Networking(2021) Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

The Internet:

Description

and

Benefits

A
  • Global system of interconnected networks that use the standard Internet Protocol Suite( TCP/IP)
  • No Centralized Governance
  • Quite Resilient
    • Reliance on the Endpoints in communication to handle most of the processing
  • Ensures Data Integrity, Reliability and Authentication
  • High degree of Redundancy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ICANN

Overview

A

Internet Corporation for

Assigned Names and Numbers

Organization that oversees the two Principle Name Spaces:

  • Internet Protocol Address Space
  • Domain Name System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two Principle

Name Spaces

of the Internet

A
  • Internet Protocol Address Space
  • Domain Name System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IETF

Overview

A

Internet Engineering Task Force

  • Deals with
    • technical underpinnings
    • standardization of core protocols
      • IPv4 and IPv6
  • International participants, anyone may contribute technical expertise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Topology/Routing:

Backbone

A

Backbone

  • Main data routes between large, strategically interconnected networks and core routers
  • Hosted by commercial, government, academic and other high-capacity network centers
    • Typically Fiber Optic Trunk Line
  • ISPs interchange traffic over the backbone by privately negotiated interconnection agreements
  • Backbone Providers sell services to ISPs, through Transit Agreements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ISP

  • Overview
  • Three Types
A

Internet Service Providers

Provide Access to the Internet in a local area

Three Types

  • Access ISPs
  • Hosting ISPs
  • Transit ISPs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access ISPs

Function

A

Directly connect customers to the internet.

Uses copper wires, wireless, or fiber-optic connections, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hosting ISPs

Function

A

Lease Server Space for

Smaller Businesses

Routinely Provide:

  • Email
  • FTP
  • Web-Hosting Services
  • Clouds
  • etc…
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transit ISPs

Function

A

Provide large Tuples

for connecting

Hosting ISPs to Access ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4 Largest

Internet Backbone Providers

A

AT&T

MCI

Sprint

Century Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethics in Networking:

Major Issues

A
  • Net Neutrality
  • Spam Email, Anti-Spam
  • Stealth Blocking
  • Web Control by Governments
  • Censorship
    • Pornography
  • Quality of Information
  • User Generated Content
    • Reviews, posts, etc
  • Cyberbullying
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Factors of Cost

A
  • Overhead
  • Transaction Cost
  • Risks
  • Damage

(I’m not sure this belongs in this deck)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tragedy of the Commons

A

A Dilemma arising from the situation in which:

Multiple individuals, acting independently, solely and rationally, consulting their own self interest,

will ultimately deplete a shared resource,

even when it is clear that it is not in anyone’s long term interest for this to happen.

Example: Spammers using resources(both physical and human) without bearing the entire cost of those resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email

Overview

A

Email

Messages embedded in files transferred between computers

  • Addressed via DNS IP Address
  • Routed over the internet
  • Possibly fragmented into packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Email:

Format

A

some_id@domain_name

  • Generic top-level domain (.edu, .gov, .com, .net)
  • DNS( Domain Name Server) translates host names to IP Address
    • Analogous to a Phone Book
  • A Hostname is a Domain Name with one or more associated IP Addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spam:

Definition

A

The use of electronic messaging systems

to send

unsolicited bulk messages

indiscriminately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spam:

Origin of Term

A

1970 Monty Python “Spam” Sketch

Nearly every menu item was spam,

vikings chanting “spam spam spam”,

thus “spamming” the dialogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How do Spammers

get

Email Addresses?

A

Two Major Ways:

  • Opt-in Lists
  • Dictionary Attacks (Try everything)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How Spammers

Seek Anonymity

A
  • Change email and IP Addresses to disguise the sending machine
  • Hijack another system as a spam launch pad
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why spammers spam

A
  • It is cheap
    • About 100x cheaper than physical junk mail
  • Wider audience
  • Profit guaranteed:
    • profitable even if only 1 in 100,000 buys product
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Costs of Spam

A
  • Overhead
    • bandwidth
    • developing or acquiring spam tool
    • taking over or acquiring host, etc
  • Transaction Cost
    • Incremental cost of contacting each recipient once a method of spamming is constructed, multiplied by #recipients
  • Risks
    • Chance and severity of legal and/or public reactions
  • Damage:
    • Impact on the community/communication channels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Anti-Spam

Methods

A
  • CAPTCHA
    • Challenge-Response test
  • Real Time Blackhole Lists
  • Grey-listing
  • Text Recognition
    • Leads to more picture based spam
  • Statistical Modeling & Heuristics
    • Neural Networks, AI, etc
  • Cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Anti-Spam Method:

Greylisting

A

Greylisting

General method based on

behavior of sending server,

rather than the content of the messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Net Neutrality:

Overview

A

Disagreement about the ability of

Broadband Providers to use their “Last Mile” of infrastructure

to block internet applications and content.

  • Neutrality Proponents claim telecom companies seek to impose a Tiered Service Model in order to control the pipeline and remove competition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Net Neutrality:

Last Mile definition

A

Last Mile:

Final leg of delivering connectivity from a communications provider to a customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Net Neutrality:

Important Events

A
  • [2010] FCC issues Open Internet(NN) order
  • Verizon and MetroPCS challenge the order
  • Case Pending at US Court of Appeals for the DC Circuit for 2 years
  • [Jan 14, 2014] DC Circuit Court declares FCC has no authority to enforce NN rules
  • [2015] FCC reclassifies broadband access as a telecommunications service, so NN applies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Net Neutrality:

Open Internet order

A
  • Issued by FCC in 2010
  • More commonly known as
    • Net Neutrality Rules
  • Essentially prohibits ISPs from blocking lawful web content
  • Challenged in US Court of Appeals for DC Circuit
  • Challenged by Verizon and MetroPCS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Net Neutrality:

Consequence of Broadband Access

being Reclassified

A

Reclassified as Telecommunications Service by the FCC (2015)

  • Allowd the FCC to treat Broadband carriers as “Common Carriers”
  • This made them subject to the Net Neutrality Rules
  • Applied to ISPs:
    • Title II (Common Carrier) of the Telecommunications Act of 1934
    • and Telecommunications Act of 1996
29
Q

Washington State Laws

regarding spam and commercial email

A
  • Commercial email conforms to state spam law, despite inability of recipient to send a reply
  • A commercial email that otherwise conforms to the WA anti-spam law by providing
    • accurate transmission path information
    • unsubscribe links
  • Inability to reply does not mean violation of state spam law when other requirements are met
30
Q

World Wide Web (WWW)

Basics

A
  • Hypertext system designed originally for research
  • Decentralized
    • Every object uniquely addressable - URL address
    • Sits on top of the internet, flexible, usable with different technologies
  • Original proposal for WWW in March 1989
  • Hypertext originated from older projects in 1960s
  • April 30, 1993, CERN said WWW would be free to anyone, no fees due
31
Q

World Wide Web (WWW)

Uses

A
  • Shopping
    • 10% of retail sales occur online in US (link)
  • Socialize: facebook, instagram, etc…
  • Blogs
  • Advertise
  • Learn
  • Entertainment
    • Online gaming, gambling, etc
32
Q

World Wide Web

Attempts at control in various countries

A
  • Saudi Arabia:
    • centralized control center
  • People’s Republic of China:
    • ISPs sign “self-discipline” agreement
  • Germany:
    • Forbids access to neo-Nazi sites
  • United States:
    • Repeated efforts to limit access of minors to pornography
33
Q

Twitter

Basic Description

A
  • A free social networking and micro-blogging service that enables its users to send and read messages
  • Tweets are text-based posts of up to 140 characters (maybe 280 soon)
    • Tweets can also contain videos, pics, etc
  • Sent to all subscribers and posted on their profile
34
Q

Twitter:

Criminal Cases

A
  • Daniel Knight, Tea Party supporter (2009)
    • arrested by FBI
    • tweets threatening violence
  • Horizon Realty Group v Amanda Bonnon, 2009
    • Horizon sued Bonnon for libel over tweets
  • Ms Monroe vs Ms Hopkins Libel case (UK)
35
Q

World Wide Web:

Quality of Information Issues

A
  • Quality of Web-based information varies widely
    • BBC News articles as opposed to CNET…
  • Other media also have information of varying quality
    • The New York Times vs. The National Enquirer
    • 60 minutes vs. Conspiracy Theory
    • History Channel 10 years ago vs. History Channel now…
  • Google attempts to reward quality
    • Ranking uses voting algorithm
    • If many links point to a page, Google search engine ranks that page higher (Page Rank)
36
Q

World Wide Web:

Quality of Information:

“Wikiality” (Colbert)

A
  • The Word - Wikiality
  • Colbert’s first reference to Wikipedia was on the July 31, 2006 broadcast
    • “Wikiality,… together we can create a reality that we all agree on - the reality we just agreed on”
  • Reality is what the wiki says it is. He explained that on Wikipedia “any user can change any entry, and if enough users agree with them, it becomes true”
  • Encouraged viewers to edit the elephant entry to say that “Elephant population in Africa has tripled over the past six months”
  • Caused lots of trouble and editing of the particular articles was restricted
37
Q

World Wide Web:

Quality of Information:

Self Determination and WikiScanner

(Colbert again)

A
  • The Word - Self Determination
  • August 21, 2007, Colbert (again) attacked WikiScanner
    • Website that tracks down people who make anonymous edits on Wikipedia
  • Claimed that it is an invasion of privacy, particularly for corporations, and that it attacks “Self-invention”
  • Claimed that everyone on the internet should be anonymous and should not be forced to give away their true identity
38
Q

Kinds of Censorship

A

Self-Censorship

General Censorship

Internet Censorship

39
Q

Censorship:

Self-Censorship

A
  • Most common form of censorship
  • Group decides for itself not to publish
  • Many different reasons
    • Avoid persecution
    • Maintain good relations with government officials
  • Ratings Systems - Another form of self censorship
    • Movies, TVs, CDs, video games, etc
40
Q

Censorship:

General Censorship

A
  • Some historical reasons for censoring material:
    • Political (sedition, treason, national security, etc)
    • Religious (blasphemy, heresy, etc)
    • Moral (Obscenity, impiety)
    • Social (incivility, irreverence, disorder)
  • How does information flow uncensored on the web?
41
Q

Censorship:

Why Internet Censorship is challenging to implement

A
  • The internet is dynamic, global and huge
    • Very hard to discriminate based on user characteristics
  • Users can remain somewhat anonymous:
    • Adopt persona
      • gamertag, twitter handle
    • VPNs
    • TOR
42
Q

Internet Anonymity:

Using a Persona

A
  • It’s easy to adopt a persona on the internet
    • gamertag, twitter handle, etc
  • However, identities can usually be revealed with cooperation from ISP, local admins, web logs, phone records, etc
  • What about a Law Enforcement Official using a persona?
    • Ethical?
43
Q

Internet Anonymity:

TOR

A
  • Tor (acronym for The Onion Router) is free software for enabling online anonymity and censorship resistance
    • Onion routing refers to layers of encryption, nested like layers of an onion
  • Directs internet traffic through a free, worldwide, volunteer network of more than 5,000 relays to conceal user’s location
  • Legal? Yes - in the US
44
Q

Censorship/Free Speech:

First Amendment of the Constitution

A

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof;

or abridging the freedom of speech, or of the press;

or the right of the people peaceable to assemble, and to petition the government for a redress of grievances

45
Q

Censorship:

Ethical Perspectives:

Kant

A

Kant opposed censorship

“Have courage to use your own reason”

46
Q

Censorship:

Ethical Perspectives:

Mill

A

Mill opposed censorship

  • No one is infallible
  • Any opinion may contain a kernel of truth
  • Ideas resulting from discourse are more influential
47
Q

Censorship:

Ethical Perspectives:

Principle of Harm

A

Principle of Harm:

“The only ground on which intervention is justified is to prevent harm to others;

the individual’s own good is not a sufficient condition”

48
Q

Censorship:

Important Legislation

A

Communications Decency Act

(Title V of Telecommunications Act of 1996)

Child Online Protection Act (COPA) - 1998

Children’s Internet Protection Act (CIPA) - 1999

49
Q

Censorship/Pornography:

Communications Decency Act

A
  • Title V of the Telecommunications Act of 1996
  • Prohibited internet distribution of indecent or patently offensive material to minors
  • Created restrictions for the internet similar to broad cast media
  • Introduced by Sen. James Exon (D-Nebraska)
  • Immediately challenged in court
  • Supreme Court struck down CDA in 1997 (Reno v. American Civil Liberties Union)
    • Not clear on the definition of indecent or obscene, violation of individuals 1st Right
  • Also called the “Great internet sex panic of 1995”
  • First notable attempt by US congress to regulate pornographic material on the internet
  • US Supreme Court struck the anti-indecency provisions from the Act - not constitutional
  • Section 230 of the act (added later)
    • Operators of ISPs and users are not to be construed as publishers
    • Not legally liable for the words of third parties who use their services
    • Promotes free speech!
50
Q

Censorship/Pornography:

Opposition to the

Communications Decency Act (CDA)

A
  • Obscenity and child pornography are already illegal to distribute (child pornography is also illegal to posses)
    • Obscenity - Miller test
  • Over-broad, vague, unenforceable
  • CDA includes “indecency standard”
    • “any comment, request, suggestion, proposal, image, or other communications, that, in context, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs”
  • What community standards do we refer to when we want to regulate the internet?
  • Internet should not be regulated like broadcast TV and radio
  • Law would chill free speech
  • Internet filters are a better solution
51
Q

Censorship/Pornography:

Miller Test for Obscenity

A

Obscenity - Miller test:

  • Whether the average person, applying contemporary community standards, would find that the work, taken as a while, appeals to the prurient interest
    • Whether the work depicts/describes, in a patently offensive way, sexual conduct specifically defined by applicable state law
    • Whether the work, taken as a while, lacks serious literary, artistic, political, or scientific value
52
Q

Censorship/Pornography:

Support for CDA

A
  • Senator James Exon, sponsor of Bill says that we need to protect children from online pornography
  • Laws that restrict selling porn to children in other media should apply to the internet
  • Filters are not sufficient
    • Parents may not be able to figure them out
    • Children may access computers away from home
53
Q

Censorship/Pornography:

Child Online Protection Act (COPA)

A

Child Online Protection Act (COPA)

  • passed in 1998
  • Banned commercial distribution of material harmful to minors
  • ACLU challenged law, Supreme Court has twice upheld lower court injunctions against enforcement
54
Q

Censorship/Pornography:

Children’s Internet Protection Act (CIPA)

A

Children’s Internet Protection Act (CIPA)

  • passed in 1999
  • Requires schools and libraries that receive federal funds for internet access to filter out child pornography, obscene materials, and materials harmful to minors
  • Upheld by Supreme Court in 2003
55
Q

Censorship:

Claims against CIPA

A
  • Claims against CIPA
    • Blocking access to constitutionally protected information
    • Filtering software does not differentiate constitutionally protected speech from illegal speech on the internet
  • US Supreme Court ruled CIPA did not violate 1st Right
    • Upheld only “if, as the Government represents, a librarian will unblock filtered material or disable the internet software filter without significant delay on an adult user’s request”
56
Q

Censorship:

Ethical Perspectives on CIPA:

Kantian Perspective

A

Kant: CIPA is wrong

  • Protecting children from harm
  • We block some non-pornographic web pages
  • Filters treat creators of non-offensive but block web pages as means to an end for restricting access to pornographic materia
57
Q

Censorship:

Ethical Perspectives on CIPA:

Utilitarian Perspective

A

Utilitarian: Depends on how benefits and harms are weighed

  • CIPA results in fewer children being exposed (+)
  • Legitimate sites filtered (-)
58
Q

Censorship:

Ethical Perspectives on CIPA:

Social Contract Perspective

A

Social Contract Theory: Freedom of conscience should be given precedence

  • Private viewing of pornography does not impact social contracts or inhibits social living
  • Libraries that block non pornographic content due to the filters may inhibit social living
  • HOWEVER, preventing content like that from being observed in public might benefit social living
59
Q

Censorship:

CDA and Online Reviews

A
  • Federal law that protects review sites such as Yelp, RateMD, etc can also lead to reckless claims online
  • Section 230 of the CDA protects websites from libel claims as long as they simply permit the posting of content and don’t actively control posts
  • If a website edits posts, weeding out vitriolic or unfounded attacks, its potential liability can be more, not less.
  • Some websites (YouTube) can skirt around this…
60
Q

Pornography:

Ethical Perspectives:

Kantian Perspective

A
  • Kant
    • Person an object of sexual appetite
    • Sexual desire focuses on body, not complete person
    • All sexual gratification outside marriage wrong
    • Means to an end
61
Q

Pornography:

Ethical Perspectives:

Utilitarian arguments for

Pornography being Unethical

A
  • Utilitarianism
  • Pornography reduces dignity of human life, harming everyone
  • Increases crimes such as rape and kidnapping
  • Industry diverts resources from more socially redeeming activities
62
Q

Pornography:

Ethical Perspectives:

Utilitarian arguments for

Pornography being Ethical

A
  • Utilitarianism
  • Those who produce pornography make money
  • Consumers of pornography derive pleasure
  • Pornography is a harmless outlet
63
Q

Pornography:

Ethical Perspectives:

Challenges with Utilitarianism

A
  • Utilitarian calculus is difficult…
  • How to deal with contradictory “facts” by “experts”?
  • How to quantify harms/benefits - harm done to people who find pornography offensive?
    • We can use statistics to get factual numbers on the issue
64
Q

Censorship and Free Expression

A
  • Freedom of expression is NOT absolute right
    • Must be balanced against the public good
  • Libel, reckless or calculated lies, slander, misrepresentation, perjury, false advertising, obscenity and profanity, solicitation of a crime, and personal abuse are not protected
  • How do we see this play out on the internet?
65
Q

Censorship and Free Expression:

Important Cases

A
  • Anthony Ellis, 2014
    • Graphically violent rap lyrics
    • Are rap lyrics threats?
  • Cannibal Cop
    • Gilberto Valle
  • George Carlin “Filthy Words” 1973
    • Broadcast media “uniquely pervasive”
    • Censorshop does not violate 1A
66
Q

Censorship on the Internet:

General Legal landscape

A
  • US Supreme Court - Not yet completely addressed the issue of hate speech on the internet
    • Neither have federal or state courts
  • When criticism (anonymous or not) crosses over the line into libel, a lawsuit may result
  • Courts have historically protected the anonymity of on-line speakers
    • More recently there is a trend to rule in favor of the the party who is a victim of libel
  • Supreme Court has made it clear that anonymous speech deserves First Amendment protection
67
Q

Censorship and Free Expression:

SLAPP Lawsuits

A
  • What happens when an alleged libeler is anonymous?
  • Offended individuals/corporations may file a “SLAPP”
    • Strategic Lawsuit Against Public Participation
  • Target of online attack typically files a lawsuit against a “John Doe”
    • Then attempts to discover John Doe’s identity via the ISP
  • Most cases involving anonymous online libel, courts have dismissed the lawsuits and/or have refused to have the identity of the anonymous critic revealed
68
Q

Cyberbullying:

Basic Idea

A

“… the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others”

  • Using forums to bully (facebook, email, etc)
  • Publish defamatory material - difficult to prevent and once it is posted, millions of people can download before removed
  • online bullies can remain anonymous
69
Q

Cyberbullying:

Legal Landscape

A
  • Washington: Requires each school district to adopt or amend if necessary a policy, that prohibits the harassment, intimidation, or bullying of any student, either verbally or electronically
  • Unless online hate speech crosses the line into incitement to imminent lawless action or true threats, the speech receives protection under the 1st Right