exam 3 Flashcards
(47 cards)
what is slow start
- a technique to discover the network capacity
- start with cong win = 1
- double each RTT (grow exponentially)
- keeps growing until it hits a threshold or packet loss
- then AIMD starts
what is DECbit
- early congestion control
- routers set DECbit in packet header if its experiencing congestion
- sender looks at DECbit on ACKS and adjusts the window size acordingly
Random Early Detection (RED)
- used to detect and signal congestion before it happens
- drops packets based on threshold sizes of queue
q < min: no packets dropped
q >max: all incoming packets drops
min < q < max: packets randomly drop with prob linear to q
Source-Based Congestion
Avoidance
source watches for signs that routers queue is building up
can watch for:
- RTT changes
- throughut
what is “fair” in fair queueing
- each flow gets reasonable access to resources
- no starvation
- equal access under equal condition
- proportional resource alocation
what is the min-max alg
- to maximize the minimum alocation we can provide to each flow
1) divide recourse evenly to all flows
2) if a flow has excess they return the excess
3) excess is split between the rest of the flows
how does weighted min-max differ
- each flow has a weight
- instead of equal split, it is porportional to the weights.
let c = capacity
1) add up all weights = n
2) for flow i with weight w: allocate (w/n) * c
FIFO
- first in first out
- uses tail drop to drop packet if queue is full
priority queue
- multiple queues for different priorities
- serve highest priority first
- can cause starvation
fair queueing
- separate queue for each flow
- each queue gets a turn by round robin
fair queueing with variable packet length
- way to choose which packet to consume
let Si = 0 for flow i
when a packet is consumed from flow i, Si += P (P = packet length)
choose packet such that (Si + P) is min
break ties with lowest flow ID
weighted version: Si += P/wi
confidentiality
control access to info
integrity
keeping info valid, data wasnt changed or altered
availability
keep info available
authenticity
data came from trusted/correct source
accountability
actions by a user can be traced back to them
non-repudiation
once something is done, you cant deny it was done
passive attacks
- does not disrupt operations
- used to listen and gain info
- hard to detect, easy to prevent
active attack
- very broad, can disrupt operations
- hard to prevent, easy to detect
message release attack
- passive
- read contents of messages directly
- prevent using encryption
traffic analysis
- learn info like credentials, location… without directly seeing the messages
masqurade attacks
- active
- pretending to be someone else to gain unauthorized access to systems.
replay attack
- active
- capture message, then replay it unchanged to the receiver
- used to gain information
modification of message attack
- active
- intercepts and alters message between 2 parties