OSU CS372 - Week 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Application layer responsibilities

- Determine destination IP address - Support network applications - Decide which data transits internet

In the Internet protocol stack, the__________________ is responsible for assembling user data to be sent.

Application Layer

In the internet protocol stack, the ______ layer is responsible for assembling user data to be sent

Application Layer

Please place the following in the order of the OSI layering model.

Application Layer Presentation Layer Session Layer Transport Layer Network Layer Link Layer Physical layer

Please place the following in the order of the Internet protocol stack.

Application Layer Transport Layer Network Layer Data Link Layer Physical Layer

At the transport layer, what is the payload?

Application data

In the internet protocol stack, the _____ Layer is responsible for finding the destination IP address

Application layer

- Types of messages exchanged - Message syntax - Message semantics - Rules for when and how processes send/respond

Application layer protocol defines:

attack sends a deluge of packets to target host, access link becomes clogged, preventing legitatmate packets from reaching server

Bandwidth flooding

Uses a small part of the wave spectrum and sends only one signal at a time

Baseband

if your computer becomes infected, you may be enrolled in a _______ and used in _______ against other hosts without your knowledge

Botnet(s), DDoS attack(s)

In a _____ architecture, one host is always on, and other hosts may connect and be continually serviced by the first host

Client-Server

What transport-layer services are provided by the base TCP protocol? (Check all that apply)

Congestion Control Connection oriented service Reliable data transmission Flow Control

A socket pair consisting of 4 tuples. client IP, client Port, Server IP, Server Port

Connection

Attacker establishes a large number of half open or fully open TCP connections at target host. Boggs down host, prevents from accepting real connections

Connection flooding

Renders a network, host, or other piece of infrastructure unusable

Denial of service (DoS)

Reflection, Obstruction from objects, interference

Effects of propagation unguided media

When a packet is passed down to the next lower layer, it is ______ into the lower layer packet

Encapsulated

Please select all examples of systems using guided media.

Ethernet Home networks Cable Television ADSL Fiber Optics

Twisted pair copper wire, coaxial cable, fiber optic cable

Guided Media

Signal attenuation is less of an issue in _____ media than it is in _____ media

Guided, Unguided

in a ___________ architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by their first host

Hybrid client-server/P2P

Send packet with false source address

IP spoofing

Protocol _______ allows multiple protocols to work together

Interoperability

Merging multiple communication streams into the same media is called ______

Multiplexing

What transport-layer services are provided by the base UDP protocol? (Check all that apply)

None of the answers given

A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called ______

Packet Sniffer

In a ________ architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion

Peer-to-Peer

Provides required link between sender and receiver, propagates bits between sender/receiver

Physical Media

A program running within a host

Process

The minimum necessary information for identifying a process on a remote host would be (check all that apply):

Remost Host IP Remote Port Number

The minimum necessary information for identifying a process on a remote host would be:

Remote Port Number, Remote Host IP

Which of the following are application-layer protocols?

Secure SHELL SSH File Transfer Protocol FTP Domain Name Service DNS Telnet Post Office Protocol v3 pop3

Waits to be contacted

Server process

supporting network applications (FTP, HTTP, SMTP)

Service - Application layer

Data transfer between neighboring network elements (PPP, Ethernet)

Service - Link layer

Routing of datagrams from source to destination (IP, Routing protocols)

Service - Network layer

Carries actual signals between devices (cable, wireless)

Service - Physical layer

process to process data transfer (TCP, UDP)

Service - Transport layer

- Data integrity - reliability of data transfer - Timing - Bandwidth - certain amount of bandwidth - Security

Services of application layer

A paired IP address and port number is called a _____

Socket

Software interface in a network that sends and receives messages. between application layer and transport layer within a host

Socket (job)

If I were to send information into the internet with your IP address listed as the sender IP, I would be _______________

Spoofing IP address

If i were to send information into the internet with your IP address listed as the sender IP, I would be _____

Spoofing IP address

In the internet, an application-level protocol implemeting email service would most likely utilize TCP as its transport-layer protocol.

TCP

In the internet, an application-level protocol implemeting email service would most likely utilize ___________ as its transport-layer protocol.

TCP

On the internet, an application level protocol implementing email service would most likely utilize ______ as its transport layer protocol

TCP

On the internet, an application level protocol implementing web browsing would most likely utilize _____ as its transport layer protocol

TCP

Application layer protocols?

Telnet, POP3, FTP, SSH, DNS

In the Internet protocol stack, if a data transfer is connection-oriented, it is implemented at the ______________

Transport Layer

In the internet, an application level protocol implementing live-streaming video would most likely utilize _____ as its transport layer protocol

UDP

Wireless radio - wifi, terrestrial microwave, wide area (cellular), satellite. Signal is carried in the electromagnetic spectrum.

Unguided Media

Malware that requires some form of user interaction to infect a user's device. Self replicating

Virus

Sending malicious message to a vulnerable application or OS

Vulnerability Attack

Applying FDM to optical transmission, receiver separates frequencies using a prism

Wave-length division

Complex systems. Modularization eases maintenance and updating of system.

Why Layering?

Malware that can enter a device without any interaction

Worms

A third party intercepting a packet and downloading its information before sending it onward toward its destination is called _______________

a packet sniffer

In the Internet protocol stack, the _____________ is responsible for finding the destination IP address.

application

In the Internet protocol stack, the __________________ is responsible for assembling user data to be sent.

application layer

If your computer becomes infected, you may be enrolled in a _________________ and used in a ___________________ against other hosts without your knowledge.

botnet(s) DDOS attack(s)

Uses larger part of wave spectrum and uses frequency division multiplexing to send multiple signals simultaneously

broadband

process that initiates contact

client process

In a client-server architecture, one host is always on, and other hosts may connect and be continually serviced by this first host.

client-server

A paired IP address and port number is called a connection

connection

network layer packet

datagram

Link Layer packet

frames

In a _____________________ architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.

hybrid client-server / p2p

In a ______________________ one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.

hybrid client-server/P2P

Protocol ___________ allows multiple protocols to work together.

interoperability

Application layer packet

message

Merging multiple communication streams into the same media is called _________?

multiplexing

Merging multiple communication streams onto the same medium

multiplexing

a passive receiver that records a copy of every packet that flies

packet sniffer

In a _______________ architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion.

peer to peer

Transport layer packet

segment

__________ is designed to act like a server, and can distribute data from an infected computer to a remote host upon request.

spyware

In the internet, an application-level protocol implemeting live-streaming video would most likely utilize ______ as its transport-layer protocol.

udp


संबंधित स्टडी सेट्स

M11, C12 - Procedural Safeguards

View Set

Unit #3: Regulation of Broker-Dealers and Their Agents

View Set

Nurs 4 - Nursing Process: Implementation NCLEX RN EAQ's

View Set

PrepU Theory, Research, and Evidence-Informed Practice Chapter 2

View Set

EMT Chapter 31 Orthopaedic Injuries

View Set

Managerial Accounting Test #2 Chapters 5, 6, and 8

View Set