Lesson 1: Intro, History, and Internet Architecture Flashcards

1
Q

What are the different layers of the Open Systems Interconnection model?

A
Application
Presentation
Session
Transport
Network
Data
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different layers of the Internet Protocol Stack? And how is this different from the OSI Model?

A

Application
Transport
Network
Data
Physical
-In the IP stack, the Application Layer includes the Presentation and Sessions Layers from the OSI model.
-The interface between the Application & Transport layer are the sockets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are examples of Application protocols? What is a packet of info referred to at this layer?

A

HTTP, SMTP, FTP, DNS

Referred to as a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the responsibility of the Presentation Layer?

A

Format data coming from the session layer up to the Application layer.

Ex: Formatting video streams, translating integers from big endian to little endian.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the responsibility of the Session Layer?

A

Responsible for the mechanism that manages different transport level streams that belong to the same session between end-user application processes.

Ex: Tying together the audio and video stream of a teleconference application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the responsibility of the Transport Layer?

A

Responsible for end-to-end communication between hosts. Packet of information is referred to as a “segment”. Leverages two transport protocols: TCP and UDP.

TCP services:

  • connection-oriented service to the applications
  • guaranteed delivery of application-layer messages
  • flow control
  • congestion control

UDP services:

  • connectionless best-effort service
  • no reliability, flow or congestion control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the responsibility of the Network Layer?

A

Packet of information is a datagram. Responsible for moving datagrams from one internet host to another.Specifically, the Network layer is responsible for delivering the datagram to the transport layer in the destination host. The Network Layer protocol is the IP Protocol.

IP Protocol defines:

  • The fields int he data gram
  • How these fields are used by the hosts/intermediate routers so that the datagrams reach their destination
  • Routing protocols that determine the routes used by the datagrams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the responsibility of the Data Layer?

A

Receives the datagram from the network layer, deliver the datagram to the next node, at the next node, the data layer passes the datagram up tot he network layer. Packets of information is referred to as Frames.

Protocol Examples: Ethernet, Wifi

Services: Reliable delivery (different from that provided by the GCP protocol), physical addressing (eg MAC address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the responsibility of the Physical Layer?

A

Facilitates the interaction with hardware and is responsible for transferring bits within the frame between two nodes that are connected by a physical link.

Example: Coaxial cable, fiber optics, radio frequency transmitters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the Encapsulation & De-Encapsulation process.

A

The process of taking data from one protocol and translating it into data that is used by another protocol, so that the data can continue across a network.

Encapsulation:
Step 1 - Application layer message is sent to the Transport Layer
Step 2 - Transport layer appends it’s Header Info (eg what the application is, error detection). This is now called a “segment”
Step 3 - Transport layer sends the segment to the Network Layer.
Step 4 - Network Layer appends it’s Header Info (eg source/destination addresses). This is now called a “datagram”.
Step 5 - Network layer sends the datagram to the Data Layer.
Step 6 - Data Layer appends it’s Header Info. This is now called a “frame” and is sent to the Physical layer for transmission.

De-encapsulation: When the receiving host receives the frame, it reverses the Encapsulation process in order to get the message to the appropriate application.

Intermediate Devices: Routers (Layer 3) and Switches (Layer 2): Only de-encapsulate and encapsulate up to their Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the End to End (e2e) Principle? What are examples of some exceptions to this princple?

A

The network core should be simple and minimal (eg, only up to Layer 2 or 3), while the end systems should carry the intelligence (where the applications exist).

Exceptions:

  • Firewalls and Traffic Filters
  • NAT boxes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lesson 1 Quiz 1:
Some data link layer protocols, such 802.11 (WiFi), implement some basic error correction as the physical medium used is easily prone to interference and noise (such as a nearby running microwave). Is this a violation of the end-to-end principle?

A

No, because violations of the e2e principle typically refer to scenarios where it is not possible to implement a functionality entirely at the end hosts, such as NAT and firewalls.

In this question, we have a lower level protocol implementing error checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does the Internet Architecture have an hourglass figure?

A

The Evolutionary Architecture Model makes the following argument:

The transport layer (TCP, UDP) acts as an “evolutionary shield” for IP because any new transport layer protocols are unlikely to survive the competition with TCP/UDP which already have multiple products at higher layers. So the stability of these two protocols provides stability for IP by eliminating any potential new transport protocols that could select a competing network layer protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lesson 1 Quiz 2:
Which of the following are ramifications of the “hourglass shape of the internet”?

A: Many technologies that were not originally designed for the internet have been modified so that they have versions that can communicate over the internet (such as Radio over IP).

B: It has been a difficult and slow process to transition to IPv6, despite the shortage of public IPv4 addresses

C: Applications like BitTorrent leverage peer-to-peer networking instead of a more traditional client-server model for better performance.

A
  • ­A is correct; Modifying a technology so that it is compatible with the rest of the internet (i.e., by making it compatible with IP) greatly enhances market penetration (from the vendor’s perspective), and/or decreases the amount of extra development that would need to happen.
  • B is correct. A big part of the Internet infrastructure uses IPV4 while the cost of transitioning is high. This reflects as a consequence of the narrow waist.
  • C is not relevant here. The hourglass shape of the Internet refers to Internet architecture in terms of protocols available at the different layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the function of Repeaters/Hubs and Bridges/Layer 2 Switches. What are the limitations?

A

Repeaters and Hubs: Provide connectivity between hosts that are directly connected in the same network.

  • Operate at Layer 1
  • Hosts connected to these devices compete for access to the same link

Bridges and Layer 2 Switches: Enable communication between hosts that are not directly connected.

  • Operate at Layer 2 based on MAC addresses.
  • Limitation: No transmission control. If arrival rate is higher than output rate, a full buffer space could lead to dropped packets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a learning bridge?

A

A learning bridge learns, populates, and maintains a forward table. It builds the forwarding table when it receives a frame from a source host and over time, is able to learn which host communicates over which port.

17
Q

What is an inherent problem of Bridges and how is it solved?

A

Bridges can have a looping problem that causes the network to fail due to an infinite loop. To address the problem, Bridges use the Spanning Tree Algorithm to identify ports that can be removed from the forward table.

18
Q

Lesson 1 Quiz 3:
Which of the following statements are correct?

A: The Spanning Tree Algorithm helps to prevent broadcast storms

B: The Spanning Tree Algorithm presented in this lecture always results in a spanning tree that places the root in a topologically central location, so that all the nodes are as “close” as possible to the root.

C: Network traffic cannot traverse an inactive link.

A
  • A is correct. That is the purpose of the Spanning Tree Algorithm. Although it is still possible to have broadcast storms on the network (such as from a bad network card), STP prevents broadcast storms that result from having loops present in the network topology.
  • B is incorrect. The Spanning Tree Algorithm presented guarantees a unique spanning tree that all the nodes will agree to, but sometimes this isn’t the most “optimal” tree possible. Network administrators can configure the switch ID if they want to have a specific spanning tree.
  • C is incorrect. Traffic can still reach the link, but the link is not used to forward traffic.