Lecture 10: Transport Layer, Security and Internet Applications Flashcards

1
Q

Is the Transport Layer dealing with getting entire message from:
a) Network to Network
b) Device to Device
c) Process to Process

A

c) Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two resposiblities of Transport Layer.

A

1) Segmentation and reassembly (packetisation).
2) Service point addressing (making sure message gets to correct port number of correct process).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which layer is resposible for:
a) Errors inside single network?
b) Errors inbetween networks?

A

a) Datalink.
b) Transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three factors of error control that sequence numbers look after?

A

Sequence control, packet loss control and duplication control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does UDP stand for and is it connectionless or connection-oriented?

A

User Datagram Protcol and connectionless. Used for streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does TCP stand for and is it connectionless or connection-oriented?

A

Transmission vControl Protocol and connection-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two resposibilities of the Session layer?

A

1) Dialog control: determining whether half-duplex or full-duplex (one way or two way comms, respectively).
2) Synchronisation: defines sync checkpoints in case of error or disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three resposibilities of the Presentation layer?

A

1) Translation: translating between character sets.
2) Encryption: for security purposes.
3) Compression: reducing data size for efficiency purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name some different genres of security.

A

Computer security, computer system security, network security, physical security, operational security, procedural security and comms security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a symmetric algorithm with regards to security?

A

The encryption key is the same as the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name three characteristics for ensuring protected information.

A

Confidentiality (cryptography and steganography), integrity (hash functions), authenticity (digital signatures).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Does public key system use asymmetric or symmetric algorithm?

A

Asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the application layer resposible for?

A

It is the interface between users and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some application layer protocols on the internet.

A

Email, WWW, remote access, file transfer, address translation, host configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the client-server model.

A

There is a client application that can request information or resources from a server application. There can be many clients to a single server and client is usually only running when required whereas server is usually all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two types of clients? Describe t hem.

A

Fat clients: perform most of processing for themselves.
Thin clients: perform little or no processing for themselves.

17
Q

What is the DNS format?

A

From right to left, 2 letter country code, then domain name, organistion’s name and computer’s name.

18
Q

What does a VPN do?

A

It treats the internet as if it were your own LAN. It protects it and sometimes requires encryption.

19
Q

Name some types of email applications.

A

Simple Mail Transfer Protcol (SMTP), Multipurpose Internet Mail Extension (MIME), Post Office Protocol (POP)

20
Q

What is remote access? Name two types.

A

Remote access allows a user to remotely log into and operate a computer from another one. SSH and TELNET.

21
Q

What are the two connections that File Transfer Protocol establishes?

A

Control connection and data transfer connection.

21
Q

What is the most common format for toring information pages on the WWW?”

A

Hypertext Markup Language (HTML)

22
Q

What protocol must a web browser use to make requests to a web server?

A

Hypertext Transfer Protocol (HTTP)