Networks prio1 Flashcards

1
Q

What is stop-and-wait ARQ?

A

Stop and wait are when a sender sends a packet and then waits for an ACK from reciever. The window size for receiver is 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is TCP congestion window?

A

Congestion window is a window which have a size of x number of bytes. This is the allowed maximimum of data that a sender can send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how ping adminstration utility works.

A

Ping administration utility is a utility that uses the ICMP protocol. It sends an ICMP packet to a destination specified by an IP adress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the key feature of the routing within virtual circuit networks?

A

The key feature of the routing within virtual circuit networks is that it reservers a path for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key feature of routing within datagram networks?

A

In datagram networks, a packet being sent can take any available path to a given destination. The packets a numbered so when packets arrive they can be re-arrange to the correct order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is it possible that congestion window exceeds network bandwidth-delay product and why?

A

Yes, it is possible for the congestion window to exceed the network bandwidth-delay product. This can happen if the network has a high bandwidth and a low delay, or if the congestion window is set too high. (The network bandwidth-delay product is the maximum amount of data that can be in transit at any given time.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the relationship between inter-arrival times of acks at the sender and capacity of bottleneck link?

A

If the bottleneck link has a higher capacity, the sender will receive acks more quickly and the inter-arrival times will be shorter. (intervals between the arrival of successive packets at a given node)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an asymmetric key cryptography and an symmetric key cryptography?

A

The symmetric key is a key that is used to encrypt and decrypt. For asymmetric one key encrypts and the other decrypts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the ALOHA protocol?

A

ALOHA is a protocol that is used to avoid channel allocation problem, a channel that is used by more than just one station. It works on the principle that if there is anything to send, send it.
There are two variants of ALOHA. Pure ALOHA and Slotted ALOHA.
slotted ALOHA instead relyies on “slots” where the sender has to wait when a slot is available. This is synchronized by a master clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is TCP congestion control?

A

TCP congestion control avoids routers buffers overflow. It automatically adjusts the transmission of packets so that the network links are fully utilized while limiting congestion losses. Normally it uses packet losses as a congestion signal. That said, it is a combined responsibility of the network and transport layer for congestion control but is ultimately caused by traffic sent into the network layer by the transport layer. Congestion control is when the transport layer sends traffic to the network layer more slowly. Here different algorithm is used to solve this. The main one that TCP uses is the AIMD algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP congestion window?

A

TCP congestion window is a set size of x amount of bytes that the sender can send. This is used to avoid congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is http and https?

A

Hypertext transfer protocol used to transport information between web servers and clients. Normally runs over TCP.
HTTPS is more secure as it uses TLS encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is RSA?

A

Is a symmetric-key algorithm.
D(E(P)) = P
Difficult to deduce D from E
E cannot be broken by a chosen plaintext attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TCP flow control?

A

Makes sure that the source does not generate data faster than the destination is able to absorb.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is AIMD?

A

AIMD Additive Increase, Multiplicative decrease is a congestion algorithm that TCP uses. AIMD combines linear growth of the congestion window when there is no congestion and then with an exponential reduction when congestion is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an “ACK clock” in TCP?

A

An ACK clock is part of TCP congestion control. ACKs will here return to the sender at about the same rate that the packets can be send over the slowest link in the path. With this TCP smoothens out traffic and avoid unnecassary queues at routers.

17
Q

What is slow start in TCP AIMD?

A

Slow start is TCP starts sending a few segments and would then for each segment that the sender receives an ACK for, It would add one more segment of bytes to the congestion window.

18
Q

What is Additive increase in TCP AIMD?

A

When slow start threshold is crossed, TCP will switch to this. Here the congestion window is increase by one segment every round trip time.

19
Q

What is TCP Tahoe?

A

Besides the AIMD algorithm with a slow start, Tahoe uses Fast Retransmit.
Here 3 Acks assumes a lost packet. The window is increased every ACK and after a certain threshold, it is increased by one segment every RTT.

20
Q

What is TCP Reno?

A

Is an improved version of TCP Tahoe. This one uses a faster retransmit algorithm.

21
Q

What is Jitter?

A

Jitter is the variation in time delay(latency) between when a signal is transmitted and when it’s received over a network connection, measuring the variability in ping. Jitter is often caused by congestion

22
Q

What is a “Tracker”?

A

A server that leads peers to the content of the torrent.

23
Q

What is throughput?

A

Is the amount of data moved from one place to another in a given time period. Typically measured in bits per second bps or Mbps, Gbps. For example, if a typical round trip time on the Internet is about 40ms, If the packets have 1,500 bytes then in Kbps this is 1500*8/0.04 = 300kbps.

24
Q

What is coderate?

A

Is the fraction of a codeword that carries information that is not redundant. m/n n=m+r

25
Q

What is Go Back N ARQ?

A

The basic version of TCP uses this. It uses a “transmit window” of size N. All N packets within this window are transmitted. If a packet isn’t receiving an ACK all packages within this window are retransmitted.

26
Q

What is Go Back N Selective Acknowledgment ARQ?

A

Compare to Go Back N, with Selective Acknowledgments the receiver sends a positive ACK for all the packets it has received correctly. nack

27
Q

What is CSMA?

A

CSMA (Carrier sense multiple access) is an improvement of ALOHA. CSMA ensures no station begins to transmit while the channel is busy.

28
Q

Describe CSMA/CD.

A

CSMA with collision detection is An algorithm that classic ethernet uses within its MAC sublayer. Station sense the medium when they have a frame to send and send the frame as soon as the medium becomes idle. They monitior the channel for collisions as they send. If there is a collision they abort the transmission and retransmits after a random interval.

29
Q

Describe CSMA/CA

A

CSMA collision avoidance is used in wifi 802.11 within its MAC sublayer protocol. Is similar to Ethernet’s CSMA/CD but here when a station has a frame to send it starts with a random “backoff”. The number of chosen slots to backoff could be 0-15. The station waits until the channel is idle and then counts down idle slots, sending when the counter reaches 0. If no ACK has been received the sender doubles the backoff period and tries again.

30
Q

What is QoS?

A

QoS stands for Quality of Service.
In the network layer, a stream of packets from source to destination, is called a flow. This flow have different quality of service which is characterized by four parameters bandwidth, delay, jitter and loss.

31
Q

What is LLC?

A

Is Logical Link control protocol which together with the MAC sublayer compose the data link layer of the OSI model. While the MAC sublayer handles the transfer of data this layer instead figures out what to do with an incoming frame.

32
Q

Explain the phases a TCP connection goes through.

A

TCP goes through “setup, send data and close”. C connection is established with a “three-way handshake”, SYN, SYN.ACK, then first package is sent with the ACK set. Data is exchanged (with data and acks); half-close(sender)(with FIN and FIN.ACK); then a second half-close(receiver)(with FIN, timed wait, and FIN.ACK).

33
Q

What is the hidden node/terminal problem?

A

The hidden terminal/node problem refers to the situation where two sending devices cannot hear each other (i.e they are hidden from each other), and hence one of them can begin transmission even if the other device is already transmitting.