Final Exam Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is hot potato routing?

A

A network routing strategy is where a data packet is forwarded to the next nearest node as quickly as possible, regardless of the overall path efficiency. The main goal is to minimize the time a packet spends in transit within a network, as opposed to optimizing for the shortest or least congested path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give a technique that addresses the count-to-infinity problem incurred by the distance vector algorithm.

A

Implementation of a split horizon with poison reverse. Split horizon prevents a node from advertising a route back to the node it learned the route from. Poison reverse actively advertises an infinite metric for routes learned from a neighboring node back to that node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is split horizon?

A

A loop prevention technique used in distance vector routing algorithms. It prohibits a router from advertising a route back to the node it learned the route from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is poison reverse?

A

A loop prevention technique used in distance vector routing algorithms. It involves a router advertising an infinite metric back to the source node for the routes it has learned from that node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a wireline local area network implementing the carrier sensing multiple access (CSMA) based medium access control, what factors may negatively impact the network
throughput?

A

Collisions, overhead, propagation delay, limited channel capacity, hidden and exposed node problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a collision?

A

A collision is when two or more nodes transmit data simultaneously. This can lead to data loss and retransmissions. Reducing the overall throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is overhead?

A

The non-data communication, such as control messages, acknowledgments, and protocol-specific mechanisms required to maintain a network. Overhead consumes a portion of the network’s bandwidth and reduces the effective throughput available for data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is propagation delay?

A

The time it takes for a signal to travel from the sender to the receiver in a network. Determined by factors such as physical distance between nodes, transmission medium, and the signal’s speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is channel capacity?

A

The maximum data rate that can be transmitted through a communication channel. Limited channel capacity arises when the demand or transmission from multiple nodes exceeds the available bandwidth of the shared medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the hidden node problem?

A

Occurs when two nodes, A and C, are unable to directly communicate or detect each others signals but share a common node, B, that can communicate with A and C. A may not be aware of C and send a transmission to B, causing a collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the exposed node problem?

A

When a node B, can hear transmission from both the sender and intended receiver. Node B might necessarily defer its own transmission thinking it would cause a collision at the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a data center network, what technique can help improve the host-to-host communication throughput?

A

Using multi-path routing as it enables the distribution of network traffic across multiple paths between source and destination nodes. (ex. equal-cost multi-path routing and the use of multi-rooted, fat-tree topologies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is CSMA?

A

Carrier sense multiple access. Listens before transmitting. If the channel is idle, the entire frame is sent. If the channel is busy, the transmission is deferred. (ex. don’t interrupt others)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ALOHA?

A

A random access protocol. A node transmits data whenever it has a packet to send. If the transmission is successful, the node receives an acknowledgement from the receiver. If not, the node waits for a random period of time and retransmits the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the drawbacks of ALOHA?

A

Low efficiency due to frequent collisions when the network is heavily loaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is S-ALOHA?

A

Slotted ALOHA. An improved ALOHA. Divides time into discrete intervals or slots, and nodes can only transmit data at the beginning of a time slot. This reduces the probability of collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is CSMA/CD?

A

CSMA is primarily used in wired Ethernet networks. Adds collision detection to allow nodes to identify when a collision occurs during transmission. If a collision is detected, the node stops transmitting and waits for a random period, and tries again. Reduces the duration of collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is CSMA/CA?

A

Another variation of CSMA is often used in wireless networks such as Wi-FI. Focuses on collision avoidance. Nodes use a random backoff mechanism after sensing an idle channel helping to reduce the probability of simultaneous transmissions and collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When people design a wireless medium access control (MAC) protocol, why the collision detection mechanism (used in Ethernet) could not be applied effectively?

A

Wireless signals are susceptible to fading, interferences, and attenuation as they propagate. As a result, detecting the difference between a collision and a weak signal is challenging. Also, the hidden node problem would deem the collision detection mechanism ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is random backoff?

A

Used in MAC protocols such as CSMA to reduce the probability of collisions when multiple nodes attempt to transmit data simultaneously. When a node sense a busy channel or collision, it waits a random period before attempting to transmit again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a centralized routing algorithm?

A

A single node or controller computes and maintains the routing information for the entire network. Requires global knowledge of the network topology and state. More computationally intensive due to processing times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the vulnerabilities of a central routing algorithm?

A

Single points of failure, as the central node’s failure could disrupt routing for the entire network. (ex. OSPF when used with a centralized controller in an SDN environment)

23
Q

What is a distributed routing algorithm?

A

Routing decisions are made independently by each node based on local knowledge and information exchanges with neighboring nodes. Requires only partial local knowledge of network topology and state. Less computationally intensive as processing is distributed.

24
Q

What are the drawbacks to distributed routing algorithms?

A

Resilient to failures as there is no single point of failure in the routing process. (ex. distance vector routing protocol or link state routing)

25
Q

Compare central and distributed routing algorithsm.

A

Centralized routing algorithms offer more control and optimal routing decisions but require global knowledge, may have higher computational demand, and are susceptible to single points of failure. Distributed routing algorithms are more resilient to failures, adaptable to network dynamics, and require only local knowledge but may not yield optimal routing decisions.

26
Q

Why are different inter-AS and intra-AS protocols used in the Internet?

A

Different inter-AS and intra-AS protocols are used in the Internet to address the distinct requirements and complexities of routing within an autonomous system (intra-AS) and between autonomous systems (inter-AS). This separation allows for better scalability, policy control, and administrative independence.

27
Q

How does BGP use the NEXT-HOP attribute?

A

To indicate the IP address of the router that should be used to reach the destination network. When a BGP speaker advertises a route to its neighbor, it includes its IP address as the NEXT-HOP. The receiving router then uses this information to forward traffic towards the destination network. This is like a signpost that tells a router which other router it should send traffic to next in order to reach a specific destination.

28
Q

How does BGP use the AS-PATH attribute?

A

Prevents routing loops and ensures traffic is routed through a stable and reliable path. It lists the sequence of autonomous systems that the route has passed through, and routers use this information to determine the best path to the destination network. BGP speakers will not accept routes that contain their own AS number. This is like a record of all the different networks a message has passed through on its way to a destination. BGP routers use this information to make sure that traffic doesn’t get stuck in a loop or take a path that is unstable or unreliable.

29
Q

What is BGP?

A

Border gateway protocol is a system that helps different networks on the internet talk to each other. It works by having routers (devices that help traffic flow between networks) share information about the best way to reach different destinations.

30
Q

Suppose you wanted to implement a new routing protocol in the SDN control plane. At which layer would you implement that protocol? Explain.

A

The network-control application layer becuase it is the layer where a routing protocol determines the end-to-end paths between sources and destinations.

31
Q

Describe the purpose of two types of OpenFlow messages that are sent
from a controlled device to the controller.

A

Flow-removed messages which informs the controller that a flow table entry has been removed by a timeout or as a result of a received modify-state message. Port-status message which informs the controller of a change in port status.

32
Q

Describe the purpose of two types of Openflow messages that are sent from the controller to a controlled device.

A

Modify-state which add/deletes or modifies entires in the switch’s flow table and to set switch port properties. Read-state which collects statistics and counter values from the switch’s flow table and ports.

33
Q

What two types of ICMP messages are received at the sending host executing the Traceroute program?

A

ICMP warning message (type 11 code 0) and a destination port unreachable ICMP message (type 3 code 3)

34
Q

What is an ICMP?

A

An internet control message protocol used by network devices to communicate with each other about network conditions and errors.

35
Q

What is the maximum number of VLANs that can be configured on a switch supporting the
802.1Q protocol? Why?

A
  1. The 802.1Q VLAN tagging protocol uses a 12-bit field meaning 2^12.
36
Q

What are some multimedia applications?

A

Video streaming, voice over IP (VoIP), online gaming.

37
Q

What is QoS?

A

Quality of service is the ability of a network to provide differentiated treatment to specific types of data or applications to meet their performance requirements, such as latency, jitter, and bandwidth.

38
Q

What is video compression?

A

Multimedia networking typically has large amounts of data, making video compression crucial for efficient transmission. Popular video compression standards included H.264, H.265 (HVEC), and VP9.

39
Q

What is audio compression?

A

Reduces the amount of data required to represent an audio signal while maintaining acceptable quality. MP3, AAC, Opus.

40
Q

What is SNMP?

A

Simple network management protocol is a widely used protocol for managing and monitoring network devices. It is built on a manager-agent model, where the manager communicates with agents installed on network devices to gather and configure information.

41
Q

What is VoIP?

A

Voice over internet protocol that allows people to make voice calls over the internet instead of traditional phone lines.

42
Q

What is SIP protocol?

A

Session initiation protocol is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that involve video, voice, messaging, and other communications over the Internet.

43
Q

What is RTP?

A

Real-time transport protocol is used to transmit real-time audio and video data over IP networks, typically used in conjunction with VoIP applications and streaming media services.

44
Q

What is VLAN?

A

A Virtual local area network is a logical grouping of network devices that share a common set of requirements, allowing for more efficient and secure communication within the group, while also isolating it from other VLANs on the same network.

45
Q

What are the key differences between wireless and wired networks in terms of signal propagation, capacity, and interference?

A

Wireless networks use radio waves to transmit data, which can be affected by physical obstacles, distance, and interference from other devices, leading to lower bandwidth and less predictable connectivity compared to wired networks, which use physical cables to transmit data with higher capacity, more consistent performance, and less susceptibility to interference.

46
Q

Explain the concepts of frequency division multiplexing (FDM) and time division multiplexing (TDM) in the context of wireless networks.

A

Frequency Division Multiplexing (FDM) is a technique that divides a wireless channel into several sub-channels, each with its own frequency band, allowing multiple signals to be transmitted simultaneously. Time Division Multiplexing (TDM), on the other hand, divides the channel into discrete time slots, enabling multiple signals to be transmitted sequentially. Both techniques are used in wireless networks to maximize the utilization of available bandwidth and increase data throughput.

47
Q

What is the purpose of routing protocols in IP networks? How do RIP and BGP fit into this context?

A

Routing protocols are used to enable communication between different network segments by determining the optimal path for data to travel. RIP (Routing Information Protocol) is a distance-vector protocol used to exchange routing information within a single autonomous system (AS), while BGP (Border Gateway Protocol) is a path-vector protocol used to exchange routing information between multiple autonomous systems on the internet. Both RIP and BGP are important routing protocols used in IP networks to ensure efficient and reliable data transmission.

48
Q

Describe the main characteristics of RIP. What type of routing algorithm does it use, and in what types of networks is it typically employed?

A

RIP (Routing Information Protocol) is a distance-vector routing protocol that uses the Bellman-Ford algorithm to determine the best path for data to travel in a network. RIP is typically employed in small to medium-sized networks that use a single autonomous system (AS). RIP exchanges routing information between neighboring routers at regular intervals and uses hop count as its metric for determining the best path. However, RIP has a limited hop count, which can lead to routing loops and slow convergence in larger networks.

49
Q

What are the limitations of RIP? Explain the issues with large networks, count-to-infinity, and slow convergence.

A

RIP has several limitations, including a maximum hop count of 15, which limits its use in larger networks. Additionally, RIP suffers from the “count-to-infinity” problem, where a failure in the network can cause a router to incorrectly advertise a route, leading to routing loops. This can cause slow convergence and increased network traffic. Slow convergence can also occur due to the time it takes for routers to exchange information and update their routing tables, which can lead to incorrect routing decisions and network downtime.

50
Q

Explain the main features and characteristics of BGP. What type of routing protocol is it, and what is its primary use case?

A

The Border Gateway Protocol (BGP) is a path vector routing protocol primarily used for exchanging routing information between autonomous systems (ASes) on the Internet.

51
Q

What is TCP Tahoe?

A

Congestion control algorithms. TCP Tahoe, the earlier of the two, employs three main strategies: slow start, congestion avoidance, and fast retransmit. It detects congestion through packet loss, and upon detecting a loss, it reduces the congestion window size and re-enters the slow start phase.

52
Q

What is TCP Reno?

A

Congestion control algorithms. TCP Reno, an improvement over Tahoe, introduces a fast recovery mechanism. While it still uses slow start and congestion avoidance like Tahoe, it handles congestion more efficiently by entering fast recovery upon detecting packet loss instead of returning to slow start. This allows for quicker recovery from congestion events, leading to improved overall performance.

53
Q

What is RIP?

A

The Routing Information Protocol, is like a mail carrier in a neighborhood. It helps computers in the neighborhood (network) know how to send messages (data) to each other by telling them the quickest way (shortest number of steps) to reach the destination. RIP keeps talking to its neighbors to make sure it always knows the best way to deliver the messages.

54
Q

What is BGP?

A

Border Gateway Protocol, is like a group of mail carriers who work in different neighborhoods. They share information with each other about the best ways to deliver mail between their neighborhoods. This helps mail carriers from one neighborhood know how to send messages to a friend’s house in another neighborhood, even if it’s far away. They can also choose which roads to take based on the rules set by their bosses.