Week 12 (Congestion Control & Queuing Theory) & Week 13 (Application Layer & Security)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:47 PM on 5/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

24 Terms

1
New cards

Congestion Collapse

A state where hosts send packets as fast as possible, causing routers to drop packets due to full buffers, which leads to timeouts, retransmissions, and even more congestion.

2
New cards

Open Loop

A bandwidth allocation model where a fixed, static bandwidth is allocated to each host.

3
New cards

Closed Loop

A dynamic bandwidth allocation model where the host adjusts its transmission rate based on network feedback. TCP congestion control is an example of a closed-loop model.

4
New cards

AIMD (Additive Increase Multiplicative Decrease)

An algorithm used to avoid router buffer congestion. It works by increasing the congestion window linearly when no congestion is detected (Additive Increase) and decreasing it exponentially when a packet drop or timeout occurs (Multiplicative Decrease).

5
New cards

CongestionWindow

A variable set by the TCP source that determines the transmission rate based on the perceived level of network congestion.

6
New cards

Queuing Theory

A branch of mathematics focused on understanding and optimizing the efficiency of queues, including queue length and waiting times.

7
New cards

Little’s Law

A queuing theory principle stating that under steady-state conditions, the average number of items in a queue (L) equals the average rate at which items arrive multiplied by the average time an item spends in the queue.

8
New cards

Silly Window Syndrome

A performance degradation problem in poorly implemented TCP where the sender repeatedly transmits just one byte of data, or the receiver repeatedly accepts just one byte.

9
New cards

Nagle’s Algorithm

A solution to Silly Window Syndrome that prevents inefficient bandwidth use by sending the first byte and buffering the remaining data until an acknowledgment is received or the buffer reaches a certain size.

10
New cards

Clark’s Solution

Another solution to Silly Window Syndrome that prevents the receiver from advertising a window size of 1 byte, forcing it to wait until it has enough buffer capacity (typically 1 maximum segment size of half-empty).

11
New cards

HTTP (Hypertext Transfer Protocol)

The Web’s primary application-layer protocol based on a client/server model. It is considered “stateless” because the server does not maintain information about past client requests.

12
New cards

Persistent Connection (Connection Reuse)

An HTTP/1.1 innovation that allows multiple requests and responses to be sent over a single established TCP connection, reducing overhead.

13
New cards

Pipelining

Sending multiple HTTP requests in rapid succession without waiting for the corresponding responses, reducing server idle time.

14
New cards

Head-of-Line Blocking (HOL)

A performance bottleneck where a packet stuck at the front of a queue holds up the rest of the packets behind it.

15
New cards

QUIC (Quick Internet Connection)

An encrypted transport protocol built on top of UDP (used in HTTP/3). It combines the speed of UDP with the security of TLS and performs multiplexing to prevent head-of-line blocking.

16
New cards

SMTP (Simple Mail Transfer Protocol)

A “client push” protocol used for exchanging and delivering outgoing e-mail messaged reliably over TCP.

17
New cards

IMAP (Internet Mail Access Protocol)

An e-mail access protocol used by clients to retrieve, delete, and organize messages stored on a receiving mail server.

18
New cards

SNMP (Simple Network Management Protocol)

A protocol running on UDP used to query (GET) or modify (SET) the state of remote network devices like switches and routers.

19
New cards

DNS (Domain Name System)

A system that translates human-usable domain names (like www.lsu.edu) into machine-readable IP addresses.

20
New cards

Cryptography

The practice of encoding messages into a secret code (ciphertext) to make them unintelligible to anyone except the intended receiver.

21
New cards

Symmetric Encryption

An encryption scheme that uses the exact same key for both the encryption and decryption processes (e.g., AES, DES).

22
New cards

Asymmetric Encryption (Public-Key Cryptography)

A scheme where each user has a pair of keys: a public key used by others to encrypt messages sent to them, and a private key kept secret by the user to decrypt those messages (e.g., RSA).

23
New cards

Diffie-Hellman Key Agreement

A protocol that allows two parties to securely establish a shared session key over a public channel without needing to pre-distribute any keys.

24
New cards

PGP (Pretty Good Privacy)

A widely used cryptographic approach for securing electronic mail, providing confidentiality, authentication, data integrity, and nonrepudiation.