Most important stuff? Flashcards

(170 cards)

1
Q

absolute URL

A

link to different domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

relative URL

A

link to same domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP request components

A

protocol
domain name
port number
file path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DOC flow block

A

top to bottom expands full width

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DOC flow inline

A

left to right width fits content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 paradigms Javascript supports

A

OOP
imperative
functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cookies store info on

A

client side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CSS applied 3 ways

A

inline (in tags)
internally (in style tag)
external style sheets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what 4 elements not inherited

A

width
margin
padding
border

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

JS can do what to do the DOM

A

access and manipulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

event handlers are

A

JS functions linked to DOM elements events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

event handlers vs event listeners

A

callbacks
elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

asynchronous data fetching

A

data downloading
fetching data asynchronously enables real time updates and smoother user experiences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

REST Api

A

representational state transfer
application programming interface that conforms to design principles of REST arch style

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

web frameworks

A

simplify development of web applications
call your code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

client and back side Web frameworks

A

client side
JS
CSS
HTML

backend
web service APIs
databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

interactive content

A

page responds to user actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dynamic content

A

generated, custom for each user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

why is DOM manipulation a problem

A

complexity of manipulating thousands of elements
traditional doesn’t inherently synchronise data changing across view boards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

one way data binding

A

updates DOM base on data model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2 way data binding

A

automatically synchronises the model and the view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

react

A

front end library focused on building user interfaces of web apps
isolates differences in VDOM then only updates DOM with differences to increase performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 main points of web frameworks

A

1) help with performance (instead of individual manipulation to DOM elements)
2) 2 way data binding ensures model and view consistency
3) help to develop complex applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

relational vs non relational databases

A

relational
rigid
based on structured schema organised into table
vertical scale

non relatiinal
flexible
document based on key value
priorities availability
horizontal scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
db normalisation
removing redundancies which improves consistency of data
26
3 types of ER diagrams
chen crow feet UML
27
DB transactions exhibit ____
ACID atomic consistent isolated durable
28
DB concurrency achieved through
2 phase locking acquire locks in one phase and releases in another
29
deadlock handling
occurs when transactions wait indefinitely for each other to release locks
30
multi value attributes
double circles
31
derived attribute
dotted line
32
weak entity vs normal entity
2 lines around normal just one line weak is when has no attributes of own
33
total participation vs optional participation
double lines one line
34
SQL
declarative
35
client vs server
client: equests resources or services server: provides resources or services
36
thin vs thick client
thin is dumb and provides basic input output only and servers provide storage and processing thick is rich and fat uses own storage and processing and can continue without server
37
DHCP
automates IP ad assignment and configuration
38
DHCP server, client and lease
server holds pool of IP ad and assigns them to clients client device that requests IP ad from DHCP lease is time for which IP is valid
39
connecting to wifi DORA
discovery client broadcasts request for IP ad to DHCP server Offer DHCP server responds with IP ad and network configuration Request client accepts offer and requests to use the offered IP Acknowedgemant DHCP confirms IP assignment and connects client to wifi
40
DNS
domain name systen system used to translate human readable domiain names like www.google.com into IP address like a phone book
41
IP address
set of 4 numbers from 0-255
42
DNS server
severs that translate DN into IP address
43
DNS resolution 6 steps
1) query user enters domain name in browser 2) local DNS resolver checks cache if not found forwards query to root DNS server 3) root DNS server directs to appropriate TLD server 4) TLD server points to authoritative DNS server for specific domain 5) authoritative DNS server provides IP address associated with requested DN 6) response, client now has IP ad and browser can connect to web server using IP ad
44
web applications 3 tier architecture
web server static content application server dynamic database server data management
45
web server get vs post request
get used to request resources, page fetching post used to send data to the server, resource fetching
46
HTTP request must include
URL to identify web server and resource
47
URL has the following info
protocol domain port resource path
48
web server main purposes
fetch and responds to client request through get and post methods path routing security compression caching logging
49
node js
js runtime that allows server side scripting
50
distributed web services pros and cons (CAP)
pros increased avaliability closer servers to client increased performance cons want sited to be but CAP theorem states can only have 2 Consistent Available Partition tolerance
51
web services enable
enable machine o machine interaction over network allowing diff apps to communicate and share data
52
web service APIs provide
HTTP interface databases don't speak HTTp but web services can speak both sql and http
53
HTTP header for request vs response
request accept if mod since if match cookies authorization response last mod ETag set cookie location (redirect URL)
54
express
web server framework for node.js that simplifies routing and middleware management
55
web server 3 tier architecture
presentation (client side UI) logic (server side app logic) data (data management)
56
what is the http response status code for success and client error
200 400
57
REST has stateless interactions what does that mean
each request is independent and server doesn't store client state
58
CRUSD ops implemented through HTTP methods
Create: post Read: get Update: put Delete: delete
59
hot linking
directly linking resources hosted on another server
60
CORS
cross origin resource sharing defines how resources on a server can be requested from another domain
61
CSR patterns and SSR patterns
CSR static file hosting CSR (JS bundle renders into HTML) CSR - JS fetches data and rendered into HTML on client side helpful for search and filter as fetches data from an API as user types SSR static site generation (pre renders HTML for static content, update required rebuild of site) good with few updates SSR - generates HTML on server for each request
62
hosts at network edge have 2 functions
sending function (break app msg up into smaller chunks (packets) receiving function (receives from access network network and reassembles packets to generate application msg)
63
3 types of wired links
twisted pair coaxial fibre optic
64
type of wireless links
wireless radio radio link types (bluetooth, satelite)
65
network core 2 functions
forwarding (switching) move packets from routers input link to appropriate router output link local actions routing global action determine source destination paths taken by packets
66
network protocol
standardised rules for data formatting transmission and receiving common language for computers
67
TCP stands for
transmission control protocol
68
TCP/IP reference model layers
application transport network link layer physical
69
OSI reference model
2 more layers not implemented under application presentation session if they needed they are implemented in application layer
70
network performance metrics
bandwith transmission max capacity thoroughput actual data transmission rate packet loss data packets that fail to reach their destination
71
2 types of network application arch CS and P2P
CS -server provides services to clients and is dedicated, always on clients request services by communicating with server and don't communicate with each other - pros centralised sytem to manage but the cons of that is single point of failure P2P - no dedicated server - all act as both clients and servers and just communicate with each other - supporting dynamic networks - pros no single point of failure but cons difficult to control network traffic
72
application layer
Interfaces with end-user applications to enable services like web browsing, file transfer, and email by defining how messages re formatted and exchanged
73
web caches
temporarily store web contents to decrease load time
74
proxy cache
browser sends all HTTP requests to web proxy
75
3 components of an email
user acgent mail server protocols
76
4 protocols for email sending
SMTP sends emails from client to server and server to server POP post office protocol email retrieval fro a server to a client IMAP internet message access protocol synchronises email between server and client allowing access from multiple clients can check email header before downloading MIME multipurpose internet mail extensions extend email functionality to support multimedia content
77
host @cs.otago.ac.nz wants IP address for ai.cs.waikato.ac.nz
requesting host from otago sends request to local DNS server local DNS server contacts DNS server dns.ac.nz this server contacts waikato.ac.nz DNS server who then contacts the DNS server of cs.waikato.ac.nz to retrieve IP ad then works its way back
78
TCP vs UDP
TCP reliable data transfer with error checking establishes handshake connection before data transfer guarantee of packet arriving in correct order UDP no reliability to guarantee of segments arriving at all let alone in order or no error checking sends data without establishing connection good for video streaming where speed is prioritised
79
transport layer
Manages data delivery with reliability, segmentation, and reassembly using TCP (reliable) or UDP (faster, less reliable).
80
multiplexing
at sender handles data from multiple sockets add transport header
81
demultiplexing
at receiver end uses header information to delivery received segments to correct socket
82
TCP 3 way handshake
establishes connection between client and server client initiates by sending a SYN packet to the server and establishing an initial sequence number server response with SYN-ACK packet acknowledging the client's SYN sending its own sequence number client sends an ACK packet back to the server to confirm server's SYN-ACK and the connection is now established
83
flow control vs congestion control
flow control is one sender too fast for one receiver congestion control is too many sources sending too much data too fast for network to handle
84
network layer
host to host communication sender encapsulates segments into IP packets and passes to link layer receiver delivers segments to TL layer and protocols are IPv4 and IPv6
85
2 key network layer functions
1) packet forwarding (control plane) packets from incoming link to outgoing link within single router 2) routing (data plane) - determining path that packets take from source to deviation across multiple routers t
86
CSR and SSR pros and cons
CSR pros - interactive content cons - no SEO - not fast for CSR but for Static file host SSR pros - useful for dynamic contetn cons - not fast for SSR but for FFS - no interactive content
87
IPv4
defines how data is packaged, addressed, transmitted, routed, and received across networked devices 32 bits (network ID and host ID) unreliable host to host communication protocol
88
IPv4 address split up into
5 classes
89
how many fields in header for IPv4
13
90
subnet
logical partition of an IP network into multiple smaller network segments split host ID up into subnet ID and host ID
91
net mask
32 bit number with all 1s for network part and 0 for host part
92
IP fragmentation and header
network links have max transmission unit in comes one large datagram and out goes 3 smaller datagrams reassembled only at destination (IP header used to identify, order related frags) - ID all same - 3 flags bits indicating if more fragments to come - offset of fragments in packets data field
93
network address translation
all devices in local network share just 1 IPv4 address all datagrams leaving local network have same source NAT IP ad but different source port #s
94
IPv6 motivation
IPv4 exhaustion
95
IPv6
128 bits 40 byte fixed header length written in hexadecimal only 8 field in header eliminating check sum as e checking done at other layer only OG sender not routers can fragment packets TTL replaced with hop limit security built in introduces flow label field to increase handling of packets belonging to same flow for QoS
96
CIDR
classless inter domain routing method for allocating IP addresses and IP routing
97
IPv4 to IPv6 and steps
tunneling IPv6 datagram carried as payload in IPv4 datagram among IPv4 routers 1) IPv6 packet encapsulated within IPv4 packet and IPV4 header added to the front of it 2) encapsulated packet sent over IPv4 network where IPv6 packet extracted 3) at destination IPv4 header stripped and original IPv6 packet processed
98
pre router control plane
individual routing algorithm components in each and every router in control plane interact directly with neighbour
99
software defined networking control plane
remote controller computes, installs forwarding table in routers centralizes control routers share info with centralised controller not each othetr expensive what big orgs use
100
routing algorithms
path is sequence of routers packets traverse from given source host to destination host and goal is to find a good path
101
in routing algorithms cost of link is defined by
network operator - always 1 (minimise hop count) - inverse bandwith - inverse congestion
102
2 types routing algorithm
global (link state) decentralised (distance vector)
103
link state routing
global each node gathers info and floods network with link state packets dijkstras alg to calc least cost path from source
104
distance vector routing
decentralised based on bellman ford algorithm (dynamic programming) each router shares distance information with direct neighbours only more eff in terms of complexity but slower convergence and issues like count to inf
105
if there is a router malfunction what happens link state vs vector distance
router advertises incorrect link cost and each router only computes its own table router advertises incorrect path cost each routers take used by others so e propagates through network
106
intra AS routing vs inter AS routing
intra is within AS RIP : Distance vector OSPF: link state inter is between ASes BGP: path vector
107
autonomous system
group of networks and routers controlled by single admin authority
108
ICMP and what ICMP msg contains
internet control message protocol operates at network layer used by routers and hosts to send network level info supports e reporting, diagnostic functions type + code + first 8 bytes of IP datagram, causing error
109
trace route and ICMP
source sends sets of UDP segments to destination 1st TTL=1 etc each router returns ICMP msg when it discards packet due to TTL=0 allowing trace route to map path packets taken through network
110
Link layer
transfer datagram from 1 node to physically adjacent node over a link
111
hosts and routers and comms channels in link layer
hosts and routers all identical at link layer communication channels that connect adjacent nodes along communication path=links (wired, wireless, LAN)
112
link layer 2 main services
framing and link access - frame encapsulates data with headers and trailers included MAC addresses for source and destination distinct from IP address reliable delivery - provides flow control (for pacing transmissions) and error detection and correction
113
where is the link layer implemented
network interface card NIC or a chip handles both link and physical layer each NIC has a unique MAC addresses for identifying device with a network
114
MAC
medium access control 48 bits 6 groups of 2 hexadecimal digits first 3 tell us manufacturer
115
flow control at transport and link layer
transport - one host to another host - end to end - byte orientated link layer - single link - frame orientated - to adjacent devices
116
window size =
amount of data that can be sent from one device to another before requiring an acknowledgmen sent not acked + usable not sent yet
117
error detection and 2 types
add bits to detect and correct bits error not 100% reliable exists at multiple layers 1) parity checking 2) cyclic redundancy check
118
single bit parity
detects singe bit error if even # 1s add 0 and if add #1s add 1 more to make it even even odd disparity can help us detect if something goes missing
119
2d bit parity
detect and correct single bit errors can't check bit in the row is wrong
120
cyclic redundancy check
more powerful detecting but can't correct checks if been corrupted by / by generator polynomial if non 0 remainder error detected
121
multiple access links and protocols
handling shares access to a channel
122
MAC protocol
medium/media accès protocol determining when a node can transmit communications about channel sharing must use channel itself
123
MAC protocols
dividing channel into small pieces to allocate piece to node for exclusive use
124
TDMA
time divided multiple access divide time into slots and assigns each slot to a node in round robin fashion
125
FDMA
frequency divided multiple access divide channels into frequency bands assigned to nodes
126
random access protocol and 4 types
contention based pure aloha transmit immediately slotted aloha synchronised transmissions to specific time slots decntralised CSMA, carrier sense multiple access nodes listen first b4 transmission don't interrupt CSMA/CD same as above but with collision detection in ethernet nodes detect collisions early and abort transmission resuming after randomised backoff interval polite person abort transmission if collision occurs
127
taking turns MAC protocols
polling - master node invites others to transmit in turn - dumb devices with single point of failure token passing - control taken passed from one node to next sequentially - avoids collisions - single point of failure
128
physical layer
responsible for transmitting raw data bits over a physical medium convert digital data into electrical/radio signals
129
LAN
local area network connects devices within a limited area wired or wireless
130
WAN
wide area network telecommunication network that extends over a large geographical area use leased telecommunication circuits
131
Ethernet
LAN tech for wired connections
132
ethernet topology
bus: all nodes in same collision domain: can collide with each other switched: switch in centre
133
ethernet standard
IEEE 802.3 standard
134
address resolution protocol
used to find MAC address associated with IP address on LAN each device maintains ARP table holding IP to MAC mappings
135
what happens to packets if don't like?
drop as easier to resend packets then trying to correct them
136
what happens if device doesn't know MAC address?
broadcasts an ARP request, device with matching IP replies with its MAC address
137
ethernet switches characteristic
self learning plug and play transparent (hosts unaware of presence of switches) store and forward
138
switches vs routers
switches - link layer - store and forward - learn forwarding table using flooding, learning, MAC address routers - network layer - store and forward - computer tables using routing algorithms and IP addresses
139
TCP/IP model summed up
A is the layer we interact with as programmers coding via socket API t uses TCP/UDP N IPv4 or IPv6 occasionally ICMP L ethernet P electrons wiggling
140
student attaches laptop to campus network and requests/receives www.google.com
1) connecting to network DHCP: client needs IP address and router and DNS server address obtained by DHCP request this request encapsulated in UDP, IP and ethernet protocol layers and broadcasted acorss LAN DHCP response: server respons to client with DHCP ACK reply with encapsulated msg containing clients IP adress, IP address of first hop router for client, name and UP address of DNS server 2) resolving the domain sends ARP request to get MAC address of router DNS query: client sends DNS query for www.google.com, router forwards to DNS server which reopens with google's IP address 3) establish TCP connection 3 way handshake client sends SYN request to open TCP connection to google's IP Google respons with SYN ACK and then client sends Google ACK to complete handshake establishing connection 4) HTTP request and response sends HTTP request over TCP connection google server responds with web page which is routed back to the client and displayed in browser
141
infrastructure model vs ad hoc mode
wireless network architectires - base station connects mobiles into wired network - ad hoc no base stations - only transmit to other notes within like coverage - route among themselves
142
wireless link characteristics
signal attenuation interference multipath propagation Snr increase as Berate decreases
143
cellular networks
solution for wide area mobile networks base station (cell tower) neighbour cells cannot use same set of frequencies
144
handoff
process of transferring ongoing call or data connectivity from one BS to another
145
hard handoff
break for make
146
soft handoff
make before break
147
roaming
customer still using cellular services when travelling outside coverage area of home network by using a visited network
148
confidentiality, authentication, message integrity for security
sender encrypts receiver decrypts confirm identity of each other no changes to message
149
bag guy could
eaves drop intercept and insert msg into connection impersonation hijack
150
symmetric key cryptography
sender adn receievr use same key to encrypt and decrypt faster key needs to be store securely secure channel needs to be used ofr key to be transferred without 3rd party obtaining agree on key by one dewciding then telling
151
public key and 2 requirements
uses private and public key public known to all but need private key known to receiever to decrypt like prize behind a door example 1) satify formula K-(K+(m))) 2) given public key impossible to compute private key
152
encryption
encoding data into form can't be read for unauthorized people
153
AP2.0, 3.0,4.0 5.0 failures?
2 fails if Ip spoofing used 3 replay attack 4 prove alice is live, bob sends alice a nonce R and alice must return R, encrypted with shares secret key 5 uses nonce public key cryptography
154
digital signatures
sender Bob digitally signs message by encrypting with his private key, when alice recieves she receiees m and signature (K-(m)) and usesBob's key to decrypt msg
155
public key certification authorities
each certificate binds public key to an individual indentityy meaning Bob can verify that the public key indeed belongs to Alice Certificate Authority (CA), to issue digital certificates.
156
transport layer security provides the 3
confidentiality via encryption integrity via digital signature authentication via public key cryptography
157
handshake TLS
alice sends msg to Bob using his pubic key Bob will send it back using her public key they decide on shares public key , shared key used for encryption once keys derived switches back to symmetric key derivation
158
change cipher spec and alert protocols
deal with error by notifying closure of secure connection and reporting error
159
HTTPS is a
extension of HTTP over TLS
160
IPSEC
suite of protocols that provides secure communication over IP networks by authenticating and encrypting each IP packe
161
firewall
isolates orgs internal network from large internet allowing some packets to pass blocking others
162
3 types of firewalls
1) stateless packet filtering apply rules to each packet independently based on IP, port protocol 2) stateful tracks state of each connection 3) application gateways
163
con of firewall
cannot detect IP spoofing and limited capabilities against UDP attacks
164
intrusion detection system
performs deep packet inspection to detect suss activities identify complex threats by comparing packet content to known attack signatures
165
firewall vs IDS
firewall - control access based on rules IDS - search/monitor for anomalies and attacks
166
datacenters have how many tier switchers and why
2 to allow for more flexibility for routes and paths less shares links to increase available links to decrease congestion
167
loan balancer
each request sent to different computer not to overload any particular computer
168
congestion notification
normally entirely up to sender to do congestion control sender ramps up amount of data sends looking at ACKS until stops getting ACKS then says top overloaded should back off
169
software defined networking
introduces centralise control plane
170
integrity for messages
hash function takes m input and produces fixed size output called a hash Alice can has message before sending to Bob and Bob can has again and compare hashes, if hashes match msg has not been altered