• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/357

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

357 Cards in this Set

  • Front
  • Back
Asynchronous Transfer Mode (ATM)
Cell Relay; a culmination of developments in circuit switching and packet switching. ATM uses fixed-length packets, called cells.
Circuit Switching
Network where a dedicated communication path is established between two stations through the nodes of the network. Path is a connected sequence of physical links between nodes. Data generated by the source station are transmitted along the dedicated path as fast as possible. I.E., Telephone Network.
Client/Server
Separate computers (servers) support database functions, store files, perform printing services and provide other specialized functions on a shared basis for many users (clients).
Convergence
Refers to the merger of previously distinct telephony and information technologies and markets. Brings many benefits including simplified network management, increased efficiency and greater flexibilitiy at the applicaiton level.
Three-Layer model of Enterprise Communications
Packet-based transmissions using the IP (Internet protocol).
Applications: integrates communications applications (voice calling, voicemail, e-mail, IMs) with business applications.
Enterprise Services: manager deals with the information network in terms of the services it supplies to support applications. (function providing system)
Infrastructure: consists of the communication links - LANs, WANs and Internet connections available to the enterprise.
Data Communications
Refers to any form of information transfer other than voice
Distributed Applications
Applications that are designed to work among a distributed set of computers for both intra-company and inter-company information exchange.
Software that executes on two or more computers in a network. In a client-server environment, distributed applications have two parts: (1) the 'front end' that requires minimal computer resources and runs on the client computer(s), and (2) the 'back end' that requires large amounts of data crunching power and/or specialized hardware, and runs on a suitably equipped server computer.
Frame Relay
A form of packet switching based on the use of variable-length link layer frames.. No network layer, basic functions have been streamlined or eliminated to provide for greater throughput.
Image Communications
Technology for storing and transmitting images , creates a demand for high-capacity networks and is one of the driving forces in the development of networking technology. Note: Important component of office environments - i.e., Fax.
Internet
Public telecommunication network.
A worldwide internetwork based on TCP/IP that interconnects thousands of public and private networks and millions of users.
Local Area Network (LAN)
A communications network that interconnects a variety of devices and provides a means for information exchange among those devices. Scope is small, typically a single building or a cluster of buildings.
Packet Switching
Data are sent out in a sequence of small chunks, called packets. Each packet is passed through the network from node to node along some path leading from source to destination. At each node, the entire packet is received, stored briefly and then transmitted to the next node. Commonly used for terminal-to-computer and computer-to-computer communications.
TCP/IP
Transmission Control Protocol/Internet Protocol: now universally used for the communications software function across multiple-vendor equipment and is the basis for the operation of the Internet.
Unified Communications
Focuses on the user perspective to the broad spectrum of business applications. Key elements:
1. Based on an integrated set of user interfaces and back-end connectivity for all communications services.
2. Merges real-time communications services with non-real-time collaboration and business process applications.
Video Communications
Becoming increasingly important in the office environment/business world. Traditionally was a one-way communication of entertainment programs. Now with the availability of high capacity transmissions links and networks, business applications are possible - i.e., video-conferencing.
Voice Communications
Primarily refers to telephone-related communications. Enhanced by a variety of computer-based services including voice mail and computerized telephone exchange systems. Now - VoIP protocol - merger of voice and internet technologies resulting in PBX and IP Centrex offerings that provide full internet support.
Wide Area Networks (WANs)
Networks that generally cover a large geographical area, require the crossing of public right-of-ways, and rely at least in part on circuits provided by a common carrier. Typically, consists of a number of interconnected switching nodes. Transmission from any attached device is routed through these internal nodes to the specified destination device. These nodes are not concerned with thee content of the data; rather their purpose is to provide a switching facility that will move the data from node to node until they reach their destination.
Wireless Networking
Wireless technology commonly used in both WANs and data networks. Provide advantages in the areas of mobility and ease of installation and configuration.
Three kinds of basic organizational difficulties communications technology can help companies overcome:
Traffic Growth: Local and Long Distance, Increasing emphasis on office automation, remote access, online transactions and other productivity measures. Struggle to maximize capacity and minimize transmission costs.
Development of New Services: Range of services expands which increases the demand for high-capacity networking and transmission facilities.
Advances in Technology: trends that enable the provision of increasing traffic capacity and the support of a wide range of services.
Four Types of Information Found on Networks:
IP Telephony: International and long-distance savings, Economics of converged networks, and productivity through application integration.
Multimedia Messaging: Increased productivity, reduced network expense, and integration into business workflow
e-Business: Workflow integration, productivity improvements, New applications tied to business needs , and better management of suppliers/ partners.
Customer Relationship Management: New customer acquisition; increased satisfaction for existing customers, reduced operating expenses and productivity via workflow management.
How has the technology of the compact disc used in the music industry been used in image communications?
The optical disc, which is similar to the compact disc, enables the storage of immense amounts of information that can be stored inexpensively as well as it being easily distributable in an office setting.
Why are burdens on Manager greater today than in previous years?
Because now they have to keep up with emerging technology and finding ways to incorporate it in their businesses at a reasonable cost. And by finding ways to incorporate technology into networks as well as making them secure and reliable.
Why has optical fiber transmission become popular in the past few years?
This transmission mode has become popular by high data transmission capacity as well as the drop in cost of this resource. Also because security characteristics of optical fiber transmission makes this resource a much sought after tool and the only issue with this mode of transmission is the bottleneck created by switching.
What types of communications can be carried by satellite transmission?
Voice (telephone communications), image (fax), video (video conferencing) and data such as reports, memos and other documents. Satellite transmission enables the user to have a portable terminal such as a smartphone from which the user can access the web, chat, and do other transactions over satellite transmission; it is also a huge factor in the rise of portable computing.
Name two approaches that can be used for increasing efficiency of transmission services.
Two approaches that can be used for increasing efficiency of transmission services are multiplexing and compression.
Multiplexing
Refers to the ability of a number of devices to share a transmission facility
Compression
involves squeezing the data down so that a lower-capacity, cheaper transmission facility can be used to meet a given demand.
Contrast of the function of application software with that of interconnection software.
Application software could be described as the end product of a certain application offered to users. An example of application software is multimedia messaging in which the user has access to a variety of sources by which to communicate such an e-mail and voice mail. Interconnection software is the software that makes it possible for the end user to be able to see the final product such as the interface for using emails. Interconnection software makes it possible for computers in a network to work together by communicating in the same language.
Analog
A continuous signal (i.e., a voltage) that can take on a continuum of values, an example is the eletrical signal coming out of a microphone when someone speaks into it. For analog communication, information rate and channel capacity are measured in (Hz)
Virtually any comunication signal can be expressed as a combination of pure oscillations of various frequencies.
The bandwidth measures the limits of these frequencies. The higher the frequencies allowed, the more accurately a complex signal can be represented.
Audio Service
Supports applications beased on sound, usually of the human voice. Primary application - telephone communication
Centrex
a telephone company offering that provides the same sort of service as a PBX but performs the switching function in equipment located in the telephone company's central office as opposed to the customer's premises
Digital
Informaiton represented as a sequence of discrete symbols from a finite "alphabet" Examples are: text, numerical data and binary data.
Information rate and the capacity of a digital channel are measured in bits per second (bps)
Analog
Information is a continuous signal (for example a voltage) that can take on a continuum of values. Example: electrical signal coming out of a microphone when someone speaks into it.
The analog electrical signal represents the continuous acoustic changes in air pressure that make up sound.
To get a good representation of sound in digital format, we need to ___________ its amplitude at a rate (samples per second (smp/s)) equal to at least twice the maximum frequency of the analog signal.
Sample
Quantization
Process where after sampling , the signal amplitudes must be put in digital form
Private Branch Exchange (PBX)
an on-premise switching facility, owned or leased by an organization, that interconnects the telephones within the facility and provides access to the public telephone system.
Text
A familiar example of digital data
International Reference Alphabet (IRA)
the most commonly used text code. Each character in this code is represented by a unique 7-bit pattern; 128 different characters can be represented. Almost always stored and transmitted using 8 bits per character.
Parity - in IRA
Eighth bit in an IRA character used for error detection. The bit is set so that the total number of binary 1s in each octet is always odd (odd parity), or always even (even parity). A transmission error that changes a single bit, or any odd number of bits can be detected.
Lossy Compression
barely perceivable loss of information, may reduce the data by factors of roughly 10:1 to 20:1
Lossless compression
No loss of information is acceptable in compression, ratios run below 5:1 Example: Medical Imaging
Vector Graphics
image is represented as a collection of straight and curved line segments. Simple objects, such as rectangles and ovals, and more complex objects are defined by the grouping of line segments.
Raster Graphics
Image is represented as a two-dimensional array of spots, called pixels. Each pixel is either black or white.
Used for computer image processing and fax.
Grayscale Image
produced if each pixel is defined by more than one bit, representing shades of gray.
JPEG
Most widely used format for raster-scan images. (Joint Photographic Experts Group) A set of standards for the compression off raster-scan images, both grayscale and color. Appropriate for high-quality images(photos).
GIF
Another format seen on the web (Graphics Interchange Format). An 8-bit color format that can display up to 256 colors and is generally useful for non-photographic images with a fairly narrow range of color. i.e., Company Logo. Originated by Compuserve, principal application/usage: flat-color graphics, animation.
PDF
(Portable Document Format) suitable for documents that include text and images, widely used on the web and readers are available for virtually all OS's free.
Postscript
Page description language that is built into many desktop printers and virtually all high-end printing systems.
Networking Implications of Images
A tremendous number of bits is needed for representation in the computer, can be reduced by compression techniques. Even with compression the number of bits to be transmitted for image information is large. Two concerns - response time and throughput.
Video
Service that carries sequences of pictures in time.Makes use of a sequence of raster-scan images, can be thought of as a time-varying analog signal.
To produce a picture on a screen, an electron beam scans across the surface of the screen from left to right and top to bottom. To achieve adequate resolution, the beam produces a total of 483 horizontal lines at a rate of 30 complete scans of the screen per second.
Interlacing
Technique used to provide flicker-free image without increasing the bandwidth requirement - the odd numbered scan lines and the even numbered scan lines are scanned separately, with odd and even fields alternating on successive scans.
Digital Video
the capture, manipulation and storage of video in digital formats. Take a series of digital photographs at a rate of at least 30 frames per second.
______________ scan is used for computer monitors and most HDTV schemes
Progressive
TVoIP
transmission of video over IP-based networks, including the internet and private intranets, known as video streaming.
Response Time
the time it takes a system to react to a given input. Or, the time it takes for the system to respond to a request to perform a particular task. Shorter response time imposes greater cost.
Computer Processing Power
The faster the computer, the shorter the response time. Increased processing power means increased cost.
Competing Requirements
Providing rapid response time to some processes may penalize other processes.
Response time ranges:
Greater than 15 seconds: rules out conversational interaction
Greater than 4 seconds: generally too long for a conversation requiring the operator to retain information in operator's short-term memory.
2 to 4 seconds: delay longer than 2 seconds can be inhibiting to terminal operations demanding a high level of concentration
Less than 2 seconds: the more detailed the information remembered, the greater the need for responses of less than 2 seconds.
Sub-second response time: certain types of thought-intensive work, especially with graphics applications, require very short response times to maintain the user's interest and attention for long periods of time.
Decisecond response time: response to pressing a key and seeing the character displayed on the screen or clicking a screen object with a mouse needs to be almost instantaneous
When a computer and a user interact at a pace that ensures that neither has to wait on the other, _____________ increases significantly.
Productivity
User Response Time
The time span between the moment a user receives a complete reply to one command and enters the next command. (Think-Time)
System Response Time
The time span between the moment the user enters a command and the moment a complete response is displayed on the terminal
Web systems with a ________________ or better response time maintain a high level of user attention.
3-second
Web systems with a response time between ___________ result in loss of some user concentration.
3 and 10 seconds
Web systems with a response time above ___________ discourage the user, who may simply abort the session.
10-seconds
Characteristics that change audio file sizes
length, sampling rate and bits per sample
____________________ describes the number of times per second an image is sent and this value can drastically change the file size or bandwidth required for transmission.
Frame Rate
Downside of modifying an image or stream in order to reduce the size
you usually sacrifice some amount of quality.
Voice
audio service support applications based on sound, usually of the human voice - primarily telephone, other applications: telemarketing, voice mail, audio teleconferencing and entertainment radio.
What are the two different interpretations of the prefixes kilo, mega and giga?
Literally taken, the prefixes kilo, mega, and giga mean 1,000, 1,000,000, and 1,000,000,000 respectively. However, due to the way computers work (and this is a gross simplification) one kilobyte actually equals 1024 bytes, a meg is 1,048,576, and a gig is 1,073,741,824.
What is the bandwidth of telephone voice?
3400 Hz of bandwidth = moderate quality
The process that takes advantage of redundancy to reduce the number of bits sent for a given piece of data is called what?
Compression
What is the difference between Centrex and PBX?
PBX provides a on-premise switching facility that interconnects the telephones within the facility and provides access to the public telephone system, Centrex performs the switching function in equipment located in the telephone company's central office.
What is the difference between a printable character and a control character?
A printable character is able to be printed as output, a control character is not printable and is used for things such as error detection and function control.
Explain the basic principles of vector graphics and raster graphics.
Vector graphics represents images as curved and straight line segments which can be grouped together to form complex shapes, use binary codes to represent details of image - size, type and orientation - later used to be transmitted digitally. Raster graphics = images as pixels, which are two-dimensional array of black and white spots. The most used form of raster graphics is faxes.
List two common image formats
JPEG - good for photos
GIF - good for web-based graphics and animations
List two common image formats.
PDF - good for text and graphics
Postscript - page description language - desktop printers and all high-end printing systems.
Describe the process used to prevent flicker in a video screen.
Prevention of flickering is done by Interlacing - process that involves scanning odd-numbered lines and even-number lines separately in order to refresh the screen 60 times per second instead of 30 times per second, also prevents having to increase bandwidth.
Define Response Time.
The time it takes a system to react to a given input. Or, the time it takes for the system to respond to a request to perform a particular task.
User response time: the time span between the moment a user receives a complete reply to one command and enters the next command (think time)
System response time: time span between the moment the user enters a command and the moment a complete response is displayed on the terminal.
What is considered an acceptable system response time for interactive applications and how does this response time relate to acceptable response times for Web sites?
Less than two seconds would be an acceptable system response time for interactive applications. the more detailed the information remembered, the greater the need for responses of less than 2 seconds. Web Systems with a 3--second or better response time maintain a high level of user attention.
Centralized Data Processing
Architecture where the data processing support is provided by one or a cluster of computers, generally large computers, located in a central data processing facility. i.e., payroll application
Centralized Computers
one or more computers are located in a central facility
Centralized Processing
All applications are run on the central data processing facility
Centralized Data
Most data are stored in files and databases at the central facility and are controlled by and accessible by the central computer or computers.
Centralized Control
A data processing or information systems manager has responsibility for the centralized data processing facility
Centralized Support Staff
A centralized data processing facility must include a technical support staff to operate and maintain the data processing equipment. Programming is usually done by a central staff.
Distributed Data Processing (DDP)
Computers, usually smaller computers, are dispersed throughout an organization, some form of interconnection is usually needed. Provides great flexibility. Data/applications are maintained on individual servers that are not tied to a centralized computer room but can be sited at the most convenient location. All servers have wireless access to the network. Network management and security are easier to manage.
Vertical Partitioning
Data processing is distributed in a hierarchical fashion which may reflect the organizational structure or simply be the most appropriate for the application.
Involves one application split up into components that are dispersed among a number of machines.
Horizontal Partitioning
Data processing is distributed among a number of computers that have a peer relationship - no concept of client/server. Normally operate autonomously - configuration sometimes used for load balancing. Usually reflects organizational decentralization. Involves either one application replicated on a number of machines or a number of different applications distributed among a number of machines.
Office Automation Support System
Staff and personnel are equipped with personal computers linked together by a network. Each PC contains software packages useful to that user. Systems are linked together so that users may exchange messages, files and other information.
An example of Horizontal Partitioning.
Distributed Devices
a distributed set of devices that can be controlled by processors. i.e., ATMs, lab interface equipment, factory automation. Involves the distribution of processing technology to the various locations of the manufacturing process.
Network Management
Any distributed system requires some form of management and control - including control of access to some of the facilities in the system, monitoring of the status of various components, and management of the communications facility to ensure availability and responsiveness. Each computer in the system must include some management and control logic to be able to interact with the central network management system.
Database
A structured collection of data stored for use in one or more applications. Contains the relationships between data items and groups of data items.
Database Management System (DBMS)
A suite of programs for constructing and maintaining the database and for offering ad hoc query facilities to multiple users and applications.
Query Language
Provides a uniform interface tot he database for users and applications.
Data Definition Language (DDL)
language used to define the database logical structure and procedural properties, represented by a set of database description tables.
Data Manipulation Language (DML)
language that provides a powerful set of tools for application developers.
Distributed database
Collection of several different databases, distributed among multiple computers, that looks like a single database to the user. The DBMS controls access to the distributed database and enables the user to treat the distributed database as a single database.
Centralized Database
Database housed in a central computer facility. Often used with a vertical DDP organization. Desirable when the security and integrity of the data are paramount because the central facility is more easily controlled than a dispersed collection of data.
Replicated Database
an overall strategy for data distribution. all or part of the database is copied at two or more computers.l
Client/Server Architecture
Users work on powerful workstations or PCs which supports the end-user programming, provides the ability to use off=the-shelf software, and gives the immediate response inherent in distributed architecture. The clients, are supported by specialized servers. - which provide database services, printing and fax services, files storage, and communication front ends, gateways and bridges. (LANs)
Connectivity
The ability of components in the system to exchange data.
Vertically partitioned DDP system - components generally need links only to components above and below them in the hierarchical structure. (more links are required than connections.)
Horizontally partitioned systems may need to allow data exchange between any two systems.
Performance
Assessment of the system and the applications it supports.
Availability
refers to the percentage of time that a particular function or application is available for users.
Extranet
Makes use of TCP/IP protocols and applications - especially the web. Provides access to corporate resources by outside clients - suppliers and customers or home-based workers, via the internet or through other data communications networks (portals).
Intranet
provides users the features and applications of the Internet but isolated within the organization.
Intranet Features
* Uses Internet-based standards
* Uses the TCP/IP protocol suite for local and WAN
* Comprises wholly owned content not accessible to the public
* can be managed
DDP System
A computing facility in which computers are dispersed within an organization with some means of interconnection among them. Implemented in a wide variety of forms. Functions/Objects supported:
* Applications
* Device controllers
* Control
* Data
What are some functions that are centralized in a fully centralized data processing facility?
Processing - all applications are run on the central data processing facility - mainframe or server
Data - most data are stored in files and databases at the central facility and are controlled by and accessible by the central computer or computers
Control - A data processing or information systems manager has responsibility for the centralized data processing facility
Support Staff - technical support staff to operate and maintain the data processing equipment/software
What are some advantages of a centralized processing facility?
Economies of scale
Can afford to have professional programmers on staff to meed the needs of the various departments.
Management can maintain control over data processing procurement, enforce standards for programming and data file structure and design and implement a security policy.
Based on your reading of the chapter, name five components that might be part of a fully centralized system.
Centralized computers
Centralized processing
Centralized data
Centralized control
Centralized support staff
What is a distributed data processing (DDP) strategy?
Computers are dispersed throughout an organization, the objective is to process information in a way that is most effective based on operational, economic, and/or geographic considerations (or all three). Some form of interconnection is usually needed. Allows greater flexibility in structure and more autonomy, but creates more redundancy .
Applications for the distributed environment are available much sooner than those in the centralized environment. What are the main sources of these applications?
Off-The-Shelf Applications - readily available (no backlog) and don't need to worry about communicating requirements from users to professional programmers.
Real-Time Replication
Immediately synchronized data/database
Near-Real-Time Replication
(more common) Backups occur in batches with a small amount of lag time (e.g., 30 minutes)
Deferred Replication
involves bulk transfer of a large number of changes at infrequent intervals, such as once or twice a day. Minimizes network resource requirements but does not provide current data.
Describe three ways that an application can be allocated in a distributed environment. (Forms of Distributed Applications)
* Split up into components that are dispersed among a number of machines
* One application replicated on a number of machines
* A number of different applications distributed among a number of machines.
What major problems for the data processing manager result from distributed small systems?
Lack of centralized processing may result in the loss of centralized control.
Individual departments may adopt incompatible systems, making interdepartmental cooperation difficult.
Procurement decisions may be made without systematic forecasts of requirements and cost and with no enforcement of standards for hardware, software, or departmental programming practices.
Increases the difficulty of obtaining data for use by top management, makes uniform collection of data for upward reporting more difficult.
What are some reasons for wanting to interconnect distributed data processing systems?
Responsiveness
Availability
Correspondence to Organizational Patterns
Resource Sharing
Incremental Growth
Increased User Involvement and Control
Decentralized Operation and Centralized Control
End-User Productivity
Distance and Location Independence
Privacy and Security
Vendor Independence
Flexibility
Distinguish between horizontal and vertical partitioning of applications.
Vertical partitioning involves one application split up into components that are dispersed among a number of machines - objective is to assign processing load to the level of the hierarchy at which it is most cost-effective.
Horizontal partitioning involves either one application replicated on a number of machines, or a number of different applications distributed among a number of machines - data processing is distributed among a number of computers that have a peer relationship - no concept of client/server.
Why would a company want a distributed database?
Distributed databases provide local autonomy by giving each department control over its data. Departments have a sense of ownership over their data.A distributed database architecture adapts more easily to changes in the organizational structure. When organizations add new locations or takeover independent entities, distributed databases allow for a smoother transition. More Flexible - local units retain some control over how data's organized and accessed. Units can change data format to accommodate unique geographical or departmental needs.
In designing a distributed database, database objectives and communications objectives are not always the same. Distinguish between the two sets of objectives.
Database objectives include accessibility of the data, security and privacy and completeness and integrity of the data - more concerned with access, availability and integrity. Communications objectives are to minimize the communications load and the delays imposed by the use of communications facilities - more concerned with load balancing and communications cost.
How does a factory often reflect the use of distributed devices?
Each major operational area is controlled by a work-station, which is fed information from individual process-control micro-processors. Distributed workstations ensure rapid response to conditions at the process level. All the workstations are linked to a higher-level computer concerned with operations planning, optimization, provision of management information, and general corporate data processing.
Name three types of communications and networking requirements generated by the use of distributed data processing.
Connectivity
Availability
Performance
Why do we still need mainframe computers even though personal computers and workstations have become so much more powerful?
These computers are capable of completing multiple tasks at the same time, taking commands from multiple users. They are capable of handling literally thousands of users at once.
The Two primary paradigms for electronic communications were _______________ switching and ____________ switching.
Circuit Switching - voice communications
Packet Switching - telegraph and telex
Message Switching
Messages are sent from A to B in stages. The transmission facility might be seized and the message is transmitted from A to C where it is temporarily stored and the transmission channel was released. Then the message would be transmitted to E where the process continues until the message is finally delivered to its destination.
Packet Switching
A special case of message switching with substantially different properties. Message packets are limited in length, and if necessary broken into a number of packets. the Packets are transmitted from switch to switch and stored in RAM instead of slower peripherals ordinarily used.
Telnet
Early application developed for the ARPANET that provided a universal language for remote computer terminals. The application provided a common denominator terminal. If software was written for each type of computer to support the "Telnet terminal" then one terminal could interact with all computer types.
File Transfer Protocol (FTP)
Similar open functionality (to Telnet) that allows the transparent transfer of files from one computer to another over the network.
Domain Name System (DNS)
invented so hosts could be assigned names that were easier to remember with DNS providing a translation from the domain names to numeric addresses. New routing algorithms were also invented to handle the ever-increasing complexity of the many connected networks.
Purpose of the Internet
to interconnect end systems called hosts.
IP Datagrams/Packets
sequenced packets of data sent via Internet
IP Address
a unique numeric address of a host or destination host
Has two components: a network number which identifies a network on the Internet, and a host address, which identifies a unique host on that network.
NSF
Foundation responsible form many of the policy decisions that led to the modern Internet.Primary goal was to establish a wide area networking infrastructure that was not directly funded by the federal government. Also helped standardize the use of many technologies such as TCP/IP.
Routers
A device that connects two networks and whose primary function is to relay data from one network to the other on a route from the source to the destination end system. Internet Gateways, ensure interoperability between the pieces of the Internet.
World Wide Web (www)
a distributed hypermedia technology that facilitates the international exchange of products, research findings and information.
HyperText Markup Language (HTML)
standard which defines embedded commands in text files that specify features of the browser display such as fonts, colors, images and their placement on the display, and the location of the locations where the user can invoke the hyperlinks and their targets.
Hypertext Transfer Protocol (HTTP)
a communications protocol for use in TCP/IP networks for fetching the files from the appropriate servers as specified by the hyperlinks.
Host
Any end system, such as a PC, workstation, or server, that connects to the Internet.
Customer Premises Equipment (CPE)
the telecommunications equipment located onsite with the host.
Point of Presence (POP)
site that has a collection of telecommmunications equipment; usually refers to an ISP or telephone company sites.
Internet Service Provider (ISP)
company that provides other companies or individuals with access to, or presence on, the Internet
Network Access Point (NAP)
one of several major Internet interconnection points that serve to tie all the ISPs together. Provide major switching facilities that serve the public in general.
A Physical facility that provides the infrastructure to move data between connected networks - built and operated by the private sector.
Infrastructure that provides the physical access paths between routers.
Network Service Provider (NSP)
company that provides backbone services to an ISP. Typically, an ISP connects at a point called an Internet Exchange (IX) to a regional ISP that in turn connects to an NSP backbone.
Company that provides Equipment responsible for routing.
ISP POP
the edge of the ISP's network; connections from users are accepted and authenticated here. an ISP may operate several POPs distributed throughout its area of operation
Local Loop (Last Mile)
the infrastructure between a provider's installation and the site where the host is located.
A transmission path, generally twisted pair, between the individual subscriber and the nearest switching center of a public telecommunications network.
Domain
a group of hosts that are under the administrative control of a single entity, such as a company or government agency - organized hierarchically
i.e., com, org, net, us, uk, ...
Domain namespace
naming system on which DNS is based is a hierarchical and logical tree structure used to identify resources on the Internet
DNS Database
The collection of all RRs is organized into a distributed database. Conceptually, each node and leaf in the name space tree structure names a set of information that is contained in resource record (RRs) that include the name, IP address and other information about hosts.
Name Servers
Server Programs that hold information about a portion of the domain name tree structure and the associated RRs.
Resolvers
Programs that extract information from name servers in response to client requests.
A typical request is for an IP address corresponding to a given domain name.
Key Features of the DNS database
Variable-depth hierarchy for names: allows essentially unlimited levels and uses the period as the level delimiter in printed names
Distributed Database: the database resides in DNS servers scattered throughout the Internet.
Distribution controlled by the database: the DNS database is divided into thousands of separately managed zones, which are managed by separate administrators. Distribution and update of records is controlled by the database software.
DNS Operation Steps
1. User program requests an IP address for a domain name.
2. Resolver module in the local host or local ISP queries a local name server in the same domain as the resolver.
3. Local name server checks to see if the name is in its local database or cache, and if so returns the IP address to the requestor. Otherwise, the name server queries other available name servers, if necessary going to the root server.
4. When response is received at the local name server, it stores the name/address mapping in its local cache and may maintain this entry for the amount of time specified in the time to live field of the retrieved RR
5. The user program is given the IP address or an error message.
Zone
Collection of one or more (or all) subdomains within a domain, along with the associated RRS. Authoritative set of data because the name server is responsible for maintaining an accurate set of RRs for the portion of the domain name space.
Root Name Servers
Top of the server hierarchy, servers that share responsibility for the top-level zones.
Two Methods by which queries are forwarded and results returned in a query.
1. Query another name server for the desired result and then send the result back to the resolver - recursive technique.
2. Return to the resolver the address of the next server to whom the request should be sent - iterative technique.
Operationally, when the DNS system receives a request for name resolution, the closest server attempts to provide the answer, if that server does not know the answer, the request is passed upward and a server with the answer responds.
ARPANET
Developed in 1969, the first operational packet-switching network which began operations in four locations.
Central Office
the place where telephone companies terminate customer lines and locate switching equipment to interconnect those lines with other networks
Internet Protocol (IP)
standardized protocol that executes in hosts and routers to interconnect a number of independent networks.
Implemented in all end systems and routers; and acts as a relay to move a block of data from one host, through one or more routers, to another host.
Transmission Control Protocol (TCP)
Provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to an intranet or the public Internet. Used to accurately deliver email and transfer files from one location to another. Implemented only in the end systems and keeps track of the blocks of data being transferred to assure that all are delivered reliably to the appropriate application.
What is the difference between and the Internet?
ARPANET was a network that that used packet-switching to communicate with it's hosts. The Internet is a technique/protocol for interconnecting networks.
What two protocols form the foundation of and govern the way we communicate on the Internet?
TCP - Transmission Control Protocol
IP - Internet Protocol
What were two of the first applications developed for use over a network?
Telnet - provided a universal language for remote computer terminals, and FTP (File Transfer Protocol) allowed the transparent transfer of files from one computer to another over the network.
What is Mosaic?
the first graphically oriented browser
What are two applications programs that have taken the place of Mosaic?
Netscape Navigator & Internet Explorer
What is the programming language used to display Web pages?
HTML - HyperText Markup Language
What is the difference between an ISP and a POP?
ISP is a company that provides other companies or individuals with access to, or presence on, the Internet.
POP is the site that has a collection of telecommmunications equipment.
What is the difference between an NAP and an NSP?
NAP is the physical facility/Infrastructure that provides the physical access paths between routers.
NSP is the Company that provides Equipment responsible for routing.
What is an Internet Domain?
a group of hosts that are under the administrative control of a single entity, i.e., com, net, gov
What is a DNS?
Domain Name System, directory lookup service that provides a mapping between the name of a host on the internet and its numerical address.
Name the four major components of the domain name system.
Domain name space
DNS database
Name servers
Resolvers
What is the difference between a name server and a resolver in DNS
Name Servers are programs that hold information about a portion of the domain name tree structure and the associated RRs. A Resolver is a program that extracts that information in response to client requests.
What is a DNS Resource Record?
record that includes the Name, IP Address and other information about hosts
Protocol Architecture
Software structure that implements the communications function - typically consists of a layered set of protocols with one or more protocols at each layer.
Open Systems Interconnection (OSI)
a seven-layer communication model for a computer protocol architecture and a framework for developing protocol standards, communications functions are partitioned into a hierarchical set of layers.
TCP/IP Protocol
a standardized communications protocol with a number of relatively independent layers, common layers include: Application, Host-to-host (transport layer), Internet layer, Network Access layer, and Physical layer.
Application Layer
the sending application generates a block of data and passes this to the transport layer.
Transport Layer
appends a transport header containing protocol control information and then hands each segment over to the network layer with transmission instructions fro the destination computer
Network Layer/ Network Access Layer
accepts the network packet, appends a network access header and presents the data to the network with a request for transmission - requires the use of control information
Internet Layer
when 2 devices are attached to different networks, procedures are used to allow data to traverse multiple interconnected networks IP - Internet Protocol used at this layer to provide the routing function across multiple networks
Physical Layer
Layer 1 of the OSI model, concerned with the electrical, mechanical, and timing aspects of signal transmission over a medium.
Covers the physical interface between a data transmission device and a transmission medium or network - concerned with specifying the characteristics of the transmission medium, the nature of the signals, the data rate and related matters.
UDP
transport-level protocol that is in common use as a part of the TCP/IP protocol suite. Does not guarantee delivery, preservation of sequence or protection against duplication. UDP enables a process to send messages to other processes with a minimum of protocol mechanism.
Essentially adds a port addressing capability to IP
IPv6
standard for a next-generation IP, designed to accommodate the higher speeds of today's networks and the mix of data streams including graphic and video that are becoming more prevalent. Driving force was the need for more addresses
Simple Mail Transfer Protocol (SMTP)
Supports a basic electronic mail facility by providing a mechanism for transferring message among separate hosts. Features include mailing lists, return receipts, and forwarding.
SSH (Secure Shell)
provides a secure remote logon capability which enables a user at a terminal or PC to logon to a remote computer and function as if directly connected to that computer. Also supports file transfer between the local host and a remote server. Enables the user and the remote server to authenticate each other, encrypts all traffic in both directions - carried on a TCP connection.;
Subnetwork
a logically visible subdivision of an IP network; constituent network
Intranet
Private Internets within Organizations that provide the key internet applications .
End Systems (ESs)
the devices connected to the subnetwork.
Intermediate Systems (ISs)
subnetworks connected by devices that provide a communications path and perform the necessary relaying and routing functions so that data can be exchanged between devices attached to different subnetworks in the internet.
Two types of ISs
Bridges
Routers
Communication Network
a facility that provides a data transfer service among devices attached to the network.
Checksum
an error-detecting code based on a summation operation performed on the bits to be checked.
Frame Check Sequence (FCS)
an error-detecting code inserted as a field in a block of data to be transmitted. The code serves to check for errors upon reception of the data.
Header
system defined control information that precedes user data in a protocol data unit
IPv4
a connectionless protocol for use on packet-switched Link Layer networks (e.g., Ethernet). It operates on a best effort delivery model, in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery. These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP).
Internet
A worldwide internetwork based on TCP/IP that interconnects thousands of public and private networks and millions of users.
OSI Architecture
Application
Presentation
Session
Transport
Network
Data link
Physical
TCP/IP Architecture
Application
Transport (Host-to-Host)
Internet
Network Access
Physical
Packet
A group of bits that includes data plus control information. Generally refers to a network layer (OSI layer 3) protocol data unit.
Port
A transport-layer address that identifies a user of a transport-layer protocol.
Protocol
A set of semantic and syntactic rules that describe how to transmit data, especially across a network. Low level protocols - define the electrical and physical standards. High-level protocols - deal with the data formatting
Protocol Architecture
The software structure that implements the communications function. Typically consists of a layered set of protocols, with one or more protocols at each layer.
Protocol Data Unit (PDU)
Information that is delivered as a unit between peer entities of a network. Typically contains control information and address information in a header. May also contain data.
What is the major function of the network access layer?
routing the data to the appropriate destination using the address of the destination computer that is provided by the sending computer.
There are several protocol models that have bee developed. Examples: SNA, Appletalk, OSI and TCP/IP as well as more general models such as three-layer models. What model is actually used for communications that travel over the Internet?
TCP/IP architecture is configured for communications.
Virtual Private Network (VPN)
consists of a set of computers that interconnect by means of a relatively unsecure network and that make use of encryption and special protocols to provide security.
IPSec
a set of Internet standards that provides the capability to secure communications across a LAN, across private and public WANs and across the Internet
What are some advantages of layering as seen in the TCP/IP architecture?
A layered architecture s particularly well suited to the development of standards.
Breaks down the work to make it more manageable.
Speeds up the standards-development process.
Which version of IP is the most prevalent today?
IPv4
Does all traffic running on the Internet use TCP?
No, there is FTP, Telnet,SMTP,UDP etc.
Compare the address space between IPv4 and IPv6. How many bits are used in each?
IPv4 is 32 bits and can support up to 232 addresses; IPv6 is 128 bits, can support up to 2128 addresses to fulfill future needs with better security and network related features
Does a router require that all attached layer 2 protocols are the same?
No .
Client Machines
Typically single-user PCs or workstations that provide a highly user-friendly interface to the end user.
Middleware
A set of drivers, APIs or other software that improves connectivity between a client application and a server
Relational Database
A database in which information access is limited to the selection of rows that satisfy all search criteria.
Server
A computer, usually a high-powered workstation or a mainframe, that houses information for manipulation by networked clients.
Structured Query Language (SQL)
A language developed by IBM and standardized by ANSI for addressing, creating, updating, or querying relational databases.
The most common type of server is a _______________ server, usually controlling a ________________ ______________.
Database
Relational Database
The third essential ingredient of the client/server environment is the ________________.
Network
Client/server computing is _____________ computing
Distributed
Characteristics that make client/server distinct from ordinary distributed processing:
* heavy reliance on bringing user-friendly applications to the user on their system
* there is an emphasis on centralizing corporate databases and many network management and utility functions.
* There is an emphasis on open and modular systems (user has greater choice in selecting products and in mixing equipment from different vendors)
* Networking is fundamental to the operation
What are two significant trends in industry that illustrate the success of client/server computing:
1. The permanent shedding of jobs by companies in an effort to downsize and streamline for success in a fiercely competitive market.
2. Substantial increases in investment in computers and other information technology in an effort to compensate for a smaller employee base.
The central feature of a client/server architecture is:
the allocation of application-level tasks between clients and servers
____________ _____________ enables the client and server to interoperate.
Communications software
i.e., TCP/IP
Graphical User Interface (GUI)
a presentation service module in the client workstation that is responsible for providing a user-friendly interface to the distributed applications available in the environment.
Application Logic
the software for data analysis that interacts with the database.
i.e., SQL
What are the four reasons that dictate the way the division of data and application processing:
1. the nature of the database information
2. the types of applications supported
3. the availability of interoperable vendor equipment
4. the usage patterns within an organization
Host Based Processing
not true client/server computing; refers to the traditional mainframe environment in which all or virtually all of the processing is done on a central host.
Server-based processing
simplest class of client;/server configuration; the client is principally responsible for providing a graphical interface, while virtually all of the processing is done on the server.
Client-Based Processing
Virtually all application processing may be done at the client, with the exception of data validation routines and other database logic functions that are best performed at the server level.
Cooperative Processing
the application processing is performed in an optimized fashion, taking advantage of the strengths of both client and server machines and of the distribution of data. More complex to set up and maintain but offers greater user productivity gains and greater network efficiency
Thick Client
Presentation logic , Application logic and Database logic are performed at the client level, Database logic and DBMS are performed at the server level
Thin Client
Presentation logic is at the client level, Application Logic, Database logic and DBMS are at the server level.
Three Tier Client/Server Approach
Application software is distributed among three types of machines: a user machine, a middle-tier server and a backend server. (typically a thin-client setup)
Middleware
standard programming interfaces and protocols that sit between the application above and communications software and operating system below. Hides the complexities and disparities of different network protocols and operating systems.
Purpose of Middleware
Enables an application or user at a client to access a variety of services on servers without being concerned about differences among servers.
Application Programming Interface (API)
the middleware which cuts across all client and server platforms, is responsible for routing client requests to the appropriate server
What are the three underlying mechanisms of middleware:
message passing
remote procedure calls
object-oriented mechanisms
Message Passing
distributed message passing to implement client/server functionality. Client process requires some service (e.g., read a file, print) and sends a message containing a request for service to a server process. Server process honors the request and sends a message containing a reply. Simplest Form: Send and Receive
Send Function
Specifies a destination and includes the message content.
Receive Function
tells from whom a message is desired (including "all") and provides a buffer where the incoming message is to be stored.
Remote Procedure Call
a common method for encapsulating communication in a distributed system, Allows programs on different machines to interact using simple procedure call/return semantics, just as if the two programs were on the same machine. - used for access to remote services.
Client/Server Binding
specifies how the relationship between a remote procedure and the calling program will be established. A binding is formed when two applications have made a logical connection and are prepared to exchange commands and data.
Nonpersistent Binding
a logical connection is established between the two processes at the time of the remote procedure call and as soon as the values are returned, the connection is dismantled.
Persistent Binding
a connection that is set up for a remote procedure call is sustained after the procedure return and can then be used for future remote procedure calls. If a specified period of time passes with no activity on the connection, the connection is terminated.
Object-Oriented Mechanisms
Clients and servers ship messages back and forth between objects. Object communications may rely on an underlying message or RPC structure or be developed directly on top of object-oriented capabilities in the operating system.
Intranet
the implementation of Internet technologies within a corporate organization rather than for external connection to the global internet.
Advantages of a Web/Database system compared to a more traditional database approach
* Ease of administration.
* Deployment
* Development Speed
* Flexible Information Presentation
Potential disadvantages of a Web/Database system
* Functionality may be more limited
* Stateless Operation-the web server keeps no information between transactions to track the state of the user
Problems associated with using traditional client/server systems
* Long development cycles
* Difficulty of partitioning applications into client and server modules and the even greater difficulty of modifying the partition in response to user feedback
* Effort involved in distributing upgrades to clients
* Difficulty of scaling the servers to respond to increased load in a distributed environment
* Continuous requirement for increasingly powerful desktop machines.
The most heavily used network application in the corporate world is:
Electronic Mail
Electronic Mailing List
an alias that has multiple destinations, usually created to discuss specific topics. Each subscriber receives messages one at a time, as they are sent.
Usenet
Network News - a collection of electronic bulletin boards that work in much the same way as the Internet mailing lists. Messages are archived at each news site and organized by subject matter, discussions are threaded.
Extranet
Makes use of TCP/IP protocols and applications, especially the web, provides access to corporate resources by outside clients, typically suppliers and customers of the org. Can be through the internet or through other data communications networks, provides more extensive access to corporate resources - usually enforcing a security policy
Service-Oriented Architecture
a form of client/server architecture, organizes business functions into a modular structure rather than as monolithic applications for each department.Common functions can be used by different departments internally and by external business partners as well.
_______________ interfaces are used to enable service modules to communicate with one another and to enable client applications to communicate with service modules.
Standardized
Service Provider
A network node that provides a service interface for a software asset that manages a specific set of tasks.
Service Requestor
A network code that discovers and invokes other software services to provide a business solution.
Service broker
A specific kind of service provider interfaces and service locations, can pass on service requests to one or more additional service providers.
Key Characteristics for effective use of services in a Service-Oriented Architecture:
* Coarse-grained
* Interface-based design
* Discoverable
* Single Instance
* Loosely coupled
* Asynchronous
Coarse-grained
Operations on services are frequently implemented to encompass more functionality and operate on larger data sets
Interface-Based Design
Services implement separately defined interfaces, multiple services can implement a common interface and a service can implement multiple interfaces
Discoverable
Services need to be found at both design time and run time, not only by unique identity but also by interface identity and by service kind.
Single Instance
Each service is a single, always running instance that a number of clients communicate with.
Loosely coupled
Services are connected to other services and clients using standard, dependency-reducing, decoupled message-based methods such as XML document exchanges.
Asynchronous
services use an asynchronous message-passing approach - not required.
Inventory Software
an application that will run on the server or mainframe - user cannot work with these applications unless they are connected and possibly authenticated.
Electronic Mail
a facility that allows users at workstations and terminals to compose and exchange messages
Mailbox
an entity maintained buy the file management system and is in the nature of a file directory.
User Agent (UA)
functions that are visible to the e-mail user. Include facilities for preparing and submitting messages for routing to the destination(s), as well as utility functions to assist the user in filing, retrieving, replying, and forwarding
Message Transfer Agent (MTA)
accepts messages from the user agent for transmission across a network or internetwork, concerned with the protocol operation needed to transmit and deliver messages
Post Office Protocol (POP3)
allows an e-mail client (UA) to download an e-mail fro an e-mail server (MTA). POP3 UAs connect via TCP/IP to the server
Internet Mail Access Protocol (IMAP)
enables an e-mail client to access mail on an e-mail server - also uses TCP/IP with server TCP port 143. More complex than POP3 but provides stronger authentication and other functions not supported by POP3
Simple Mail Transfer Protocol (SMTP)
used for transfer of mail from a UA to an MTA and from one MTA to another
Multipurpose Internet Mail Extensions (MIME)
Supplements SMTP and allows the encapsulation of multimedia (nontext) messages inside of a standard SMTP message
__________ is the standard protocol for transferring mail between hosts in the TCP/IP protocol suite (defined in RFC 821.
SMTP
SMTP is not concerned with the format or content of messages themselves, with two exceptions:
1. SMTP standardizes the message character set as 7-bit ASCII
2. SMTP adds log information to the start of the delivered message that indicates the path the message took.
Conceptual queued message has two parts:
1. the message text consisting of
* the 822 header: constitutes the message envelope and includes an indication of the intended recipient(s)
* the body of the message composed by the user
2. A list of mail destinations.
SMTP Sender
takes messages from the outgoing mail queue and transmits them to the proper destination host via SMTP transactions over one or more TCP connections to port 25 on the target hosts.
SMTP Protocol
Used to transfer a message from the SMTP sender to the SMTP receiver over a TCP connection, attempts to provide reliable operation but does not guarantee recovery of lost messages. Generally considered reliable.
SMTP ReceIver
Accepts each arriving message and either places it in the appropriate user mailbox or copies it to the local outgoing mail queue if forwarding is required. Must be able to verify local mail destinations and deal with errors, including transmission errors and lack of disc file capacity.
Connections Setup
An SMTP sender will attempt to set up a TCP connection with a target host when it has one or more mail messages to deliver to that host.
Connection Setup Sequence
1. Sender opens a TCP connection with the receiver
2. Once the connection is established, receiver identifies itself with "220 Service Ready"
3. Sender identifies itself with the HELO command
4. Receiver accepts the sender's identification with "250 OK"
If mail services - destination is unavailable, destination host returns a "421 Service Not Available" reply and the process is terminated.
Three Logical Phases of Mail Transfer
1. A Mail command identifies the originator of the message
2. One or more RCPT commands identify the recipients for the message.
3. A Data command transfers the message text
If receiver is prepared to accept messages from originator, it returns a "250 OK" reply
Mail Command
gives the reverse path, which can be used to report errors.
RCPT Command
identifies an individual recipient of the mail data; multiple recipients are specified by multiple use of this command.
Connection Closing
SMTP sender closes the connection in two steps:
1. sender sends a Quit command and waits for a reply
2. initiate a TCP close operation for the TCP connection
RFC 822
Defines a format for text messages that are sent using e-mail. Adopted standard of the SMTP.
Messages are viewed as having an envelope and contents. The envelope contains whatever information is needed to accomplish transmission and delivery. The contents compose the object to be delivered to the recipient.
Multipurpose Internet Mail Extensions (MIME)
an extension to the RFC 822 framework that is intended to address some of the problems and limitations of the use of SMTP and RFC 822.
MIME Specification includes these three elements:
1. Five new message header fields which may be included in an RFC 822 header - provide information about the body of the message
2. Number of content formats are defined, standardizing representations that support multimedia e-mail.
3. Transfer encodings are defined that enable the conversion of any content format into a form that is protected from alteration by the mail system.
MIME-Version
First of the new header fields, must have the parameter value 1.0 which indicates the message conforms to the RFCs
Content-Type
Second of the new header fields, describes the data contained in the body with sufficient detail that the receiving user agent can pick an appropriate agent or mechanism to represent the data to the user or otherwise deal with the data in an appropriate manner
Content-Transfer-Encoding
Third of the new header fields, indicates the type of transformation that has been used to represent the body of the message in a way that is acceptable for mail transport.
Content-ID
Fourth of the new header fields, used to uniquely identify MIME entities in multiple contexts.
Content-Description
Fifth of the new header fields, a plain text description of the object with the body - useful when the object is not readable (e.g., audio data)
MIME Content Type: Text Type
no special software is required to get the full meaning of the text, aside from support of the indicated character set. (simply a string of ASCII characters)
MIME Content Type: Multipart type
indicates that the body contains multiple, independent parts
Mutipart/Mixed subtype: multiple parts are bundled
Multipart/Parallel subtype: order of the parts is not significant
Multipart/Alternative Subtype: various parts are different representations of the same information
Multipart/Digest Subtype: used when each of the body parts is interpreted as an RFC 822 message with headers.
Message type: provides a number of important capabilities - indicates that the body is an entire message, including header and body.
Message/Partial subtype: enables fragmentation of a large message in a number of parts.
Boundary
Defines the delimiter between body parts, should not appear in any parts of the message.
MIME Content Type: Message type
The body is itself an encapsulated message that conforms to RFC 822. Used to allow fragmentation of large mail items, in a way that is transparent to the recipient
MIME Content Type: Message/partial Subtype
enables fragmentation of a large message into a number of parts which must be reassembled at the destination. Will include: ID, Number (sequence indicating position), Total (total number of parts)
MIME Content Type: Message/External Body subtype
indicates that the actual data to be conveyed in this message are not contained in the body, instead the body contains the information needed to access the data
MIME Access Type Parameters
FTP
TFTP
Anon-FTP
Local-File
AFS
Mail-Server
HTTP
transaction-oriented client/server protocol provides reliability, stateless protocol - each transaction is treated independently. Flexible in the formats that it can handle.
HTTP User Agent
the client that intiates the request, such as a web browser being run on behalf of an end user
HTTP Origin Server
The server on which a resource of interest resides (web server)
Cache
A programs local store of response messages and the subsystem that controls its message storage, retrieval and deletion.
HTTP Client
an application program that establishes connections for the purpose of sending requests.
HTTP Connection
A transport layer virtual circuit established between two application programs for the purposes of communcation
HTTP Entity
a particular representation or rendition of a data resource, or reply from a service resource that may be enclosed within a request or response message, consists of entity headers and an entity body
HTTP Gateway
a server that acts as an intermediary for some other server
HTTP Message
basic unit of HTTP communication, consisting of a structured sequence of octets transmitted via the connection
Proxy
an intermediary program that acts as both a server and a client for the purpose of making requests on behalf of other clients. Must interpret and, if necessary, rewrite a message before forwarding it.
Resource
A network data object or service that can be identified by a URI
HTTP Server
An application program that accepts connections in order to service requests by sending back responses.
Tunnel
An intermediary program that is acting as a blind relay between two connections.
Proxy: Security Intermediary
the client and server may be separated by a security intermediary such as a firewall.
Proxy: Different Versions of HTTP
Proxy can implement both versions and perform the required mapping
Gateway: Security Intermediary
client and server may be separated by a security intermediary such as a firewall, with the gateway on the server side of the firewall
Gateway: Non-HTTP Server
Gateway that provides the capability to contact servers for protocols other than HTTP e.g. FTP and Gopher servers. The gateway server contacts the relevant FTP/Gopher server, obtains the desired result, then converts into a form suitable for HTTP and transmits back to the client.
IPSec (IP Security)
transparent to end users and applications and provides a general-purpose security solution. Includes a filtering capability so that only selected traffic need incur the overhead of IPSec processing.
Secure Sockets Layer (SSL)
a layer i the TCP/IP protocol architecture that provides security functions.
Socket
a method of directing data to the appropriate application in ta TCP/IP network.
Three Categories of SSL Security
Confidentiality - all data is encrypted
Message Integrity - assures the message is not altered or substituted for en route
Authentication - validates the identity of one or both partners to the exchange
HTTPS (HTTP over SSL
Refers to the combination of HTTP and SSL to implement secure communication between a web browser and a web server.
Session Initiation Protocol (SIP)
defined in RFC 3261, an application-level control protocol for setting up, modifying, and terminating real-time sessions between participants over an IP data network. Can support any type of single or multimedia.
SIP Uniform Resource Identifier (URI)
identification of a resource with an SIP network.
Session Description Protocol
defined in RFC 2327, describes the content of sessions including telephony, Internet radio and multimedia applications
SIP Location Service
Location service used by a SIP redirect or proxy server to obtain information about a caller's possible location.
SIP Method
first line of a request, which defines the nature of the request
SIP Proxy Server
An intermediary entity that acts as both a server and a client for the purpose of making requests on behalf of other clients. Also useful for enforcing policy
SIP Redirect Server
Used during session initiation to determine the address of the called device, returns this information to the calling device and directs the UAC to contact an alternate URI
SIP Regisrar
A server that accepts Register requests and places the information it receives in those requests into the location service for the domain it handles.
Voice Over IP (VoIP)
Internet Telephony, will probably be the standard IP signaling mechanism for voice and multimedia calling services
Network Class
The IP address is coded to allow a variable allocation of bits to specify network and host. The encoding provides flexibility in assignint addresses to hosts and allows a mix of network sizs on an internet.
What are the Three principal network classes?
Class A: Few Networks, each with many hosts
Class B: Medium number of networks, each with a medium number of hosts
Class C: Many networks, each with a few hosts
Dotted Decimal Notation
format of IP addresses - a decimal number represents each of the octets o the 32-bit address.
Class A: Few Networks, each with many hosts
All Class A network addresses begin with a binary 0; binary 00000000 thru 01111111 (0 - 127) are reserved, making 126 Potential Class A network numbers
Class B: Medium number of networks, each with a medium number of hosts
Class B addresses begin with a binary 10; binary 10000000 to 10111111. The second octet is also part of the Class B address, so theat there are 2 to the 14 power = 16,384 Class B addresses.
Class C: Many networks, each with a few hosts
The first decimal number ranges from 192 - 223 (binary 11000000 to 11011111); the total number of Class C addresses is 2 to the 21 power = 2,097,152
Subnet Masks
a logically visible subdivision of an IP network.[1] The practice of dividing a network into two or more networks is called subnetting.
Router Function
responsible for receiving and forwarding packets through the interconnected set of networks. Makes routing decisions based on knoowledge of the topology and traffic/delay condtions of the internet-must avoid portions of the newtwork that have failed and should avoid portions of the network that are congested.
Two Concepts of Routing Function
Routing Information
Routing Algorithm
Routing Information
Information about the topology and delays of the internet
Roting Algorithm
The algorithm used to make a routing decision for a particular datagram, based on current routing information
Characteristics Autonomous System (AS)
1. An AS is a set of routers and networks managed by a single organization.
2. An AS consists of a group of routers exchanging information via a common routing protocol.
3. Except in times of failure, an AS is connected (in a graph-theoretic sense); that is, there is a path between any pair of nodes.
Interior Router Protocol (IRP)
A shared routing protocol passes routing informaton between routers within an AS - does not need to be shared outside the system - flexibility that allows IRPs to be custom tailored to specific applicaitons and requirements. Needs to build up a rather detailed model of the interconnection of routers within an AS in order to calculate the least-cost path from a given router to any network within the AS
Exterior Router Protocol (ERP)
the protocol used to pass routing information between routers in different ASs. supports the exchange of summary reachability information between separately administered ASs - Simpler and uses less detailed information than an IRP
Border Gateway Protocol (BGP)
developed for use in conjucation with internets that employ the TCP/IP suite - concepts are applicable to any internet.
**The preferred ERP for the internet
allows routers (gateways in the standard) in different ASs to cooperate in the exchange of routing information. Operates in terms of messages which are sent over TCP connections. Current version - BGP-4
Neighbors
Refers to two routers that share the same network.
What are the 3 functional procedures in BGP?
Neighbor Acquisition -
Neighbor Reachability -
Network Reachability -
Neighbor Acquisition
occurs when two neighboring routers in different autonomous systems agree to exchange routing infomation regularly.
Neighbor Reachability
Once neighbor relationship is establised the neighbor reachability procedure is used to maintain the relationship - periodically pass Keepalive message between routers.
Network Reachability
Each router maintains a database of the networks that it can reach and the preferred route for reaching each network.
Open Shortest Path First (OSPF) Protocol
Protocol sidely sed as an interior router protocol in TCP/IP networks. Uses what is known as a link state routing algorithm. Each router maintains descriptions of the state of its local links to networks
Each router maintains a database that reflects the known __________ of the autonomous system of which it is a part.
topology

topology expressed as a directed graph, consisting of the following:
1. Vertices, or nodes, of two types
- Router
- Network
a. Transit if it can carry data that neither originates nor terminates on an end system attached to this network
b. Stub, if it is not a transit network
2. Edges, of two types:
- A graph edge that connects two router viertices when the correspoonding routers are connected to each other by a direct point-to-point link
- A graph edge that connects a router vertex to a network vertex when the router is directly connected to the network.
'What are the two significant trends the altered the role of the PC, and therefore the requirements of the LAN?
1. The speed and computing power of PCs continued to enjoy explosive growth.
2. IT organizations have recognized the LAN as a viable and essential computing platform, resulting in the focus on Network