Internet Protocol Stack Flashcards

1
Q

What is the internet

A

A global network connecting millions of computers, allowing them to communicate and share resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the world wide web

A

A system of interlinked hypertext documents which can be accessed via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Address Resolution Protocol

A

Operating at the link layer, ARP resolves IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Transmission Control Protocol

A

Operating at the transport Layer, TCP provides reliable, ordered, and error free delivery of data between applications running on internet-connected hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of layering in network protocols?

A

Layering helps in dealing with complex systems by providing an explicit structure that allows for the identification and relationship of various components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the layers in the Internet protocol stack?

A

Application layer
Transport layer
Network layer
Link layer
Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some examples of protocols at the application layer?

A

FTP (File Transfer Protocol)
SMTP (Simple Mail Transfer Protocol)
HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two main architectures for network applications?

A

Client-server architecture
Peer-to-peer (P2P) architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the client-server architecture.

A

In the client-server architecture, there is an always-on server with a permanent IP address, communicating with clients which may be periodically connected. Clients do not communicate directly with each other but interact with the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of the P2P architecture?

A

In the P2P architecture, there is no always-on server. Instead, arbitrary end systems communicate directly with each other. Peers request services from other peers and provide services in return, leading to self-scalability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some examples of application-layer protocols and their underlying transport protocols?

A

SMTP (TCP)
Telnet (TCP)
HTTP (TCP)
FTP (TCP)
RTP (TCP or UDP)
SIP, proprietary protocols like Skype (TCP or UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the services provided by TCP and UDP?

A

TCP (Transmission Control Protocol) provides reliable transport, flow control, and congestion control. It’s connection-oriented.
UDP (User Datagram Protocol) provides unreliable data transfer without the mentioned features of TCP. It’s connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is DNS and its purpose?

A

DNS stands for Domain Name System, a distributed database implemented in a hierarchy of name servers. Its purpose is to resolve human-readable domain names to IP addresses and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is DNS distributed rather than centralized?

A

Distributing DNS prevents a single point of failure, reduces traffic volume, and eliminates the need for a distant centralized database, making it more scalable and easier to maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are TLD servers and authoritative DNS servers?

A

TLD (Top-Level Domain) servers are responsible for managing top-level domains like .com, .org, etc. Authoritative DNS servers are maintained by organizations or service providers and provide authoritative hostname to IP mappings for the organization’s named hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of a local DNS server?

A

A local DNS server, also known as a default name server, serves clients within an ISP, company, or university. It maintains a cache of recent name-to-address translation pairs and forwards queries into the DNS hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describe the process of DNS name resolution.

A

DNS name resolution involves a client querying a series of DNS servers starting from the root server to resolve a domain name to an IP address, typically through iterative or recursive queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some common HTTP methods used in HTTP request messages?

A

Common HTTP methods include GET (retrieve a resource), POST (submit data to be processed), and HEAD (retrieve headers only).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are HTTP response status codes and their significance?

A

HTTP response status codes indicate the outcome of a request. For example, “200 OK” signifies success, “301 Moved Permanently” indicates a resource has moved, and “404 Not Found” signifies the requested resource was not found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of cookies in web browsing?

A

Cookies are used to maintain user-state information, such as session data, preferences, and authentication tokens, across multiple HTTP requests and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do web caches (proxy servers) work?

A

eb caches store copies of web content to serve to clients, reducing latency and bandwidth usage by satisfying requests without involving the origin server. If the cache doesn’t have the requested content, it fetches it from the origin server and caches it for future requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some potential uses of cookies, and what concerns are associated with them?

A

Cookies can be used for authorization, shopping carts, recommendations, and maintaining user session state. However, they raise privacy concerns as they allow sites to track user behavior and may potentially be misused.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three major components of email systems?

A

The three major components of email systems are user agents, mail servers, and the Simple Mail Transfer Protocol (SMTP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a User Agent in the context of email?

A

A User Agent (UA) is also known as a “mail reader” and is responsible for composing, editing, and reading email messages. Examples include Outlook, Thunderbird, and iPhone mail clients.

25
Q

Describe the role of SMTP in email communication

A

SMTP (Simple Mail Transfer Protocol) is used to reliably transfer email messages from a client to a server. It operates over TCP, typically on port 25, and facilitates the transfer of messages between sending and receiving mail server

26
Q

How do mail servers handle incoming and outgoing email messages?

A

Mail servers maintain a mailbox for incoming messages and a queue for outgoing messages. They use SMTP to transfer messages between servers, and the messages are stored until accessed by the user agent.

27
Q

Explain the process of SMTP communication between a client and a server.

A

SMTP communication involves three phases: handshaking, transfer of messages, and closure. It uses ASCII text commands and responses exchanged between the client and server over a TCP connection.

28
Q

What are POP3 and IMAP, and how do they differ?

A

POP3 (Post Office Protocol) and IMAP (Internet Mail Access Protocol) are mail access protocols used by clients to retrieve emails from a server. POP3 typically downloads messages to the client, while IMAP allows messages to be manipulated on the server.

29
Q

What is the purpose of FTP (File Transfer Protocol)?

A

FTP is used for transferring files between a client and a server over a network. It allows users to upload and download files to and from a remote host.

30
Q

How does FTP establish data connections for file transfer?

A

FTP uses separate control and data connections. The control connection is established on port 21, and the server opens a data connection on port 20 for transferring files directly to the client.

31
Q

What are some common FTP commands and their meanings?

A

Common FTP commands include USER (specify username), PASS (specify password), LIST (retrieve a list of files), RETR (retrieve a file), and STOR (store a file onto the server).

32
Q

What is the role of the transport layer in networking?

A

The transport layer links the application layer with the network layer, extending the network layer’s delivery service between two hosts to an application-layer delivery service between two processes via UDP/TCP.

33
Q

What are the two fundamental issues in networking?

A

how to communicate reliably over a medium that may lose or corrupt data,

how to control transmission rates of transport-layer entities to avoid or recover from congestion.

34
Q

What are transport services and protocols responsible for?

A

Transport services and protocols provide logical communication between application processes running on different hosts.

They are implemented in end systems, breaking app-layer messages into segments at the sender and reassembling them at the receiver.

35
Q

Name two Internet transport-layer protocols and describe their characteristics.

A

UDP (User Datagram Protocol), which provides unreliable and unordered delivery

TCP (Transmission Control Protocol), which offers reliable and ordered delivery, as well as congestion control.

36
Q

What is multiplexing and demultiplexing in the context of transport-layer protocols?

A

Multiplexing involves handling data from multiple sockets at the sender and adding transport headers for demultiplexing at the receiver, ensuring that received segments are delivered to the correct socket.

37
Q

What is the purpose of UDP (User Datagram Protocol)?

A

UDP is a connectionless transport protocol that offers unreliable and unordered delivery. It is commonly used for streaming multimedia apps, DNS, and other applications where loss tolerance is acceptable.

38
Q

Describe the UDP segment structure.

A

The UDP segment structure includes source and destination port numbers, a length field indicating the length of the segment, a checksum for error detection, and application data payload.

39
Q

What are the characteristics of TCP (Transmission Control Protocol)?

A

TCP is a connection-oriented, reliable, and ordered transport protocol. It supports pipelining, full bi-directional data flow, flow control, and congestion control to ensure efficient data transmission.

40
Q

How does TCP manage retransmission in case of lost segments?

A

TCP uses timeouts and acknowledgments to manage retransmission. If a timeout occurs or an acknowledgment for a segment is not received, the sender retransmits the segment and restarts the timer.

41
Q

Explain the TCP 3-way handshake for connection establishment.

A

The TCP 3-way handshake involves SYN, SYN-ACK, and ACK segments exchanged between the client and server to establish a connection. It ensures that both parties agree to establish a connection and exchange initial sequence numbers.

42
Q

What are two key functions of the network layer?

A

The two key functions of the network layer are routing, which determines the route taken by packets from source to destination, and forwarding, which involves moving packets from the input link to the appropriate output link.

43
Q

What are datagram networks, and how do they forward packets?

A

Datagram networks forward packets using the destination host address. Each packet is forwarded based on its destination address, allowing for independent routing of packets without establishing a connection.

44
Q

What are the main components of the Internet network layer, and what are their functions?

A

The main components of the Internet network layer are the transport layer (TCP, UDP),

the IP protocol (Internet Protocol), which handles addressing, datagram format, and packet handling conventions,

routing protocols like RIP, OSPF, and BGP.

45
Q

Describe the IPv4 datagram format.

A

The IPv4 datagram format includes fields such as version number, header length, total datagram length, time to live, type of service, source and destination IP addresses, options, data payload, and header checksum.

46
Q

What is IP addressing, and how are IP addresses structured?

A

IP addressing involves assigning 32-bit identifiers to each interface of a host or router. IP addresses are structured into network and host parts, with subnetting used to group devices with the same subnet part of the IP address.

47
Q

What are forwarding tables, and how are they used in routing?

A

Forwarding tables are used by routers and hosts to determine how to process outgoing packets. These tables contain destination addresses and corresponding output interfaces, helping routers decide where to forward incoming packets.

48
Q

How does forwarding table lookup work in routing?

A

Forwarding table lookup involves using the destination address of an IP datagram as a key to search the routing table. The result of the lookup provides the IP address of the next hop or the name of a network interface.

49
Q

Explain the process of getting a datagram from source to destination.

A

The process involves forwarding the datagram based on the destination address. At each router, the forwarding table is consulted to determine the next hop. The datagram travels unchanged from source to destination, reaching its destination through multiple routers if necessary.

50
Q

What are some motivations for IPv6, and how does it differ from IPv4?

A

IPv6 was motivated by the need for a larger address space and improved header format for faster processing. IPv6 has a 128-bit address space, a simplified header format, and removes the checksum field to reduce processing time.

51
Q

What is the purpose of DHCP in connecting a device to a network?

A

DHCP (Dynamic Host Configuration Protocol) is used to obtain the device’s IP address, the address of the first-hop router, and the address of the DNS server.

52
Q

How does DHCP work in obtaining network configuration information?

A

The DHCP request, encapsulated in UDP, IP, and Ethernet frames, is broadcasted on the LAN. The DHCP server formulates a DHCP ACK containing the client’s IP address, the first-hop router’s IP address, and the DNS server’s information.

53
Q

What is ARP, and why is it used before sending a DNS query?

A

ARP (Address Resolution Protocol) is used to obtain the MAC (physical) address of the router interface before sending a DNS query, as the Ethernet frame requires the MAC address for transmission

54
Q

What role does DNS play in the web request process?

A

DNS (Domain Name System) resolves domain names to IP addresses. It translates human-readable domain names like “www.google.com” into IP addresses like “64.233.169.105” to facilitate communication over the Internet.

55
Q

How is TCP involved in establishing a connection between the client and the web server?

A

TCP (Transmission Control Protocol) is used to establish a connection between the client and the web server.

This involves a three-way handshake where the client sends a SYN segment, the server responds with a SYN-ACK, and the client acknowledges the SYN-ACK, establishing the connection.

56
Q

What is the purpose of the HTTP protocol in the web request process?

A

HTTP (Hypertext Transfer Protocol) is responsible for fetching web pages and other resources from web servers. It facilitates the request and response process between the client’s browser and the web server.

57
Q

How does packet switching differ from circuit switching?

A

In packet switching, data streams are divided into packets, and users share network resources.

Each packet uses the full link bandwidth, and resources are used as needed, allowing for more efficient use of network resources compared to circuit switching.

58
Q

What are some examples of network applications, and how do they function?

A

Network applications include email, web browsing, file sharing, video streaming, and social networking.

These applications facilitate communication and data exchange between users over the Internet, often using protocols like SMTP, HTTP, and BitTorrent.