Quiz 3 - Transport & Application Layer Protocols and DNS (Ch. 9-10) Flashcards

1
Q

Describe HTTP packets in networking layers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Transport Layer protocols

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you select the Transport Layer protocol?

A
  • Based on Quality of service (QoS) requirement
  • QoS is an acceptable level of network performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QoS factor: Reliability

A
  • some apps can tolerate some loss
    • (e.g., audio)
  • other apps require 100% reliable data transfer
    • (e.g., file transfer, telnet)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QoS factor: Timing

A
  • some apps require low delay to be “effective”
    • (e.g., Internet telephony, interactive games)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

QoS factor: Throughput

A
  • some apps require minimum amount of throughput to be “effective”
    • (e.g., multimedia)
  • other apps make use of whatever throughput they get
    • (“elastic apps”)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QoS factor:Security

A
  • encryption
  • data integrity
  • etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transport service requirements of common apps

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the Layer 4 (Transport) Protocols?

A
  • TCP
  • UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe TCP

A
  • connection-oriented: setup required between client and server processes reliable transport between sending and receiving
  • process flow control: sender won’t overwhelm receiver
  • congestion control: throttle sender when network overloaded
  • does not provide: timing, minimum throughput guarantees, security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe UDP

A
  • unreliable data transfer between sending and receiving process
  • does not provide: connection setup, reliability, flow control, congestion control, timing, throughput guarantee, or security
  • faster than TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Connection-oriented communication?

A
  • Within the connection, messages are
    • sequenced,
    • acknowledged, and
    • retransmitted if necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does TCP handle connections?

A
  • There is a formal opening of the connection.
  • A connection opening requires three segments. (three-way handshake)
  • There is a formal closing of the connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is TCP is a connection-oriented protocol?

A
  • Yes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Transport protocols for Internet apps

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What determines the choice of transport protocol?

A
  • QoS determines the transport protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How are processes on the same host uniquely identified?

A
  • To be uniquely identified, each process must have an identifier
  • Identifier includes both IP address of the host and port numbers associated with process on host.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Addressing processes within a host

A
  • Hosts are identified by unique 32-bit IP address
  • But many processes can be running on the same host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How are ports designated?

A
  • Using a 16-bit value
  • between 0 and 65,535
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the range for Well-known ports?

A
  • 0 to 1,023
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the range for Registered ports?

A
  • 1,024 to 49,151
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the range for Dynamic range ports?

A
  • 49,152 to 65,535
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Socket?

A
  • Virtual identifier
    • A virtual connection to a process running on a host
  • Combination of the (virtual) port number and the (virtual) IP address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is at the beginning of TCP and UDP headers?

A
  • Both TCP and UDP headers begin with a
    • source port number field and a
    • destination port number field
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What port numbers do clients use?

A
  • Clients use ephemeral port numbers
  • (usually 1024 - 4999)
26
Q

How do clients assign port numbers?

A
  • A client generates a different ephemeral port number for each connection
27
Q

What port numbers do server programs use?

A
  • Server programs use well-known port numbers
  • (0 - 1023)
28
Q

What does the Internet do?

A
  • The Internet establishes a global data communications system
    • (hardware and software infrastructure)
    • between computers.
29
Q

What is the Web?

A
  • The Web is one of the services communicated via the Internet.
  • It is a collection of interconnected documents and other resources,
    • linked by hyperlinks and URLs.
30
Q

What is a URL?

A
  • URL: Is a symbolic meaning for specifying
    • A Web resource
    • The Web server on which the resource resides
    • The protocol that will be used to retrieve the resource
  • URL components are separated from each other by
    • forward slashes,
    • dots, and sometimes
    • colons
    • e.g., http://www.facebook.com/georgemason
31
Q

What is HTTP?

A
  • Hypertext Transfer Protocol (HTTP)
  • HTTP is a file transfer standard
32
Q

How does HTTP use TCP/IP?

A
  • HTTP uses the services of TCP and IP to actually move data between the browser and the server
33
Q

What are Cookies?

A
  • Cookies: very small text files written to the client’s hard drive
  • contain “state” information
  • Allow a server application to understand the http requests that make up a continuous exchange
34
Q

Why are cookies commonly used with HTTP?

A
  • HTTP Protocol is stateless
  • Makes it difficult to design complex and interactive Web pages.
  • Other technologies enhance HTTP:
    • JavaScript/AJAX
    • Server-side scripting
    • Adobe Flash
    • Cookies
35
Q

What is a stateless protocol?

A
  • Each command is performed independently
    • without reference to any commands the user previously executed
36
Q

What does FTP do?

A
  • Establishes rules for transferring data between an ftp server and a client
  • Users can download a file from an ftp server and upload a file to an ftp server
  • Used to download large data sets where the receiver is interested in the data but not concerned with presentation
37
Q

How does FTP work?

A
  • Users interact with the server to obtain data sets but do not interact with the data
  • In many instances, a password is required to log on to an ftp server before data can be moved in either direction
  • Transfers can be initiated by graphical user interface programs or line commands
38
Q

How does email work?

A
  • Messages are stored on e-mail server
  • Most e-mail clients notify you when new message arrives
    • or automatically download
39
Q

What level protocols does email use?

A
  • E-mail programs use application-level protocols
  • SMTP: Simple Mail Transfer Protocol
    • Uses TCP port 25
40
Q

What is STMP and what is it used for?

A
  • SMTP: Simple Mail Transfer Protocol
  • For E-Mail delivery
41
Q

What protocols are used for email downloading (receiving)

A
  • POP: Post Office Protocol
  • IMAP: Internet Message Access Protocol
42
Q

How does POP work?

A
  • Downloads e-mail to computer’s e-mail client inbox
  • Disconnects as soon as e-mail is downloaded
43
Q

How does IMAP work?

A
  • More complex, more sophisticated than POP
  • Allows multiple clients to simultaneously connect to same inbox
  • Clients can use/manipulate multiple mailboxes and folders on same server
  • Clients can search e-mail on server besides inbox
  • Clients can remain connected to the server
44
Q

What are the components of VoIP?

A
45
Q

How does VoIP work?

A
  • Voice is digitized by an ADC
    • (analog to digital conversion)
  • Process is reversed by a DAC
    • (digital to analog conversion)
  • Together the ADC/DAC is called a codec
    • (compression-decompression algorithm)
46
Q

How does VoIP handle signaling and transport?

A
  • UDP
    • There is no time to wait for the transmission of lost packets
    • UDP makes more sense because of its lightweight processing requirements
  • Real-Time Protocol (RTP) Header
    • Makes up for two UDP deficiencies
      • Adds sequence numbers to packets
      • Adds a time stamp for when its codec octets should be played back
    • Allows smooth playback
47
Q

What is the structure of a VoIP packet?

A
48
Q

How does the Skype network operate?

A
  • Users must log into the network before they receive service
  • Once connected, the two parties communicate entirely P2P (transport)
49
Q

How does DNS work?

A
  1. You want to access www.amazon.com. So, your host (PC/laptop) has to send packets to the www.amazon.com server. But, in order to do so, it has to first learn the IP address of the destination host.
  2. The originating host must contact a DNS server to find the IP address.
  3. The DNS server sends a response message to the originating host with the IP address of the destination host.
  4. The originating host can now send packets to the target host.
50
Q

What protocol and port does DNS mainly use?

A
  • DNS primarily uses
    • UDP on
    • port number 53 to serve requests.
51
Q

What is a good analogy for a DNS host?

A
  • The DNS host is like a telephone directory
  • You send it the host name for which you need an IP address
52
Q

After the IP address of a destination host has been resolved by the DNS server, does the orignating host need to do DNS lookup again?

A
  • No
  • DNS lookup is not needed for the rest of the communication between the originating host and the target host
53
Q

Describe the hierarchy of DNS

A
54
Q

What is the DNS root and how many servers are used?

A
  • The root is all domains
  • There are 13 DNS root servers
55
Q

What are TLDs and how are they divided up?

A
  • There are two kinds of top level domains
  • Generic top-level domains indicate organization type
    • (.com, .edu, .gov, etc.).
  • Country top-level domains are specific to a country
    • (.UK, .CA, .CH, etc.).
56
Q

What are SLDs?

A
  • Companies want Second-Level Domain Names
    • (microsoft.com, apple.com etc.).
  • Competition for these names is fierce.
57
Q

What are subdomains and how are they used?

A
  • subdomains are “third-level” domains
    • (e.g., som.gmu.edu, mail.google.com, store.apple.com, etc.)
  • Most companies divide their organizations into subdomains
58
Q

What is at the bottom of the DNS hierarchy?

A
  • At the bottom of the hierarchy are individual hosts
  • (e.g., research1.som.gmu.edu, research2.som.gmu.edu, etc.)
59
Q

What is a local name server?

A
  • a local cache (typically at the ISP) of DNS directory entries
  • does not strictly belong to hierarchy
  • each ISP (residential ISP, company, university) has one
  • also called default name server
60
Q

How does a local name server work?

A
  • when host makes DNS query, query is sent to its local DNS server
    • acts as proxy, forwards query into hierarchy
  • once (any) name server learns mapping, it caches mapping
    • cache entries timeout (disappear) after some time
    • TLD servers typically cached in local name servers
      • Thus root name servers not often visited
61
Q

What are the various types of DNS services?

A
  • Primary service:
    • Hostname to IP address translation
  • Other services:
    • Host aliasing
      • Multiple hostnames may correspond to a single IP address:
        • combined with virtual hosting, this allows a single machine to serve many web sites.
    • Load distribution
      • a single hostname may correspond to many IP addresses
      • avoids overwhelming a single host server