Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
67 Cards in this Set
- Front
- Back
Hosts
|
Devices that are hooked up to the internet
|
|
End System
|
Devices that are hooked up to the inernet
|
|
What is tranmission rate measured in
|
bits/seconds
|
|
Where are routers used
|
network core
|
|
link-layer switches are used where
|
access networks
|
|
ISP
|
internet service provider, allow end systems access to the internet
|
|
TCP
|
transmission control protol, how applications talk to eachother
|
|
IP
|
Internet Protocol, format of packets that are sent and received among routers and end systems
|
|
RFC
|
request for comments
|
|
API
|
application programming interface, specifies how a software piece on one end system asks the internet infastructure to deliever data to another end system
|
|
protocol
|
defines the format and the order of messages exchange d between two or more communicating entities, as well as the actinos taken on the transission and or receipt of a message or other event
|
|
Client program
|
program running on one end system that requests and receives a service from a server program
|
|
distributed applications
|
a client program on one computer and a server program on another computer
|
|
DSL
|
Digital Subscriber Line
|
|
PON
|
Passive Optical Networks
Similar to cable, one fiber cable, split near homes, OLT on server side and ONT on user side |
|
OLT
|
Optical Line Terminator - Used on client side in PON
|
|
ONT
|
Optical Network Terminator
|
|
Guided media
|
Waves are guided along a solid medium such as a fiber-optic cable, twisted-pair copper wire or coaxial cable
|
|
unguided media
|
waves propagate in the atmosphere and in outer space such as wireless lan or digital satelite
|
|
FDM
|
Frequency-Division Multiplexing, the link dedicates a frequency band to each connection for the duration of the connection
|
|
TDM
|
Time-Division Multiplexing - Line is broken into circuits, each time frame a end host gets the whole bandwith
|
|
Bandwidth
|
Width of the band, with FDM means how big the frequency range is. Bandwidth split
|
|
Packets
|
Long messages are broken into smaller chunks of data
|
|
Store-and-forward transmission
|
Switch must receive entire packet before it can begin to transmit the first bit of the packet onto the outbound link
|
|
Statistical Multiplexing
|
On demand sharing of resources as demonstrated in packet switching networks
|
|
How do packets make it to destination?
|
Use a forwarding table, split ip address into sections and get closer each time
|
|
tier-1 isps (3)
|
1.) Directly connected to each of the other tier-1 ISPs
2.) Connected to a large number of tier-2 ISPS and other customer networks 3.) International in coverage |
|
Tier-2 Isps
|
Regional or national coverage and only connects to a few of tier-1 isps
|
|
POP
|
points of presence - group of one or more routers in the ISP's network at which routers in other ISPs or in the netwrkings belonging to the ISP's customers can connect
|
|
Processing Delay
|
How long it takes the router to process the information and determine where to send the packet - Fixed
|
|
Queing Delay
|
How long the packet sits in the router's queue. Variable
|
|
Transmission Delay
|
How long it takes the packet to get on the link - Fixed
|
|
Propagation Delay
|
How long it takes the packet to move from end-host to another
|
|
Throughput
|
Amount of work that a computer can do in a given amount of time
|
|
Bandwidth Vs Throughput
|
Bandwidth - Theoretical amount of data that can be sent on link
Throughput- In practice amount of data that is being sent |
|
5 layer internet stack - And what information is called in each
|
Application - Message
Transport - Segment Network - Datagram Link - Frames Physical |
|
Virus
|
Malware that require some form of user interaction to infect the user's device
|
|
Worms
|
Malware that can enter a device without any explicit user interaction
|
|
Trojan Horse
|
Malware that is a hidden part of some otherwise useful software
|
|
Dos
|
Denial of service
|
|
DDos
|
Distributed Denial of Service
|
|
Transport Services availble to applications
|
1.) REliable Data Transfer
2.) Throughput 3.) Timing 4.) Security |
|
UDP
|
user-datagram protocol
|
|
HTTP
|
Hyper Text Transfer Protocol
|
|
POP3
|
Post Office Protocol
|
|
IMAP
|
Internet Maill Access Protocol
|
|
DNS
|
Domain Name System
|
|
Root DNS Servers
|
13 in the world
|
|
Top level domain servers
|
Responsible for com org net edu gov
|
|
Authoritative DNS servers
|
Organization with pblicly accessible hosts must provide these
|
|
Recursive DNS servers
|
No information back to host, keeps going until answer then comes back through all servers
|
|
Iterative DNS servers
|
Information back to host about where to go next
|
|
DHT
|
distributed hash table
|
|
Transport Protocols can not provide what services
|
Bandwidth or Timing gurantees
|
|
What services can a transport protocol provide
|
Reliable data transfer, throughput, timing, security
|
|
What are avaiable options for an HTTP Request Message
|
GET, POST, HEAD, PUT, DELETE
|
|
The date field in an HTTP Response message means what
|
The date the response was generated
|
|
The last modified field in an HTTP response message means what
|
The time the object was last modified or created
|
|
How do cookies work?
|
1.) Server generates ID for user
2.) Creates database entry for ID 3.) Includes ID in response 4.) Client Stores hostname and cookie id value locally 5.) Each request message includes cookie value |
|
How do Caches Work
|
Install a cache between clients and web server. Link between clients and web server has a super fast link so most connections go through cache first and if object needs to be updated, cache requests from server
|
|
Conditional Get
|
Cache uses a Last-Modified get to see if an object has changed. If not, empty message body with response 304
|
|
conection socket
|
Servers dedcated socket when making a tcp connection
|
|
stream
|
sequence of characters that flow into or out of a process
|
|
UDP has how many bytes in header?
|
8
|
|
5 SMTP commands
|
HELO, QUIT, MAIL FROM, RCPT TO, DATA
|
|
protocol
|
Defines the format of messages, the order of messages and actions taken when receiving messages
|
|
MIME
|
Multipart Internet Mail Extension.
Defines data types in ascii format so they can be sent over email |