Chapter 1 Flashcards

(31 cards)

1
Q

Distributed Applications

A

apps which involve multiple end systems exchanging data with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Host vs. End-System

A

interchangeable terms for the agents that operate within the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Technology Examples

A
  1. DSL
  2. Cable
  3. Fibre
  4. 3G
  5. LTE
  6. Ethernet
  7. Wifi
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guided Media vs. Unguided Media

A

solid medium vs. WLAN or satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What speeds of Ethernet LAN are there?

A

10 Mbps, 100 Mpbs, 1 Gbps, 10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Max speeds of access technologies

A

up to 56 Kbps, bandwidth is dedicated; ADSL: up to 24 Mbps downstream and 2.5 Mbps upstream, bandwidth is dedicated; HFC, rates up to 42.8 Mbps and upstream rates of up to 30.7 Mbps, bandwidth is shared. FTTH: 2-10Mbps upload; 10-20 Mbps download; bandwidth is not shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is store-and-forward?

A

every packet must be received in a node before being transmitted to a subsequent node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Output buffer/queue

A

stores all outgoing packets before sending them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Queuing Delay

A

a delay caused by waiting for a busy link and being stored in a output buffer. can lead to lost packets if it runs out of space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Forwarding Table

A

maps destination addresses to the router’s outbound link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Packet Switch vs. Circuit Switch

A

packet switch involves a shared medium, where a request/response is important. circuit switch is a direct line between two communicators - more resource heavy, but direct and dependable, with a guaranteed bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Circuit

A

When two end users on a network maintain a persistent connection throughout their communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FDM

A

Frequency-division multiplexing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TDM

A

Time-division multiplexing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the delay components of a packet sending action?

A
  • processing delay
  • transmission delay
  • propagation delay
  • queueing delay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define processing delay

A

time required to examine a packet’s header and determine where it goes

17
Q

Define transmission delay

A

it is L/R where L is the length in bits and R is the transmission rate.

18
Q

define propagation delay

A

Physical movement delay, dependent on the medium. usually between 2e8 m/s or 3e8m/s speed of lightish. it is d/s where d is the distance and s is the speed.

19
Q

define queueing delay

A

the delay a packet experiences while it waits to be transmitted onto the link.

20
Q

name the layers

A
application layer
transport layer
network layer
link layer
physical layer
21
Q

application layer

A

where the network applications reside. includes HTTP, SMTP, and FTP. uses DNS. packets are called a MESSAGE

22
Q

transport layer

A

Transports application-layer messages between app endpoints. Uses TCP and UDP. Packets are called a SEGMENT

23
Q

network layer

A

Uses the IP protocol to move packets from one host to another. Contains the routing protocols. Packets are called DATAGRAMS.

24
Q

link layer

A

Interfaces between the network and physical layer - prepares the DATAGRAM for delivery from the current link to the next link. Ethernet, WiFi are examples of link layer. packets are called FRAMES.

25
physical layer
The actual cable or air that the BITS are traveling through.
26
Malware
malicious software used to compromise your computer
27
Viruses
malware that require some level of user interaction.
28
Worms
malware that can enter your computer without any explicit interaction.
29
Name three DDOS attack examples
- Vulnerability attack - Bandwidth Flooding - Connecting flooding
30
HFC
Hybrid-fibre-coaxial - many cable connections to the home are a combo of fibre and coax
31
What are valid ethernet physical forms?
Twisted-pair copper wire | fibre optic