Networking Concepts Flashcards

1
Q

What is the Internet?

A

Billions of interconnected devices.

Hosts = end systems
running network applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the communication links?

A

fiber, satellite, copper, radio

transmit data
the transmission rate is measured in bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do packet switches do?

A

Forward packets (chunks of data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do protocols do?

A

Control the sending and receiving of messages

define format, order of messages sent and received among network entities and actions taken on message transmission and receipt.

Examples: TCP, IP, 802.11, HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does TCP stand for?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the network edge?

A

host: clients and servers
servers often in data centers
access networks, physical media: wired, wireless communication links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the network core?

A

interconnected routers, network of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we connect end systems to edge routers?

A

Through residential access networks, institutional networks (schools, companies), and mobile access networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NAT?

A

Network Address Translation: the process where a network device assigns a public address to a computer or group of computers on a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a home network setup?

A

devices are connected to either a wireless access point or wired ethernet. Which is connected to your local router (This is where the firewall is located as well as NAT occurs), your router is connected to a modem to your ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe a enterprise network setup?

A

Devices are connected to either a wireless access point or directly to an ethernet switch. Which can be connected to a main router that links out to the ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe packet switching:

A

hosts break application-layer messages down into packets which are forwarded from router to router until they get from the source to the destination.

L/R - transmission delay (Length of packet/rate of transmission)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is queueing delay and how can it lead to packet loss?

A

if the arrival rate of packets exceeds the transmission rate of the link, packets will queue up and wait to be transmitted. Packets can be accidentally dropped if memory (buffer) fills up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the IP(Internet Protocol) stack?

A

Application Layer - supporting network applications (HTTP, SMTP)

Transport - proces-process data transfer (TCP, UDP)

Network - routing of datagrams from source to destination (IP, routing protocols)

Link: data transfer between neighboring network elements.
(Ethernet, 802.11)

Physical: bits on the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the OSI (Open systems interconnection) model?

A

Application

Presentation: Allows applications to interpret the meaning of data (encryption, compression)

Session: synchronization checkpointing, recovery of data exchange.

Transport

Network

Link

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain TCP vs UDP (User Datagram Protocol) transport layer protocols?

A

TCP - reliable, in order delivery.

UDP - unreliable, unordered delivery.

  • barebones
  • Packets may be lost or out of order
  • no handshaking
  • small header size
  • less delay

uses: streaming multimedia apps, DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is in a UDP segment header?

A

source, destination, length, data, checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the goal of a checksum?

A

to detect “errors” (flipped bits) in transmitted segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is pipelining?

A

Sender allows multiple “in-flight”, yet to be acknowledged pkts.

Two generic forms:
Go-back-N
Selective Repeat

20
Q

Explain Go-Back-N:

A

Sender can have up to N un-acknowledged packets in the pipeline.

receiver only sends cumulative ack.

sender has a timer for oldest unacked packet-when the timer expires, retransmit all unacked packets.

21
Q

Explain Selective repeat:

A

Sender can have up to N un-acknowledged packets in a pipeline.

receiver sends individual acks for each packet.

sender maintains timer for each unacked packet.- when timer expires only resend the un-acked packet.

22
Q

What is in a TCP segment structure?

A

source, destination, sequence number, ack number, receive window, length, checksum, data

23
Q

What are some of the network layer functions?

A

Routing protocols - path selection (forwarding table)

IP - addressing conventions
packet handling conventions
datagram format

ICMP- error reporting
router signaling

24
Q

What are some link layer services?

A

Flow control, error detection, error correction

25
Q

What is parity checking ? (two dimensional bit parity)

A

detects and corrects single bit errors (remember even and odd parity)

26
Q

What is Cyclic Redundancy Check (CRC)?

A

A more powerful error detection tool. View data bits as a Binary number ‘D’, Choose ‘r’ bits such that ‘D’/’G’ = will give exactly ‘r’.

If there is a non zero remainder there are errors detected. G is a generated bit pattern that is D is evenly divisible by.

27
Q

What is an Ethernet Frame?

A

The encapsulated IP datagram (network layer protocol packet).

Contains: preamble, dest, source, type, data, CRC.

28
Q

What are some examples of Single bit error detection.

A

1-D Parity, Checksum

29
Q

What are some example of multi-bit error detection.

A

CRC, Hamming Code

30
Q

What are some examples of single bit error correction

A

2-D parity, Hamming Code

31
Q

What is an example of multi-bit error correction.

A

Convolution Codes

32
Q

What are some characteristic of 1-D Parity Bit checking?

A

Simplest error checking mechanism - very limited reliability.

can be utilized alongside other detection correction methods

can only detect single bit,

cannot correct errors

if an error is found, it cannot tell if it is the actual parity bit that is wrong or a data bit.

33
Q

What are some characteristics of Hamming Code error detection and correction?

A

Can correct single bit errors

Can detect 2-bit errors, but can only correct 1-bit errors

34
Q

How do we determine the MAC address of a machine knowing its IP address?

A

Using ARP: Address resolution protocol

35
Q

How do switches know which end devices are reachable through which interfaces?

A

They have a forwarding table - think of it like a routing table.

A switch will learn which hosts are connected to it through which interfaces as it receives transmissions from it. It will store the sender/location pair in its switch table

36
Q

What are some characteristics that differentiate Wireless links from Wired links?

A
  • decreased signal strength
  • interference from other sources - standardized wireless network frequencies are shared by other devices - phones, roku etc

multipath propagation - radio signals reflect off objects, ground, and arrive at destination at slightly different times.

communication across wireless links are much more difficult

37
Q

What is the hidden terminal problem?

A

multiple wireless senders and recievers create additional problems (beyond multiple access)

B,A - can hear each other

B, C - can hear each other

A,C - cannot hear each other, meaning they are unaware of their interference at B

38
Q

What is UWSN ?

A

UnderWater Acoustic Sensor Networks (UW-ASN).

Uses sound as underwater wireless communication medium

39
Q

What are some applications of underwater sensor networks?

A
Seismic monitoring
Pollution Monitoring
Ocean current monitoring
equipment monitoring and control
Autonomous Underwater Vehicles
40
Q

Why use sound for underwater networks?

A

Optical or light - is affected by scattering

Radio waves- cannot transmit at high frequencies underwater. It would require an extremely large antennae to work.

41
Q

What are some challenges faced by underwater networks?

A

Battery power is limited - solar energy charge cannot usually be exploited

available bandwidth is limited

long delays

high bit error rates

underwater sensors prone to corrosion

42
Q

What year was bluetooth version 1.0 released?

A

1999

43
Q

What is the name of the organization that founded Bluetooth?

A

SIG - Bluetooth special interest group

44
Q

What band frequency does bluetooth operate at?

A

2.4 GHz

45
Q

What are some ways you can make sure bluetooth does not interfere with Wifi?

A

TDM - Time division multiplexing

using 5GHz bandwidth