Final Flashcards

1
Q

Put the steps in the most correct order for closing TCP Connection.

A
  1. Client Sends segment with FIN bit set; 2. Server sends ACK of received segment; 3. Server sends segment with FIN bit set; 4. Client sends ACK of received segment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How might authentication work with public key encryption?

A

Sender encrypts a signature with a registered private key and distributes public key. If public key decrypts signature, we know the sender is who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

f. Kprivate(Kpublic(m)) = ?

A

m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

e. Kprivate(c) = ?

A

(c^d) % n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

d. c = Kpublic(m) = ?

A

(m^e) % n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

c) d = ?

A

23

There are several possibilities. Choose d so that ed-1 is exactly divisible by z. If we choose d = 23, ed-1 = 7 x 23 - 1 = 160, which is divisible by 40.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

b) z = ?

A

(p-1)(q-1) = 4 x 10 = 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use the RSA algorithm discussed in lecture to develop a public key and a private key for public-key encryption. Let p = 5, q = 11, e = 7, m is the original message, c is the encrypted message.

a) n = ?

A

pq = 5 x 11 = 55

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the major components of networking security?

A

Confidentiality: Intruders should not be able to understand the contents of a message.

Integrity: Intruders should not be able to change the contents of a message, without the end users being aware of it.

Authentication: End users should be able to verify they are actually speaking to whom they think they are speaking to. Availability: Services should be accessible, and not interrupted by attacks (resilience to DDoS, etc…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some considerations which might be made before instituting a security policy at a company?

A

Cost vs. Benefit - How much are we willing to spend to achieve a certain level of security?

Will we secure stored information and transmitted information, or just one or the other?

How will we educate our users so that our policy is not breached from the inside? Each computer is attached to a shared medium, with a terminator on each end to absorb signal and prevent reflections. A ring topology does not have a terminator. Rather, its “ends” are connected to each other to form a ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the performance issues involved with mobility?

A

Data loss due to transmission medium and hand-offs - interpreted as congestion.

Additional overhead

Overall lower throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In ____________ routing, the correspondent contacts the home agent to get the mobile device’s care-of address, and sends packets to the visited network

A

Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DevRTT formula

A

(1 - β) ⋅ DevRTT + β ⋅ | SampleRtt - EstimatedRtt |

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is network congestion? What causes it?

A

In the simplest terms, network congestion is the increase in end-to-end delay due to high bandwidth utilization at some point in the network. It is caused by end systems sending data faster than the network is capable of handling (those darned routers!).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some consequences of a congested network?

A

Packets are dropped, delayed, or routed through a non-optimal path. Because of this, sending hosts will attempt to retransmit (if using TCP), which causes an increase in network congestion. If this were to continue, there would be a congestion collapse (essentially a network super-slow-down).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Given a nodal delay of 3 ms when there is no traffic on the network (i.e., when usage = 0%).

What is the effective delay when network usage is 25%? 75%? 99%?

A

(Nodal Delay / (1-usage) = 3ms/(1-.25) = 4ms
(Nodal Delay / (1-usage) = 3ms/(1-.75) = 12ms
(Nodal Delay / (1-usage) = 3ms/(1-.99) = 300ms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the goal of congestion control? What, in general, is used to do this?

A

To optimizing network utilization, such that a high throughput is ensured, with the restriction that utilization is not pushed so high that delay and packet loss become major factors. This is accomplished by attempting to detect and avoid congestion, and if congestion is un-avoidable, the sender should reduce their data output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is TCP’s timeout interval set?

A

TimeoutInterval = EstimatedRTT + (4 * DevRTT)

EstimatedRTT is an exponential weighted moving average based on recent and past sampled round trip time values.

EstimatedRTT(n) = (1 - α)EstimatedRTT(n-1) + (α)SampleRTT(new)

DevRTT is a factor which increases when the most recent sampled round trip time is different from the most recent estimated round trip time. It is another exponential weighted moving average, strongly weighted toward the most recent deviation value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the two major approaches to network congestion control?

A

Network core assistance: The network core senses when congestion is an issue - directly - and sends messages (either to the destination host, which bounces it back to the source host, or directly back to the source host) indicating congestion in the core, and possibly advising on a course of action.

Host inference: A source host attempts to infer congestion in the network core based on observables (e.g. round trip time, dropped packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In basic terms, how is congestion control implemented in TCP? What is this method called?

A

When no congestion is perceived, the sliding window size gradually increases (additive increase).

When there is perceived congestion, the sliding window size is drastically reduced (multiplicative decrease).

Together this makes up an additive-increase multiplicative-decrease (AIMD) scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an MSS?

A

Maximum Segment Size. This is the maximum amount of transport-layer data which can be sent, such that it will fit within one link-layer data frame. This ranges from the 500’s for a dial-up modem to around 1460 for cable internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe TCP’s “Slow Start” mode. What is its purpose?

A

The purpose of TCP Slow Start is that it allows for a very slow start, but a rapid increase, in the size of the congestion window. By doubling the CongWin every time the transmitted packets ACK within the timeout interval, there is an exponential increase in the rate of transmission (until a threshold is reached).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe TCP’s “Fast Retransmit” technique. What is its purpose? What affect does this have on congestion control?

A

TCP’s fast retransmit (from RDT) is intended to more quickly infer the loss of a packet, and retransmit it, to increase data throughput. If a host receives three duplicate (so four total) ACKs “requesting” the same segment number, it assumes the segment starting with that sequence number was dropped, and retransmits the segment, even if the timer for that segment has not expired.

In terms of congestion control, this assumed loss is perceived as congestion, but given less weight than a full timeout. The CongWin is cut in half, rather than set to 1 MSS (as in a timeout).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe the steps of the TCP connection setup.

A

1) SYN: Client host sends a segment to the Server host with the SYN bit set, the ACK bit cleared, and some pre-generated sequence number.

2) SYN ACK: Server host sends a segment to the Client host with the SYN and ACK bits set, a locally generated sequence number, and an ACK number equal to the first segment’s sequence number plus one.

3) ACK: Client host sends a segment to the Server host with the ACK bit set, the SYN bit cleared, and the ACK number is the previous segment’s sequence number plus one. Note that this segment may contain actual application data in the payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Describe the steps of the TCP connection takedown
1) FIN: Client host sends a segment to the Server host with the FIN bit set, the ACK bit cleared, and its next sequence number. 2) FIN ACK: Server host sends a segment to the Client host with the ACK bit set and Fin bit cleared. The ACK number is the next expected sequence number. (This is a normal TCP ACK segment). 3) FIN: Server host sends a segment to the Client host with the FIN bit set, the ACK bit cleared, and its next sequence number. 4) FIN ACK: Client host sends a segment to the Server host with the ACK bit set and the FIN bit cleared, and the ACK number is the previous segment's sequence number plus one. (This is a normal TCP ACK segment)
26
What is fairness in TCP?
The goal is to share bandwidth evenly amongst all connections through a router. TCP works toward fairness due entirely to its congestion window size algorithm. This is on a per-connection basis, so for example a web browser which spins off a connection for every image it has to download (in parallel) would not be "fair" to a single-connection FTP transfer.
27
Is the UDP protocol fair?
No, UDP does not utilize any fairness-allowing schemes.
28
What does TCP do better than UDP?
While there are quite a number of answers to this question, the basics are that TCP's reliable data transfer is the most endearing aspect it has to an end user, and congestion control for the network core.
29
What does UDP do better than TCP?
Throughput
30
Where do Network-layer protocols run?
Everywhere in the internet! At the edge (host systems) and in the core (routers).
31
What is the purpose of the network layer?
At a very high level, the purpose is to ensure logical communication from host to host. In a more nuts-and-bolts view, the purpose is to determine a path from source to destination that a datagram can take, and to move it on that path (within the network layer)
32
What is the difference between routing and forwarding?
Routing is the process of determining the path a datagram will take from source to destination in the internet, whereas forwarding is the process within a router of moving a datagram from an input port to the appropriate output port, so that it may take the next step in its journey from source to destination.
33
What is a "first hop" router?
The "first hop" router is the first router a datagram is passed to from the source host on the path to the destination host
34
What is a virtual-circuit network? What are some benefits of this type of network?
A connection-oriented network layer implies a virtual-circuit network. This type of network has a call setup at the beginning of a host-to-host connection, and from that point the state of the connection is preserved in all routers from source to destination, until the call is taken down. Some primary benefits of VC networks are guaranteed bandwidth and timing (jitter), which makes them ideal for streaming audio/video.
35
What is a datagram network? What are some benefits of this type of network?
A connectionless network layer implies a datagram network. The internet is a datagram network. The advantages are similar to those of UDP - there is FAR less overhead. Each network need not preserve the state for every host-to-host communication passing through it. With the billions of devices on the internet, this would be terribly implausible regardless of the rapid development of storage space and access times.
36
How does a router know which output port each one of the billions of IP addresses are located at?
The forwarding table in a datagram network's router matches ranges of addresses to output ports, rather than matching each address to its own output port. By doing this, it saves tremendously on time and required storage/access capability.
37
What does a routing algorithm do? Where is the output of a routing algorithm stored?
Finds a path from a router to destination, and selecting it appropriately. The result of the algorithm is used to construct the router forwarding table (or routing table), which is stored in the router.
38
What is switching fabric in terms of networking? How is it controlled?
The hardware switching circuitry used, within routers, to switch datagrams from an input port to an output port (or queue) without any collisions occurring. This is controlled by the routing processor, which utilizes the stored routing table. The IP address of incoming datagrams are used to determine the output port.
39
Is it possible to have a queueing delay at the output port of a router? How? What about packet loss?
Yes, due to transmission rate limitations on the output port link: if several datagrams were switched to the same output port, they will have to wait for access to the transmission medium. Packet loss can also occur, if the buffer overflows.
40
Is it possible to have a queueing delay at the input port of a router? How? What about packet loss?
Yes, due to head-of-line blocking or output port contention: if the datagram at the front of the line in the input port queue cannot be transferred to the output port because there is already a transfer occurring to, or a full queue at, the desired port. This would cause a delay in transferring the HOL datagram to its output port. Packet loss can occur here as well, if the input buffer overflows
41
A key aspect of a virtual network is ___________________________.
a single, uniform address format
42
What reliability services does the IP network-layer protocol implement?
Header Checksum! But no real reliability services.
43
What are the minimum and maximum sizes of the IP header, in bytes?
Minimum: No options, Length = 5. 5x4 = 20 bytes. Maximum: Max options, Length = 15. 15x4 = 60 bytes.
44
Theoretically, what is the maximum number of bytes of "payload" (actual application data) that can be transmitted in an IP datagram carrying a TCP segment?
65495 bytes. The "length" field of the IP datagram header is 16 bits, so the maximum datagram size is 65,535 bytes. The TCP header and the IP datagram header are each at least 20 bytes. 65535 - 40 = 65495
45
Why can't we use hardware addresses for our network address?
IP addresses are hierarchically organized, allowing for streamlined routing throughout the internet. If we used hardware addresses, we would not be able to use longest-prefix matching. Indeed, some routers would have to keep lookup tables for every single hardware address connected to the internet. To make it worse, some hardware types use different addressing schemes than others.
46
Convert the following 32-bit binary number to a dotted-decimal IP address format. 10000000 11000001 00000100 01110000
128.193.4.112
47
First 20 bits of an IPv4 address represent what?
Network Address
48
Last 12 bits of an IPv4 address represent what?
Host number
49
Network address + host number = ?
Host Address
50
Bits 21-24 of an IPv4 address are for:
ISP subnets
51
How many hosts can be supported in /28 subnet?
2^4 - 2 = 14 (32 - 28) = 4 bits available 2^4 = total numbers available Minus 2 because all 0's and all 1's (broadcast) is restricted
52
What is a subnet?
Most generally, a subnet is a part of a network which shares a common address prefix component. More specifically, it is often a discrete portion of a network, separated by a router from all other portions of the network.
53
What are the two addresses in a subnet which are reserved, and what are they reserved for?
The network address cannot be assigned to a host. To find the network address, set the host part of the IP address to all zeros. (mask it with the netmask) The broadcast address is also reserved. To find the broadcast address, set the host part of the IP address to all ones.
54
What is a next-hop router?
Once a prefix match is made within a routing table, a packet is forwarded to its appropriate output link. The router at the other end of that link is the next-hop router.
55
What is DHCP?
Dynamic Host Configuration Protocol: - application layer protocol, DHCP client-server - dynamically "lease" IP address from a server when joining the network - IP address can be reused by other hosts if released - IP lease can be renewed while still connected
56
What is the purpose of DHCP?
DHCP is intended to streamline the connection of new devices to a network. Rather than having a sysadmin hard-code a relationship between hardware (MAC) addresses and IP addresses, a new device can enter a network and automatically obtain an IP address valid in the network.
57
Give the steps undergone when a new device enters a DHCP-enabled network. (very long)
1. It broadcasts a "DHCP discover" via UDP to port 67, sending the message to IP address 255.255.255.255 with a 'source IP address' of 0.0.0.0. It passes this datagram to the Link Layer which will broadcast to all nodes on the subnet. 2. A DHCP-enabled server will pick up this message and send back a "DHCP offer" message on the broadcast IP address (255.255.255.255). This message will contain the proposed IP address, lease time, network mask, etc. NOTE: The link-layer frame is addressed to the MAC address of the new device. 3. The new device sends a "DHCP request" message, echoing the configuration parameters, again to the IP broadcast address from source 0.0.0.0, and again to the MAC broadcast address, requesting an IP address. 4. The DHCP-enabled server, in response, sends a "DHCP acknowledgement" message, confirming the parameters, to the Broadcast IP address (and the device's hardware address). It also records the relationship between this IP address, and the device's hardware address, in a table.
58
Why does an arriving DHCP client have to broadcast its hardware address?
An arriving DHCP client has no IP address. By broadcasting its hardware address to the entire network, it is received by the DHCP server. The DHCP server can then offer an IP address lease to the client, by sending to its (unique) hardware address
59
Is IP address space exhaustion a problem?
This depends on your outlook. There are some mechanisms that are proving a stopgap, but really we've already run out.
60
A ____________ is used to find a datagram's path through a network
routing algorithm
61
In a network graph... * "Nodes" represent ________________.
Routers
62
In a network graph... * Edges represent ________________________.
direct connections between routers
63
In a network graph... * Weights represent ________________________.
costs (speed, traffic, $$$, distance, etc...)
64
In a network graph... A "shortest path" from node A to node G is ________________________.
the set of edges to traverse from A to G with the smallest sum of edge weights
65
Once the routing algorithm is complete, what is stored in the routing table?
A series of IP prefixes, each matched to a single next-hop router.
66
What is the purpose of IP fragmentation?
It is possible for a datagram to encounter a link-layer technology which is incapable of encapsulating the entirety of the datagram into the link-layer frame, due to sizing constraints. If this happens, the datagram must be subdivided such that it will fit - this is fragmentation - or else be dropped from the network.
67
What is an MTU? What is a path MTU?
An MTU is the maximum transmission unit, in terms of bytes of data, for a specific piece of networking hardware. A path MTU is the minimum MTU on the entire path from source to destination. If a datagram is smaller than the path MTU, there will be no fragmentation.
68
Is the header of the original IP datagram included in the payload of fragmented datagrams?
No. Each fragmented IP datagram has its own header (which is almost identical to the original IP datagram header), but the original header is not included in the payload.
69
If it is a TCP segment which has been fragmented (with header length = 20 bytes) where does the TCP header go?
The TCP header was originally the first 20 bytes of the un-fragmented IP datagram. IP doesn't care about the TCP header, and just sees it as IP-layer payload. As a result, it becomes the first 20 bytes of the first fragmented IP datagram. It does not, however, reappear in subsequent datagram fragments.
70
How does the ID field of the IP datagram change from Fragment #1 to Fragment #N?
It doesn't. All fragments of the same original datagram have the same ID field value.
71
Where does reassembly of fragmented datagrams take place?
Destination Host
72
What happens if an IP datagram is fragmented into N datagrams, but the destination only receives the first 1 ... N-1 fragmented datagrams?
When the fragment timer expires, the destination router drops all of the fragmented datagrams.
73
Can a fragmented IP datagram be re-fragmented?
Yes. This occurs if the fragment encounters a link with an even smaller MTU.
74
ICMP allows information to be carried between what types of devices? (e.g. router to...)?
Router to Router Router to Source Host Source Host to Destination Host Destination Host to Source Host
75
Where is the ICMP carried?
The ICMP message is in the payload of the IP datagram. The format of the information in the payload depends on the type of ICMP message being sent.
76
If an IPv4 datagram had to traverse 15 routers to reach its destination host, and I set the IPv4 header TTL field to 10, what would happen?
The datagram would be dropped by the 10th router in the path, and that router would send an ICMP Type 11 (Time Exceeded), Code 0 (TTL expired in transit) message back to the sending host.
77
Give common usages of ICMP.
* PING requests use ICMP messages with echo requested. * Traceroute (tracert) uses a series of ICMP messages, each with an incrementing TTL, to trace the path from source to destination. * Destination Network Unreachable is extremely common if your internet goes down somewhere. * Destination Port Unreachable is common if a web server goes down. * Internet Core Routing Algorithms use ICMP to establish paths and active router listings.
78
What is the motivation for Network Address Translation (NAT)?
There are not enough IPv4 addresses to go around. NAT allows a sub-network of computers to use the same "global" IP address, but different "local" addresses (behind the NAT device).
79
What are some advantages NAT?
* Multiple computers on the same IP address * Local addresses are inaccessible from the global network without any prior information. (good for privacy). * You can change ISPs without changing inner network structure.
80
What are some disadvantages of NAT?
* NAT translation adds some minor delay. * Local addresses are inaccessible from the global network without prior information. (bad for hosting servers) * NAT breaks some networking conventions, such as ports being used to specify processes (in NAT they also specify hosts). They also allow routers to modify data above layer 3.
81
Why does NAT have to translate port numbers?
Multiple devices in the local network might be attempting to access the same external address/port. These are necessary to keep the sockets straight.
82
The computers in your network have addresses of the form 10.0.0.x/8, and your network uses a NAPT device as an internet gateway. The NAPT box has external address 192.205.11.1, and internal address 10.0.0.1 . The next available port number on the NAPT device is 36409. Suppose that the original sender at computer 10.0.0.25 uses port 23000 to send a query to a remote host at 209.53.77.5 on port 80.
When message from original sender arrives at NAPT: Sender: 10.0.0.25:23000 Destination: 209.53.77.5:80 When message forwarded from NAPT to remote host: Sender: 192.205.11.1:36409 Destination: 209.53.77.5:80 When response from remote host arrives at NAPT: Sender: 209.53.77.5:80 Destination: 192.205.11.1:36409 NAPT to Original Sender: Sender: 209.53.77.5:80 Destination: 10.0.0.25:23000
83
What does a NAPT device change in an outgoing TCP/IP datagram?
Source host:port and checksum
84
What does a NAPT device change in an incoming TCP/IP datagram?
Destination host:port and checksum
85
What are some methods by which an outside host can contact a server running behind a NAPT device?
* You can setup the NAPT device to forward from a specific port number to a specific host inside the network. You can then advertise this address:port combination outside the network to devices which want to reach the internal server (UPnP). * Have the NAPT device forward ALL packets for which there isn't a current mapping to the same server (Static NAT Traversal). * Have the internal host connect to an outside relay, and the remote host also connect to the relay. The relay then will establish the connection between the end hosts (NAT Traversal relaying). * The NAPT device provides DNS services for hosts within its network. These devices can then be accessed by name (Twice NAT - very similar to UPnP).
86
What is the difference between "wireless "and "mobility" in terms of networking?
Wireless generally refers to a link-layer protocol which enables a physical layer to be transmitted without a wired link (over the air). Mobility, on the other hand, refers to the management of a host which moves amongst a number of networks (which may not be related, hierarchically).
87
Describe a scenario that is wired, but still mobile.
A laptop which moves between a home Ethernet network to a work Ethernet network.
88
Describe a scenario that is wireless, but not mobile.
A home PC which is connected over Wifi, but which never moves from this network
89
What multiple access control scheme does 802.11g Wifi use?
CSMA/CA
90
What are some differences between wired and wireless links?
Undirected Media (broadcast in a sphere or cone, rather than on a wire) This leads to much faster signal degradation (think flashlight vs. laser) Multipath propagation (which also helps with coverage, actually) Interference (much worse than unshielded cables - more like bus network, but with all manner of communications on the bus).
91
Describe the RTS/CTS channel reservation scheme.
A connected host transmits a broadcasts a request-to-send message into the channel. The AP receives this (and possibly several other RTS's) and makes a decision to grant exclusive access to the channel to one host. They broadcast a CTS indicating how long this one host will have access to the channel. All connected hosts receive this and halt their "random access" attempts to send data into the channel for the allotted period of time.
92
Why is "letting the routers handle it" not feasible for mobility?
This would require routers to keep track of all mobile devices attached to the internet, resulting in massive lookup tables and very slow processing.
93
In ____________ routing, the correspondent sends all packets to the home network, which then redirects them to the mobile device's visited network.
Indirect
94
With regard to wireless mobility, please describe each of the following terms. a. Home Network: b. Home Agent: c. Permanent Address: d. Visited Network: e. Foreign Agent: f. Care-of Address g. Correspondent
a. The registered "home network" in which the home agent resides. b. The entity in the home network which performs mobility functions for the device c. Address in home network, which will always correspond to the device d. Network which mobile device is currently in (assuming it is not in the home network) e. Entity in the visited network which performs mobility functions for the device f. Address in the visited network which is registered to the mobile device g. Entity attempting to communicate with the mobile device
95
When using RTS/CTS, are collisions still possible?
Yes. For example, the RTS packet can collide with other RTS or random access packets. Or, during the CTS window, another user can attempt to join the network, causing a collision.
96
What are some issues with using non-printable ASCII as frame delimiters?
You may send data that looks like an EOT, but is actually usable data. If the receiver sees an EOT it assumes this is the end of the frame - so if you see this before the end of the frame, it would effectively destroy the frame.
97
Describe perimeter security.
This entails isolating a network from the outside world by filtering incoming and/or outgoing packets. Packets not meeting certain qualifications or requirements will be blocked by the policy (firewall)
98
What is message encryption? (High-level is OK)
Altering the contents of a message so that it is difficult (or impossible) to ascertain the original message, unless you are the intended recipient, by means of cryptography
99
How would encryption work with public key encryption?
Sender encrypts with recipient's registered public key. Recipient decrypts with their own private key.
100
Given a router with 5 input ports and 5 output ports. If the switching fabric is 5 times as fast as the input/output line speed, queueing _______ occur at an output port and/or input port (same for both!)
can
101
The Internet Protocol (IP) implements timing controls and/or congestion control.
False
102
What can cause packet queueing at a router's output port? (Check all that apply)
- Multiple data flows requiring the same outbound link. - Slow outbound link transmission rate
103
The rate of CongWin size increase (in terms of MSS) while in TCP's Congestion Avoidance phase is _____.
Linear
104
Select the proper equation for TCP's calculation of DevRTT.
DevRTTn = (1-B) * DevRTTn-1 + B * |SampleRTTnew - EstimatedRTTn-1|
105
The process of moving a datagram from a router's input port to output port is handled by the _____.
Switching Fabric
106
In a datagram network, the responsibilities of the network layer include: (check all that apply).
packet routing, host-to-host comms, packet forwarding
107
Which of the following are benefits of a virtual circuit network? (Check all that apply)
Guaranteed Timing, Guaranteed Bandwidth, Connection states are preserved
108
The transport-layer header is encapsulated in the first fragmented IP datagram.
True
109
It is the responsibility of a routing algorithm to determine the cost of an output link.
False
110
The "traceroute" application (on Windows) receives ICMP messages.
True
111
The path MTU is the smallest MTU on a path from sender to receiver.
True
112
In a fragmented IP datagram, the "offset" IP header field value is exactly equal to the number of bytes of fragmented data preceding this fragment.
False - equal to sets of 8 bytes
113
In a prefix-matching network, a routing table stores... (Check all that apply)
Next Hop link info, IP Prefixes
114
It is the responsibility of a routing algorithm to correlate MAC addresses with IP addresses.
False - responsibility of ARP
115
The "time to live" field in a modern IPv4 datagram header specifies...
the number of remaining hops before the datagram is dropped.
116
IP datagrams fragments can not be fragmented again.
False - can if a smaller MTU occurs
117
The "traceroute" application (on Windows) sends UDP messages by default.
False
118
When a destination host's IP fragment timer expires, it drops all accumulated fragments corresponding to that timer.
True
119
The "ping" application (on Windows) uses ICMP echo request/reply.
True
120
Network address translation alters IP to add new IP addresses.
False
121
NAPT devices translate IP address and port numbers.
True
122
In IPv6, there is no datagram fragmentation performed in the network core..
True
123
Select all features explicitly available in IPv6 which were already available explicitly in IPv4.
Source/Dest Addressing Version Hop Limit Traffic Type
124
Select all features explicit in IPv6 which are NOT explicitly available in IPv4. (Check all that apply)
Explicit Payload Length Extension Headers Flow Labeling 128-bit Addresses
125
When encountering an IPv4-only router, an IPv6 datagram is dropped.
False
126
The transition from IPv4 to IPv6 requires that ____________. (Check all that apply)
IPv4 routers still in use must “tunnel” IPv6 datagrams, by fragmenting/encapsulating them in IPv4 datagrams
127
In Random Access multiple access schemes, no two nodes will ever transmit at the same time.
False
128
To retrieve an adjacent node's MAC address, ______ is used.
ARP
129
Which of the following are used in a wired Ethernet network? (Check all that apply)
Exponential back-off/retry for collision resolution Carrier Sense Multi-Access (CSMA) Collision Detection (CD)
130
An address table with MAC Addresses and IP Addresses would be maintained by a host, router, or switch by..
ARP
131
Select all Random Access schemes below.
CSMA, ALOHA
132
A multiple access scheme which listens to the channel to make sure it is empty, prior to transmitting, is called...
carrier sense protocol
133
A MAC address was originally designed to be permanent and unique.
True
134
A link-layer link between more than two adjacent nodes is called a/an ________.
broadcast link
135
When sending a message to all devices on a link, you would send it to the broadcast MAC address: 00-00-00-00-00-00
False - all Fs
136
A network with a bus topology must terminate the endpoints, but in with a ring topology they are connected so there is no endpoint.
Answer over there
137
A link-layer link between only two adjacent nodes is called a/an point to point link.
point to point
138
On the sending or receiving host, most of the protocol tasks "below" the application layer of the protocol stack (data encapsulation, IP addressing, etc. ) are handled by
Network Interface Card
139
It is fairly easy to detect collisions in wired networks.
True
140
Which are functions of the Ethernet preamble? (Check all that apply)
Clock synchronization Clock wakeup Start signal
141
A switch is a link-layer device.
True
142
The IPv6 address size is 120 bits.
False - 128 bits (16 bytes)
143
IPv6 datagrams cannot be converted to IPv4 datagrams without losing any information.
True
144
1234::a03:abcd is a valid preferred-format IPv6 address.
True
145
In a CSMA/CD system, when a collision is detected, ...
the sender will cut off transmission and wait some time before retransmitting.
146
The link-layer device at the center of an ethernet star is a ______________.
Switch
147
If an Ethernet sender senses a clear channel, and begins transmission, but shortly thereafter detects a collision, it will...
Terminate transmission and enter exponential backoff.
148
For a 10Mbps link, 1000 bit times is 0.1ms.
True - 1000/10,000,000 = .0001s = .1ms
149
In one type of wireless network, hosts communicate directly with other hosts that are within range. This communication model forms a "grid" called a(n)
ad-hoc network
150
The default multiple access scheme of 802.11g is RTS/CTS.
False - CSMA/CA
151
When a mobile unit moves from a home or foreign agent to another (foreign) agent, the new agent must assign.... (Check all that apply)
a new “care-of” address to the mobile unit
152
A device which is connected to the network through a link which does not utilize any physical connection is a _________ device.
Wireless
153
Which of the following are major issues that must be handled in wireless networks (i.e., issues that are more significant than in wired networks). Check all that apply.
Hosts may frequently move from one network to another Obstacles that block radio signals Radio waves are more susceptible to interference than signals carried on cable Multi-path propagation when radio signals bounce off obstacles The "hidden node" problem
154
When an organization establishes a network security policy, which of the following should be considered?
the cost of damage control after various types of security breaches the cost of installing "secure" systems the value of the information that is stored or transmitted by the site
155
S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an encrypted message to D?
S encrypts a message using D's public key, and D decrypts the message using D's private key.
156
S represents a source host and D represents a destination host. Which of the following is the most typical use of public key encryption, when S sends an authenticated (digitally signed) message to D?
S encrypts a signature using S's private key, and D decrypts the signature using S's public key.