OSU CS372 - Week 2
Application layer responsibilities
- Determine destination IP address - Support network applications - Decide which data transits internet
In the Internet protocol stack, the__________________ is responsible for assembling user data to be sent.
Application Layer
In the internet protocol stack, the ______ layer is responsible for assembling user data to be sent
Application Layer
Please place the following in the order of the OSI layering model.
Application Layer Presentation Layer Session Layer Transport Layer Network Layer Link Layer Physical layer
Please place the following in the order of the Internet protocol stack.
Application Layer Transport Layer Network Layer Data Link Layer Physical Layer
At the transport layer, what is the payload?
Application data
In the internet protocol stack, the _____ Layer is responsible for finding the destination IP address
Application layer
- Types of messages exchanged - Message syntax - Message semantics - Rules for when and how processes send/respond
Application layer protocol defines:
attack sends a deluge of packets to target host, access link becomes clogged, preventing legitatmate packets from reaching server
Bandwidth flooding
Uses a small part of the wave spectrum and sends only one signal at a time
Baseband
if your computer becomes infected, you may be enrolled in a _______ and used in _______ against other hosts without your knowledge
Botnet(s), DDoS attack(s)
In a _____ architecture, one host is always on, and other hosts may connect and be continually serviced by the first host
Client-Server
What transport-layer services are provided by the base TCP protocol? (Check all that apply)
Congestion Control Connection oriented service Reliable data transmission Flow Control
A socket pair consisting of 4 tuples. client IP, client Port, Server IP, Server Port
Connection
Attacker establishes a large number of half open or fully open TCP connections at target host. Boggs down host, prevents from accepting real connections
Connection flooding
Renders a network, host, or other piece of infrastructure unusable
Denial of service (DoS)
Reflection, Obstruction from objects, interference
Effects of propagation unguided media
When a packet is passed down to the next lower layer, it is ______ into the lower layer packet
Encapsulated
Please select all examples of systems using guided media.
Ethernet Home networks Cable Television ADSL Fiber Optics
Twisted pair copper wire, coaxial cable, fiber optic cable
Guided Media
Signal attenuation is less of an issue in _____ media than it is in _____ media
Guided, Unguided
in a ___________ architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by their first host
Hybrid client-server/P2P
Send packet with false source address
IP spoofing
Protocol _______ allows multiple protocols to work together
Interoperability
Merging multiple communication streams into the same media is called ______
Multiplexing
What transport-layer services are provided by the base UDP protocol? (Check all that apply)
None of the answers given
A third party intercepting a packet and downloading its information before it is sent onward toward its destination is called ______
Packet Sniffer
In a ________ architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion
Peer-to-Peer
Provides required link between sender and receiver, propagates bits between sender/receiver
Physical Media
A program running within a host
Process
The minimum necessary information for identifying a process on a remote host would be (check all that apply):
Remost Host IP Remote Port Number
The minimum necessary information for identifying a process on a remote host would be:
Remote Port Number, Remote Host IP
Which of the following are application-layer protocols?
Secure SHELL SSH File Transfer Protocol FTP Domain Name Service DNS Telnet Post Office Protocol v3 pop3
Waits to be contacted
Server process
supporting network applications (FTP, HTTP, SMTP)
Service - Application layer
Data transfer between neighboring network elements (PPP, Ethernet)
Service - Link layer
Routing of datagrams from source to destination (IP, Routing protocols)
Service - Network layer
Carries actual signals between devices (cable, wireless)
Service - Physical layer
process to process data transfer (TCP, UDP)
Service - Transport layer
- Data integrity - reliability of data transfer - Timing - Bandwidth - certain amount of bandwidth - Security
Services of application layer
A paired IP address and port number is called a _____
Socket
Software interface in a network that sends and receives messages. between application layer and transport layer within a host
Socket (job)
If I were to send information into the internet with your IP address listed as the sender IP, I would be _______________
Spoofing IP address
If i were to send information into the internet with your IP address listed as the sender IP, I would be _____
Spoofing IP address
In the internet, an application-level protocol implemeting email service would most likely utilize TCP as its transport-layer protocol.
TCP
In the internet, an application-level protocol implemeting email service would most likely utilize ___________ as its transport-layer protocol.
TCP
On the internet, an application level protocol implementing email service would most likely utilize ______ as its transport layer protocol
TCP
On the internet, an application level protocol implementing web browsing would most likely utilize _____ as its transport layer protocol
TCP
Application layer protocols?
Telnet, POP3, FTP, SSH, DNS
In the Internet protocol stack, if a data transfer is connection-oriented, it is implemented at the ______________
Transport Layer
In the internet, an application level protocol implementing live-streaming video would most likely utilize _____ as its transport layer protocol
UDP
Wireless radio - wifi, terrestrial microwave, wide area (cellular), satellite. Signal is carried in the electromagnetic spectrum.
Unguided Media
Malware that requires some form of user interaction to infect a user's device. Self replicating
Virus
Sending malicious message to a vulnerable application or OS
Vulnerability Attack
Applying FDM to optical transmission, receiver separates frequencies using a prism
Wave-length division
Complex systems. Modularization eases maintenance and updating of system.
Why Layering?
Malware that can enter a device without any interaction
Worms
A third party intercepting a packet and downloading its information before sending it onward toward its destination is called _______________
a packet sniffer
In the Internet protocol stack, the _____________ is responsible for finding the destination IP address.
application
In the Internet protocol stack, the __________________ is responsible for assembling user data to be sent.
application layer
If your computer becomes infected, you may be enrolled in a _________________ and used in a ___________________ against other hosts without your knowledge.
botnet(s) DDOS attack(s)
Uses larger part of wave spectrum and uses frequency division multiplexing to send multiple signals simultaneously
broadband
process that initiates contact
client process
In a client-server architecture, one host is always on, and other hosts may connect and be continually serviced by this first host.
client-server
A paired IP address and port number is called a connection
connection
network layer packet
datagram
Link Layer packet
frames
In a _____________________ architecture, one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.
hybrid client-server / p2p
In a ______________________ one host is always on, and other hosts may connect and be handed off amongst themselves by this first host.
hybrid client-server/P2P
Protocol ___________ allows multiple protocols to work together.
interoperability
Application layer packet
message
Merging multiple communication streams into the same media is called _________?
multiplexing
Merging multiple communication streams onto the same medium
multiplexing
a passive receiver that records a copy of every packet that flies
packet sniffer
In a _______________ architecture, no one host is always on, but hosts may connect amongst themselves in an on-demand fashion.
peer to peer
Transport layer packet
segment
__________ is designed to act like a server, and can distribute data from an infected computer to a remote host upon request.
spyware
In the internet, an application-level protocol implemeting live-streaming video would most likely utilize ______ as its transport-layer protocol.
udp