Final Exam Flashcards
Network Layers
- Application layer
- Transport layer
- IP layer
- Data link layer
Application layer
The application layer is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services.
Transport layer
The transport layer is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.
IP layer
Data traffic divided into packets – Each packet contains a header (with address) • Packets travel separately through network – Packet forwarding based on the header – Network nodes may store packets temporarily • Destination reconstructs the message – IP prefix, e.g., 12.34.158.0/24 – Classful Addressing (Class A, B, C) – Classless Inter-Domain Routing (CIDR) – Private networks • 10.0.0.0/8 (255.0.0.0) • 172.16.0.0/12 (255.240.0.0) • 192.168.0.0/16 (255.255.0.0)
TCP vs UDP
TCP is reliable
• Acknowledgement, retransmission, discard duplicates, …
– TCP 3-way handshake
• SYN, ACK, FIN
TCP
Communication service (socket)
– Ordered, reliable byte stream
– Simultaneous transmission in both directions
• Key mechanisms at end hosts
– Retransmit lost and corrupted packets
– Discard duplicate packets and put packets in order
– Flow control to avoid overloading the receiver buffer
– Congestion control to adapt sending rate to network
load
UDP
User Datagram Protocol (UDP)
– IP plus port numbers
– Optional error checking on the packet contents
• Lightweight communication between processes
– Avoid overhead and delays of ordered, reliable delivery
• For example: VoIP, video conferencing, gaming
SSH
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
HTTP
HTTP is the underlying protocol used by the World Wide Web and this protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
Certification: Threats
Eavesdropping
– Password guessing
– Server database reading (compromised)
• Certification Typical solution:
Use a trusted node as a certification authority (CA)
• E.g., VeriSign, GoDaddy
– Everybody needs to know the CA public key
– The CA generates certificates: Signed(A, public-key, validity
information)
– Certificates can be stored in a directory service or exchanged
during the authentication process
DNS
– Local DNS server / caching
– Hierarchical name space divided into zones
– Translation of names to/from IP addresses
– Distributed over a collection of DNS servers
true/false
192.168.x.x is not globally accessible.
True
• Not globally delegated
– 10.0.0.0/8 (255.0.0.0)
– 172.16.0.0/12 (255.240.0.0)
– 192.168.0.0/16 (255.255.0.0)
Which of the following header may not contain destination’s
information:
A. TCP header B. IP header
C. Ethernet header D. All of above
A. TCP header
Compare TCP and UDP, and briefly describe their difference.
TCP is more secure