Week 10 Flashcards

1
Q

When do Network Communications work badly?

A

Network Communication works badly if two or more computers send messages at
the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When do Network Communications work well?

A

Network Communication work well if one computer sends a message at a time (for a limited period of time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 sorts of Multiple Access Protocol?

A
  1. Carrier sense, multiple access/ collision detection (CSMA/ CD), for wired networks, such as Ethernet
  2. Carrier sense, multiple access/ collision avoidance (CSMA/ CA), for wireless networks such as WiFi
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the properties of a CSMA/ CD wired network?

A

All computers are attached to a shared cable - Multiple Access (MA)

Any computer may transmit if the cable is unused - Carrier Sense (CS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Collision Detection and Waiting Time of CSMA/CD?

A

While transmitting, a computer may detect that it is receiving a message - Collision Detection (CD)

After detecting a collision, a computer waits for a random interval (chosen from an exponentially-doubling range), and then tries again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Random Waiting Time of CSMA/CD?

A

By using random interval we avoid repeated collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Exponentially-Doubling Range of CSMA/CD?

A

An exponentially-doubling range enables computers to adapt to the network load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is CSMA/CD not used today?

A

Not used today because modern Ethernet variants avoid collisions by operating in full duplex mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the properties of a CSMA/ CA wireless network?

A

All computers use a shared frequency - Multiple Access (MA)

Any computer may transmit if the frequency is clear - Carrier Sense (CS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Collision Avoidance in CSMA/CA?

A

a computer finding the frequency clear, transmits after an instant

a computer finding the frequency busy counts down from a random value
(chosen from an exponentially-doubling range) while the channel is clear;
otherwise, the count is frozen — Collision Avoidance (CA)

a computer then transmits and (hopefully) receives an acknowledgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Hidden Node Problem?

A

A computer may be in range of the base station, but out of range of another
computer — the hidden node problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is the Hidden Node Problem Resolved?

A

The hidden node problem may be solved by reservation using ready to send and
clear to send messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 Collision-Free Protocols?

A
  1. Token Ring
  2. Bit-map Protocols
  3. Binary Countdown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Token Ring?

A

In a token ring wired network, a token continuously circulates, to which
messages may be attached, and from which they may be removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Token Bus?

A

In a token bus, the token is passed around a virtual ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Bit-Map Protocol?

A

In a bit-map protocol, host n may announce that it has a frame to send by
inserting a 1 bit into slot n

Following this, hosts begin to transmit frames in numerical order

17
Q

What is Binary Countdown?

A

Hosts that wish to transmit broadcast their binary address. Hosts with ”1”s in
their address get priority. The winner of the bid gets to transmit a frame

18
Q

What is the property of Network Gateways?

A

Modern networks have a single fortified point of entry/exit

19
Q

What are the Firewall Characteristics?

A

A Firewall can:

restrict both incoming and outgoing traffic

use both positive and negative filters

consider both the payload and different TCP/IP headers

consider packets individually or as part of a flow

20
Q

What are the Firewall Characteristics?

A
  1. packet-filtering firewalls
  2. stateful packet inspection firewalls
  3. application-level gateways
  4. circuit-level gateways
21
Q

What are Packet-Filtering Firewalls?

A

A packet-filtering firewall filters individual packets on the basis of packet headers
(up to the transport layer) and packet payloads

22
Q

What are examples of Packet-Filtering Firewalls?

A
  1. Port Numbers
  2. IP addresses
  3. Filetypes
  4. Malware Signatures
23
Q

What is a Wildcard Mask?

A

A wildcard mask indicates which bits of an IP address a particular rule is
concerned with during IP address matching.

0: The corresponding bit must match

1: The corresponding bit does not matter

000101000000000100000001000000001

24
Q

What are examples of Wildcard Masks?

A

Action IP address Wildcard Mask

Allow 20.1.1.1 0.0.255.255

means “allow all IP addresses of the form 20.1.x.y

Action IP address Wildcard Mask

Deny 20.2.1.1 0.0.0.255

means “deny all IP addresses of the form 20.2.1.z

25
Q

What are Stateful Firewalls?

A

A stateful firewall reviews the same packet information as a packet filtering
firewall, but also filters packets on the basis of a directory of established
transport-layer connections

26
Q

What are Stateful Firewalls?

A

A stateful firewall can track

TCP connections by looking for handshakes during connection start-up and
connection shutdown

UDP segments by tracking IP addresses and port numbers

27
Q

What is the Application-Level Gateway?

A

An application-level gateway filters packets based on applications or certain
features of applications.

An application-level gateway sets up two TCP connections: one from the trusted
network to the firewall, and one from the firewall to the untrusted network

28
Q

What is an example of an Application-Level Gateway?

A

An application-level gateway can be used as a web or e-mail gateway

29
Q

What are Circuit-Level Gateways?

A

A circuit-level gateway determines which TCP connections will be allowed. Just
as the application-level gateway, a circuit-level gateway sets up two TCP
connections.

30
Q

What are examples of Circuit-Level Gateways?

A
  1. The circuit-level gateway receives a TCP connection request from a trusted
    client
  2. The circuit-level gateway approves or denies the TCP connection based on
    IP addresses, port numbers, user authentication, etc.
  3. If the connection is approved, the circuit-level gateway establishes a second
    TCP connection to the server on the client’s behalf
  4. From this point on, the circuit-level gateway simply relays segments in the
    TCP connection
31
Q

What do Firewall Organisations include?

A
  1. Single firewall inline
  2. Double firewall inline
32
Q

What is a Single Firewall Inline?

A

A single firewall inline puts a firewall between an external and internal router

33
Q

What is a Double Firewall Inline?

A

A double firewall inline puts a demilitarized zone (DMZ) between an external
and internal firewall. The DMZ is a network for systems that must be externally
accessible (e.g., e-mail, DNS, web), but still need some protection

34
Q

What are Virtual Private Network?

A

A virtual private network (VPN) uses encryption and authentication (provided
by, for example, IPsec) to provide a secure connection through an otherwise
insecure network, typically the Internet

35
Q

What are the benefits of Virtual Private Networks?

A

A VPN can be used to bypass firewalls and other restrictions, and to increase
privacy and security

36
Q

What are the limitations of Virtual Private Networks?

A

Using a VPN may result in a lower connection speed, blocks from certain
internet services, and resale of your data to third parties