Name the 7 OSI Layers, from Lowest to Highest
Application, Presentation, Session, Transport, Network, Data Link Physical
List 2 advantages and 2 disadvantages of strictly conforming to a layered networking standard, such as OSI/ISO model
Which two layers would you employ encryption in for the OSI model?
Employ encryption at the lowest two levels because they’re the easiest to cause a DoS for.
A system uses n-layer protocol hierarchy. Appl generates messages of M bytes each. At each layer, a header of h bytes is added. What fraction of the network B/W is filled with headers?
(n.h)/(m+n.h)
Provide 3 distinct reasons why a stream of data is broken into frames by the DL layer?
Reason for piggy-backed ACKs in the DL layer?
Used to decrease the number of frames sent back from the receiver to sender, by combining data and ACK in to one frame
Why does the checksum only cover headers?
Without the header, the data is useless as it has no destination or source so would never be received by dest.
Why is ACK preferred to NACk in stop-and-wait protocol?
For the sliding window protocol, is it meaningful for the receiver’s max window size to be larger than the sender’s max window size?
Receiver’s window size should be constant so that the receiver doesn’t pick up unwanted frames as well as sender knowing when it sold receive ACK from receiver, knowing that the frames are in order
Primary difference between Eth hub and Eth switch?
Hub receives packet and broadcasts to all outgoing ports but switch is more intelligent and only retransmits to correct/most efficient outgoing port.
List 3 tasks a network bridge must perform connecting dissimilar hardware technologies
- Data link reformatting for the 3 different standards of 802.3, 802.4 and 802.5
Why must IEEE 802.3 employ collision avoidance instead of collision detection?
Wireless NIC cannot transmit and receive at the same time, therefore cannot detect a collision if transmitting. Employs a scheme to avoid collisions, MACA (multiple access with collision avoidance) using both physical and virtual channel sensing.
Why are all MAC addresses in 802.11 NICs unique?
Unique identifier for a particular device
Why is registering only wanted MAC addresses for an AP ineffective against a determined intruder?
Hackers are able to create fake MAC addresses so would be able to passively listen to packets to find out which MAC address is registered.
Provide 2 distinct motivations for the NL to employ sequencing numbers
Why doesn’t each node in a virtual circuit use the same number to identify the circuit?
Each nodes needs to be able to alter outgoing ID numbers of packets from different computers so that they remain unique. VC doesn’t know which numbers are in use, the numbers only identify the SWITCHING between different nodes, and cannot identify whole circuit.
Differences between flow control and congestion control
CC - ensures that the subnet can carry the offered traffic, which is a global issue for hosts and routers
FC - concerned with end-to-end control, possibly multiple hops apart
Effects of Leaky Bucket and Token Bucket flow control
LB - ensures uncontrolled flow of packets into bucket, acts as a buffer for a regulated flow of bursty traffic out
TB - provides a bucket with tokens, with regulated flow where each packet must ‘consume’ a token before being transmitted.