Chapter 6 [ B ] Flashcards

(82 cards)

1
Q

What are the different concerns that can be separated in the architectural model of networks?

A

The architectural model can separate concerns about - media access, - control of communication, and - management of communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why were different application services traditionally coupled to specific networks?

A

because various applications require different levels of support for data transmission functions, performance, reliability, channel sharing, data control, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is simpler to design networks to support one specific set of application requirements rather than to support multiple applications.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How has the focus shifted in service-oriented networks compared to traditional models?

A
  • the focus has shifted from users subscribing to specific network configurations for services, to core networks supporting multiple services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key decision regarding the placement of complexity for service-specific communication?

A

whether to place the complexity for service-specific communication in the - core network, - the edge network, - or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Simplest network topology is to have only 1 network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the second best Simplest network topology?

A

to partition network into 2parts:- Access network or edge network - Core network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of Service-Oriented Networks?

A
  • Content-Based Networks (CN)* Programmable Networks* Overlay Networks* Mesh Networks* Cooperative Networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What characterizes Content-Based Networks (CN)?

A

Receivers subscribe to content types of interest, and senders publish information without specific destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it challenging for service providers to deploy new network services in traditional networks?

A

Traditional networks often do not grant service providers access to routers, making it challenging to optimize for different applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The 2 main initiatives to establish programmable networks are ______ and _______.

A
  • DARAPA’s Active Networks (AN) program- the Opensig community
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is An overlay network

A

is a virtual network built on top of a physical network that provides a (virtual) infrastructure to one or more applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What distinguishes Programmable Networks from traditional closed networks?

A

Programmable Networks allow dynamic reprogramming of some network elements, providing flexibility beyond the constraints of traditional closed network nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What role do third parties play in Overlay Networks?

A

Third parties, [ end-users ], can operate Overlay Networks in an organized and coherent way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main difference between full mesh and partial mesh network topologies?

A

In a full mesh, every network node connects to every other node, while in a partial mesh, nodes are not connected to every other node, typically combining ring and star topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do Wireless Mesh Networks (WMNs) contribute to lower power usage compared to other WLANs?

A

WMNs use lower power multi-hop transmissions instead of a single powerful transmission, reducing overall power consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why might Wireless Mesh Networks be a suitable solution for rural areas?

A

In rural areas with patchy conventional network support, WMNs can enhance connectivity at a lower cost and power output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What role do mesh routers play in a Wireless Mesh Network (WMN)?

A

provide additional routing capabilities,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do nodes operate in Wireless Mesh Networks (WMNs)?

A

In WMNs, each node functions both as a host and a router (mesh-client), forwarding packets on behalf of other nodes not within direct wireless transmission range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the advantage of dynamic self-organization and self-configuration in WMNs?

A

allows the network to adapt and configure mesh connectivity on-the-fly, supporting ad hoc multi-hop networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What distinguishes network access devices that have limited network access from those with heterogeneous network access?

A

Devices with limited access connect to a single network, while those with heterogeneous access support connectivity to multiple networks, albeit in isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do overlapping networks behave in terms of interoperability?

A

Networks of the same type may overlap in a vicinity, but they operate independently and do not interoperate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the primary goal of cooperative communication in networks?

A

Cooperative communication aims to empower single-antenna mobile devices by providing benefits similar to Multiple Input Multiple Outputs (MIMO) systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What specific problem at the physical media layer does cooperative communication address?

A

addresses signal fading, which can result from issues like thermal noise, shadowing, and signal attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does cooperative communication mitigate the effects of signal fading?
by transmitting independent copies of the signal, generating diversity
26
what are the two main components that define the network viewpoint in ICT systems?
- computer nodes- network elements that interlink them
27
Traditionally, there is a distinction made between network management and system management, although these two aspects are inherently linked.
True
28
What are the two approaches for managing heterogeneous content and applications with different requirements?
- Keep management support in the core network- Increase Management support in the core network
29
_________ Obtain information for supporting management functions?
Monitoring
30
What are the 3 processes involved in monitoring?
analysis, filtering, and auditing.
31
Name two protocols commonly used for monitoring networked devices or hosts.
- ICMP (Internet Control Message Protocol) - SNMP (Simple Network Management Protocol).
32
What are the objectives of accounting in the context of network management?
- tracking service usage- setting limits on resource usage- handling automatic actions when usage exceeds limits.
33
What does configuration management aim to achieve?
- Configuration management aims to set parameters for routine operation, track resources, track changes in resource status, and manage the activation and deactivation of resources.
34
What are the side effects of reconfiguration management in systems?
- The side effects of reconfiguration management may include systems needing to interrupt their service and reboot for changes to take effect,
35
How can misconfigurations be addressed in network devices?
- aiming for zero manual configuration- supporting automatic remote service discovery- supporting automatic device installation.
36
_______ Is defined as the cause of one or more observed errors, or abnormal, events.
fault
37
Why is fault management considered crucial for maintaining critical infrastructures, and what does it involve?
- Fault management ensures reliability and continuous operation. -It involves detecting events leading to system failure, organizing fault cascades, reporting faults, and implementing automatic correction.
38
What is involved in fault management?
fault prevention,fault prediction,fault event monitoring,fault detection,fault diagnosis,fault handling,fault-tolerance.
39
What are the ways of managing performance?
- best effort, - Quality of Service (QoS), and - Service Level Agreements (SLA)
40
_______ is responsible for collecting network statistics, evaluating performance in various conditions and monitoring events?
performance management
41
What is security management?
- Security management addresses concerns such as assessing risks, vulnerabilities, and developing safeguards against threats.
42
What are the 2 basic security safeguards?
> detection, > prevention> correction
43
Security management involves specifying 2 main relationships ... ?
- of threats against assets- of safeguards against assets.
44
What is Risk assessment used to model?
- the value of assets- their loss of value - the probability of threats happening - the probability of threats succeeding.
45
What are the characteristics of asymmetric encryption, and how does it address the challenge of sharing secret keys in secure communication?
- Asymmetric encryption uses different keys for encryption and decryption (public key for encryption, private key for decryption). - It addresses the challenge of sharing secret keys by enabling public keys to be made public, eliminating the need for both parties to share the same secret key.
46
_______ is Also called public key encryption algorithms
Asymmetric Encryption
47
Authorization often involves authentication.
true
48
What are some threats posed by compromised phones in a wireless network?
- free-loader users- users can overload a network- Users can eavesdrop.
49
____ is Risk of an un-secured terminal?
Tampering
50
What are solutions to tampering?
* Tamper-proof devices* Tamper-resistant devices* Tamper-evident devices
51
How can UbiCom system functions be effectively managed?
- can be modelled as services and managed at both human organizational and ICT levels, using policies and service-level agreement [ SLAs ].
52
What are some key metrics used for evaluating Service-Oriented Architectures (SOAs) in pervasive environments?
Service :- density, - availability, - potential, - impact, and - redundancy.
53
What are the two metrics for service composition?
- service composition length and - service composition sustainability.
54
What does the GRID Resource Management System (RMS) support in distributed resource management?
- GRID RMS supports adaptability, extensibility, and scalability.Enable systems with different administrative policies to :- interoperate, - co-allocate resources, - support load balancing, and - meet computational cost constraints
55
Managing resources in UbiCom systems must consider both ______ and _______ simultaneously,
system-level requirements &application-level requirements
56
What is the role of SLA (Service Level Agreement) in Service-Oriented Architectures (SOAs)?
- In SOA models, SLAs define quantifiable operational targets or outcomes for services.
57
______ in UbiCom systems provide a framework for ensuring quality of service, reliability, and adherence to operational targets?
SALs
58
What are the 2 perfomance models of SLA?
- load performance - system performance
59
What is the primary concept behind Policy-based Service Management?
- Instead of dealing with low-level configurations, users specify high-level policies for the system
60
How are policies represented in Policy-based Service Management?
- from light-weight Knowledge Representations (KRs) to heavy-weight KRs.
61
How can we address Policy conflicts?
Through mechanisms like : - prioritization, - specificity rules, - policy analysis, - negotiation, and - voting.
62
______ is Raw input into data processes and its output will be _______ ?
Data, Information.
63
How is hard information different from soft information in the context of Information Management?
- Hard information refers to lean, operational data, - Soft information is richer and more suitable for intelligent system knowledge representations.
64
What is metadata?
Metadata is information that self-describes data
65
What is the dominant service management model used in smart devices?
- The Remote Service Access Points (RSAP) model
66
What are the classifications of metadata?
- Application-specific Vs. generic- Intensional Vs. extensional data Vs. internal data schema
67
What is a common challenge faced by users in managing complex systems?
The complexity of learning to use, operate, and manage such systems can be overwhelming for users.
68
How can service management models minimize user management complexity?
- by putting intelligence into a generic service infrastructure- by using biologically inspired management- by using service pools- by using appliance models.
69
What are the privacy concerns addressed by Identity Management?
- hiding the identity of users unless consent is given or when legal requirements necessitate revealing identity.
70
What is the purpose of Biometric User Identification And what is it based upon?
Biometric User Identification identifies individuals by unique biological characteristics: - behavioral traits - physiological traits.
71
Give examples of applications using Signature-based Identification.
routinely used in banking, but its accuracy can vary.
72
How is Finger-print Identification commonly used?
- crime detection - security access to devices and resources - Together with DNA profiling for identification.
73
Finger-print identification is less routinely
True
74
________ are commonly used at airports for access control, enhancing security measures.
Retinal scans
75
What is the typical process involved in biometric identification, specifically feature extraction?
Typically, biometric identification involves processing a biometric print to extract a multi-dimensional set of features, such as multiple feature dimensions in face recognition.
76
What privacy concern is frequently associated with UbiCom systems?
Violation of individual privacy is a common concern in UbiCom systems,
77
What are some privacy requirements in the context of Identity Management?
- Anonymity Vs. Authentication- Un-linkability- Un-observability, and - managing Notifications, rights, and consent.
78
What is the purpose of P3P in the context of Privacy Preferences?
P3P (Platform for Privacy Preferences Project) is recommended as an industry standard to provide a simple, automated way for users to gain more control over the use of personal information on websites.
79
How do legislative approaches to privacy differ internationally, particularly between the EU and the U.S.?
The EU Data Privacy Directive incorporates a unique opt-in provision, requiring consent for personal information access. In the U.S., data collectors presume consent and require an affirmative opt-out by the user.
80
What are some challenges in managing context-awareness and what are possible solutions?
Challenges:- dealing with uncertainty- ambiguities, - contradictions, - logical inconsistencies, and - conflicts. Solutions : - data mining techniques, - prediction models, and - learning.
81
In the design of micro devices, _______ is crucial
very efficient power management
82
How are micro and nano devices managed when they may be untethered or part of a larger system?
Micro and nano devices may be untethered, airborne, or fluid-born. Their movement may be tracked instead of controlled, and they might be part of a larger system or environment. Managing them involves challenges like containment and tracking.