Lesson 1 - History and Internet Architecture Flashcards

1
Q

Galactic Network

A

a 1962 vision of J.C.R Licklider from MIT. He envisioned that everyone could quickly access data through a set of interconnected computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARPANET

A

First network connecting 4 nodes (UCLA, Stanford, UCSB, Univ. of Utah) created by MIT researcher Lawrence Roberts in 1969.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DARPA

A

Defense Advanced Research Projects Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One of the first application launched on the internet in 1972

A

email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The initial ARPANET Host-To-Host protocol introduced in 1970

A

Network Control Protocol (NCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocol developed 1973 as an evolution of NCP which introduced the idea of open-architecture networking so that individual networks may be independently designed and developed

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP original 1973 service features were

A

The Transmission Control Protocol focused on service features such as flow control and recovery from lost packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP originally responsible for

A

Internet Protocol responsible for addressing and forwarding of individual packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

System designed in 1983 to translate domain names to IP addresses by a scaleable distributed mechanism.

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application first introduced by team of researchers lead by Tim Berners-Lee

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advantages of internet layered architecture

A

scalability, modularity, flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disadvantes of layered protocol stack model

A
  1. Some layers’ functionality depends on the information from the other layers.
  2. One layer may duplicate lower layer functionalities.
  3. Overhead that is caused by the abstraction between layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI model layers proposed by the International Organization for Standardization (ISO)

A
  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Protocol Stack layers are:

A
  1. Application
  2. Transport
  3. Network
  4. Data Link
  5. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the interface between the application and transport layer?

A

sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe the Application Layer

A

includes multiple protocols (web, email, ftp, DNS) and multiple services.

17
Q

What does the Presentation Layer do?

A

formats the information that it receives from the layer below and delivering it to the application layer.

18
Q

The Session Layer is responsible for

A

The session layer is responsible for the mechanism that manages the different transport streams that belong to the same session between end-user application processes

19
Q

In which layer do the TCP and UDP protocols reside

A

Transport Layer

20
Q

Transport layer packet of information

A

segment

21
Q

Network layer packet of information

A

datagram

22
Q

Transport layer is responsible for

A

end-to-end communication between end hosts.

23
Q

The Network Layer is responsible for

A

moving datagrams from one Internet host to another.

24
Q

Which layer includes the Internet Protocol (IP) & routing protocols?

A

Network layer

25
Q

Data Link layer packets of information

A

frames

26
Q

Protocols in the Data Link Layer

A

Ethernet, PPP, WiFi

27
Q

Describe the Physical Layer

A

The physical layer facilitates the interaction with the actual hardware
It is responsible for transferring bits within a frame between two nodes that are connected through a physical link.

28
Q

What responsibility does the data link layer have?

A

data link layer is responsible to move the frames from one node (host or router) to the next nod

29
Q

define encapsulation with respect to network data

A

the process of adding layer information to the proceeding layer.
The transport layer encapsulates the application message with a transport header to make a segment.
The network layer encapsulates the segment with network header information to make a datagram.

30
Q

End-to-end principle

A

the network core should be simple and minimal, while the end systems should carry the intelligence.

31
Q

What is OSI model

A

A 7-layer internet architecture model proposed by ISO

32
Q

What are examples of a violation of the end-to-end principle?

A

firewalls, traffic filters, Network address translation box (sometimes home router),

33
Q

What are the ramifications of the hourglass shape of the internet?

A

A. Many technologies that were not originally designed for the internet have been modified so that they have versions that can communicate over the internet (such as Radio over IP).
B. It has been a difficult and slow process to transition to IPv6, despite the shortage of public IPv4 addresses.

34
Q

What is an EvoArch model?

A

an abstract model for studying protocol stacks and their evolution.

35
Q

On which layers to repeaters, hubs, bridges, routers operate?

A

repeaters/hubs - physical layer - receive and forward digital signals to connect different Ethernet segments.
Bridges - Data Link layer (layer 2) Receive packets and forward them to the appropriate destination.
Routers - Network Layer (Layer 3)

36
Q

What is the purpose of the Spanning Tree Algorithm?

A

The goal of the spanning tree algorithm is to have the nodes (bridges) select which links (ports) to use for forwarding eliminating loops.

37
Q

Describe the steps of the Spanning Tree Algorithm.

A

The algorithm runs in “rounds” and at every round each node sends to each neighbor node a configuration message with three fields: a) the sending node’s ID, b) the ID of the roots as perceived by the sending node, and c) the number of hops between that (perceived) root and the sending node.

At every round, each node keeps track of the best configuration message that it has received so far, and it compares that against the configuration messages it receives from neighboring nodes at that round.

38
Q

Name each of the 5 internet layer’s packet of information

A
application - message 
transport - segment, 
network - datagram
data link - frame
physical - ??