ICS 451 Midterm 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:58 PM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

94 Terms

1
New cards

what is a header?

supplemental data at the neginning of a packet to ensure it reaches the right destination

2
New cards

what is a TCP header?

a 20-60 byte control block preceding data is a TCP packet

3
New cards

what are the key TCP header fields?

source/destination port

sequence number

ack number

checksum

length

control flags

4
New cards

TCP 3-way handshake

SYN: the client sends a SYN to the server.

SYN-ACK: the server receives the SYN from the client, and sends back an ACK.

ACK: The client sends an ACK packet back to the server, and the connection is established

5
New cards

checksum

a numerical value calculated to detect errors: a header field

6
New cards

what is the purpose of the HTTP header?

HTTP headers let the client and server pass information with a message in a reauest or response.

7
New cards

HTTP request header

contains information about the resource to be fetched, or about the clint requesting the resource

8
New cards

HTTP response header

holds additional information about the response, like its location, or about the server providing it.

9
New cards

Accept request header

specifies the media type acceptable for response

10
New cards

User-Agent request header

provides information about the client software

11
New cards

Cache-Control response header

dictates how and for how long browsers and CDNs store a resource

12
New cards

IP header fields

TTL

version

source and destination address

protocol

IP Header Length

13
New cards

TTL in IP header

the number of hops a packet can go through in a network

14
New cards

What is the purpose of TTL in IP headers?

To prevent infinite circulation of packets in a network

15
New cards

What is the difference between TTL in IP and HTTP?

IP uses TTL to track the number of hops- it has nothing to do with cache.

16
New cards

What is the function of IP headers

routing

17
New cards

IPv4

uses 32 bit addresses

varying header sizes

utilizes checksum

18
New cards

IPv6

fixed header size

no checksum 128-bit

19
New cards

why is IPv6 better than IPv4?

it has much more address space, thus eliminating the need for Network Address Translation

it enables direct end-end connectivity.

it offers faster, more efficient routing

20
New cards

how does a network work?

any time a device sends a message, every host in the network sees it. it transmits packets between devices through routers and switches

21
New cards

what is a CIDR block?

a method for allocating IP addresses: represented by an IP address followed by a slash and prefix number

22
New cards

how do routers send data?

the router takes the message, and sends out to the next network until it gets to the right location.

23
New cards

hops

the number of routers that are gone through to get to the destination

24
New cards

network address

the very first IP in CIDR notation, AKA the lowest number

all 0s on the host side

25
New cards

broadcast address

the very last IP in CIDR notation, AKA the highest number

all 1s on the host side

26
New cards

how WERE IPs specified to different machines?

static Ips: every machine on network has an IP

27
New cards

how are IPs specified to different machines currently?

dynamic IPs: Dynamic Host Configuration Protocol

28
New cards

DHCP

Dynamic Host Configuration Protocol

automatically assigns IP addresses and config details to devices

29
New cards

DHCP server

server that assigns a computer an IP when it connects to a network

30
New cards

what are the steps of DHCP?

Discover

Offer

Request

Acknowledge

31
New cards

Discover step of DHCP

client broadcasts a DHCPDISCOVER message to locate available DHCP servers on the local network

32
New cards

Offer step of DHCP

DHCP servers receive the request and respong with a DHCPOFFER message, proposing an IP address, subnet mask, etc.

33
New cards

Request step of DHCP

client selects one offer and broadcasts a DHCPREQUEST message, indicating acceptance of the offer, notifying other servers to reclaim their unused offers

34
New cards

Acknowledge step of DHCP

the selected server sends a DHCPACK message to finalize, confirming the IP address is assigned to that specific client

35
New cards

where is the DHCP server located?

router

36
New cards

routing table

a database in routers and devices that stores paths to network destinations, enabling efficient data forwarding

37
New cards

what algrithms are used to set up the routing table?

Open Shortest Path First

Border Gateway Protocol

38
New cards

Border Gateway Protocol

Primary routing protocol: relies on each next edge: “can you take the packet there?” Looks at path to minimize hops

39
New cards

RTT

the time TCP was sent to the time where the ACK for the same packet is received

40
New cards

flow control

prevents receiver overload

done on the receiver side

41
New cards

congestion control

prevents network overload

done on the network side

42
New cards

congestion control algorithms

slow start

congestion avoidance

fast retransmit

43
New cards

pipelining

sending multiple packets before waiting to receive an ACK

44
New cards

why does RTT matter?

it affects time delay, TCP performance, throughput

45
New cards

timeout interval length

the amount of time a system waits for a response before ending an operation

46
New cards

pros vs cons of small timeout interval

faster interactions, but may cause extra resends and waste bandwidth

47
New cards

slow start congestion control

start with a small congestion window, and double exponentially each RTT until threshold

48
New cards

congestion avoidance

above threshold, grows by 1mss per RTT linearly

49
New cards

what is the purpose of pipelining?

to maximize throughput, making the best use of the space

50
New cards

Go Back N pipelining

sender sends up to N unacked packets

receiver accepts in order

if packet is lost: receiver discards everything after, and sender retransmits starting from the lost packet.

51
New cards

what are the pros and cons of GBN pipelining?

it is simple and uses cumulative ACKS, but wastes bandwidth.

52
New cards

Selective Repeat pipelining

receiver accepts out of order packets, and only missing packets are resent.

53
New cards

what are the pros and cons of selective repeat?

it is efficient and uses individual ACKS, but is complex and needs buffering.

54
New cards

what is the difference between flow and congestion control?

flow control ensures the sender sends enough data for the receiver to accomadate. congestion control ensures that the sender reduces the amount of sent packets to avoid overflow.

55
New cards

network layer forwarding

the moving of packets from a sending host to a receiving host

56
New cards

is network layer forwarding done in hardware or software?

hardware

57
New cards

contents of a router

input port

output port

58
New cards

encryption

the hiding/changing of information

59
New cards

plaintext vs ciphertext

real info vs altered

60
New cards

symmetric key

using the same secret key for both encryption and decryption

61
New cards

why are symmetric keys preferred over asymmetric?

they are faster and require less operations. the faster you can encrypt, the faster you can see. asymmetric works only one way

62
New cards

what is the purpose of certificates?

to confirm a requested site is who it says it is

63
New cards

certificates

bytes that ensure you are an actual site, that include information about the site, including the private key

64
New cards

DNS architecture

root server

TLD server

Auth server

65
New cards

DNS host file

checked before DNS query

66
New cards

what is inside a certificate?

public key

domain name

certificate Authority (CA)

signature

67
New cards

SSL

secure sockets layer: a protocol that encrypts data, providing privacy, authentication, and integrity to internet comms between server and browser

68
New cards

how does SSL work?

establishes a secure channel by authenticating the server, then encrypting data exchanged.

begins with a handshake to open a connection

exchange certificates and validate them

exchange keys

digitally signs data to prove data integrity

69
New cards

SSL certificate

a digital document that verifies the indentity of a client and server, enables encrypted communication

70
New cards

types of SSL certificates

single domain

wild card

multi domain

71
New cards

what are SSL certificates commonly used for?

protecting login credentials

securing transactions

securing transfers

72
New cards

What do Certificate Authorities do?

responsible for issuing SSL certificates to verify identities of websites, devices, or individuals

73
New cards

How are SSL certificates linked back to CAs?

the chain of trust makes it traceable back to the trust root it was signed off of

74
New cards

Root certificate

a digital certificate belonging to the issuing CA

75
New cards

intermediate certificate

branches off root certificates and acts as a middle man between protected root certificates and public server certificates

76
New cards

server certificate

issued to the specific domain a user is requesting

77
New cards

how doe the chain of trust work?

The Chain of Trust starts with the installation of the SSL certificate. You are sent an intermediate root certificate, and when a browser downloads your website's certificate, it chains it back to the root. Following the chain to the intermediate, it traces back until it reaches a trusted root certificate. If valid, it will be trusted. If not, the browser issues a warning.

78
New cards

Server Name Indication

a TLS extension that allows a server to host multiple SSL certificates on a single IP address and port

79
New cards

what does Server Name Indication allow a client device to do?

to specify the domain name it is trying to reach in the first step of handshake: many web servers host multiple domain names in addition to IPs, so SNI solves problem of server not knowing which SSL certificate to show.

80
New cards

A connection has a high RTT. What happens to performance?

Slower communication, longer waiting for ACKS, and lower throughput (unless pipelining is used).

81
New cards

Why are both congestion control and flow control needed?

Flow control protects the receiver, and congestion control protects the network.

82
New cards

If a sender transmits data but receives no ACK, what happens?

A timeout occurs, the packet is retransmitted, and the congestion window is reduced.

83
New cards

Why is pipelining more beneficial when RTT is high?

It prevents idle waiting, and keeps the network busy while waiting for ACKS.

84
New cards

What does seeing many duplicate ACKs in wireshark indicate?

Packet loss, and congestion is likely

85
New cards

True or False: flow control prevents congestion

false: it only protects the receiver

86
New cards

A packet arrives with TTL = 1. What happens next?

router decrements TTL, packet is dropped

87
New cards

Why are port numbers needed if we already have IP addresses?

IP identifies device

Port identifies application/process

88
New cards

What is the subnet mask for /26?

255.255.255.192

89
New cards

why is CIDR better than class-based addressing?

it is more flexible and reduces wasted IP space.

90
New cards

Why is DHCP useful?

automatic configuration

no manual IP assignment

91
New cards

what does a routing table store?

destination network

next hop

interface

92
New cards

what happens when a certificte is invalid?

broswer shows a warning that the connection is not secure.

93
New cards

why is symmetric encryption faster?

it uses simpler math operations

94
New cards

what happens when you type a URL into a browser?

DNS lookup

TCP handshake

TLS handshake(if https)

HTTP request

server response