Lesson 1 Flashcards

1
Q

Is a worldwide system of computer networks

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network of networks

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hosts = ___________

A

End Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communication Links

A

Fiber, copper, radio, satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transmission rate of Communication Links

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.

A

Network bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is used to forward packets (chunks of data)

A

Packet Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hardware in Packet Switching

A

Routers and Switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

connects multiple devices to create a network

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

connects multiple switches, and their respective networks, to form an even larger network.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. IP picture frame
  2. Web enabled toaster
  3. Internet refrigerator
  4. Sensorized bed mattress
  5. Internet Phones
  6. Tweet-a-watt monitor energy use
A

Examples of “Fun” Internet-connected devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet

A

” network of networks “

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Interconnected ISPs

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

control sending, receiving of messages

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Example of Protocols

A
  1. TCP
  2. IP
  3. HTTP
  4. Skype
  5. 802.11
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Example of Internet Standards

A
  1. RFC
  2. IETF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Services that the Internet provides

A
  1. Infrastructure that provides services to applications
  2. Provides programming interface to apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Web
VoIP
Email
Games
E-commerce
Social nets

A

Infrastructure that provides services to applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hooks that allow sending and receiving app programs to “connect” to internet and Provides service options, analogous to postal service

A

Provides programming interface to apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

are defined format, of message sent and received among network entities, and actions taken on message transmission, receipt

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

exchanging messages and taking actions in human

A

Human Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

the entities exchanging messages and taking actions are hardware or software components of a computer network

A

Network Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

All communication activity in Internet governed by _____________.

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Example of Human Protocol

A

Greetings like “Hi” and “ Hello”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Network Structure

A
  1. Network Edge
  2. Access networks, Physical Media
  3. Network Core
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Network Edge

A

Hosts: Clients and servers often in data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Access networks, Physical Media:

A

Wired, and wireless communication links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How to connect end systems to edge routers?

A
  1. Residential access nets
  2. Institutional access networks (School and company)
  3. Mobile access networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bandwidth unit measurement

A

BPS/ Bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

refers to internet connection where you have exclusive access to the connection infrastructure

A

Dedicated Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Means your internet connection uses the same infrastructure as your neighbors

A

Shared Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Digital Subscriber Line (DSL)

A

is a type of network connection that uses existing telephone line to central office DSLAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Data over DSL phone line goes to ________

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Where does the Voice over DSL phone line go?

A

telephone net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Frequency division multiplexing

A

The different channels are transmitted in different frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Asymmetric: up to 30 Mbps downstream transmission rate, 2 Mbps upstream transmission rate

A

HFC: Hybrid Fiber Coax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The network of cable, fiber attaches homes to ISP router

A

HFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Does DSL has dedicated access to central office?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Wireless Devices -> Wireless Access Point -> Router, Firewall, NAT -> Wired Ethernet Connected to router -> Cable or DSL Modem -> Central Office

A

Home Network Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

ENTERPRISE ACCESS NETWORKS (ETHERNET)

A
  • Typically used in companies, universities, etc.
  • 10 Mbps, 100 Mbps, 1 Gbps, 10 Gbps transmission rates
  • Today, end systems typically connected into Ethernet Switch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

EXAMPLES OF WIRELESS ACCESS NETWORKS

A
  1. Wireless LANs
  2. Wide-area wireless access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q
  • Within a building (100 ft.)
  • 801.1 1b/g/n (WiFi): 11,54,450 Mbps transmission rate
A

Wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q
  • Provided by telco (cellular)
  • Between 1 and 10 Mbps
  • 3G, 4G: LTE
A

Wide-area wireless access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Shared wireless access network connects end systems to router

A

WIRELESS ACCESS NETWORKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q
  1. Takes application message
  2. Breaks into smaller chunks, known as packets, of Length L bits
  3. Transmits packet into access network at transmission rate R
A

Host sending function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Physical Media: Propagates between transmitter/receiver pairs

A

Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Physical Media: What lies between transmitter & receiver

A

Physical Link

48
Q

Physical Media: Signals propagate in solid media: copper, fiber, coax

A

Guided Media

49
Q

Physical Media: Signals propagate freely
e.g., radio

A

Unguided Media

50
Q

Physical Media: Two insulated copper wires

A

Twisted Pair (TP)

51
Q

2 Twisted Pair cable categories

A
  1. Category 5
  2. Category 6
52
Q

TP Category: 100 Mbps, 1 Gbps Ethernet

A

Category 5

53
Q

TP Category: 10 Gbps

A

Category 6

54
Q

Physical Media: Types of Cable

A
  1. Coax cable
  2. Fiber optic cable
55
Q
  • Two concentric copper conductors
  • Bidirectional
  • broadband:
A

Coax cable

56
Q
  • Glass fiber carrying light pulses, each pulse a bit
  • High-speed operation
  • Low error rate
A

Fiber optic cable

57
Q
  • Signal carried in electromagnetic spectrum
  • No physical “wire”
  • Bidirectional
A

Radio

58
Q

Propagation environment effects of Radio Transmission

A
  1. Reflection
  2. Obstruction by objects
  3. Interference
59
Q

Mesh Interconnected routers

A

Network Core

59
Q

RADIO LINK TYPES:

A
  1. Terrestrial Microwave
  2. LAN
  3. Wide-area
  4. Satellite
60
Q

Packet-switching

A

hosts break application-layer messages into packets

61
Q

PACKET-SWITCHING: STORE-AND-FORWARD

A

entire packet must arrive at router before it can be transmitted on next link

62
Q

PACKET-SWITCHING: QUEUEING DELAY AND LOSS

A

Packets will queue, wait to be transmitted on link. Packets can be dropped (lost) if memory (buffer) fills up

63
Q

TWO KEY NETWORK-CORE FUNCTIONS

A
  1. Routing
  2. Forwarding
64
Q

Determines source-destination route taken by packets

A

ROUTING

65
Q

Moves packets from router’s input to appropriate router output

A

FORWARDING

66
Q

End-end resources allocated to reserved for “call” between source & dest

A

CIRCUIT SWITCHING

67
Q

Allows more users to use network

A

Packet-Switching

68
Q

it works with digital signals as well as analog signals

A

Time division multiplexing (TDM)

69
Q

It works with only analog signals.

A

(FDM) Frequency division multiplexing

70
Q

How many users can accommodate in Circuit Switching?

A

10 Users

71
Q

How many users can accommodate in Packet Switching?

A

With 35 users, probability > 10 active at same time

72
Q

Private network that connects its data centers to internet, often by passing tier-1, regional ISPs

A

Content Provider Network

73
Q

(Packets queue in router buffers)
- Packet arrival rate to link (temporarily) exceed output link capacity
- Packets queue, wait for turn

A

HOW DO LOSS AND DELAY OCCUR

74
Q

FOUR SOURCES OF PACKET DELAY

A
  1. Nodal processing
  2. Queueing delay
  3. Transmission delay
  4. Propagation delay
75
Q

Source of Packet Delay:
1.Check bit errors
2. Determine output link
3. Typically <msec

A

Nodal Processing

76
Q

Source of Packet Delay:
1. Time waiting at output link for transmission
2. Depends on congestion level of router

A

QUEUEING DELAY

77
Q

Source of Packet Delay:
1. L: packet length (bits)
2. R: link bandwidth (bps)

A

Transmission Delay

78
Q

Source of Packet Delay:
1. d: length of physical link
2. S: propagation speed ( ~ 2x 10 ^8 m/sec

A

Propagation Delay

79
Q

It provides delay measurement from source to router along the end-end Internet path towards destination.

A

TRACEROUTE PROGRAM

80
Q

Queue or also known as buffer, is a preceding link in a buffer that has finite capacity.

A

Packet Loss

81
Q

Packet arriving to full queue dropped or also known as __________

A

Loss

82
Q

Lost packet may be retransmitted by previous node, by source end system, or not at all

A

Packet Loss

83
Q

Throughput

A

Bits are transferred between sender or receiver

84
Q

Throughput: rate at a given point in time

A

Instantaneous

85
Q

Throughput: is a rate over long period of time

A

Average

86
Q

Bottleneck Link

A

link on end-end path that constrains end-end throughput

87
Q

Networks are complex with many __________

A

Pieces

88
Q
  1. Hosts
  2. Routers
  3. Links of various media
  4. Applications
  5. Protocols
  6. Hardware, software
A

” Pieces “ of Networks

89
Q

each ________ implements a service

A

layer

90
Q

Layering

A

it helps to deal with complex systems

91
Q

INTERNET PROTOCOL STACK

A
  1. Application
  2. Transport
  3. Network
  4. Link
  5. Physical
92
Q

Protocol Stack: Application

A

Supporting network applications

93
Q

Protocol Stack: Transport

A

process -process data transfer

94
Q

Protocol Stack: Network

A

Routing of datagrams from source to destination

95
Q

Protocol Stack: Link

A

Data transfer between neighboring network elements

96
Q

Protocol Stack: Physical

A

Bits “on the wire”

97
Q

FTP, SMTP, HTTP

A

Example of supporting network applications

98
Q

TCP, UDP

A

Examples of Process-process data transfer

99
Q

ISO/ OSI REFERENCE MODEL

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Link
  7. physical
100
Q

Allow applications to interpret meaning of data
- e.g., encryption
- Compression
- Machine-specific conventions

A

Presentation

101
Q

Synchronization, checkpointing, recovery of data exchange

A

Session

102
Q

SOURCE ( Flow )

A

Message -> Segment -> datagram ->
frame

103
Q

the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft

A

NETWORK SECURITY

104
Q

Enumerate what Bad Guys can do

A
  1. PUT MALWARE INTO HOSTS VIA INTERNET
  2. ATTACK SERVER, NETWORK INFRASTRUCTURE
  3. CAN SNIFF PACKETS
  4. CAN USE FAKE ADDRESSES
105
Q

Malware can get in host form:

A
  1. Virus
  2. Worm
106
Q

Self-replicating infection by receiving or executing object

A

Virus

107
Q

Example of Virus

A

Email Attachment

108
Q

Self-replicating infection by passively receiving object that gets itself executed

A

Worm

108
Q

Can record keystrokes, websites visited, and upload information to collection site

A

Spyware malware

109
Q

Infected host can be enrolled in ______, used for spam.

A

botnet

110
Q

Attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic

A

Denial of Service (DoS)

111
Q
  1. Select target
  2. Break into host around the network (see botnet)
  3. Send packets to target from compromised hosts
A

Process of DoS

112
Q

a method of detecting and assessing packet data sent over a network.

A

Packet Sniffing

113
Q
  • Broadcast media
  • Promiscuous network interface reads/records all packets passing by
A

Packet “ Sniffing “

114
Q

Send packet with false source address

A

IP Spoofing

115
Q

Types of Defense in Network Security

A
  1. Access control. This method limits access to 2. network applications and systems to a specific group of users and devices. …
  2. Antivirus and antimalware. …
  3. Application security. …
  4. Behavioral analytics. …
  5. Cloud security. …
  6. Data loss prevention (DLP). …
  7. Email security. …
  8. Firewall.