1.3 Network Data Mangement Flashcards

1
Q

What is NAS?

A

Network Application Software

Single or groupings of applications that control system functionality in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three common NAS applications?

A

Remote Terminal Applications
File Transfer Protocols
Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Remote Terminal Application?
What are three common types of RTA’s?

A

Allow users to access and manage remote devices on a client-server model.

Includes:

Secure Shell (SSH)
Telnet
SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Telnet. What is a disadvantage to Telnet?

A

Allows clients to remotely send commands to servers and network devices.

Commands are sent over plaintext with no encryption, which is a security risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Secure Shell (SSH)

A

Allows clients to remotely send commands to servers and network devices but uses password and public key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SSL?

A

SSL is Secure Sockets Layer:

Establishes a secure connection on an insecure network.

Your computer accesses a web server.
The web server gets an SSL certificate from the website to authenticate its identity.
The web server sends the SSL cert. to your computer.
Your computer tells the web server it trusts the website.
The web server acks and opens the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is TLS?

A

Transport Layer Security:

Establishes secure connection on insecure network.

Supersedes SSL.

Similar to SSL but also encrypts the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is FTP?

A

File Transfer Protocol.

The protocol to transfer files over a TCP/IP network.

Uses client-server model.

Uses plaintext so it is not secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Ping?

A

Tests the reachability of a host on an IP based network.

Sends ICMP echo request packets to the target and measures the round-trip time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Bandwidth Management?

A

Prevents unexpected drains on a limited bandwidth.

IPv6 has more native bandwidth control
IPv4 requires extra software and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the factors of Bandwidth Management?

A

Same as QoS.

Bandwidth
Throughput (packet loss)
Latency
Jitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some hardware solutions to bandwidth management?

A

Statistical multiplexing.
Throttling
Server segmentation
T Carrier
E Carier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Statistical Multiplexing? (STDM)

A

Hardware solution to bandwidth management.

STDM = Statistical Time Division Multiplexing

Assigns time slots for transmitting. Reassigns empty slots to fill empty slots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Bandwidth Throttling?

A

Intentionally slowing or speeding internet service to minimize network congestion and prevent server crashes. Prevents a user from spamming the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is segmentation?

A

Breaking up a LAN into smaller broadcast domains.

AKA subnetting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a T Carrier?

A

A piece of hardware which carries digitized voice over time division multiplexed channels over a 4 wire circuit. Replaced by E-Carrier

17
Q

What is an E-Carrier

A

Hardware device which allows digital transmission of many simultaneous phone calls via TDM. Replaced by Ethernet.

18
Q

Describe TCP Congestion Control.

A

Senders increase packet rates until a packet is lost.

Tahoe and Reno algorithms are used to:

Increasing: test the network to determine whether the network can sustain a higher sending rate

Decreasing: react to congestion to minimize loss rate.

19
Q

Describe the ‘sliding window’ method for TCP congestion control.

A

The sender uses acknowledgements from the reciever to clock its data sending, to ensure there is a fixed amount of packets in flight at any given time.

20
Q

Describe Data Compression.

A

Encoding information to use fewer bits.

21
Q

What is Lossless data compresssion?

A

Identifying and eliminating statistical redundancy to reduce bits.

22
Q

What is Lossy data compression?

A

Removing unnecessary or less important information to reduce bits.

23
Q

What is Packet Shaping?

A

Delays flow of certain types of packets IOT prioritize certain applications.

24
Q

Describe a Token Bucket.

A

Tokens represent a group of bits or bytes.

A user request to send data reaches the bucket and if there are tokens in the bucket, the data goes through, using a token.. If not, the packet is dropped. The tokens are filled up at a refill rate.

25
Q

Describe Leaky Bucket

A

Packs are send through the bucket at a constant rate to smooth traffic.

26
Q

Describe Caching

A

Data is stored (usually on RAM) to allow faster call up for frequent requests. Helps latency and throughput.

27
Q

Describe Scheduling.

A

More bandwidth is given to certain types of traffic.

Eg. VOIP requires more bandwidth because it is more sensitive to congestion.

28
Q

Describe First Come, First Serve

A

Packets sent first are allowed through the network first. Fair algorithm that ensures starvation will not occur.

29
Q

Describe priority scheduling.

A

A network scheduler will prioritize packets based on priority flags or ports (not on data type)

30
Q

Describe Round Robin scheduling.

A

Everyone gets a turn to transmit in sequence. Fair, no starvation.

Can add dynamic weights to connections to implement priority.