• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
List the 5 application architectures we discussed in the text
Terminal/host, client/host, cloud computing, service-oriented architecture, P2P
What are the three non-web email protocols described in the text
Simple mail transfer protocol (SMTP), Post office protocol (POP), Internet message access protocol (IMAP)
Which email protocol is used by email clients to send email messages?
SMTP
Which email protocol can be used by email clients to receive email messages from a mail server?
POP, IMAP
List the three email message formats discussed in the text.
RFC 822/2822, HTML, UNICODE
What connects an IP network to the circuit-switched Public switched telephone network?
Media gateway
What is the primary VoIP signaling protocol?
Session initiation protocol
What are the two main features of the RTP header?
Add sequence numbers and time stamps
What are the www's primary transmission and document standards?
Transmission = HTTP Document =HTML
Generally describe cloud computing from an organizational perspective.
In cloud computing, the company outsources some combination of servers, server applications, and client PC software to a cloud service provider. If client PC software is outsourced, the client PC only needs a browser.
List four advantages of SaaS
Reduces cost and risk because user only pays for software as needed, saves money because company does not have to manage the application. Mobility, users can access the software wherever there is internet access. Collaboration, sharing is easy
What are the issues associated with Saas?
Unusable without internet access. The cloud SaaS provider may go out of business. Loss of control, may be blocked into proprietary vendor software. Security, will company's data be vulnerable if cloud service provider is attacked or has software vulnerabilities? Legal complications, if user company is required by law to be secure, how can this be satisfied with SaaS?
What is the primary difference between SaaS and Cloud utility computing?
Traditional utility computing, a company sends server processing work to another company at a remote site. In cloud utility computing, the company that receives this processing job is a cloud service provider, and the data is sent over the internet to be processed. Unlike in Saas, the application is not managed by the cloud provider, only processing power and storage.
Describe Service Oriented Architecture
Traditionally, in client/server computing, a single client program calls a single server program. In service-oriented architecture, a client program may contact many small service objects on many different machines to do the work the client needs. In addition, a service object may serve many clients. Service objects usually do small chunks of work, like computing a currency exchange rate.
Describe the components of a BitTorrent Protocol network.
Client PC with a BitTorrent program requests a file via and index website. The index server directs a client to a Tracker server. The tracker server identifies the "swarm" of BitTorrent PC's that have parts of the desired file. Individual PC's in the swarm transfer file bits via traditional P2P transmission. The client PC then reassembles the file.
Describe the three steps in a skype call.
1.Login:the skype login server authenticates username and password, notes IP address. 2.Signaling /Directory Search:Skype application looks up the username and IP address of the party it wants to contact, using supernodes. 3.Transport:handle by host nodes
List the network and security concerns that have lead to most organizations banning the use of Skype for corporate communication.
Registration is open and uncontrolled, so usernames mean nothing from a security standpoint. Skype is almost impossible to control at firewalls; skype's file transfer mechanism does not work with most antivirus products. Skype's proprietary software and protocols are not revealed to security professionals, change frequently. Detailed method of Skype encryption is unknown.