chptr13 Flashcards

(72 cards)

1
Q

NIC Network Interface Controller

A

serves as the hardware interface between computer and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

End to end channel

A

nic to cloud/sps to nic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Open Systems Interconnection Reference Model OSI

A

theoretical model as a standard by ISO - used for research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/IP

A

integrated suite consisting of numerous protocols that control aspects of data communication - 5 layers: Application - Transport - Network - Data Link - Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protocol Stack

A

each layer of the stack at the sending node contributes information that will be used by the corresponding peer layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Program Applications

A

Safari - Outlook - Skype etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Applications

A

designed to present the message to the network in a format that can be understood by each of the hardware and software components of the channel - standard protocols part of TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Application Layer

A

contains the program and network applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ethernet

A

comprises layers 1 and 2 of the tcp/ip protocol suite - Physical and data link layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

frame

A

bits of an Ethernet packet sent through a single link from one node to another in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

non-Ethernet packets

A

also called frames at the data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

not a node

A

hub switch or Wi-Fi access point are transparent to data being moved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical Layer

A

Level 1 - layer at which the communication actually takes place. Includes medium - signaling method - specific signal parameters - voltages - carrier frequencies - lengths of pulses etc. Sync and timing issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Link layer

A

Level 2 - responsible for transmission and delivery of packets across the communication link between nodes. Two sublayers Medium Access Control MAC and
Logical Link Control LLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

collision

A

two messages collide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Carrier Sense Multiple Access with Collision Detection CSMA/CD protocol

A

Ethernet - connections are point to point and collisions are not possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MAC Address

A

Address for each node on the Ethernet network - permanently assigned by the IEEE org to manufacturers of Ethernet attached equipment. NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Propagation delay

A

the amount of time it takes for a packet to get from one end of the network to the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WI Fi ad hoc mode

A

assumes direct connections between Wi-Fi nodes and is based on a partial mesh network topology. Depends on a network of available coop stations rarely is used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Wi Fi infrastructure mode

A

variation of CSMA/CD is used for infrastructure Wi-Fi. Collision handling is required. Delays due to collisions are much longer than those on a wired hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Carrier Sense Multiple Access with Collision Avoidance CSMA/CA protocol

A

a station listens until channel clear to transmit. Then transmits frame to access point. When frame reaches its destination the receiver checks for errors then sends a short acknowledgment packet to indicate receipt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Logical Link Control (within Datalink)

A

resize frame if necessary optional error checking - frame numbering or reordering/recombining frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Media Access Control (within Datalink)

A

add frame header. Encode bytes of frames to bits in format and signal type appropriate for medium and signal method of physical layer. On receiving message it decodes bit stream to bytes of frame and removes frame header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Network Layer

A

Layer 3 - responsible for addressing and routing of packets from the source end node through intermediate nodes - step by step - to their proper final destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
TCP IP Network layer
aka internetworking layer or IP layer
26
IP datagrams
IP level packets within a LAN
27
Layer 3 switches
routing takes place at the network layer - routers and gateways are sometimes called this
28
fragments
ip datagram fragments are reassembled by IP when the final destination is reached using header info that is stored with each fragment. IPv6 rejects fragments instead
29
ICMP Internet Control Message Protocol
auxiliary protocol that creates error messages that occur when there is a failure in procedures
30
Transport Layer
Layer 4 - purpose is to take messages from the network applications and provide services that support reliable end to end communications. Responsible for generating the final address of the destination. Responsible for packetization of the message. implemented with 3 different protocols: TCP; USER Datagram Protocol UDP; and Stream Control Transmission Prot SCTP
31
Port addresses or numbers
16 bits - first 1024 numbers are "well known ports". Ie port 80
32
socket
operating systems provide an interface called a socket for comms between apps and trans layer
33
TCP - Transmission Control Protocol
connection-oriented service. Before any data packets are sent to receiving node TCP at the sending node establishes a connections with TCP at the receiving node. Sends message. Closes the connection. Reliable delivery service
34
Logical Connection
operates independently of the actual physical characteristics of the network (TCP connector) - separate from the message route
35
Segments
TCP packets are called this by some network practitioners - since data content is part of an ordered sequence of bytes
36
handshaking
the brief initial connections made by TCP with a random 32 bit number to number the packets
37
UDP User Datagram Protocol
used for some applications instead of TCP. Connectionless service. No comms between sender and receiver prior to sending message. Datagram is sent independently. Faster and simpler but no guarantee on delivery. Streaming video is an example
38
User datagrams
UDP packets are known as this. Contains the message exactly as delivered from the application. App has to divide message into smaller pieces.
39
SCTP - Stream Control Transmission Protocol
offers features similar to TCP with improvements to fault tolerance and enables multiple messages in byte streams to be transported simultaneously through same connections. Will allow redirect to other ip address if failure in first address.
40
DNS - Domain Named System/Server
Translates domain names into ip addresses
41
IP addresses
standards for location resources on the internet.
42
ICANN
registers domain names and ip addresses
43
Static IP Addresses
permanently assigned to computers etc
44
Dynamic Addresses
assigned on an as needed basis using DHCP
45
DHCP - Dynamic Host Configuration Protocol
Within the application layer - assigns and reclaims IP addresses from a pool of addresses. DHCP client resides on the computer or device being connected which connects to the DHCP server
46
DDNS Dynamic Domain Name Service
Can provide a link by updating the local DNS server so that a computer with a dynamic address can be open to public.
47
IPv6
Created since IPv4 addresses are gone. 128 bits long; 256 trillion trillion trillion different ip addresses. Sequence of 8 4 digit hexadecimal numbers
48
Colon-hexadecimal notation
IPv6 address written in this: 2fc3:4ab2:4470:0001:FFDC:BB54:c126:7001
49
DNS Root Server
Top of the root directory - 13 servers all over. Handle 50 billion queries a day
50
Top-Level Domains
.com; .edu; .org; .net; .de; .cn; .uk
51
country-code top-level domain servers (ccTLDs)
Country identifiers .de; .cn etc
52
generic top-level domain name servers (gTLDs)
.com; .edu; .org etc.
53
Second-level or third-level domain names
Registered through ICANN - ie amazon.com etc.
54
replication
process used to synchronize the multiple dns servers
55
resolution
translation process when converting a web address to IP address
56
local DNS server
not part of the dns hierarchy - could be on host machine - on the LAN or isps site
57
jitter
defined as the variation in delay from packet to packet
58
QoS Quality of Service
focuses on 2 params: methods to reserve and prioritize channel capacity to favor packets that require special treatment. Service guarantees from contracted carrier services that specify particular throughput - delay and jitter
59
Differentiated Service DS field
8 bit field - index into a table that defines various classes of service. Routers can prioritize and route packets based on packet class
60
Network Security
1-5 categories: Intrusion; Confidentiality; Authentication; Data integrity and nonrepudiation; assuring network availability and access control
61
NS Intrusion
Keeping systems and network intact and free from intrusion
62
NS Confidentiality
Keeping content of traveling data private
63
NS Authentication
Verifying identity of source of data being received. Similar to electronic signatures.
64
NS Data integrity and nonrepudiation
Protecting data against changes and verifying the source of a message.
65
NS Assuring network availability and access control
Restricting access to authorized users; keeping network up and running to those users
66
Packet Sniffing
reading of data in a packet as it passes
67
Physical Access Restriction
limiting access to network wiring and equipment to personnel.
68
Logical Access Restriction
Limited with intelligent firewall design that blocks public access where it is not required.
69
Encryption
provides security beyond other measures.
70
Symmetric key cryptography
requires that the same key be used for both encryption and decryption
71
Public key-private key cryptography
two different keys - one public other private are used together in various ways to achieve the different goals.
72
Network Address Translation NAT
Use of private ip addresses behind a router; router must readdress traffic passing between the internet and local network; difficult with large networks; software that is intelligent