M12: Network Programming Design: Efficiency Techniques and Internet Architecture Flashcards

1
Q

Denial of service attacks:

A

bad attackers try to overwhelm a web server by
making requests at the same time, using up all the resources on the web server;
it can often be difficult to distinguish the fake traffic from legitimate network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Event-driven programming:

A

rather than using blocking system calls,
event-driven programming allows higher performance and resource utilization by
allowing functionality to continue or sleeping until the desired event occurs
○ Event loop:
○ Event handlers:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI model:

A

a formal, standard representation of networking that splits the
network functionality into seven layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet model:

A

an informal representation of networking that splits the
network functionality into five layers. This model groups the “application,
presentation, and session” layers of the OSI model together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layers of Internet Model

A
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical layer:

A

includes the actual wires and wireless links that

move bits between two physical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data link layer:

A

determines how the raw bytes should be
transferred over the physical links. In particular, the link layer puts raw bytes into messages, performs error detection and correction in transferred data, includes functions for reliable delivery, and determines where and when to send the data over the links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network layer:

A

includes IP and message routing within the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport layer:

A

includes the TCP and UDP protocols; creates
network communication channels between different processes on
the same or on different machines through the use of sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application layer:

A

includes all the user level processes that

require network communication. OSI model splits this into three layers: session, presentation, and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interface :

A

accepted form of representing and accessing data such that the user
can decode the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protocol :

A

rules and formats that govern communication between two entities
over the network or network boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

○ Data frame - datalink layer

A

grouping of raw data bits; the recipient can identify the

frames by the particular sequences of bits that represent the start and end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

○ MAC address - datalink layer

A

unique address that identifies your network card; 48-bit address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet - NW Layer

A

a method of wrapping data with its control information (e.g. its error detection codes, destination, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Router:- NW Layer

A

a networking device that is connected to multiple network links
and determines where to send a packet based on its

17
Q

Switch:- NW Layer

A

within a given network, switches forward messages between devices

18
Q

Encapsulation:

A

each layer can only see the service provided by the layer immediately below it