ISQS 3349 Final review questions (Spring 2002) Chapter 3 1. Describe the three types of data flows? The three types of data flows are simplex, half-duplex and full duplex. Simplex is one-way transmission, such as that in radio or TV transmission. Half duplex is two-way transmission, but you can transmit in only one direction at a time. A half duplex communication link is similar to a walkie-talkie link; only one computer can transmit at a time. With full duplex transmission, you can transmit in both directions simultaneously, with no turnaround time. 2. Clearly explain the differences among analog data, analog transmission, digital data, and digital transmission. Data can be transmitted through a circuit in the same form they are produced. Most computers, for example, transmit their data through digital circuits to printers and other attached devices. Likewise, analog voice data can be transmitted through telephone networks in analog form. In general, networks designed primarily to transmit digital computer data tend to use digital transmission, and networks designed primarily to transmit analog voice data tend to use analog transmission (at least for some parts of the transmission). 3. Describe how data could be transmitted using phase modulation. Phase modulation (PM) (also called phase shift keying (PSK)), is the most difficult to understand. Phase refers to the direction in which the wave begins. Until now, the waves we have shown start by moving up and to the right (this is called a 0º phase wave). Waves can also start down and to the right. This is called a phase of 180º. With phase modulation, one phase is defined to be a zero and the other phase is defined to be a one. 4. Why is data compression so useful? Data compression can increase throughput of data over a communication link literally by compressing the data. A 2:1 compression ratio means that for every two characters in the original signal, only one is needed in the compressed signal (e.g., if the original signal contained 1000 bytes, only 500 would needed in the compressed signal). In 1996, ITU-T revised the V.34 standard to include a higher data rate 33.6 Kbps. This revision is popularly known as V.34+. The faster data rate is accomplished by using a new form of TCM that averages 9.8 bits per symbol (symbol rate remains at 3429). Chapter 4 1. What does the data link layer do? The data link layer controls the way messages are sent on the physical media. The data link layer handles three functions: media access control, message delineation, and error control. The data link layer accepts messages from the network layer and controls the hardware that actually transmits them. The data link layer is responsible for getting a message from one computer to another without errors. The data link layer also accepts streams of bits from the physical layer and organizes them into coherent messages that it passes to the network layer. 2. Compare and contrast stop-and-wait ARQ and continuous ARQ. With stop-and-wait ARQ, the sender stops and waits for a response from the receiver after each message or data packet. After receiving a packet, the receiver sends either an acknowledgment (ACK) if the message was received without error, or a negative acknowledgment (NAK) if the message contained an error. If it is an 1 NAK, the sender resends the previous message. If it is an ACK, the sender continues with the next message. Stop-and-wait ARQ is by definition, a half duplex transmission technique. With continuous ARQ, the sender does not wait for an acknowledgment after sending a message; it immediately sends the next one. While the messages are being transmitted, the sender examines the stream of returning acknowledgments. If it receives an NAK, the sender retransmits the needed messages. Continuous ARQ is by definition a full duplex transmission technique, because both the sender and the receiver are transmitting simultaneously (the sender is sending messages, and the receiver is sending ACKs and NAKs). 3. Explain why Ethernet does not suffer from transparency problems. Ethernet is a byte-count protocol because instead of using special characters or bit patterns to mark the end of a packet, it includes a field that specifies the length of the message portion of the packet. Unlike SDLC and HDLC, Ethernet has no transparency problems. Any bit pattern can be transmitted because Ethernet uses the number of bytes, not control characters, to delineate the message Chapter 5 1. What does the network layer do? The network layer performs three important functions: addressing, routing, and breaking long messages into smaller packets for transmission by the data link layer. The network layer sits between the application layer and the data link layer. The network layer accepts messages from the application layer and formats and addresses them for transmission by the data link layer. The network layer also accepts individual messages from the data link layer and organizes them into coherent messages that it passes to the application layer. 2. What is a subnet and why do networks need them? Each organization must assign the IP addresses it has received to specific computers on its networks. In general, IP addresses are assigned so that all computers on the same local area network have a similar addresses. For example, suppose a university has just received a set of Class B addresses starting with 128.184.x.x. It is customary to assign all the computers in the same LAN numbers that start with the same first three digits, so the Business School LAN might be assigned 128.184.56.x while the Computer Science LAN might be assigned 128.184.55.x (see Figure 6-8). Likewise, all the other LANs at the university and the backbone network that connects them, would have a different set of numbers. Each of these LANs are called a TCP/IP subnet because they are logically grouped together by IP number. Knowing whether a computer is on your subnet or not it very important for message routing. 3. How does dynamic addressing work? With dynamic addressing, a server is designated to supply a network layer address to a computer each time the computer connects to the network. This is commonly done for client computers, but usually not done for servers. Instead of providing a network layer address in a configuration file, a special software package is installed on the client that instructs it to contact bootp or DHCP servers using data link layer addresses. This message asks the servers to assign the requesting computer a unique network layer address. The server runs a corresponding bootp or DHCP software package that responds to these requests and sends a message back to the client giving it its network layer address (and its subnet mask). 4. What is address resolution? In order to send a message, the sender must be able to translate the application layer address (or server name) of the destination into a network layer address and in turn translate that into a data link layer address. This process is called address resolution. There are many different approaches to address 2 resolution that range from completely decentralized (each computer is responsible for knowing all addresses) to completely centralized (there is one computer that knows all addresses). Chapter 6 1. Briefly describe CSMA, CD, and CA. CSMA/CD, like all contention-based techniques, is very simple in concept: wait until the bus is free (sense for carrier) and then transmit. Computers wait until no other devices are transmitting, and then transmit their data. As long as no other computer attempts to transmit at the same time, everything is fine. However, it is possible that two computers located some distance from one another can both listen to the circuit, find it empty, and begin to simultaneously. This simultaneous transmission is called a collision. The two messages collide and destroy each other. The solution to this is to listen while transmitting, better known as collision detection (CD). If the NIC detects any signal other than its own, it presumes that a collision has occurred, and sends a jamming signal. All computers stop transmitting and wait for the circuit to become free before trying to retransmit. The problem is that the computers which caused the collision could attempt to retransmit at the same time. To prevent this, each computer waits a random amount of time after the colliding message disappears before attempting to retransmit. 2. What is the topology of wireless Ethernet and how does it work? The logical and physical topologies of wireless Ethernet are the same as those of traditional Ethernet. It is both a physical start and a logical bus. A central wireless access point (AP) is a radio transmitter that plays the same role as a hub in traditional Ethernet. 3. What is a bottleneck and how can you locate one? In order to improve performance, you must locate the bottleneck, the part of the network that is restricting the data flow. Generally speaking, the bottleneck will lie in one of two places. The first is the network server. In this case, the client computers have no difficulty sending requests to the network server, but the server lacks sufficient capacity to process all the requests it receives in a timely manner. The second location is the network circuit. The network server can easily process all the client requests it receives, but the network circuit lacks enough capacity to transmit all the requests to server. It is also possible that the bottleneck could also lie in the client computers themselves (e.g., they are receiving data to fast for them to process it), but this is extremely unlikely. Chapter 7 1. How does a bridge differ from a layer 2 switch? Both bridges and switches operate at the data link layer, may connect different types of cable, and use the same data link and network protocol to connect computers or network segments. With the exception of new address encounters in an address-learning phase, layer-2 switches replace the Ethernet broadcast paradigm with a capability for simultaneous processing of multiple messages. Bridges are commonly used to segment local area networks to improve performance. Bridges “learn” whether to forward packets from one network segment to another. When a bridge receives a packet, it reads the packet's data link layer source address and compares this address to its own internal address table. If the destination address is on the same network segment from which the packet arrived, the bridge discards the packet, which is a process known as filtering. Layer-2 switches (or workgroup switches) typically provide ports for a small set of 16 to 24 computers. Layer-2 witches operate at the same layers as bridges but differ from them in two ways. First, most switches enable all ports to be in use simultaneously by managing paired combinations of ports as 3 separate point-to-point circuits. Since all ports can be active at once, switches usually are faster than bridges. Like bridges, layer-2 switches "learn" addresses; a layer-2 switch builds a forwarding table after it is first turned on. To learn addresses, a layer-2 switch retransmits to all ports (except to the one from which it was received) only for a packet with a destination address not already in the forwarding table. The resulting ACK from the destination computer (that recognized its address) is then used by the layer2 switch to add the new port number and address to the forwarding table. As layer-2 switches become more powerful, they render bridges obsolete. 2. How does a bridge differ from a layer 3 switch? Layer-3 switches switch messages on the basis of their network layer address (usually TCP/IP address, but some also support IPX/SPX) while bridges (and also layer-2 switches) switch on the basis of data link layer addresses (usually Ethernet addresses). These switches provide the best of both switches and routers (or brouters). Since they utilize network layer addressing, layer-3 switches can replace routers (rather than hubs or bridges as layer-2 switches) and deliver significant benefits at the network layer: more simultaneously active ports and thus much faster transmission. 3. Explain how routed backbones work. Routed backbones move packets along the backbone based on their network layer address (i.e., layer 3 address). The most common form of routed backbone uses a bus topology (e.g., using Ethernet 100BaseT). Routed backbones can be used at the core or distribution layers. At the core layer routed backbones are sometimes called subnetted backbones or hierarchical backbones and are most commonly used to connect different buildings within the same campus network. At the distribution layer a routed backbone uses routers or layer 3 switches to connect a series of LANs (access layer) to a single shared media backbone network. Each of the LANs are a separate subnet. Message traffic stays within each subnet unless it specifically needs to leave the subnet to travel elsewhere on the network, in which case the network layer address (e.g., TCP/IP) is used to move the packet. Chapter 10 1. What is a sniffer? A sniffer program records all messages received for later (unauthorized) analysis. A computer with a sniffer program could then be plugged into an unattended hub or bridge to eavesdrop on all message traffic. 2. What is a firewall? A firewall is a router, gateway, or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. The network is designed so that a firewall is placed on every network connection between the organization and the Internet. No access is permitted except through the firewall. Some firewalls have the ability to detect and prevent denialof-service attacks, as well as unauthorized access attempts. Two commonly used types of firewalls are packet level, and application level. 3. What is a NAT proxy server and how does it work? The NAT proxy server (NAT means network address translation) uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet. When a computer inside the organization accesses a computer on the Internet, the proxy server changes the source IP address in the outgoing IP packet to its own address. When the external computer responds to the request, it addresses the message to the proxy server's IP 4 address. The proxy server receives the incoming message, and after ensuring the packet should be permitted inside, changes the destination IP address to the private IP address of the internal computer and changes the TCP port id to the correct port id before transmitting it on the internal network. This way systems outside the organization never see the actual internal IP addresses, and thus they think there is only one computer on the internal network. 4. What is key management? Key management is concerned with dispersing and storing keys carefully. Because the DES algorithm is known publicly, the disclosure of a secret key can mean total compromise of encrypted messages. Managing this system of keys can be challenging, especially with symmetric algorithms. 5