Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
List the 5 application architectures we discussed in the text
|
Terminal/host, client/host, cloud computing, service-oriented architecture, P2P
|
|
What are the three non-web email protocols described in the text
|
Simple mail transfer protocol (SMTP), Post office protocol (POP), Internet message access protocol (IMAP)
|
|
Which email protocol is used by email clients to send email messages?
|
SMTP
|
|
Which email protocol can be used by email clients to receive email messages from a mail server?
|
POP, IMAP
|
|
List the three email message formats discussed in the text.
|
RFC 822/2822, HTML, UNICODE
|
|
What connects an IP network to the circuit-switched Public switched telephone network?
|
Media gateway
|
|
What is the primary VoIP signaling protocol?
|
Session initiation protocol
|
|
What are the two main features of the RTP header?
|
Add sequence numbers and time stamps
|
|
What are the www's primary transmission and document standards?
|
Transmission = HTTP Document =HTML
|
|
Generally describe cloud computing from an organizational perspective.
|
In cloud computing, the company outsources some combination of servers, server applications, and client PC software to a cloud service provider. If client PC software is outsourced, the client PC only needs a browser.
|
|
List four advantages of SaaS
|
Reduces cost and risk because user only pays for software as needed, saves money because company does not have to manage the application. Mobility, users can access the software wherever there is internet access. Collaboration, sharing is easy
|
|
What are the issues associated with Saas?
|
Unusable without internet access. The cloud SaaS provider may go out of business. Loss of control, may be blocked into proprietary vendor software. Security, will company's data be vulnerable if cloud service provider is attacked or has software vulnerabilities? Legal complications, if user company is required by law to be secure, how can this be satisfied with SaaS?
|
|
What is the primary difference between SaaS and Cloud utility computing?
|
Traditional utility computing, a company sends server processing work to another company at a remote site. In cloud utility computing, the company that receives this processing job is a cloud service provider, and the data is sent over the internet to be processed. Unlike in Saas, the application is not managed by the cloud provider, only processing power and storage.
|
|
Describe Service Oriented Architecture
|
Traditionally, in client/server computing, a single client program calls a single server program. In service-oriented architecture, a client program may contact many small service objects on many different machines to do the work the client needs. In addition, a service object may serve many clients. Service objects usually do small chunks of work, like computing a currency exchange rate.
|
|
Describe the components of a BitTorrent Protocol network.
|
Client PC with a BitTorrent program requests a file via and index website. The index server directs a client to a Tracker server. The tracker server identifies the "swarm" of BitTorrent PC's that have parts of the desired file. Individual PC's in the swarm transfer file bits via traditional P2P transmission. The client PC then reassembles the file.
|
|
Describe the three steps in a skype call.
|
1.Login:the skype login server authenticates username and password, notes IP address. 2.Signaling /Directory Search:Skype application looks up the username and IP address of the party it wants to contact, using supernodes. 3.Transport:handle by host nodes
|
|
List the network and security concerns that have lead to most organizations banning the use of Skype for corporate communication.
|
Registration is open and uncontrolled, so usernames mean nothing from a security standpoint. Skype is almost impossible to control at firewalls; skype's file transfer mechanism does not work with most antivirus products. Skype's proprietary software and protocols are not revealed to security professionals, change frequently. Detailed method of Skype encryption is unknown.
|