Mother Midterm...

5.0(1)
studied byStudied by 66 people
5.0(1)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/82

flashcard set

Earn XP

Description and Tags

Flashcard set for Network Architectures Midterm (CIS 3329)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

83 Terms

1
New cards

WiFi 4

802.11n

2
New cards

WiFi 5

802.11ac

3
New cards

WiFi 6

82.11ax

4
New cards

BitTorrent 

A peer-to-peer file transfer protocol for sharing large amounts of data over the internet, in which each part of a file downloaded by a user is transferred to other users..

5
New cards

Botnet

A network of compromised devices that are secretly controlled by a single attacker to perform malicious activities.

6
New cards

Bandwidth

The maximum rate of data transfer over a connection.

7
New cards

Broadband

A high-speed internet connection that uses a wide range of frequencies, or several simultaneous frequencies, to transmit data.

8
New cards

Broadcast

A network communication method where data is sent to all devices on a local network.

9
New cards

Checksum

A mathematical value generated from data to verify its integrity.

10
New cards

Congestion Control

Prevents a sender from overwhelming the network capacity.

11
New cards

Flow Control

Prevents a sender from overwhelming a single reciever’s buffer.

12
New cards

Connection Oriented

Establishes a reliable, dedicated connection before data transfer, similar to sending a signed document via courier.

13
New cards

Connectionless

A communication model that sends data without a prior connection, like a postcard.

14
New cards

Content Distribution Network (CDN)

A geographically distributed network of servers that caches content closer to users to improve website performance and availability.

15
New cards

Dynamic Adaptive Streaming over HTTP (DASH)

An adaptive streaming protocol; allows for a video stream to switch between bit rates on the basis of network performance, in order to keep a video playing.

16
New cards

DNS Root Servers

Highest level servers in the DNS hierarchy; starting point for translating human-readable domain names into machine-readable IP addresses.

17
New cards

DNS TLD Server

Holds information for all domain names with a common extension, such as ".com" or ".org"

18
New cards

DNS Authoritative Name Server

Servers that hold the final, official records for a domain, providing the authoritative answer for an IP address when a DNS query is made

19
New cards

Authoritative name servers

When a recursive resolver can’t find an answer in its cache, it queries the _____ _____ _____ to get the correct IP address.

20
New cards

Bring Home

Placing fewer, larger server clusters in key locations, which simplifies management but can lead to higher user delay and lower throughput.

21
New cards

Enter Deep

Placing many smaller servers deep inside various access networks to be close to users, reducing delay but increasing management overhead.

22
New cards

Ethernet CSMA/CD

A protocol for managing access to a shared network cable in half-duplex Ethernet networks

23
New cards

Ethernet CSMA/CD

Works by having devices first "sense" the line to see if it's busy. If it's not, they send data; if two devices transmit at the same time and a "collision" occurs, they both stop, send a "jam" signal, and wait a random amount of time before trying again

24
New cards

FTP out-of-band

Uses two separate connections: one for control information (commands like login, list files, etc.) and a different one for the actual file data

25
New cards

In-band communication

Both control information and data travel over the same channel.

26
New cards

Frames

Encapsulates a network layer packet with a header and a trailer, which contain essential information for transmission, such as source and destination MAC addresses.

27
New cards

Non-persistent HTTP (HTTP/1.0)

A new TCP connection is established for every single request and response. 

28
New cards

Persistent HTTP (HTTP/1.1)

Reuses a single TCP connection to handle multiple requests and responses

29
New cards

HTTP/2

This protocol uses framing to address the HOL problem.

30
New cards

Head of Line (HOL)

A performance issue in networking and stream-based systems where a slow or lost packet at the beginning of a queue blocks all subsequent packets from being processed, even if they are ready

31
New cards

ICANN

The umbrella non-profit organization which assigns and ensures domain names and IP addresses are unique.

32
New cards

IMAP

This protocol allows manipulation of emails and creation of folders.

33
New cards

IPv4

(In DNS) Uses A records to map a domain name to a 32-bit address.

34
New cards

IPv6

(In DNS) Uses AAAA records to map a domain name to a 128-bit address.

35
New cards

Iterative Query

Sends a request to a DNS server, and the server provides the best answer it can, which might be a referral to another DNS server.

36
New cards

Recursive Query

Sends a request to a DNS server and expects a complete answer.

37
New cards

Internet2

A hybrid optical and packet network designed for research and education, distinct from the public internet.

38
New cards

Len Kleinrock

He developed the concept of packet switching,

39
New cards

Load balancing

The process of distributing network traffic across multiple servers to optimize resource usage, maximize throughput, and improve availability.

40
New cards

LAN Ring

A type of local area network where devices are connected in a closed loop, with each device linked to exactly two neighbors

41
New cards

STAR

a network architecture where all devices connect to a single central hub or switch

42
New cards

BUS

A type of network architecture where all devices are connected to a single, shared communication cable called a "____" or "backbone.

43
New cards

Virus

Self-replicating infection by receiving/executing object (e.g., e-mail attachment)

44
New cards

Worm

Self-replicating infection by passively receiving object that gets itself executed

45
New cards

Trojan

A malicious software program that disguises itself as a legitimate or useful application to gain unauthorized access to a computer or network

46
New cards

Malware

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

47
New cards

Manifest file

A structured configuration document that describes the network's components, services, and their required states

48
New cards

MIME

This protocol allows email to contain images, audio, video files as well as text.

49
New cards

Multiplexing in UDP

The process of gathering data from multiple application processes and combining it into single datagrams for the network layer, using a destination port number to identify which application process should receive the data on the receiving host

50
New cards

Demultiplexing in UDP

The process of directing incoming UDP datagrams to the correct application on a receiving host, using only the destination port number to identify the target socket

51
New cards

Multiplexing in TCP

The process of sending data from multiple application-layer connections over a single, shared TCP connection

52
New cards

Demultiplexing in TCP

The process at the receiving end that uses the information in a TCP segment's header to deliver the data to the correct application socket

53
New cards

Transmission delay

The time it takes for a device to send all the bits of a packet onto a network link (L/R)

54
New cards

Propagation delay

The time it takes for a single bit of a signal to travel from a sender to a receiver through a physical medium (distance/speed)

55
New cards

Queuing delay

The time a data packet spends waiting in a buffer in a network device, such as a router or switch, before it can be transmitted (1/(service rate - average arrival rate))

56
New cards

Packet switching

A network architecture that divides data into packets, which are then sent independently across a shared network and reassembled at the destination

57
New cards

Circuit switching

A network architecture that establishes a dedicated, physical path between two endpoints for the entire duration of a communication session

58
New cards

Peer-to-peer (P2P)

A decentralized network architecture where participants connect directly with each other to share resources, acting as both clients and servers.

59
New cards

Pharming

A type of attack that manipulates the DNS to redirect user traffic from a legit website to a fraudulent one without the users knowledge.

60
New cards

Poisoning

A type of attack that inserts false information into a DNS server’s cache, redirecting users from a legit website to a fraudulent one.

61
New cards

Ping

diagnostic utility that tests the reachability of a host on an IP network

62
New cards

Sequencing

The order of operations or data, and it can mean either the ordered delivery of data packets or the use of machine learning models that process sequential data

63
New cards

SMTP

The internet standard for sending and forwarding email messages from a client to a server and between mail servers

64
New cards

Socket

A software endpoint that acts as a doorway for communication between programs on a network

65
New cards

Three-way handshake

a TCP process that establishes a reliable connection between a client and server by exchanging three packets: SYN, SYN-ACK, and ACK

66
New cards

Throughput

The actual rate of data successfully transferred over a network in a given period, measured in bits per second (bps)

67
New cards

Traceroute

This program provides delay measurement from source to router along end-end Internet path towards destination.

68
New cards

TCP/IP Protocol stack

a four-layer network architecture that governs how data is transmitted across the internet and other networks.

69
New cards

TCP

Provides reliable, connection-oriented data delivery between applications.

70
New cards

UDP

A transport layer communication protocol that enables connectionless, fast, low-latency data transfer between network devices

71
New cards

Coax

A type of cable used to transmit data, the internet, video and voice communications

72
New cards

Fiber optic

Transmits data as pulses of light through glass or plastic strands

73
New cards

Unshielded twisted pair (UTP)

A copper cable with insulated wires twisted into pairs to reduce crosstalk and interference; forms the physical layer for ethernet

74
New cards

Simplex

Uses a unidirectional communication channel, where data flows only from the sender to the receiver

75
New cards

Half-duplex

A bidirectional communication mode where data can flow in both directions, but only one direction at a time

76
New cards

Full duplex

A network communication method that allows data to be sent and received simultaneously between two devices

77
New cards

Iterative query

Requests a website name or URL by providing references to other DNS servers that might have the answer.

78
New cards

Recursive query

One DNS server communicates with several other DNS servers to hunt down an IP address and return it to the client.

79
New cards

“maintain the state” (stateful architecture)

The system actively remembers data from previous interactions, transactions, or sessions. This allows the network to process future requests with full context of a client's past activity.

80
New cards

Stateless architecture

Treats every request as an independent, new interaction with no memory of prior ones.

81
New cards

The application layer uses SMTP to send the message from the client to the mail server, and TCP is used at the transport layer to establish a reliable connection for data transfer

Diagram and identify application and transport layer protocols in sending an email.

82
New cards

Cookies and a back end database

How do websites keep track of the site user traffic

83
New cards

Ok

(This is just a flashcard to read, just answer “Ok”) Cookies and the website backend work because: when a user first visits a website, the server may generate a unique identifier for that user and store it in its backend database, associated with any relevant user data (like preferences or session information, this is the cookie), then the website backend database stores the actual user data associated with these unique identifiers so that it can be retrieved the next time the user visits the website.