Lesson 2 Flashcards

1
Q

Types of messages exchanges in App-layer protocols

A

Request and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of Proprietary Protocols

A

Skype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define (6) App-layer protocol

A
  1. Types of Messages exchanged
  2. Message Syntax
  3. Message Semantics
  4. Rules for when and how processes send and respond to messages
  5. Open Protocols
  6. Proprietary Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of Network Apps

A
  1. Email
  2. Web
  3. Text Messaging
  4. Remote Log In
  5. P2P File Sharing
  6. Multi-user network games
  7. Streaming Stored Video
  8. Voice Over IP
  9. Real-Time Video Conferencing
  10. Social Networking
  11. Search
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of Streaming Stored Video

A

Youtube, Hulu, Netflix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of Voice Over IP

A

Skype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 Application Architectures

A

Client-Server
Peer-To-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

it includes both IP address and port numbers associated with progress on host

A

Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port Numbers

HTTP Server:
Mail Server:

A

HTTP Server: 80
Mail Server: 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transport Services an App need

A
  1. Data Integrity
  2. Timing
  3. Throughput
  4. Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

it is a measure of how many units of information a system can process in a given amount of time.

A

throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is throughput

A

it is a measure of how many units of information a system can process in a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do you call when valuable or sensitive information on a computer is compromised due to theft, human error, viruses, malware, or power failure

A

Data Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

File Transfer in Throughput

A

Elastic Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email in throughput

A

Elastic Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web Documents in Throughput

A

Elastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Throughput: Real-time Audio (kbps)

A

5kbps-1mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Throughput: Real-time Video (kbps)

A

10kbps-5mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Throughput: Stored Audio

A

5kbps-1mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Throughput: Stored Video

A

10kbps-5mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Throughput: Interactive Games

A

Few kbps up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Throughput: Text Messaging

A

Elastic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DATA LOSS: FILE TRANSFER

A

No Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DATA LOSS: Email

A

No Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DATA LOSS: Web Documents

A

No Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DATA LOSS: Real-Time Audio/Video

A

Loss-Tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DATA LOSS: Stored Audio/Video

A

Loss-Tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DATA LOSS: Interactive Games

A

Loss-Tolerant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

DATA LOSS: Text Messaging

A

No Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

3 TCP SERVICES

A
  1. Reliable Transport
  2. Flow Control
  3. Congestion Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Does TCP Service provide Timing and Minimum throughput?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In UDP Service, is data transfer unreliable?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

UDP Service does not provide the following (8):

A
  1. Reliability
  2. Flow Control
  3. Congestion Control
  4. Timing
  5. Throughput
  6. Guarantee
  7. Security
  8. Connection Set Up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

It define the language that network applications speak to fulfill user requests

A

Application Layer protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Refers to HTML file, JPEG Image, Java Applet, Audio File

A

Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Webpage consist of _________ like HTML-FILE

A

Objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

is a browser that requests, receives using HTTP protocol

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

sends objects in response to requests,

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

It uses HTTP Protocol

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

They use to initiate TCP connection to HTTP server in Port 80

A

HTTP client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

is HTTP is STATELESS?

A

YES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

HTTP client request message contains what?

A

URL (or objects)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the format of HTTP request message?

A

ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

3 GENERAL FORMAT OF HTTP REQUEST MESSAGES

A

Request Line
Header Line
Body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

4 TYPES OF HTTP REQUEST MESSAGES

A

Post Method
Get Method
Head Method
Put Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

TYPES OF HTTP REQUEST MESSAGES:

  • Web page often includes form input
  • User input sent from client to server in entity body of _________ request message
A

POST METHOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Include user data in URL field of HTTP request message (following a’?’)

A

Get Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Requests headers (only) that would be retired if specific URL were requested with an HTTP GET method

A

Head Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q
  • Uploads a new file (object) to server
A

Put Method

50
Q

Completely replaces file that exists at specified URL with content in entity body of POST HTTP request message

A

Put method

51
Q

TWO TYPES OF HTTP CONNECTIONS

A
  1. Non-persistent HTTP
  2. Persistent HTTP
52
Q

Sequence of Non-persistent HTTP

A
  1. TCP connection opened
  2. At most one object sent over TCP connection
  3. TCP connection closed
53
Q

Sequence of Persistent HTTP

A
  1. TCP connection opened to a server
  2. Multiple Objects can be sent over single TCP connection between client, and that server
  3. TCP connection closed
54
Q

Only one Object can be sent over TCP connection

A

NON-PERSISTENT HTTP

55
Q

Multiple objects can be sent

A

PERSISTENT HTTP

56
Q

5 RESPONSE STATUS CODES

A

404
400
505
301
200 OK

57
Q

RESPONSE STATUS CODE 404

A

404 NOT FOUND requested documented not found on this server

58
Q

RESPONSE STATUS CODE 400

A

400 Bad Request: requested messages not understood by server

59
Q

RESPONSE STATUS CODE 505

A

505 HTTP Version Not Supported

60
Q

RESPONSE STATUS CODE 301

A

301 Moved Permanently: Requested object moved, new location specified later in this message (in Location: Field)

61
Q

RESPONSE STATUS CODE 200 OK

A

Request succeeded, request object later in this message

62
Q

These are use by web sites and client browsers to maintain some state between transactions

A

Cookies

63
Q

3 Uses of Cookies

A
  1. Track user behavior on a given website (first party cookies)
  2. Track user behavior across multiple websites (Third party cookies) without user ever choosing to visit tracker site
  3. Tracking may be invisible to
64
Q

Cookies can be used in (4)

A
  1. Authorization
  2. Shopping cats
  3. Recommendations
  4. User session state (web email)
65
Q

Cookie is also known as?

A

Unique ID

66
Q

Common Identity is also known as?

A

Cookie Value

67
Q

Third party persistent cookies is also known as?

A

Tracking Cookies

68
Q

FOUR COMPONENTS OF COOKIES

A
  1. Cookie header line of HTTP response message
  2. Cookie hear line in next HTTP request message
  3. Cookie file kept on user’s host, managed by user’s browser
  4. Back-end database at web site
69
Q

Satisfy client request without involving origin server

A

Web caches

70
Q

WEB CACHES: What is the Average rate from browsers to origin servers?

A

15/sec

71
Q

WEB CACHES: What is the Average data rate to browsers?

A

1.50 Mbps

72
Q

Web Caches are also known as?

A

Proxy Servers

73
Q

3 COMPONENTS OF ELECTROMAGNETIC MAIL

A
  1. User Agents
  2. Mail Servers
  3. Simple Mail Transfer Protocol (SMTP)
74
Q

Other term for User Agent

A

Mail Reader

75
Q

it contains Incoming messages for user

A

Mailbox

76
Q

it means outgoing mail messages

A

Message Queue

77
Q
  1. EXAMPLE OF ELECTRONIC MAIL USER AGENT
A
  1. Outlook
  2. Thunderbird
  3. iPhone
  4. Mail Client
78
Q

SMTP use ___________ connection

A

Persistent

79
Q

It is Between mail servers to sent mail messages

A

SMTP

80
Q

They Send mail server

A

Client

81
Q

They Receive mail server

A

Server

82
Q

What SMTP server uses to determine end of message?

A

CRLF

83
Q

SMTP:PUSH
HTTP:

A

PULL

84
Q

The transfer of email messages from client to server happen on what port?

A

PORT 25

85
Q

3 PHASES OF TRANSFER

A
  1. Handshaking (Greeting)
  2. Transfer of messages
  3. Closure
86
Q

The Format used for commands is

A

ASCII text

87
Q

Protocol for exchanging email messages

A

SMTP

88
Q

Standard for text message format

A

RFC 822

89
Q

entered by user, formatted by local user agent

A

Header lines

90
Q

Format of Header lines

A

To:
From:
Subject:

91
Q

Where the “message” ASCII characters only

A

Body

92
Q

Fields giving info about data

A

Headers

93
Q

Info (Payload) being communicated

A

Data

94
Q

MAIL ACCESS PROTOCOLS

A

1, POP
2. IMAP
3. HTTP

95
Q

CLIENT COMMANDS: declares username

A

User

96
Q

CLIENT COMMANDS: password

A

Pass

97
Q

SERVER RESPONSES

A

+ OK
- ERR

98
Q

TRANSACTION PHASE

A

List
Retr
Dele
Quit

99
Q

list message numbers

A

List

100
Q

retrieve message by number

A

Retr

101
Q

delete

A

Dele

102
Q

Keeps all messages in one place: at server

A

IMAP

103
Q

Where does IMAP store all messages?

A

server

104
Q

implemented in hierarchy of many name servers

A

Distributed Database

105
Q

4 DNS SERVICES

A
  1. Hostname to IP address translation
  2. Host aliasing
  3. Mail server aliasing
  4. Load distribution
106
Q

3 SUB BRANCHES OF ROOT DNS SERVERS

A

com DNS servers
org DNS servers
edu DNS servers

107
Q

Organization’s own DNS server(s), providing authoritative hostname to IP mappings for organizations named hosts.

A

AUTHORITATIVE DNS SERVERS

108
Q

RR format

A

(name, value, type, TTL)

109
Q

4 FLAGS

A
  1. Query or reply
  2. Recursion desired
  3. Recursion available
  4. Reply is authoritative
110
Q
  • No always-on server
  • Arbitrary end systems directly communicate
  • Peers are intermittently connected and changed IP addresses
A

PURE P2P ARCHITECTURE

111
Q

EXAMPLE OF PURE P2P ARCHITECTURE

A
  1. File distribution (BitTorrent)
  2. Streaming (KanKan)
  3. VoIP (Skype)
112
Q

Group of peers exchanging chunks of a file

A

Torrent

113
Q

Tracks peers participating in torrent

A

Tracker

114
Q

Peers may come and go

A

Churn

115
Q

EXAMPLES OF VBR

A

MPEG 1
MPEG 2
MPEG 4

116
Q

Stores copies of content in CDN nodes

A

CDN

117
Q

Learn how to build client/server applications that communicate using sockets

A

SOCKET PROGRAMMING

118
Q

Door between application process and end-end transport protocol

A

Socket

119
Q

2 Socket types for 2 transport services

A

UDP and TCP

120
Q

Time for a small packet to travel from client to server and back

A

RTT