Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
105 Cards in this Set
- Front
- Back
What are the two problems we face with building protocols at the physical layer?
|
Propagation Delay and Limited Bandwidth
|
|
What is framing at the physical layer?
|
Detecting errors on pieces of the whole data
|
|
What is flow control and the physical layeR?
|
We don't want senders overwhelming receievers
|
|
What is vampire tapping?
|
The old way they used to connect wires and computers together
|
|
What is time division multiplexing?
|
Chopping up time units for each computer to transmit
|
|
What is frequency division multiplexing?
|
Chopping up the frequencies for the different computers to use
|
|
What are two examples of statitc bandwidth allocation schemes?
|
TDM and FDM
|
|
What are the problems with circuit switched networks?
|
There is a dedicated connection between all hosts
|
|
What are the problems with packet switched networks?
|
Multiplexing. Different bandwidths between hosts. Ordering of packets
|
|
What are the different layers of data communications?
|
Physical. Datalink. Network. Transport. Application
|
|
What are the requirements we might want from our network?
|
Reliability. Availability. Security, Global connectivity. Scalability. Transparency. QOS guarantees(Throughput. Bound on loss. Bound on delay. Bound on jitter) Accounting. Usable(think DNS) Manageble. Interoperable. Hetergeneous.
|
|
What does UDP add to IP?
|
UDP adds data checksum and best effort service
|
|
What does TCP add to IP?
|
Data checksum and reliable byte-stream delivery PLUS flow and congestion control.
|
|
What is the simplest analog signal?
|
Sine wave
|
|
What are the three ways we can encode data into a sine wave?
|
Frequency, amplitude, and phase
|
|
What is baud?
|
Changes per second to detect
|
|
Is it possible to have infinite bandwidth?
|
No.
|
|
What is bandwidth?
|
The range of frequencies
|
|
Who found the fundamental limit to the signaling rate?
|
Nyquist 1924
|
|
What is the highest signaling rate?
|
2H the bandwidth
|
|
What is the H in Nyquists formula?
|
H = bandwidth
|
|
How do you find bitrate?
|
2H log base 2 of l
H=bandwidth l = number of levels |
|
What is attenuation?
|
The face that the strength of the signal dies with distance
|
|
What is the problem with amplifying the signal?
|
You also amplify the noise
|
|
What is delay distortion?
|
The fact that higher frequencies travel faster than lower frequencies
|
|
What kinds of noise can we get at the physical layer?
|
Thermal noise, electron agitation
Cross talk |
|
What did claude shannon determine to be the capacity of a medium?
|
C = Hlog2(1+ s/n ratio)
C = capacity, H = bandwidth |
|
What is pulse code modulation?
|
Take a continuous signal and puts it through a sampler and gives a digital version
|
|
How many twists do cat3 and cat5 have?
|
Cat3 - 3-4 twists per foot
Cat5 - 3-4 twists per inch |
|
What are packets called at the datalink layer?
|
Frames
|
|
What is bit stuffing?
|
If I am encoding and I see 5 consecutive 1's I add a 0. If I ever see 6 1's I know I am done.
|
|
How do we deteremine effeciency of a frame rate transmission?
|
N = Tf/Tf+2Tau+Ta+Tp
|
|
What is wrong with stop and wait at the datalink level?
|
We are limited to one frame at a time?
|
|
How do windowing protocols work at the datalink level?
|
We can send x number of frames at a time without an ack. The window shrinks from the left and expands from the right.
|
|
What are the fundamental rules for decoding at the datalink level?
|
If there is an error I always want to detect it. If there is no error I want to believe it.
|
|
What is a codeword at the datalink layer?
|
A legal sequence of bits (any combo of n-bits that are legal)
|
|
When would we ever use error correction at the datalink layer?
|
If we are talking over really long distances, eg. to Mars, and we don't want to have to retransmit.
|
|
What is ARQ?
|
Auto Repeat Request
|
|
What is FEC
|
Foreign Error Correction
|
|
What is MAC
|
Medium Access Control
|
|
What is the Aloha protocol?
|
Transmt when you are ready. Listen to channel after you transmit. If collision is detected delay t and retransmit.
|
|
What is CSMA?
|
Carrier Sense Multiple Access
|
|
What is CSMA/CD?
|
Carrier Sense Multiple Access with Collision Detection
|
|
What does CSMA/CD add to CSMA?
|
It checks to see if people are talking while I am talking
|
|
At what point do you know you have seized the medium?
|
At 2 tau you know without a doubt you are the only one talking
|
|
In a token ring, when can you talk?
|
When you receive a token
|
|
What is the number of the Ethernet protocol?
|
802.3
|
|
What is thicknet
|
10base5 - 10 mbps 5 base freq's 500m max distance
|
|
What is thin net
|
10base2
|
|
What is twisted pair
|
10base-T (500m)
|
|
What is the physical longest length of an ethernet medium?
|
2500M
|
|
What does padding help insure?
|
That we have a transmission time of at least 2 tau
|
|
What does ethernet use as its way of making sure everyone gets a chance to talk?
|
P-Persistent CSMA/CD
|
|
What is DQDB?
|
Distributed Queue Dual Bus
|
|
What is MAN?
|
Metro Area Network
|
|
What is a repeater at datalink layer?
|
Everything is sent to both networks
|
|
What is a selective repeater
|
Things are sent to all networks unless the repeater knows where the host is
|
|
What is a repeater called at the Transport layer?
|
A bridge
|
|
What is a transparent bridge?
|
Plug it in and it works. Repeats stuff it needs to not stuff it don't.
|
|
What is backward learning?
|
Learn about the network from where things came from.
|
|
What are the options for an IP packet?
|
Record route, source routing(strict and loose) security info, timestamp
|
|
What are the two routing categories?
|
Direct and Indirect
|
|
What is ARP?
|
Address Resolution Protocol
|
|
What is RARP?
|
Reverse Address Resolution Protocol
|
|
What is ICMP?
|
Internet Control Message Protocol
|
|
What protocol does a smurf attack use?
|
ICMP
|
|
How do you get a network ID from a subnet mask?
|
AND it with your ip address and out pops your network id
|
|
What is VLSM?
|
Variable Length Subnet Mask
|
|
What is CIDR?
|
Classless Interdomain Routing
|
|
What is UDP?
|
User Datagram Protocol
|
|
What is TCP?
|
Transmission Control Protocol
|
|
What is the TCP URG flag do?
|
The urgent pointer is valid. The urgent pointer is the number of octets from the beginning of the segment to last urgent byte
|
|
What is the TCP PSH flag?
|
Pushes it all the way to the app (last segment of a write)
|
|
What is the TCP RST flag?
|
Reset; if things go wrong, dump the connection
|
|
What is the TCP window size multiplier?
|
The window size field is not big enough for us to have significant window sizes so we multiply our window size with this field
|
|
What does the pseudoheader do?
|
The pseudoheader is put on before the packet is sent to calculate the checksum
|
|
How many sequence numbers do ACK's consume?
|
0
|
|
What is the MSL of a TCP packet?
|
2 minites
|
|
What is MSL?
|
Maximum Segment Lifetime or Length
|
|
What is time wait in TCP?
|
If you send a fin before you see one you are going to end up in time wait
|
|
How do you calculate the RTT of a TCP packet?
|
RTT = alpha(RTTold) + (1-alpha)M
where M is the most recent packet |
|
If a TCP packet times out what is the new transmission timeout?
|
2 times the old one
|
|
What are two types of flow control?
|
Fixed sliding window and Credit Based Scheme
|
|
What is Nagle's algorithm?
|
When data comes in, first byte is sent.
All subsequent bytes are buffered til ack is recived. |
|
What types of protocols is Nagle's algorithm not appropriate for?
|
RDP, telnet, ssh
|
|
What is silly window syndrome?
|
When you have a window size of 1.
|
|
How do you avoid silly window syndrome?
|
Avoid receiver sending credits of small octets
|
|
What implies that there is congestion in the network?
|
Packet loss
|
|
How do we do congestion control in TCP?
|
First we do slow start to the slow start threshold then additive increase after we hit that threshold. The slow start threshold is cut in half with a packet loss.
|
|
What is ATM?
|
Asynchronous Transfer Mode
|
|
What is CBR, VBR, and ABR
|
Constant Variable and Available
Bit Rate |
|
What is APIPA?
|
Automatic Private IP Addressing
|
|
When do you APIPA?
|
You APIPA when you can't find a DHCP server
|
|
What are Internet root servers?
|
Servers that resolve TLD's
|
|
What is a TLD?
|
Top Level Domain
|
|
What is TTL?
|
Time To Live
|
|
What are the classes of networks in the resource records of the internet
|
SOA,A,MX,NS,CNAME,PTR,HNFO,TXT
|
|
What are the two types of DNS
|
Recursive and Non Recursive
|
|
What does the TTL in a DNS server tell us?
|
How long the cache is good for
|
|
What is an authoritative vs. non authoritative response from DNS?
|
Non authoritative is when a server tells us an ip address but it is not the root dns server for that domain name
|
|
What program can we use to look up DNS information from the command line?
|
nslookup
|
|
Which protocol does DNS almost always run over?
|
DNS
|
|
What are the 4 problems we are worried about when implementing security into our networks?
|
Interception. Interruption. Modification. Fabrication.
|
|
What are the two types of security attacks and give examples?
|
Passive attacks-eavesdropping, traffic analysis
Active attacks-everything else |
|
What is SSL?
|
Secure Socket Layer
|