Presentation is loading. Please wait.

Presentation is loading. Please wait.

Persistence lists Explain the purpose of persistence lists and what maintains them. Give an example of a client who should be on a persistence list.

Similar presentations


Presentation on theme: "Persistence lists Explain the purpose of persistence lists and what maintains them. Give an example of a client who should be on a persistence list."— Presentation transcript:

1 persistence lists Explain the purpose of persistence lists and what maintains them. Give an example of a client who should be on a persistence list.

2 TCP Tahoe/Reno What is the difference between TCP Tahoe and TCP Reno?

3 Packet Size Sending data over the network generally has high header data to payload ratio, making transactions quite expensive. Explain why this is and briefly outline one possible solution which will improve this ratio while keeping a remote shell session, which sends data one byte at a time, relatively lag-free

4 Network Layer There are two types of network layers - connection-based and datagram-based. The internet is datagram based, which means that the router does not keep connection-state information. But connections are a very popular feature on the internet! Explain the benefits of using a datagram-based network, and why it would be selected over a connection-based network for a large-scale project.

5 IPSec When trying to make data secure using an encapsulating security payload, what is the difference between the invisible mode header and the tunnel mode header?

6 Routing Algorithms what does it mean to be a routing algorithm with global information? what does it mean to be a routing algorithm with local information?

7 SYN Floods One of the most popular Denial of Service attacks on the Internet is often based on SYN flooding. a) Please describe below how SYN flooding works. What weakness of TCP protocol is it exploiting? You may include (draw) diagrams in your explanation. b) How can we prevent massive SYN Flood attacks? In what layer of the seven layer OSI network model can we best prevent the attacks?

8 Layer Model Draw the seven layer OSI model, describe what each layer is concerned with. Also, list at least 5 protocols we have discussed in class and note to which layer they belong.


Download ppt "Persistence lists Explain the purpose of persistence lists and what maintains them. Give an example of a client who should be on a persistence list."

Similar presentations


Ads by Google