Unit 4 Flashcards

1
Q

The default behavior on the network is process traffic
on a “first come, first serve” basis. This is called:

A

First In, First Out (FIFO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ provides different priority to different applications, users, or data flows, to guarantee a certain level of performance.

A

Quality of Service (QoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the QoS Principles?

A

Latency -Time it takes for packet to reach destination

Jitter -Variation in delay that effects video/audio quality

Dropped Packets -Packets that do not make it to destination

Low Throughput - Data stream too low for real-time media services from devices using the same resources

Out-of-Order Delivery - packets arrive out of order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Today’s wired Ethernet networks are ___-duplex, while wireless Ethernet networks are ___-duplex.

A

full-duplex
half-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is a field in an IP packet that enables different levels of service in network traffic.

A

Differentiated Services Code Point (DSCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In DSCP, There are two service types called:

A

guaranteed service and control load service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In DSCP, ___ ___ provides high-quality quantifiable guarantees with bounded (guaranteed minimum) latency.

A

Guaranteed service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In DSCP, ___ ___ ___ provides high-quality quantifiable guarantees without bounded latency.

A

Controlled load service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSCP has two methods of filtering:

A

port number
deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following describes which DSCP filtering type?

 Fast
 Low resource-consuming
 Supported by many network devices
 Does not implement the application-layer payload, so user privacy is not compromised
 Useful only for the applications and services, which use fixed port numbers
 Easy to cheat by changing the port number in the system

A

Port Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes which DSCP filtering type?

 Inspects the actual payload of the packet
 Detects the applications and services regardless of the port number used in the packet
 Lacks support for many applications, like Skype, which is poorly supported by most
classifiers
 Slow
 Requires a lot of processing power
 Signatures must be kept up to date, as the applications change frequently
 Applications that use encryption makes deep packet inspection nearly impossible

A

Deep Packet Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are three different types of traffic classification. These traffic classes determine the priority they receive in a network.

A

Sensitive Traffic
Best Effort Traffic
Undesired Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following describes which type of DSCP traffic?

___ ___ is data traffic that the operator has an expectation of being delivered on time. This includes VoIP, online gaming, video conferencing, and some web browsing.

A

Sensitive Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes which type of DSCP traffic?

___ ___ ___ is all other kinds of non-detrimental traffic. This is traffic that the Internet Service Provider (ISP) deems isn’t sensitive to QoS metrics (jitter, packet loss, latency). A typical example would be peer-to-peer and email applications. Traffic management schemes are generally tailored so that best-effort traffic gets what is left after sensitive traffic.

A

Best Effort Traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following describes which type of DSCP traffic?

___ ___ is generally limited to the delivery of spam and traffic created by worms, botnets, and other malicious attacks. In some networks, this definition can include such traffic as non- local VoIP (for example, Skype) or video streaming services to protect the market for the ‘in- house’ services of the same type. In these cases, traffic classification mechanisms identify this traffic, allowing the network operator to either block this traffic entirely or severely hamper its operation.

A

Undesired traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A