Most important stuff? Flashcards

1
Q

absolute URL

A

link to different domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

relative URL

A

link to same domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP request components

A

protocol
domain name
port number
file path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DOC flow block

A

top to bottom expands full width

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DOC flow inline

A

left to right width fits content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 paradigms Javascript supports

A

OOP
imperative
functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cookies store info on

A

client side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSS applied 3 ways

A

inline (in tags)
internally (in style tag)
external style sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what 4 elements not inherited

A

width
margin
padding
border

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

JS can do what to do the DOM

A

access and manipulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

event handlers are

A

JS functions linked to DOM elements events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

event handlers vs event listeners

A

callbacks
elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

asynchronous data fetching

A

data downloading
fetching data asynchronously enables real time updates and smoother user experiences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

REST Api

A

representational state transfer
application programming interface that conforms to design principles of REST arch style

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

web frameworks

A

simplify development of web applications
call your code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

client and back side Web frameworks

A

client side
JS
CSS
HTML

backend
web service APIs
databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

interactive content

A

page responds to user actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dynamic content

A

generated, custom for each user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why is DOM manipulation a problem

A

complexity of manipulating thousands of elements
traditional doesn’t inherently synchronise data changing across view boards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

one way data binding

A

updates DOM base on data model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2 way data binding

A

automatically synchronises the model and the view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

react

A

front end library focused on building user interfaces of web apps
isolates differences in VDOM then only updates DOM with differences to increase performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 main points of web frameworks

A

1) help with performance (instead of individual manipulation to DOM elements)
2) 2 way data binding ensures model and view consistency
3) help to develop complex applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

relational vs non relational databases

A

relational
rigid
based on structured schema organised into table
vertical scale

non relatiinal
flexible
document based on key value
priorities availability
horizontal scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

db normalisation

A

removing redundancies which improves consistency of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

3 types of ER diagrams

A

chen
crow feet
UML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DB transactions exhibit ____

A

ACID
atomic
consistent
isolated
durable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

DB concurrency achieved through

A

2 phase locking
acquire locks in one phase and releases in another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

deadlock handling

A

occurs when transactions wait indefinitely for each other to release locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

multi value attributes

A

double circles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

derived attribute

A

dotted line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

weak entity vs normal entity

A

2 lines around
normal just one line
weak is when has no attributes of own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

total participation vs optional participation

A

double lines
one line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SQL

A

declarative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

client vs server

A

client: equests resources or services
server: provides resources or services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

thin vs thick client

A

thin is dumb and provides basic input output only and servers provide storage and processing

thick is rich and fat
uses own storage and processing and can continue without server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DHCP

A

automates IP ad assignment and configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

DHCP server, client and lease

A

server holds pool of IP ad and assigns them to clients
client device that requests IP ad from DHCP
lease is time for which IP is valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

connecting to wifi DORA

A

discovery
client broadcasts request for IP ad to DHCP server

Offer
DHCP server responds with IP ad and network configuration

Request
client accepts offer and requests to use the offered IP

Acknowedgemant
DHCP confirms IP assignment and connects client to wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DNS

A

domain name systen
system used to translate human readable domiain names like www.google.com into IP address
like a phone book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

IP address

A

set of 4 numbers from 0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

DNS server

A

severs that translate DN into IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

DNS resolution 6 steps

A

1) query user enters domain name in browser
2) local DNS resolver checks cache if not found forwards query to root DNS server
3) root DNS server directs to appropriate TLD server
4) TLD server points to authoritative DNS server for specific domain
5) authoritative DNS server provides IP address associated with requested DN
6) response, client now has IP ad and browser can connect to web server using IP ad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

web applications 3 tier architecture

A

web server
static content

application server
dynamic

database server
data management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

web server get vs post request

A

get
used to request resources, page fetching

post
used to send data to the server, resource fetching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

HTTP request must include

A

URL to identify web server and resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

URL has the following info

A

protocol
domain
port
resource path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

web server main purposes

A

fetch and responds to client request through get and post methods

path routing
security
compression
caching
logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

node js

A

js runtime that allows server side scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

distributed web services pros and cons (CAP)

A

pros
increased avaliability
closer servers to client increased performance

cons
want sited to be but CAP theorem states can only have 2

Consistent
Available
Partition tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

web services enable

A

enable machine o machine interaction over network allowing diff apps to communicate and share data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

web service APIs provide

A

HTTP interface
databases don’t speak HTTp but web services can speak both sql and http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

HTTP header for request vs response

A

request
accept
if mod since
if match
cookies
authorization

response
last mod
ETag
set cookie
location (redirect URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

express

A

web server framework for node.js that simplifies routing and middleware management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

web server 3 tier architecture

A

presentation (client side UI)
logic (server side app logic)
data (data management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

what is the http response status code for success and client error

A

200
400

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

REST has stateless interactions what does that mean

A

each request is independent and server doesn’t store client state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

CRUSD ops implemented through HTTP methods

A

Create: post
Read: get
Update: put
Delete: delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

hot linking

A

directly linking resources hosted on another server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

CORS

A

cross origin resource sharing
defines how resources on a server can be requested from another domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

CSR patterns and SSR patterns

A

CSR
static file hosting
CSR (JS bundle renders into HTML)

CSR
- JS fetches data and rendered into HTML on client side
helpful for search and filter as fetches data from an API as user types

SSR
static site generation (pre renders HTML for static content, update required rebuild of site) good with few updates

SSR
- generates HTML on server for each request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

hosts at network edge have 2 functions

A

sending function (break app msg up into smaller chunks (packets)

receiving function (receives from access network network and reassembles packets to generate application msg)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

3 types of wired links

A

twisted pair
coaxial
fibre optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

type of wireless links

A

wireless radio
radio link types (bluetooth, satelite)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

network core 2 functions

A

forwarding (switching) move packets from routers input link to appropriate router output link
local actions

routing
global action
determine source destination paths taken by packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

network protocol

A

standardised rules for data formatting transmission and receiving
common language for computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

TCP stands for

A

transmission control protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

TCP/IP reference model layers

A

application
transport
network
link layer
physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

OSI reference model

A

2 more layers not implemented
under application
presentation
session
if they needed they are implemented in application layer

70
Q

network performance metrics

A

bandwith
transmission max capacity

thoroughput
actual data transmission rate

packet loss
data packets that fail to reach their destination

71
Q

2 types of network application arch CS and P2P

A

CS
-server provides services to clients and is dedicated, always on
clients request services by communicating with server and don’t communicate with each other
- pros centralised sytem to manage but the cons of that is single point of failure

P2P
- no dedicated server
- all act as both clients and servers and just communicate with each other
- supporting dynamic networks
- pros no single point of failure but cons difficult to control network traffic

72
Q

application layer

A

Interfaces with end-user applications to enable services like web browsing, file transfer, and email
by defining how messages re formatted and exchanged

73
Q

web caches

A

temporarily store web contents to decrease load time

74
Q

proxy cache

A

browser sends all HTTP requests to web proxy

75
Q

3 components of an email

A

user acgent
mail server
protocols

76
Q

4 protocols for email sending

A

SMTP
sends emails from client to server and server to server

POP post office protocol
email retrieval fro a server to a client

IMAP internet message access protocol
synchronises email between server and client allowing access from multiple clients
can check email header before downloading

MIME multipurpose internet mail extensions
extend email functionality to support multimedia content

77
Q

host @cs.otago.ac.nz wants IP address for ai.cs.waikato.ac.nz

A

requesting host from otago sends request to local DNS server
local DNS server contacts DNS server dns.ac.nz
this server contacts waikato.ac.nz DNS server who then contacts the DNS server of cs.waikato.ac.nz to retrieve IP ad then works its way back

78
Q

TCP vs UDP

A

TCP
reliable data transfer with error checking
establishes handshake connection before data transfer
guarantee of packet arriving in correct order

UDP
no reliability to guarantee of segments arriving at all let alone in order or no error checking
sends data without establishing connection
good for video streaming where speed is prioritised

79
Q

transport layer

A

Manages data delivery with reliability, segmentation, and reassembly using TCP (reliable) or UDP (faster, less reliable).

80
Q

multiplexing

A

at sender
handles data from multiple sockets
add transport header

81
Q

demultiplexing

A

at receiver end
uses header information to delivery received segments to correct socket

82
Q

TCP 3 way handshake

A

establishes connection between client and server

client initiates by sending a SYN packet to the server and establishing an initial sequence number

server response with SYN-ACK packet acknowledging the client’s SYN sending its own sequence number

client sends an ACK packet back to the server to confirm server’s SYN-ACK and the connection is now established

83
Q

flow control vs congestion control

A

flow control is one sender too fast for one receiver

congestion control is too many sources sending too much data too fast for network to handle

84
Q

network layer

A

host to host communication
sender encapsulates segments into IP packets and passes to link layer
receiver delivers segments to TL layer and protocols are IPv4 and IPv6

85
Q

2 key network layer functions

A

1) packet forwarding (control plane)
packets from incoming link to outgoing link within single router
2) routing (data plane)
- determining path that packets take from source to deviation across multiple routers t

86
Q

CSR and SSR pros and cons

A

CSR
pros
- interactive content

cons
- no SEO
- not fast for CSR but for Static file host

SSR
pros
- useful for dynamic contetn

cons
- not fast for SSR but for FFS
- no interactive content

87
Q

IPv4

A

defines how data is packaged, addressed, transmitted, routed, and received across networked devices
32 bits (network ID and host ID)
unreliable host to host communication protocol

88
Q

IPv4 address split up into

89
Q

how many fields in header for IPv4

90
Q

subnet

A

logical partition of an IP network into multiple smaller network segments

split host ID up into subnet ID and host ID

91
Q

net mask

A

32 bit number with all 1s for network part and 0 for host part

92
Q

IP fragmentation and header

A

network links have max transmission unit
in comes one large datagram and out goes 3 smaller datagrams
reassembled only at destination (IP header used to identify, order related frags)
- ID all same
- 3 flags bits indicating if more fragments to come
- offset of fragments in packets data field

93
Q

network address translation

A

all devices in local network share just 1 IPv4 address
all datagrams leaving local network have same source NAT IP ad but different source port #s

94
Q

IPv6 motivation

A

IPv4 exhaustion

95
Q

IPv6

A

128 bits
40 byte fixed header length
written in hexadecimal
only 8 field in header eliminating check sum as e checking done at other layer
only OG sender not routers can fragment packets
TTL replaced with hop limit
security built in
introduces flow label field to increase handling of packets belonging to same flow for QoS

96
Q

CIDR

A

classless inter domain routing
method for allocating IP addresses and IP routing

97
Q

IPv4 to IPv6 and steps

A

tunneling
IPv6 datagram carried as payload in IPv4 datagram among IPv4 routers

1) IPv6 packet encapsulated within IPv4 packet and IPV4 header added to the front of it
2) encapsulated packet sent over IPv4 network where IPv6 packet extracted
3) at destination IPv4 header stripped and original IPv6 packet processed

98
Q

pre router control plane

A

individual routing algorithm components in each and every router in control plane
interact directly with neighbour

99
Q

software defined networking control plane

A

remote controller computes, installs forwarding table in routers
centralizes control
routers share info with centralised controller not each othetr
expensive
what big orgs use

100
Q

routing algorithms

A

path is sequence of routers packets traverse from given source host to destination host and goal is to find a good path

101
Q

in routing algorithms cost of link is defined by

A

network operator
- always 1 (minimise hop count)
- inverse bandwith
- inverse congestion

102
Q

2 types routing algorithm

A

global (link state)
decentralised (distance vector)

103
Q

link state routing

A

global
each node gathers info and floods network with link state packets
dijkstras alg to calc least cost path from source

104
Q

distance vector routing

A

decentralised
based on bellman ford algorithm (dynamic programming)
each router shares distance information with direct neighbours only
more eff in terms of complexity but slower convergence and issues like count to inf

105
Q

if there is a router malfunction what happens link state vs vector distance

A

router advertises incorrect link cost and each router only computes its own table

router advertises incorrect path cost
each routers take used by others so e propagates through network

106
Q

intra AS routing vs inter AS routing

A

intra is within AS
RIP : Distance vector
OSPF: link state

inter is between ASes
BGP: path vector

107
Q

autonomous system

A

group of networks and routers controlled by single admin authority

108
Q

ICMP and what ICMP msg contains

A

internet control message protocol
operates at network layer
used by routers and hosts to send network level info
supports e reporting, diagnostic functions

type + code + first 8 bytes of IP datagram, causing error

109
Q

trace route and ICMP

A

source sends sets of UDP segments to destination
1st TTL=1 etc
each router returns ICMP msg when it discards packet due to TTL=0 allowing trace route to map path packets taken through network

110
Q

Link layer

A

transfer datagram from 1 node to physically adjacent node over a link

111
Q

hosts and routers and comms channels in link layer

A

hosts and routers all identical at link layer
communication channels that connect adjacent nodes along communication path=links (wired, wireless, LAN)

112
Q

link layer 2 main services

A

framing and link access
- frame encapsulates data with headers and trailers included MAC addresses for source and destination distinct from IP address
reliable delivery
- provides flow control (for pacing transmissions) and error detection and correction

113
Q

where is the link layer implemented

A

network interface card NIC or a chip
handles both link and physical layer
each NIC has a unique MAC addresses for identifying device with a network

114
Q

MAC

A

medium access control
48 bits 6 groups of 2 hexadecimal digits
first 3 tell us manufacturer

115
Q

flow control at transport and link layer

A

transport
- one host to another host
- end to end
- byte orientated

link layer
- single link
- frame orientated
- to adjacent devices

116
Q

window size =

A

amount of data that can be sent from one device to another before requiring an acknowledgmen

sent not acked + usable not sent yet

117
Q

error detection and 2 types

A

add bits to detect and correct bits error
not 100% reliable
exists at multiple layers

1) parity checking

2) cyclic redundancy check

118
Q

single bit parity

A

detects singe bit error
if even # 1s add 0 and if add #1s add 1 more to make it even
even odd disparity can help us detect if something goes missing

119
Q

2d bit parity

A

detect and correct single bit errors
can’t check bit in the row is wrong

120
Q

cyclic redundancy check

A

more powerful detecting but can’t correct
checks if been corrupted by / by generator polynomial if non 0 remainder error detected

121
Q

multiple access links and protocols

A

handling shares access to a channel

122
Q

MAC protocol

A

medium/media accès protocol
determining when a node can transmit
communications about channel sharing must use channel itself

123
Q

MAC protocols

A

dividing channel into small pieces to allocate piece to node for exclusive use

124
Q

TDMA

A

time divided multiple access
divide time into slots and assigns each slot to a node in round robin fashion

125
Q

FDMA

A

frequency divided multiple access
divide channels into frequency bands assigned to nodes

126
Q

random access protocol and 4 types

A

contention based

pure aloha
transmit immediately

slotted aloha
synchronised transmissions to specific time slots
decntralised

CSMA, carrier sense multiple access
nodes listen first b4 transmission
don’t interrupt

CSMA/CD same as above but with collision detection
in ethernet nodes detect collisions early and abort transmission resuming after randomised backoff interval
polite person
abort transmission if collision occurs

127
Q

taking turns MAC protocols

A

polling
- master node invites others to transmit in turn
- dumb devices with single point of failure

token passing
- control taken passed from one node to next sequentially
- avoids collisions
- single point of failure

128
Q

physical layer

A

responsible for transmitting raw data bits over a physical medium
convert digital data into electrical/radio signals

129
Q

LAN

A

local area network
connects devices within a limited area
wired or wireless

130
Q

WAN

A

wide area network
telecommunication network that extends over a large geographical area
use leased telecommunication circuits

131
Q

Ethernet

A

LAN tech for wired connections

132
Q

ethernet topology

A

bus: all nodes in same collision
domain: can collide with each other
switched: switch in centre

133
Q

ethernet standard

A

IEEE 802.3 standard

134
Q

address resolution protocol

A

used to find MAC address associated with IP address on LAN
each device maintains ARP table holding IP to MAC mappings

135
Q

what happens to packets if don’t like?

A

drop as easier to resend packets then trying to correct them

136
Q

what happens if device doesn’t know MAC address?

A

broadcasts an ARP request, device with matching IP replies with its MAC address

137
Q

ethernet switches characteristic

A

self learning
plug and play
transparent (hosts unaware of presence of switches)
store and forward

138
Q

switches vs routers

A

switches
- link layer
- store and forward
- learn forwarding table using flooding, learning, MAC address

routers
- network layer
- store and forward
- computer tables using routing algorithms and IP addresses

139
Q

TCP/IP model summed up

A

A is the layer we interact with as programmers coding via socket API
t uses TCP/UDP
N IPv4 or IPv6 occasionally ICMP
L ethernet
P electrons wiggling

140
Q

student attaches laptop to campus network and requests/receives www.google.com

A

1) connecting to network
DHCP: client needs IP address and router and DNS server address obtained by DHCP request
this request encapsulated in UDP, IP and ethernet protocol layers and broadcasted acorss LAN
DHCP response: server respons to client with DHCP ACK reply with encapsulated msg containing clients IP adress, IP address of first hop router for client, name and UP address of DNS server

2) resolving the domain
sends ARP request to get MAC address of router
DNS query: client sends DNS query for www.google.com, router forwards to DNS server which reopens with google’s IP address

3) establish TCP connection
3 way handshake
client sends SYN request to open TCP connection to google’s IP
Google respons with SYN ACK and then client sends Google ACK to complete handshake establishing connection

4) HTTP request and response
sends HTTP request over TCP connection google server responds with web page which is routed back to the client and displayed in browser

141
Q

infrastructure model vs ad hoc mode

A

wireless network architectires

  • base station connects mobiles into wired network
  • ad hoc no base stations
  • only transmit to other notes within like coverage
  • route among themselves
142
Q

wireless link characteristics

A

signal attenuation
interference
multipath propagation
Snr increase as Berate decreases

143
Q

cellular networks

A

solution for wide area mobile networks
base station (cell tower)
neighbour cells cannot use same set of frequencies

144
Q

handoff

A

process of transferring ongoing call or data connectivity from one BS to another

145
Q

hard handoff

A

break for make

146
Q

soft handoff

A

make before break

147
Q

roaming

A

customer still using cellular services when travelling outside coverage area of home network by using a visited network

148
Q

confidentiality, authentication, message integrity for security

A

sender encrypts receiver decrypts

confirm identity of each other

no changes to message

149
Q

bag guy could

A

eaves drop

intercept and insert msg into connection

impersonation

hijack

150
Q

symmetric key cryptography

A

sender adn receievr use same key to encrypt and decrypt
faster
key needs to be store securely
secure channel needs to be used ofr key to be transferred without 3rd party obtaining
agree on key by one dewciding then telling

151
Q

public key and 2 requirements

A

uses private and public key
public known to all but need private key known to receiever to decrypt
like prize behind a door example
1) satify formula K-(K+(m)))
2) given public key impossible to compute private key

152
Q

encryption

A

encoding data into form can’t be read for unauthorized people

153
Q

AP2.0, 3.0,4.0 5.0 failures?

A

2 fails if Ip spoofing used
3 replay attack
4 prove alice is live, bob sends alice a nonce R and alice must return R, encrypted with shares secret key
5 uses nonce public key cryptography

154
Q

digital signatures

A

sender Bob digitally signs message by encrypting with his private key, when alice recieves she receiees m and signature (K-(m)) and usesBob’s key to decrypt msg

155
Q

public key certification authorities

A

each certificate binds public key to an individual indentityy meaning Bob can verify that the public key indeed belongs to Alice

Certificate Authority (CA), to issue digital certificates.

156
Q

transport layer security provides the 3

A

confidentiality via encryption
integrity via digital signature
authentication via public key cryptography

157
Q

handshake TLS

A

alice sends msg to Bob using his pubic key
Bob will send it back using her public key
they decide on shares public key , shared key used for encryption
once keys derived switches back to symmetric key derivation

158
Q

change cipher spec and alert protocols

A

deal with error by notifying closure of secure connection and reporting error

159
Q

HTTPS is a

A

extension of HTTP over TLS

160
Q

IPSEC

A

suite of protocols that provides secure communication over IP networks by authenticating and encrypting each IP packe

161
Q

firewall

A

isolates orgs internal network from large internet allowing some packets to pass blocking others

162
Q

3 types of firewalls

A

1) stateless packet filtering
apply rules to each packet independently based on IP, port protocol
2) stateful
tracks state of each connection
3) application gateways

163
Q

con of firewall

A

cannot detect IP spoofing and limited capabilities against UDP attacks

164
Q

intrusion detection system

A

performs deep packet inspection to detect suss activities
identify complex threats by comparing packet content to known attack signatures

165
Q

firewall vs IDS

A

firewall
- control access based on rules

IDS
- search/monitor for anomalies and attacks

166
Q

datacenters have how many tier switchers and why

A

2 to allow for more flexibility for routes and paths
less shares links to increase available links to decrease congestion

167
Q

loan balancer

A

each request sent to different computer not to overload any particular computer

168
Q

congestion notification

A

normally entirely up to sender to do congestion control
sender ramps up amount of data sends looking at ACKS until stops getting ACKS then says top overloaded should back off

169
Q

software defined networking

A

introduces centralise control plane

170
Q

integrity for messages

A

hash function takes m input and produces fixed size output called a hash
Alice can has message before sending to Bob and Bob can has again and compare hashes, if hashes match msg has not been altered