Applications Chap 2 Flashcards
What is the role of the application layer (Layer 7) in the OSI model?
interface between users and network services,
providing applications with functionalities to exchange data across networks.
How is the application layer defined in the TCP/IP model?
presentation + session + application
List some protocols in the application layer.
- DNS,
- HTTP,
- SMTP,
- FTP,
- TELNET,
- TFTP,
- SNMP.
Describe the client-server paradigm.
distributed application architecture where clients initiate requests for services and servers provide those services.
What are the characteristics of clients in the client-server model?
- Clients initiate requests,
- provide a user interface,
- require less processing power
- can run on various devices.
What are the characteristics of servers in the client-server model?
- Servers provide services
- have powerful hardware and software,
- run continuously
- serve multiple clients concurrently.
What is statelessness in client-server interactions?
server does not store information about the client’s state between requests;
* each request is treated independently,
What are some security considerations in the client-server model?
- **Authentication and encryption **protect communication.
- Access controls manage client access to server resources.
Give examples of applications using the client-server paradigm.
World Wide Web (HTTP), Email (SMTP), File sharing (FTP), Printing (LPD), Database access (SQL), Online gaming, and Cloud computing.
Describe the peer-to-peer (P2P) architecture.
A decentralized network model where
- each participant (peer) has equal status and functionality
- acting as both client and server.
What are the 4 key principles of P2P architecture?
- Decentralization
- resource sharing
- direct communication
- scalability.
What are 3 benefits of P2P networks?
- Robustness
- fault tolerance
- scalability
What are the challenges of P2P networks?
- Security can be a challenge due to the lack of centralized control.
- Dynamic network topology requires efficient protocols for peer discovery and communication.
Give examples of applications using P2P architecture.
- File sharing (e.g., BitTorrent)
- online gaming
- cryptocurrency
How does file distribution time differ between client-server and P2P?
- Client-server time increases linearly with the number of peers (N)
- P2P leverages peer upload capacity for better scalability.
How does BitTorrent work?
- Files are divided into chunks
- peers exchange chunks
- tracker monitors peers in the torrent
- Peers request rarest chunks first and use a tit-for-tat mechanism for sending chunks.
How do processes communicate within the same host?
Using inter-process communication (IPC) mechanisms defined by the OS, such as
- shared memory
- message passing
- pipes
- sockets.
How do processes communicate in different hosts?
By exchanging messages.
What is a socket?
A bidirectional communication endpoint across networks or within a single machine.
How are processes addressed for communication?
Using a combination of the host’s IP address and the port number associated with the process.
What are the 3 benefits of process communication?
- Modularity
- flexibility
- optimized resource utilization.
What are the challenges of process communication?
- Increased complexity
- synchronization overhead
- security concerns.
What does an application-layer protocol define?
- Types of messages exchanged
- message syntax
- message semantics
- rules for when and how processes send and respond to messages.
Give examples of open and proprietary protocols.
Open protocols: HTTP, SMTP.
* available to all
Proprietary protocols: Skype, Zoom.
* controlled by certain entity