Midterm Flashcards

1
Q

Which of the following applications are naturally suitable for P2Parchitectures?

A. Distributed Computing
B. Instant Messaging
C. Video Streaming
D. None of the above

A

A-B-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Consider a HTTP client wants to retrieve a Web document at a given URL. The IP address of the HTTP server is initially unknown. WhatApplication-layer and Transport-layer protocols besides HTTP are needed in this scenario?

A. UDP for DNS and TCP for HTTP
B. UDP for both DNS and HTTP
C. TCP for both DNS and HTTP
D. UDP for HTTP and TCP for DN

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If 10 files are being transferred using FTP from server A to client Bin the same session. The number of TCP connections between A and B is:

A. 1
B. 10
C. 11
D. 2

A

C (1 control 10 data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which one of the following protocols delivers/stores mail to receiver mail server?

A. SMTP
B. POP3
C. IMAP
D. HTTP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a router, queuing can occur:

A. in the input ports
B. in an interconnection network
C. in the output ports
D. all of the above

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telnet is a protocol for the ________ layer (i.e., one of the layers for the internet/OSI model)

A

Apllication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________, refers to the per-router action of moving a packet arriving at an input port to the appropriate output port

A

Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________, refers to the process of determining the end-to-end path that a packet will take through the network

A

Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a P2P system, nodes that take resources from a system without contributing in kind are called _______

A

Free-riders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In BitTorrent, a ________ is a server that maintains a list of all the peers that are actively downloading and uploading the file. The group of peers exchanging chunks of a file is referred to as _________

A

Tracker - Torrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTP is a stateless protocol. However, using ______, web applications can keep stateful information about user’s activity.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List 1 advantage and 1 disadvantage of having international standards for network protocols.

A

One advantage is that if everyone uses the standard, everyone can talk to everyone and people can create networking systems and products that interoperate.

A disadvantage is that once a standard has been widely adopted, it is difficult to change, even if new and better techniques or methods are dis-covered. Also, by the time it has been accepted, it may be obsolete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List, in order, the layers of the TCP/IP stack, starting with the layer thatis part of your program implementation

A
Application
Transport
Network
Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encapsulation and why is it important for the operation of a protocol stack?

A

Encapsulation is the concept of wrapping data from an upper layer’s protocol with a new header for the current layer and treating the upper layer’s data as uninterpreted. Encapsulation allows us to isolate the functionalityof a layer and change layer information without aecting the rest of theprotocol stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Suppose the algorithms used to implement the operations at layer k is changed. How does this impact operations at layers k-1 and k+ 1?

A

This has no impact on the operations at layers k-1 or k+ 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Suppose there is a change in the service (set of operations) provided by layer k. How does this impact services at layers k-1 and k+ 1?

A

There is no impact at layer k-1, but operations in k+ 1 have to be reimplemented.

17
Q

What are the main components of delay assuming packet switching is used along the network?

A

Processing
Queueing
Transmission
Propagation

18
Q

What is the difference between transmission delay and propagation delay?

A

Transmission delay is the time needed to put the entire packet on the linkand is dependent on the length of the packet, while the propagation delayis the time needed for one bit to reach the other end of the link

19
Q

How is propagation delay affected if the length of the packet is increased?

A

This delay is just a function of link length and its physical characteristics,so it is NOT affected.

20
Q

Consider the following forms of non-Internet data distribution: FM radio, broadcast TV, and newspapers. Are these Push or Pull systems?

A

FM radio, broadcast TV, and newspapers are all push systems. Information is sent out via these media regardless of whether or not anyone is tuning in to the TV or radio stations, or buying the newspaper. Also,content is not individualized for the receiver.

21
Q

Is the traditional Web browser/server aPushorPullsystem? Explain

A

The Web is a pull system because data is not transmitted to the browserunless it is explicitly requested by the browser. Some automated phoneresponse systems are non-Internet pull systems. For example, I may call anumber to get my horoscope, and enter my birth date in order to have myhoroscope read to me

22
Q

SMTP transfers messages between mail servers using aPushsystem. Discuss the changes to SMTP operations if the transfer of messages betweenmail servers was implemented as a Pull system

A

mail servers must keep track of all existing mail servers and continuouslycheck for new e-mails. This would create a lot of trac on the network between two hosts

23
Q

Suppose you use your web-based e-mail account (e.g., gmail) to send a message to your colleague, who accesses his mail from his mail server usingPOP3. Discuss how the message gets from your host to your friend’s host.List the series of application-layer protocols that are used to move the message between the two hosts.

A

The message is rest sent from my host to my mail server over HTTP. My mail mail server then sends the message to my friend’s mail server over SMTP. My friend then transfers the message from his mail server to his host over POP3.

24
Q

Suppose you can configure your browser to open multiple simultaneous connections to a Web site? What are the advantages and disadvantages of having a large number of simultaneous TCP connections?

A

The advantage is that you will you potentially download the le faster. The disadvantage is that you may be hogging the bandwidth, thereby significantly slowing down the downloads of other users who are sharing the same physical links.

25
Q

Application layer protocols implemented on the source and destination host must match (T/F)

A

T

26
Q

It is not possible for an application to enjoy reliable data transfer when the application runs over UDP (T/F)

A

F

The application developer can put reliable data transfer into the application layer protocol. This would require a signicant amount of work and debugging,however.

27
Q

HTTP, FTP, SMTP, and POP3 run on top of UDP (T/F)

A

F

The applications associated with those protocols require that all application data be received in the correct order and without gaps. TCP provides this service whereas UDP does not.

28
Q

Consider an HTTP Web server using persistent connections. Suppose the server spawns a separate process for each client that connects to the server.Then each of these spawned processes will have different server port numbers. (T/F)

A

F

The web server will have the same port number for all processes.

29
Q

Bandwidth Flooding is a DoS (Denial of Service) attack in which theattacker establishes a large number of half-open or fully open TCP connections at the target host (T/F)

A

F

his is a Connection Flooding attack.

30
Q

In IP spoofing, the attacker interchanges the source and destination addresses in the sender’s IP datagram (T/F)

A

F