• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/67

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

67 Cards in this Set

  • Front
  • Back
Hosts
Devices that are hooked up to the internet
End System
Devices that are hooked up to the inernet
What is tranmission rate measured in
bits/seconds
Where are routers used
network core
link-layer switches are used where
access networks
ISP
internet service provider, allow end systems access to the internet
TCP
transmission control protol, how applications talk to eachother
IP
Internet Protocol, format of packets that are sent and received among routers and end systems
RFC
request for comments
API
application programming interface, specifies how a software piece on one end system asks the internet infastructure to deliever data to another end system
protocol
defines the format and the order of messages exchange d between two or more communicating entities, as well as the actinos taken on the transission and or receipt of a message or other event
Client program
program running on one end system that requests and receives a service from a server program
distributed applications
a client program on one computer and a server program on another computer
DSL
Digital Subscriber Line
PON
Passive Optical Networks

Similar to cable, one fiber cable, split near homes, OLT on server side and ONT on user side
OLT
Optical Line Terminator - Used on client side in PON
ONT
Optical Network Terminator
Guided media
Waves are guided along a solid medium such as a fiber-optic cable, twisted-pair copper wire or coaxial cable
unguided media
waves propagate in the atmosphere and in outer space such as wireless lan or digital satelite
FDM
Frequency-Division Multiplexing, the link dedicates a frequency band to each connection for the duration of the connection
TDM
Time-Division Multiplexing - Line is broken into circuits, each time frame a end host gets the whole bandwith
Bandwidth
Width of the band, with FDM means how big the frequency range is. Bandwidth split
Packets
Long messages are broken into smaller chunks of data
Store-and-forward transmission
Switch must receive entire packet before it can begin to transmit the first bit of the packet onto the outbound link
Statistical Multiplexing
On demand sharing of resources as demonstrated in packet switching networks
How do packets make it to destination?
Use a forwarding table, split ip address into sections and get closer each time
tier-1 isps (3)
1.) Directly connected to each of the other tier-1 ISPs

2.) Connected to a large number of tier-2 ISPS and other customer networks

3.) International in coverage
Tier-2 Isps
Regional or national coverage and only connects to a few of tier-1 isps
POP
points of presence - group of one or more routers in the ISP's network at which routers in other ISPs or in the netwrkings belonging to the ISP's customers can connect
Processing Delay
How long it takes the router to process the information and determine where to send the packet - Fixed
Queing Delay
How long the packet sits in the router's queue. Variable
Transmission Delay
How long it takes the packet to get on the link - Fixed
Propagation Delay
How long it takes the packet to move from end-host to another
Throughput
Amount of work that a computer can do in a given amount of time
Bandwidth Vs Throughput
Bandwidth - Theoretical amount of data that can be sent on link

Throughput- In practice amount of data that is being sent
5 layer internet stack - And what information is called in each
Application - Message

Transport - Segment

Network - Datagram

Link - Frames

Physical
Virus
Malware that require some form of user interaction to infect the user's device
Worms
Malware that can enter a device without any explicit user interaction
Trojan Horse
Malware that is a hidden part of some otherwise useful software
Dos
Denial of service
DDos
Distributed Denial of Service
Transport Services availble to applications
1.) REliable Data Transfer
2.) Throughput
3.) Timing
4.) Security
UDP
user-datagram protocol
HTTP
Hyper Text Transfer Protocol
POP3
Post Office Protocol
IMAP
Internet Maill Access Protocol
DNS
Domain Name System
Root DNS Servers
13 in the world
Top level domain servers
Responsible for com org net edu gov
Authoritative DNS servers
Organization with pblicly accessible hosts must provide these
Recursive DNS servers
No information back to host, keeps going until answer then comes back through all servers
Iterative DNS servers
Information back to host about where to go next
DHT
distributed hash table
Transport Protocols can not provide what services
Bandwidth or Timing gurantees
What services can a transport protocol provide
Reliable data transfer, throughput, timing, security
What are avaiable options for an HTTP Request Message
GET, POST, HEAD, PUT, DELETE
The date field in an HTTP Response message means what
The date the response was generated
The last modified field in an HTTP response message means what
The time the object was last modified or created
How do cookies work?
1.) Server generates ID for user
2.) Creates database entry for ID
3.) Includes ID in response
4.) Client Stores hostname and cookie id value locally
5.) Each request message includes cookie value
How do Caches Work
Install a cache between clients and web server. Link between clients and web server has a super fast link so most connections go through cache first and if object needs to be updated, cache requests from server
Conditional Get
Cache uses a Last-Modified get to see if an object has changed. If not, empty message body with response 304
conection socket
Servers dedcated socket when making a tcp connection
stream
sequence of characters that flow into or out of a process
UDP has how many bytes in header?
8
5 SMTP commands
HELO, QUIT, MAIL FROM, RCPT TO, DATA
protocol
Defines the format of messages, the order of messages and actions taken when receiving messages
MIME
Multipart Internet Mail Extension.

Defines data types in ascii format so they can be sent over email