Networking Study Guide Test 2 (IN THE HOOD) (GONE WRONG??)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the different routing protocols used in wireless networks, and how do they differ from the ones in wired networks?

Ad-hoc routing and mobile ad-hoc routing. Ad-hoc is used for P2P communication between devices, mobile ad-hoc is used for communication between mobile devices in a network.

What are the different challenges involved in multimedia networking, and how can they be addressed?

Bandwidth limitations, latency, synchronization, security. This can be addressed with CDNs (content distribution networks aka servers around the world that distribute content), QOS (quality of service, allocates resources to critical apps first) and encryption

What are the different types of network attacks, and how do they work?

DOS (Denial of Service) Phishing attacks Malware attacks SQL Injection attacks They exploit vulnerabilities in the network or app and gain unauthorized access.

What is multimedia, and how is it different from different types of data?

Data that combines multiple media types such as text, images, and video. \ Requires high bandwidth and low latency.

What are different types of routing algorithms, how do they work?

Distance vector routing, Link state routing, Path vector routing. DVR shares routing tables with neighboring routers. LSR each router creates a map of the entire network and determines shortest path to each network. PVR similar to DVR but works with policies of different network domains (used with Internet).

What are the different metrics used for routing, and how do they affect the selection of paths?

Distance, bandwidth, delay, reliability, cost. Different metrics may prioritize different aspects of network performance.

What are the different types of security threats, and how can they be mitigated?

Internal or external Can be mitigated with security policies, access controls, and encryption. Internal includes employee mistakes or system failures. External refers to hackers.

What are the different multimedia compression techniques, and how do they work?

JPEG, MPEG M.264 reduce size of data by eliminating redundant info.

What are the different multimedia standards, and how do they ensure interoperability between different multimedia devices and applications?

MPEG, JPEG, MP3, H.264 (compresses HD video) all provide guidelines and specifications for decoding and transmitting data.

1. What are the future trends in multimedia networking, and how are they expected to shape the development of multimedia applications?

Machine learning AI for content suggestions, development of more efficient compression, and integration of apps with emerging tech such as IoT and 5G.

What are the future trends in congestion control, and how are they expected to shape the development of computer networks?

Machine learning algorithms new CC mechanisms for new network architectures integration of CC with other network management tasks Will improve performance, reliability, and scalability.

What are the different types of congestion control?

Open loop and Closed loop; Open loop uses predefined limits to regulate the amount of traffic entering a network, while closed loop uses real time feedback mechanisms to adjust the rate of network traffic flow.

What are the different multimedia quality metrics, and how are they used to evaluate the quality of multimedia applications?

PSNR, SSIM VQM compare similarity between original and compressed multimedia data. Others Include Bitrate, Resolution, Framerate (Peak signal to noise ratio) (structural similarity index) (video quality metric)

What are the different types of firewall architectures, and how do they provide network security?

Packet filtering, stateful inspection, app-level getaways They control network traffic and prevent unauthorized access to network resources.

What are the different techniques used for measuring network congestion , and how do they help in congestion control?

Packet loss rate, round-trip time, and network throughput They provide feedback on the state of the network and guiding congestion control mechanisms. (% of packets lost during transmission), (time for packet to travel from sender to receiver and back) (rate at which data is transmitted over network)

What are the different types of authentication mechanisms, and how do they work?

Passwords, digital certificates, biometric authentication They verify identity of users or devices accessing a network.

What is network security, and why is it important in computer networks

Practice of protecting computer networks from unauthorized access and disruption. Important to ensure integrity and availability on network and its data.

What are different congestion avoidance mechanisms, and how do they work?

RED Random Early Detection ECN Explicit Congestion Rate FECN Forward Explicit Congestion Notification. RED, discards packets avoiding congestion ECN, marks IP packets to indicate congestion), FECN sets a FECN bit in the header to indicate congestion

What is routing, why is it important?

Routing determines the best path for data from one network to the other. Ensures data reaches its destination in an efficient and reliable manner.

What are the future trends in routing, and how are they expected to shape development of computer networks?

SDN and machine learning algorithms. Software Defined Networking (SDN) separates control and data planes of network devices to allow flexible and efficient routing.

What are the different types of security protocols, and how do they provide security for different layers of the network stack?

SSL/TLS (app layer), IPSec (network layer), Kerebros

What are the different types of virtual private networks (VPNs), and how do they provide secure communication over public networks?

Site to Site VPNs, Remote Access VPNs They encrypt network traffic between remote locations.

What techniques does TCP use for congestion control ?

Slow Start Congestion avoidance Fast retransmit Fast recovery (gradually increasing data sent) (reduces transmission rate) (recovers lost packets) (unnecessary retransmissions)

What are the different types of multimedia applications, and how do they work?

Streaming services video conferencing. They work by transmitting large amounts of data in real time.

What are the different types of encryption algorithms, and how do they provide security for network data?

Symmetric and asymmetric key encryption, hash functions They protect confidentiality of network data.

What are the different congestion control algorithms used by TCP, and how do they differ of their performance?

TCP Reno, TCP Vegas, TCP Cubic. Reno is the most common is modern OS', recovers from network congestion quickly. Vegas maintains high throughput and low delay. Cubic is determines congestion window size with a cubic function and is optimized for high bandwidth and high latency networks.

What is TCP, and how does it implement congestion control?

TCP uses a closed loop mechanism "TCP congestion control algorithm".

What are the different multimedia data types, and which protocol is used to transfer the data?

Text, images, audio, video. RTP is the most protocol used, as it enables real time communication.

How do intrusion detection and prevention systems work?

They monitor network traffic for suspicious activity. IDPS can use signature or behavior based detection.

What are the different multimedia delivery models, and how do they affect the delivery of multimedia applications over networks?

Unicast, Multicast, broadcast; they determine how data is transmitted to end-users. Unicast is 1 to 1, from one source to one destination. Multicast is 1 to many where message is sent from one source to a group of people. Broadcast is 1 to all, from one source to all device on a network.

What is Routing Information Protocol (RIP), and how does it implement Distance-Vector routing?

distance-vector routing protocol that uses hop count for path selection. Has each router share its routing table with its neighbors.

What are the different challenges involved in network security, and how can they be addressed?

evolving security threats, balance of security and usability, cost of implementing security measures Tech, organizational, and human factors

What is Border Gateway Protocol (BGP), and how does it implement inter-domain routing?

inter-domain routing protocol that works by having each autonomous system advertise the routes to its neighbors, which routers use to determine the best path.

What is the Open Shortest Path First (OSPF), and how does it implement Link-State routing?

link-state protocol that uses Shortest Path First (SPF) algorithm to determine shortest path to the network. Creates a map of the network and shares info with other routers.

What are the different challenges involved in congestion control, and how can they be addressed?

measuring network congestion coordinating different CC mechanisms minimizing delay maximizing throughput. Can be countered with sophisticated CC algorithms.

What are the challenges involved in routing, and how can they be addressed?

scalability, security, fault tolerance. Scalability is addressed with hierarchal routing, security can be addressed through encryption and authentication, fault tolerance is addressed through load balance.

What are the future trends in network security, and how are they expected to shape the development of computer networks?

use of AI, machine learning for threat detection, integration of security in development process.

What is congestion, and why is it a problem in computer networks?

when the amount of traffic on a network segment or link exceeds its capacity, causing delays, packet loss, and reduced throughput.


Set pelajaran terkait

Westward Expansion Unit Study Guide

View Set

JOUR 310 Midterm - Grammar Portion

View Set

Match the words or phrase and the definitions.

View Set

Chapter 7 Cryptography and The Public Key Infrastructure

View Set