This class was created by Brainscape user Cecilia Petersson. Visit their profile to learn more about the creator.

Decks in this class (54)

L1. Why do we need protocol layering?
What is protocol layering,
What does a layer do,
How do different layers interact
22  cards
DS L1. What are main design goals in DS?
What is a distributed system,
What are the benefits of ds s,
Name some examples of ds s
22  cards
S1. How do config errors made in OSPF vs BGP affect Internet operation?
What is ospf,
What is bgp,
What are the differences between ...
10  cards
L2. Describe the functioning of the HTTP protocol and summarize different versions
What is http,
When is http used,
What model does http operate on
25  cards
S2. How does a self-learning switch make its table?
How does a self learning switch m...,
What happens when a frame arrives...,
What happens when a frame arrives...
6  cards
S3. What is encapsulation, decapsulation, and tunneling?
What are encapsulation decapsulat...,
What is encapsulation,
Give an example of how data is en...
12  cards
S4. Compare P2P vs client-server model. What are strong and weak sides?
What is the client server model,
What is the client server model t...,
What are the strengths of the cli...
8  cards
S5. What is packet fragmentation and how is it handled in IPv4 vs IPv6?
What is packet fragmentation,
Why is packet fragmentation neces...,
What is mtu
8  cards
S6. Describe the differences between flow and congestion control?
What are flow and congestion control,
What is flow control,
What happens without flow control
12  cards
S7. What is an MTU, what are typical values, and how is it different from MSS?
What is mtu,
What happens if a packet exceeds ...,
How is mtu measured
14  cards
S8. Explain the functioning of HTTP adaptive streaming
What is http adaptive streaming,
How does http adaptive streaming ...,
How does http adaptive streaming ...
8  cards
S9. What is a network prefix? Give an example for a subnet of 255 hosts
What is a network prefix,
Why are network prefixes used,
How are network prefixes expressed
10  cards
S10. How are bit errors detected in link vs network vs transport layer protocols?
What are bit errors,
Why is bit error detection important,
How are bit errors detected at th...
12  cards
S11. What are the differences between TLS and IPSec?
What is tls,
What is ipsec,
What are the commonalities and di...
8  cards
L27. Describe the evolution of telecommunication networks from 1G to 5G
What is a telecommunication network,
What is 1g,
When was 1g introduced
18  cards
L28. What information does a host obtain via DHCP and how?
What is dhcp,
What are the benefits of dhcp,
What information does a host obta...
18  cards
L29. Describe the role and functioning of NAT
What is nat,
What is nat used for,
What does nat do
17  cards
L30. Explain how a web page with 3 local and 3 remote images is downloaded by a web browser using persistent connections with pipelining
How does a web browser load a web...,
What does it mean that an image i...,
What happens in the transport lay...
14  cards
L26. Describe the source and effect of queueing, propagation, and transmission delays
What is a delay,
When does queueing delay happen,
What are the effects of queueing ...
19  cards
L25. Compare the properties of symmetric vs asymmetric cryptography
What is cryptography used for,
What are the two types of cryptog...,
What is symmetric cryptography
17  cards
L24. What is longest prefix matching and how is it used?
What is longest prefix matching,
How does longest prefix matching ...,
How does routers determine where ...
10  cards
L23. What are different approaches for Medium Access Control?
What is medium access control,
What is the role of mac,
What are the four approaches to mac
25  cards
L22. What is congestion collapse, how can it be avoided? Is TCP or UDP a fair protocol?
What is congestion collapse,
When does congestion collapse occur,
What causes congestion collapse
11  cards
L21. What is user mobility and how is it implemented in WLAN vs cellular networks?
What is user mobility,
Why is user mobility important,
How is user mobility implemented ...
10  cards
L20. How are certificates used to secure WWW?
What is the purpose of certificates,
How are certificates used to secu...,
W
10  cards
L19. How is the optimal value of a retransmission timeout computed?
What is rto,
How is rto calculated,
Why must rto be calculated dynami...
11  cards
L18. Compare the use of TCP vs UDP for streaming.
Which is used for streaming mead ...,
How does the choice of transport ...,
What type of streaming applicatio...
5  cards
L17. Describe the role and working of BGP
What is bgp,
What is the role of bgp in intern...,
What is bgp used for
14  cards
L16. Describe CSMA/CD and how it differs from CSMA/CA.
What is csma cd,
What is csma ca,
What are common properties of csm...
16  cards
L15. Why is IPv6 needed, how is it different to IPv4, and what is the adoption status?
What is ipv4 and ipv6,
Why is ipv6 necessary,
What improvements does ipv6 offer...
24  cards
L14. Describe slow start and fast retransmit mechanisms in TCP Reno.
What is tcp reno,
What is slow start,
What is the goal of slow start
24  cards
L13. Compare link state vs distance vector routing.
What are link state and distance ...,
What is the idea of link state ro...,
What is the most common link stat...
32  cards
L12. Explain the concept of SDN
What is sdn,
What are the benefits of sdn,
What does sdn do
14  cards
L11. What is broadcast, unicast, multicast, anycast and flooding?
What are broadcast unicast multic...,
What is broadcast,
What are the characteristics of b...
16  cards
L10. Describe typical architectures and functions of a router.
What is a router,
What are the components of a router,
What does the input port do
15  cards
L9. Explain the role and functioning of ARP. What is equivalent for IPv6?
What is arp,
What does arp do,
Why is arp necessary
15  cards
L8. Compare packet switching with circuit switching.
What are packet and circuit switc...,
What is packet switching,
What is circuit switching
13  cards
L7. Describe 7 ”bad things” that can happen with a packet on the Internet. What are solutions to those problems?
What are 7 bad things that can ha...,
What is packet loss,
What causes packet loss
22  cards
L6. List most common Internet applications and explain which transport protocol they use and why.
List the most common internet app...,
What protocols does web browsing ...,
What protocols does email use and...
12  cards
L5. Compare go-back-N vs selective repeat mechanisms. Which one is used in TCP?
What are gbn and sr,
How do gbn and sr differ,
What is arq
12  cards
L4. Compare recursive and iterative DNS resolvers. What are security challenges in DNS?
What is a dns resolver,
What is a recursive dns resolver,
What is an iterative dns resolver
22  cards
L3. Describe how confidentiality and integrity can be provided for email messages.
What is confidentiality in emails,
What is integrity in emails,
How can confidentiality and integ...
18  cards
S12. What problem is poison reverse solving and how?
What is poison reverse,
How does the count to infinity pr...,
How do routing loops arise
8  cards
S13. What are the properties of CDMA and where is it used?
What is cdma,
How does cdma allow multiple user...,
How does cdma improve on other te...
6  cards
S14. What are classes of multimedia applications?
What are classes of multimedia ap...,
What is the purpose of classifyin...,
Name different classes of multime...
8  cards
S15. How is the hidden terminal problem solved?
What is the hidden terminal problem,
What are the effects of the hidde...,
What techniques are used to addre...
7  cards
S16. What are the pros and cons of generalized forwarding?
What is generalized forwarding,
What are the pros of generalized ...,
What are the cons of generalized ...
4  cards
S17. Describe the principle behind store-and-forward. What is the optimal packet size?
What is the princple behind store...,
How does store and forward work,
What is the purpose of store and ...
8  cards
S18. What are CDNs, why are they needed, and what are common examples?
What are cdns,
How do cdns work,
Why are cdns needed
9  cards
S19. Summarize modern standards for encryption and hash algorithms
What are encryption and hash algo...,
What does encryption do,
What is hashing do
11  cards
S20. How does decreasing SNR affect the choice of signal encoding and reception?
What is snr,
What does high and low snr mean,
What kind of encoding schemes can...
9  cards
DS S1. Describe the functioning of Map-Reduce in distributed systems
What is map reduce,
What happens in the mapping phase,
What happens in the reducing phase
6  cards
DS L2. What are main types of communication in DS?
What are the main types of commun...,
What are remote procedure calls,
What are message passing
16  cards
DS L3. Explain the concept of time in DS and how clocks are synchronized.
Why is time complex in ds,
How are clocks synchronized in ds,
What are the two conceptualizatio...
20  cards

More about
TDTS04

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Cecilia Petersson's TDTS04 flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Make Flashcards