if the buffer overflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Is it possible to have a queueing delay at the input port of a router? How? What about packet loss?

A

Yes, due to head-of-line blocking or output port contention: if the datagram at the front of the line in the input port queue cannot be transferred to the output port because there is already a transfer occurring to, or a full queue at, the desired port. This would cause a delay in transferring the HOL datagram to its output port. Packet loss can occur here as well, if the input buffer overflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A key aspect of a virtual network is ___________________________.

A

a single, uniform address format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What reliability services does the IP network-layer protocol implement?

A

Header Checksum!
But no real reliability services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are the minimum and maximum sizes of the IP header, in bytes?

A

Minimum: No options, Length = 5. 5x4 = 20 bytes.
Maximum: Max options, Length = 15. 15x4 = 60 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Theoretically, what is the maximum number of bytes of “payload” (actual application data) that can be transmitted in an IP datagram carrying a TCP segment?

A

65495 bytes.

The “length” field of the IP datagram header is 16 bits, so the maximum datagram size is 65,535 bytes.

The TCP header and the IP datagram header are each at least 20 bytes. 65535 - 40 = 65495

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Why can’t we use hardware addresses for our network address?

A

IP addresses are hierarchically organized, allowing for streamlined routing throughout the internet. If we used hardware addresses, we would not be able to use longest-prefix matching. Indeed, some routers would have to keep lookup tables for every single hardware address connected to the internet. To make it worse, some hardware types use different addressing schemes than others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Convert the following 32-bit binary number to a dotted-decimal IP address format.

10000000 11000001 00000100 01110000

A

128.193.4.112

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

First 20 bits of an IPv4 address represent what?

A

Network Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Last 12 bits of an IPv4 address represent what?

A

Host number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Network address + host number = ?

A

Host Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Bits 21-24 of an IPv4 address are for:

A

ISP subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How many hosts can be supported in /28 subnet?

A

2^4 - 2 = 14
(32 - 28) = 4 bits available
2^4 = total numbers available
Minus 2 because all 0’s and all 1’s (broadcast) is restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is a subnet?

A

Most generally, a subnet is a part of a network which shares a common address prefix component. More specifically, it is often a discrete portion of a network, separated by a router from all other portions of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the two addresses in a subnet which are reserved, and what are they reserved for?

A

The network address cannot be assigned to a host. To find the network address, set the host part of the IP address to all zeros. (mask it with the netmask) The broadcast address is also reserved. To find the broadcast address, set the host part of the IP address to all ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a next-hop router?

A

Once a prefix match is made within a routing table, a packet is forwarded to its appropriate output link. The router at the other end of that link is the next-hop router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is DHCP?

A

Dynamic Host Configuration Protocol:

  • application layer protocol, DHCP client-server
  • dynamically “lease” IP address from a server when joining the network
  • IP address can be reused by other hosts if released
  • IP lease can be renewed while still connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the purpose of DHCP?

A

DHCP is intended to streamline the connection of new devices to a network. Rather than having a sysadmin hard-code a relationship between hardware (MAC) addresses and IP addresses, a new device can enter a network and automatically obtain an IP address valid in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Give the steps undergone when a new device enters a DHCP-enabled network. (very long)

A
  1. It broadcasts a “DHCP discover” via UDP to port 67, sending the message to IP address 255.255.255.255 with a ‘source IP address’ of 0.0.0.0. It passes this datagram to the Link Layer which will broadcast to all nodes on the subnet.
  2. A DHCP-enabled server will pick up this message and send back a “DHCP offer” message on the broadcast IP address (255.255.255.255). This message will contain the proposed IP address, lease time, network mask, etc. NOTE: The link-layer frame is addressed to the MAC address of the new device.
  3. The new device sends a “DHCP request” message, echoing the configuration parameters, again to the IP broadcast address from source 0.0.0.0, and again to the MAC broadcast address, requesting an IP address.
  4. The DHCP-enabled server, in response, sends a “DHCP acknowledgement” message, confirming the parameters, to the Broadcast IP address (and the device’s hardware address). It also records the relationship between this IP address, and the device’s hardware address, in a table.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Why does an arriving DHCP client have to broadcast its hardware address?

A

An arriving DHCP client has no IP address. By broadcasting its hardware address to the entire network, it is received by the DHCP server. The DHCP server can then offer an IP address lease to the client, by sending to its (unique) hardware address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Is IP address space exhaustion a problem?

A

This depends on your outlook. There are some mechanisms that are proving a stopgap, but really we’ve already run out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A ____________ is used to find a datagram’s path through a network

A

routing algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

In a network graph…

  • “Nodes” represent ________________.
A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

In a network graph…

  • Edges represent ________________________.
A

direct connections between routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

In a network graph…

  • Weights represent ________________________.
A

costs (speed, traffic, $$$, distance, etc…)

64
Q

In a network graph…

A “shortest path” from node A to node G is ________________________.

A

the set of edges to traverse from A to G with the smallest sum of edge weights

65
Q

Once the routing algorithm is complete, what is stored in the routing table?

A

A series of IP prefixes, each matched to a single next-hop router.

66
Q

What is the purpose of IP fragmentation?

A

It is possible for a datagram to encounter a link-layer technology which is incapable of encapsulating the entirety of the datagram into the link-layer frame, due to sizing constraints. If this happens, the datagram must be subdivided such that it will fit - this is fragmentation - or else be dropped from the network.

67
Q

What is an MTU? What is a path MTU?

A

An MTU is the maximum transmission unit, in terms of bytes of data, for a specific piece of networking hardware. A path MTU is the minimum MTU on the entire path from source to destination. If a datagram is smaller than the path MTU, there will be no fragmentation.

68
Q

Is the header of the original IP datagram included in the payload of fragmented datagrams?

A

No. Each fragmented IP datagram has its own header (which is almost identical to the original IP datagram header), but the original header is not included in the payload.

69
Q

If it is a TCP segment which has been fragmented (with header length = 20 bytes) where does the
TCP header go?

A

The TCP header was originally the first 20 bytes of the un-fragmented IP datagram. IP doesn’t care about the TCP header, and just sees it as IP-layer payload. As a result, it becomes the first 20 bytes of the first fragmented IP datagram. It does not, however, reappear in subsequent datagram fragments.

70
Q

How does the ID field of the IP datagram change from Fragment #1 to Fragment #N?

A

It doesn’t. All fragments of the same original datagram have the same ID field value.

71
Q

Where does reassembly of fragmented datagrams take place?

A

Destination Host

72
Q

What happens if an IP datagram is fragmented into N datagrams, but the destination only receives the first 1 … N-1 fragmented datagrams?

A

When the fragment timer expires, the destination router drops all of the fragmented datagrams.

73
Q

Can a fragmented IP datagram be re-fragmented?

A

Yes. This occurs if the fragment encounters a link with an even smaller MTU.

74
Q

ICMP allows information to be carried between what types of devices? (e.g. router to…)?

A

Router to Router
Router to Source Host
Source Host to Destination Host
Destination Host to Source Host

75
Q

Where is the ICMP carried?

A

The ICMP message is in the payload of the IP datagram. The format of the information in the payload depends on the type of ICMP message being sent.

76
Q

If an IPv4 datagram had to traverse 15 routers to reach its destination host, and I set the IPv4 header TTL field to 10, what would happen?

A

The datagram would be dropped by the 10th router in the path, and that router would send an ICMP Type 11 (Time Exceeded), Code 0 (TTL expired in transit) message back to the sending host.

77
Q

Give common usages of ICMP.

A
  • PING requests use ICMP messages with echo requested.
  • Traceroute (tracert) uses a series of ICMP messages, each with an incrementing TTL, to trace the path from source to destination.
  • Destination Network Unreachable is extremely common if your internet goes down somewhere.
  • Destination Port Unreachable is common if a web server goes down.
  • Internet Core Routing Algorithms use ICMP to establish paths and active router listings.
78
Q

What is the motivation for Network Address Translation (NAT)?

A

There are not enough IPv4 addresses to go around. NAT allows a sub-network of computers to use the same “global” IP address, but different “local” addresses (behind the NAT device).

79
Q

What are some advantages NAT?

A
  • Multiple computers on the same IP address
  • Local addresses are inaccessible from the global network without any prior information. (good for privacy).
  • You can change ISPs without changing inner network structure.
80
Q

What are some disadvantages of NAT?

A
  • NAT translation adds some minor delay.
  • Local addresses are inaccessible from the global network without prior information. (bad for hosting servers)
  • NAT breaks some networking conventions, such as ports being used to specify processes (in NAT they also specify hosts). They also allow routers to modify data above layer 3.
81
Q

Why does NAT have to translate port numbers?

A

Multiple devices in the local network might be attempting to access the same external address/port. These are necessary to keep the sockets straight.

82
Q

The computers in your network have addresses of the form 10.0.0.x/8, and your network uses a NAPT device as an internet gateway. The NAPT box has external address 192.205.11.1, and internal address 10.0.0.1 . The next available port number on the NAPT device is 36409. Suppose that the original sender at computer 10.0.0.25 uses port 23000 to send a query to a remote host at 209.53.77.5 on port 80.

A

When message from original sender arrives at NAPT:
Sender: 10.0.0.25:23000
Destination: 209.53.77.5:80

When message forwarded from NAPT to remote host:
Sender: 192.205.11.1:36409
Destination: 209.53.77.5:80

When response from remote host arrives at NAPT:
Sender: 209.53.77.5:80
Destination: 192.205.11.1:36409

NAPT to Original Sender:
Sender: 209.53.77.5:80
Destination: 10.0.0.25:23000

83
Q

What does a NAPT device change in an outgoing TCP/IP datagram?

A

Source host:port and checksum

84
Q

What does a NAPT device change in an incoming TCP/IP datagram?

A

Destination host:port and checksum

85
Q

What are some methods by which an outside host can contact a server running behind a NAPT device?

A
  • You can setup the NAPT device to forward from a specific port number to a specific host inside the network. You can then advertise this address:port combination outside the network to devices which want to reach the internal server (UPnP).
  • Have the NAPT device forward ALL packets for which there isn’t a current mapping to the same server (Static NAT Traversal).
  • Have the internal host connect to an outside relay, and the remote host also connect to the relay. The relay then will establish the connection between the end hosts (NAT Traversal relaying).
  • The NAPT device provides DNS services for hosts within its network. These devices can then be accessed by name (Twice NAT - very similar to UPnP).
86
Q

What is the difference between “wireless “and “mobility” in terms of networking?

A

Wireless generally refers to a link-layer protocol which enables a physical layer to be transmitted without a wired link (over the air). Mobility, on the other hand, refers to the management of a host which moves amongst a number of networks (which may not be related, hierarchically).

87
Q

Describe a scenario that is wired, but still mobile.

A

A laptop which moves between a home Ethernet network to a work Ethernet network.

88
Q

Describe a scenario that is wireless, but not mobile.

A

A home PC which is connected over Wifi, but which never moves from this network

89
Q

What multiple access control scheme does 802.11g Wifi use?

A

CSMA/CA

90
Q

What are some differences between wired and wireless links?

A

Undirected Media (broadcast in a sphere or cone, rather than on a wire) This leads to much faster signal degradation (think flashlight vs. laser)

Multipath propagation (which also helps with coverage, actually)

Interference (much worse than unshielded cables - more like bus network, but with all manner of communications on the bus).

91
Q

Describe the RTS/CTS channel reservation scheme.

A

A connected host transmits a broadcasts a request-to-send message into the channel. The AP receives this (and possibly several other RTS’s) and makes a decision to grant exclusive access to the channel to one host. They broadcast a CTS indicating how long this one host will have access to the channel. All connected hosts receive this and halt their “random access” attempts to send data into the channel for the allotted period of time.

92
Q

Why is “letting the routers handle it” not feasible for mobility?

A

This would require routers to keep track of all mobile devices attached to the internet, resulting in massive lookup tables and very slow processing.

93
Q

In ____________ routing, the correspondent sends all packets to the home network, which then redirects them to the mobile device’s visited network.

A

Indirect

94
Q

With regard to wireless mobility, please describe each of the following terms.
a. Home Network:
b. Home Agent:
c. Permanent Address:
d. Visited Network:
e. Foreign Agent:
f. Care-of Address
g. Correspondent

A

a. The registered “home network” in which the home agent resides.
b. The entity in the home network which performs mobility functions for the device
c. Address in home network, which will always correspond to the device
d. Network which mobile device is currently in (assuming it is not in the home network)
e. Entity in the visited network which performs mobility functions for the device
f. Address in the visited network which is registered to the mobile device
g. Entity attempting to communicate with the mobile device

95
Q

When using RTS/CTS, are collisions still possible?

A

Yes. For example, the RTS packet can collide with other RTS or random access packets. Or, during the CTS window, another user can attempt to join the network, causing a collision.

96
Q

What are some issues with using non-printable ASCII as frame delimiters?

A

You may send data that looks like an EOT, but is actually usable data. If the receiver sees an EOT it assumes this is the end of the frame - so if you see this before the end of the frame, it would effectively destroy the frame.

97
Q

Describe perimeter security.

A

This entails isolating a network from the outside world by filtering incoming and/or outgoing packets. Packets not meeting certain qualifications or requirements will be blocked by the policy (firewall)

98
Q

What is message encryption? (High-level is OK)

A

Altering the contents of a message so that it is difficult (or impossible) to ascertain the original message, unless you are the intended recipient, by means of cryptography

99
Q

How would encryption work with public key encryption?

A

Sender encrypts with recipient’s registered public key. Recipient decrypts with their own private key.

100
Q

Given a router with 5 input ports and 5 output ports. If the switching fabric is 5 times as fast as the input/output line speed, queueing _______ occur at an output port and/or input port (same for both!)

A

can

101
Q

The Internet Protocol (IP) implements timing controls and/or congestion control.

A

False

102
Q

What can cause packet queueing at a router’s output port? (Check all that apply)

A
  • Multiple data flows requiring the same outbound link.
  • Slow outbound link transmission rate
103
Q

The rate of CongWin size increase (in terms of MSS) while in TCP’s Congestion Avoidance phase is _____.

A

Linear

104
Q

Select the proper equation for TCP’s calculation of DevRTT.

A

DevRTTn = (1-B) * DevRTTn-1 + B * |SampleRTTnew - EstimatedRTTn-1|

105
Q

The process of moving a datagram from a router’s input port to output port is handled by the _____.

A

Switching Fabric

106
Q

In a datagram network, the responsibilities of the network layer include: (check all that apply).

A

packet routing, host-to-host comms, packet forwarding

107
Q

Which of the following are benefits of a virtual circuit network? (Check all that apply)

A

Guaranteed Timing, Guaranteed Bandwidth, Connection states are preserved

108
Q

The transport-layer header is encapsulated in the first fragmented IP datagram.

A

True

109
Q

It is the responsibility of a routing algorithm to determine the cost of an output link.

A

False

110
Q

The “traceroute” application (on Windows) receives ICMP messages.

A

True

111
Q

The path MTU is the smallest MTU on a path from sender to receiver.

A

True

112
Q

In a fragmented IP datagram, the “offset” IP header field value is exactly equal to the number of bytes of fragmented data preceding this fragment.

A

False - equal to sets of 8 bytes

113
Q

In a prefix-matching network, a routing table stores… (Check all that apply)

A

Next Hop link info, IP Prefixes

114
Q

It is the responsibility of a routing algorithm to correlate MAC addresses with IP addresses.

A

False - responsibility of ARP

115
Q

The “time to live” field in a modern IPv4 datagram header specifies…

A

the number of remaining hops before the datagram is dropped.

116
Q

IP datagrams fragments can not be fragmented again.

A

False - can if a smaller MTU occurs

117
Q

The “traceroute” application (on Windows) sends UDP messages by default.

A

False

118
Q

When a destination host’s IP fragment timer expires, it drops all accumulated fragments corresponding to that timer.

A

True

119
Q

The “ping” application (on Windows) uses ICMP echo request/reply.

A

True

120
Q

Network address translation alters IP to add new IP addresses.

A

False

121
Q

NAPT devices translate IP address and port numbers.

A

True

122
Q

In IPv6, there is no datagram fragmentation performed in the network core..

A

True

123
Q

Select all features explicitly available in IPv6 which were already available explicitly in IPv4.

A

Source/Dest Addressing
Version
Hop Limit
Traffic Type

124
Q

Select all features explicit in IPv6 which are NOT explicitly available in IPv4. (Check all that apply)

A

Explicit Payload Length
Extension Headers
Flow Labeling
128-bit Addresses

125
Q

When encountering an IPv4-only router, an IPv6 datagram is dropped.

A

False

126
Q

The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)

A

IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams

127
Q

In Random Access multiple access schemes, no two nodes will ever transmit at the same time.

A

False

128
Q

To retrieve an adjacent node’s MAC address, ______ is used.

A

ARP

129
Q

Which of the following are used in a wired Ethernet network? (Check all that apply)

A

Exponential back-off/retry for collision resolution
Carrier Sense Multi-Access (CSMA)
Collision Detection (CD)

130
Q

An address table with MAC Addresses and IP Addresses would be maintained by a host, router, or switch by..

A

ARP

131
Q

Select all Random Access schemes below.

A

CSMA, ALOHA

132
Q

A multiple access scheme which listens to the channel to make sure it is empty, prior to transmitting, is called…

A

carrier sense protocol

133
Q

A MAC address was originally designed to be permanent and unique.

A

True

134
Q

A link-layer link between more than two adjacent nodes is called a/an ________.

A

broadcast link

135
Q

When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00

A

False - all Fs

136
Q

A network with a bus topology must terminate the endpoints, but in with a ring topology they are connected so there is no endpoint.

A

Answer over there

137
Q

A link-layer link between only two adjacent nodes is called a/an point to point link.

A

point to point

138
Q

On the sending or receiving host, most of the protocol tasks “below” the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by

A

Network Interface Card

139
Q

It is fairly easy to detect collisions in wired networks.

A

True

140
Q

Which are functions of the Ethernet preamble? (Check all that apply)

A

Clock synchronization
Clock wakeup
Start signal

141
Q

A switch is a link-layer device.

A

True

142
Q

The IPv6 address size is 120 bits.

A

False - 128 bits (16 bytes)

143
Q

IPv6 datagrams cannot be converted to IPv4 datagrams without losing any information.

A

True

144
Q

1234::a03:abcd is a valid preferred-format IPv6 address.

A

True

145
Q

In a CSMA/CD system, when a collision is detected, …

A

the sender will cut off transmission and wait some time before retransmitting.

146
Q

The link-layer device at the center of an ethernet star is a ______________.

A

Switch

147
Q

If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will…

A

Terminate transmission and enter exponential backoff.

148
Q

For a 10Mbps link, 1000 bit times is 0.1ms.

A

True - 1000/10,000,000 = .0001s = .1ms

149
Q

In one type of wireless network, hosts communicate directly with other hosts that are within range. This communication model forms a “grid” called a(n)

A

ad-hoc network

150
Q

The default multiple access scheme of 802.11g is RTS/CTS.

A

False - CSMA/CA

151
Q

When a mobile unit moves from a home or foreign agent to another (foreign) agent, the new agent must assign…. (Check all that apply)

A

a new “care-of” address to the mobile unit

152
Q

A device which is connected to the network through a link which does not utilize any physical connection is a _________ device.

A

Wireless

153
Q

Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.

A

Hosts may frequently move from one network to another
Obstacles that block radio signals
Radio waves are more susceptible to interference than signals carried on cable
Multi-path propagation when radio signals bounce off obstacles
The “hidden node” problem

154
Q

When an organization establishes a network security policy, which of the following should be considered?

A

the cost of damage control after various types of security breaches
the cost of installing “secure” systems
the value of the information that is stored or transmitted by the site

155
Q

S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an encrypted message to D?

A

S encrypts a message using D’s public key, and D decrypts the message using D’s private key.

156
Q

S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an authenticated (digitally signed) message to D?

A

S encrypts a signature using S’s private key, and D decrypts the signature using S’s public key.