Mid-Sem Examples Flashcards

1
Q

Name the 7 OSI Layers, from Lowest to Highest

A
Application,
Presentation,
Session,
Transport,
Network,
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 2 advantages and 2 disadvantages of strictly conforming to a layered networking standard, such as OSI/ISO model

A
  • (A) Layer corresponds to a different level of abstraction
  • (A) Each layer corresponds to a well defined, independent function
  • (A) Assures that users networking software will connect to other vendor’s system and software
  • (D) Doesn’t allow creativity of other techniques
  • (D) Exploitable for DoS hacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two layers would you employ encryption in for the OSI model?

A

Employ encryption at the lowest two levels because they’re the easiest to cause a DoS for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A system uses n-layer protocol hierarchy. Appl generates messages of M bytes each. At each layer, a header of h bytes is added. What fraction of the network B/W is filled with headers?

A

(n.h)/(m+n.h)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provide 3 distinct reasons why a stream of data is broken into frames by the DL layer?

A
  • Easier to send small chunks of data in frames
  • Can control the f;pw pf frames depending on traffic
  • Detecting and correcting higher-level transmission errors from the network layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reason for piggy-backed ACKs in the DL layer?

A

Used to decrease the number of frames sent back from the receiver to sender, by combining data and ACK in to one frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why does the checksum only cover headers?

A

Without the header, the data is useless as it has no destination or source so would never be received by dest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is ACK preferred to NACk in stop-and-wait protocol?

A
  • Timeouts would have to be longer to account for busy routes/lots of traffic
  • ACK preferred as shorter timeout and sender knows sooner whether to resend data
  • Less frames wasted if data is retransmitted quicker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For the sliding window protocol, is it meaningful for the receiver’s max window size to be larger than the sender’s max window size?

A

Receiver’s window size should be constant so that the receiver doesn’t pick up unwanted frames as well as sender knowing when it sold receive ACK from receiver, knowing that the frames are in order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Primary difference between Eth hub and Eth switch?

A

Hub receives packet and broadcasts to all outgoing ports but switch is more intelligent and only retransmits to correct/most efficient outgoing port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List 3 tasks a network bridge must perform connecting dissimilar hardware technologies

A
  • Buffering of frames to allow for varying bit rates

- Data link reformatting for the 3 different standards of 802.3, 802.4 and 802.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why must IEEE 802.3 employ collision avoidance instead of collision detection?

A

Wireless NIC cannot transmit and receive at the same time, therefore cannot detect a collision if transmitting. Employs a scheme to avoid collisions, MACA (multiple access with collision avoidance) using both physical and virtual channel sensing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are all MAC addresses in 802.11 NICs unique?

A

Unique identifier for a particular device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is registering only wanted MAC addresses for an AP ineffective against a determined intruder?

A

Hackers are able to create fake MAC addresses so would be able to passively listen to packets to find out which MAC address is registered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Provide 2 distinct motivations for the NL to employ sequencing numbers

A
  • Make sure all packets are received at dest from src for routing purposes so that the routing arg can be improved because nodes know which packet has been seen before
  • In load shedding, better to discard higher seq num frames to descrease the num of frames kept in buffer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why doesn’t each node in a virtual circuit use the same number to identify the circuit?

A

Each nodes needs to be able to alter outgoing ID numbers of packets from different computers so that they remain unique. VC doesn’t know which numbers are in use, the numbers only identify the SWITCHING between different nodes, and cannot identify whole circuit.

17
Q

Differences between flow control and congestion control

A

CC - ensures that the subnet can carry the offered traffic, which is a global issue for hosts and routers
FC - concerned with end-to-end control, possibly multiple hops apart

18
Q

Effects of Leaky Bucket and Token Bucket flow control

A

LB - ensures uncontrolled flow of packets into bucket, acts as a buffer for a regulated flow of bursty traffic out
TB - provides a bucket with tokens, with regulated flow where each packet must ‘consume’ a token before being transmitted.