COMP 4320 Introduction to Computer Networks - Final Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

flashcard set

Earn XP

Description and Tags

Practice flashcards covering key terms and concepts from the COMP 4320 lecture notes on computer networks.

Last updated 7:16 PM on 4/28/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

User Datagram Protocol (UDP)

The simplest connectionless transport protocol that does not ensure reliable delivery of packets.

2
New cards

TCP Congestion Control

Methods used in TCP to adapt to network congestion for efficient data transmission.

3
New cards

Flow Control in TCP

A mechanism to prevent the receiver’s buffer from being overflowed by preventing too much data from being sent too quickly.

4
New cards

Sliding Window in TCP

A method that allows a sender to send multiple packets before needing an acknowledgment for the first one, controlling the amount of data in transit.

5
New cards

Three-Way Handshake

The process used by TCP to establish a connection by exchanging three messages: SYN, SYN-ACK, and ACK.

6
New cards

Well Known Ports

Specific port numbers that are assigned to common protocols like HTTP (80), FTP (21), and DNS (53).

7
New cards

Congestion Notification (DECbit)

A bit in the packet header indicating congestion status in the network, allowing the sender to adjust its transmission rate.

8
New cards

Public-Key Cryptography

A cryptographic system that uses pairs of keys: a public key for encryption and a private key for decryption.

9
New cards

Digital Signature

A means of verifying the authenticity and integrity of a message by using a sender's private key to create a hash that can be verified using the sender's public key.

10
New cards

Packet Filtering

A method utilized by firewalls where packets are analyzed and allowed or blocked based on predefined rules.

11
New cards

Affine Cipher

A type of substitution cipher where each letter in the plaintext is mapped to its numeric equivalent, transformed using a linear equation.

12
New cards

Network Security Basics

Fundamental principles of protecting networks, including concepts like confidentiality, integrity, and availability (CIA).

13
New cards

DNS (Domain Name System)

A hierarchical service that translates human-friendly domain names (URLs) into IP addresses.

14
New cards

TCP Segment Header Format

The structure of a TCP segment, which includes fields like source port, destination port, sequence number, acknowledgment, and flags.

15
New cards

Fast Retransmit

A mechanism in TCP that allows for immediate retransmission of lost packets without waiting for a timeout, triggered by receiving duplicate ACKs.

16
New cards

Congestion Avoidance

The phase in TCP that occurs when the congestion window exceeds a threshold; it shifts from exponential growth to linear growth of the transmission rate.