Mid-Sem 2017 Flashcards

1
Q

In what circumstances does error correction offer benefits over using only error detection

A
  • When the link only supports uni-directional (simplex) transmissions
  • When the it is too expensive, too slow (long latency), too insecure to retransmit original data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Under what circumstances would the use of DL layer frame pipelining be unnecessary?

A

When the latency between 2 directly connected nodes is very short, an ACK frame will return to the seder before the second frame can be assembled and transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Must sliding window protocols use windows whose sizes are powers of 2?

A

Not necessary - it just simplifies the implementation in software/hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the need for both a min and max frame length in IEEE 802.3 Eth std

A
  • Min frame ensures that the nodes at the extremities of the etc segment will sense ALL frames before frame’s sender finishes sending the frame
  • Max frame prevents single sending node from monopolising the use of the Eth segment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Assuming that nodes use CSMA/CD and bin exp backoff arg have each attempted their first transmission, and all 3 collide.

  • Prob that all 3 re-trans collide again in first time slot?
  • Prob that exactly 2 nodes will collide again in the first time slot after orig collision?
  • Prob that all 3 nodes can successfully transmit their frames in a max of 3 time slots after the orig?
A
  • 1/8 (if retransmission immediately)
  • 3/8
  • 0 (there is always a collision in the second slot)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 Distinct DoS attacks that can be performed on IEEE802.11 wireless networks on different layers of the protocol stack

A
  • Physical, device may generate random RF noise, making the medium appear constantly busy (saturated)
  • DL (MAC), device may generate random packs, which violates the cooperative RTS/CTS sequence
  • Appl, an application may NAIVELY perform a large file transfer, dominating the medium and slowing down connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 2 distinct security-delated design requirements of the WEP protocol

A
  • optional for running of wireless network
  • employ reasonably strong encryption
  • self-synchronising, as nodes move in and out of range
  • computationally efficient
  • conform to government encryption regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To avoid eavesdroppers employing passive scanning to identify an IEEE802.11 network, the owner of an AP disables transmission of beacon point frames. Explain why this is ineffective against a determined eavesdropper seeking the network’s identity

A
  • Only disables the SSID which is transmitted in beacon frames
  • Determined eavesdropper just needs to wait until a valid mobile client device, wishing to associate with the network, transmits a probe request frame carrying the required SSID.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As a brute force form of congestion control, the NL may choose to deliberate discard some packets when its maximum permissible memory allocation is reached.

  • What packets are best candidates for removal?
  • What effects does their removal have on the total network’s congestion?
A
  • Low priority packets, not ACK packets, packets that haven’t travelled far (many router hops), packets for applications that tolerate unreliability
  • Hopefully sender wait’s a while before retransmission, so that temporary congestion can clear.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly