Study Questions for Exam 3

advertisement

CSCI 4132 EXAM 3Study Questions

Chapter 7 Multimedia Networking

1.

Identify the following classes of multimedia applications: a.

Streaming stored audio and video (pg. 599) b.

Streaming Live Audio and Video (pg. 600) c.

Real-Time Interactive Audio and Video (p. 601)

2.

Explain what is meant by delay sensitive and loss tolerant. What is jitter?

3.

Compare the following alternatives for evolving the Internet to better support multimedia: a.

Integrated Services(pg.602) b.

Differentiated Services (pg. 604) c.

Laissez-faire (pg. 603)

What do you think is best?

4.

What are the basic data rates for a.

Compressed audio—explain b.

CD music—explain c.

MP3 d.

Internet telephony

5.

What is the basic approach to video compression? What type of redundancy exists?

6.

What are the data rates for a.

MPEG1 (CD-ROM) b.

MPEG2 (DVD) c.

MPEG4

7.

Besides MPEG, what are some other video compression schemes?

8.

Consider streaming stored Multimedia and a Media Player; explain the following two functions of the media player: (page 608) a.

Decompression b.

Jitter Removal

9.

Draw a diagram of Internet Multimedia: Simplest Approach (Slide 7-17)— briefly discuss.

10.

Draw a diagram of the Streaming Approach to Internet Multimedia—briefly discuss. (Figure 7.1, page 609)

11.

How many servers does the Streaming Server to a Helper Application use?

12.

How are different client rates handled? (See slide 7-23)

13.

What does the Real-Time Streaming Protocol( RTSP: RFC 2326) do? What does it not do? (Slide 7-24 and page 612).

14.

What is the problem with best-effort service for Multimedia?

15.

Consider the Interactive Multimedia Internet Phone example: a.

What is the data rate during a talk spurt? b.

When are packets generated? c.

A 20 msec chunck of data contains how many bytes? d.

After an application layer header is added, what transport protocol is used?

16.

What does the Real-Time Protocol (RTP) specsify? (see slide 7-49)

17.

Draw the RTP header fields (Figure 7.10, page 633)

18.

Draw a diagram illustrating RTP in a TCP/IP protocol stack (see slide 7-50, or

Figure 7.11, page 635).

Chapter 8 Security in Computer Networks

1.

What is meant by each of the following (page 688-689, and slide 8-4) a.

Confidentiality b.

Authentication (End-to-end) c.

Message Integrity d.

Access and availability (Operational security)

2.

An intruder can potentially perform what kind of security violations (page 689 and section 1.6 and slide 8-7. Explain each of the following: a.

Eavesdropping b.

Modification, insertion, or deletion of messages or message content c.

Impersonation d.

Hijacking e.

Denial of Service

3.

Draw a diagram of a cryptographic system (Figure 8.2 or slide 8-9).

4.

Briefly describe each of the following: a.

Plaintext b.

Ciphertext c.

Encryption algorithm d.

Decryption algorithm e.

Encryption key f.

Decryption key

5.

What is the Caesar cipher, monoalphabetic cipher, substitution cipher, polyalphabetic cipher (slide 8-10, 8-11, text page 692-694)

6.

What is meant by cipher-text only attack, known-plaintext attack, chosenplaintext attack?

7.

What is meant by symmetric key cryptography?

8.

What is the difference between stream ciphers and block ciphers (slide 8-15)

9.

What is the ciphertext for the binary message in slide 8-18?

10.

Briefly discuss the data encryption standard (DES—NIST 1993) (see slide 8-25).

11.

What is the Advanced Encryption Standard? Why was it adopted (ie, what is wrong with the DES?). Are the DES and AES symmetric encryption algorithms?

12.

How does public key cryptography differ from symmetric encryption? Draw a diagram of public key cryptography. (Figure 8.6)

13.

What are the two requirements for public key encryption algorithm? Is the RSA algorithm a public key algorithm?

14.

What is meant by message integrity?

15.

What is meant by a message digest?

16.

What are some standard hash function algorithms (slide 8-45).

17.

What is a message authentication code (MAC) and how is it used (slide 8-46, page 708)?

18.

What is one of the most popular MAC standards today? (see slide 8-47 and page

708)

19.

What are digital signatures? (slide 8-53, page 709).

20.

What protocol is used to secure TCP connections? (page 727, slide 8-67)

21.

What happens during the following phases of SSL? a.

Handshake phase (you might want to read page 713 to understand what a

Certificate Authority is.) b.

Key derivation phase c.

Data Transfer

22.

Consider Figure 8.27 (Record format for SSL)—What are the fields and what fields are encrypted with a session encryption key?

23.

Draw a diagram illustrating an SSL Record Protocol (slide 8-83).

24.

What is a private network? What is a virtual private network?

25.

What protocol is used to provide security at the network layer?

26.

What does the IEEE 802.11 Wired Equivalent Privacy (WEP) provide?

27.

Why was IEEE 802.11i created?

28.

What is a firewall? What does a firewall do? (see slide 8-125, page 747.)

29.

What is meant by deep packet inspection (pg. 755) and what is the difference between an intrusion detection system and an intrusion prevention system?

Chapter 9. Network Management

1.

What is network management? (Slide 9-4, page 775)

2.

List the five areas of network management (page 774, 775)

3.

Draw a diagram illustrating the following components of a network management architecture: a.

Managing entity b.

Managed device c.

Management agents.

4.

What does a network management protocol do?

5.

What is meant by managed objects and a management information base?

6.

What is the difference between OSI CMIP and SNMP.

7.

What are the four key parts of SNMP? (slide 9-8)

8.

Briefly describe the structure of the OSI Object Identifier Tree.

9.

Briefly describe the following two ways to convey MIB information: a.

Request/response mode b.

Trap mode

Download