Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
91 Cards in this Set
- Front
- Back
network |
a collection of devices that share a common communication protocol and a communication medium |
|
network cards routers hubs gateways |
elements forming network physical architecture (NRHG) |
|
network cards |
hardware devices added to a computer to allow it to talk to a network |
|
routers |
are machines that acts as switches |
|
hubs |
provide connections that allow multiple computers to access a network |
|
gateways |
connect one network to another |
|
nodes |
raw data passed across various points in the network |
|
network interface card (NIC) |
ensures no two devices address alike |
|
hardware address ethernet address MAC address NIC address |
physical address (HEMN) |
|
packets |
consists of header and data segment |
|
header |
contains addressing information, checksums, etc. |
|
data segment |
contains sequences of bytes, comprising actual data |
|
Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer |
name all the OSI Model |
|
Physical Layer |
most basic level, netwok hardware, cables, cards |
|
Data Link Layer |
-responsible for providing more reliable data, grouping data into frames -sends frames into network -to ensure garbled data frames will not be passed to higher layers |
|
Network Layer |
this layer deals with data packets |
|
Transport Layer |
this layer controlling how data is transmitted |
|
Session Layer |
to facilitate application to application data exchange, and establishment & termination communication session |
|
Presentation Layer |
this layer deals with data representation ams data conversion |
|
Application Layer |
The final OSI layer, which is where the vast majority of programmerswrite code. its protocols dictate the semantics of how requests for services aremade, such as requesting a file or checking for e-mail. |
|
TCP/IP |
aworldwide collection of smaller networks that share a common communication suite aka intranet |
|
The Internet |
is an open system, built on common network, transport, and application layerprotocols, while granting the flexibility to connect a variety of computers, devices, and operatingsystems to it |
|
The Internet Protocol (IP) |
is a Layer 3 protocol (network layer) that is used to transmit datapackets over the Internet. It is undoubtedly the most widely used networking protocol in the world |
|
IP datagrams |
Information is exchanged betweentwo hosts in the form of IP packets |
|
version field |
describes which version of the Internet Protocol is being used |
|
header length field |
specifies the length of the header, in multiples of 32 bits |
|
type of service field |
requests that a specific level of service be offered to the datagram |
|
total length field |
states the total length of the datagram (including both header and data) |
|
identification field |
allows datagrams that are part of a sequence to be uniquely identified. |
|
flags field |
controls whether these datagrams may be fragmented (sent assmaller pieces and later reassembled). |
|
time-to-livecounter (TTL) field |
So thatdatagrams don't get caught in infinite loops and congest the network even further, |
|
protocol type field |
identifies the transport level protocol that is using a datagram forinformation transmission. |
|
header checksum |
is used to detectwhether data has been scrambled to safeguard against incorrect transmission of a datagram |
|
version header length type of service total length identification flag TTL header checksum source & destination IP address datagram options |
IP Datagram format (VHTT-IFTH-SD) |
|
datagram options field |
the field is of variable length, and contains flags to control security settings, routinginformation, and time stamping of individual datagrams. the last field |
|
IP address |
Each host machine under the InternetProtocol has a unique address is a four-byte (32-bit) address, which is usually expressed in dotted decimal format(e.g., 192.168.0.6). |
|
Host Name |
A much simpler addressingmechanism to associate an easy-to-remember textual name with an IP address |
|
Destination Unreachable Parameter Problem Redirect Source Quench Time Exceeded |
The ICMP defines five error messages (DPRST) |
|
Transmission Control Protocol (TCP) |
is a Layer 4 protocol (transport layer) that providesguaranteed delivery and ordering of bytes |
|
User Datagram Protocol (UDP) |
is a Layer 4 protocol (transport layer) that applications canuse to send packets of data across the Internet (as opposed to TCP, which sends a sequence ofbytes) |
|
Telnet |
is a service that allows users to open a remote-terminal session to a specific machine |
|
File Transfer Protocol (FTP) |
ability to transfer files is extremely important. Even before the World Wide Web, peopledistributed images, documents, and software using the ________________ |
|
Post Office Protocol,version 3 (POP3) |
With the exception of Web-based e-mail orspecialized accounts, the majority of people access their e-mail using this protocol Messages are stored on a server, retrieved by an email client, and then deleted from the server. This allows users to read mail offline, without beingconnected to the Internet. |
|
InternetMessage Access Protocol (IMAP) |
This protocol is less popular, as it requires a continualconnection to the mail server, and thus increases bandwidth consumption and disk usage sincemessages are not stored on the user's system. |
|
Simple Mail Transfer Protocol (SMTP) |
allows messages to be delivered over the Internet |
|
HyperText Transfer Protocol (HTTP) |
is one of the most popular protocols in use on the Internet today; it made the World WideWeb possible. |
|
Finger |
is a handy protocol that allows someone to look up a person's account and find out certaininformation, such as when they last logged in and checked their mail |
|
Network News Transport Protocol (NNTP) |
allows users to access Usenet newsgroups. Usenet is acollection of discussion forums on a colorful and diverse number of topics |
|
WHOIS |
protocol allows users to look up information about a domain name |
|
firewall |
is a special machine that has been configured specifically to prohibit harmful incoming or outgoing data |
|
Proxy Servers |
is a machine that acts as a proxy for application protocols. |
|
Java |
a is applied to a variety of technologies created by Sun Microsystems |
|
The Java programming language The Java platform The Java API |
three main components of Java |
|
The Java programming language |
a programming language used to write software forthe Java platform |
|
The Java platform |
a range of runtime environments that support execution of softwarewritten in Java |
|
The Java API |
a rich, fully featured class library that provides graphical user interface,data storage, data processing, I/O, and networking support |
|
James Gosling |
affectionately known as the father of the Java language |
|
HotJava |
the first Web browser capable of running Java software released in March 1995 |
|
•Object orientation • Simplicity • Automatic garbage collection • Portability • Multi-threaded programming • Security • Internet awareness |
Some of the most important properties of Java are its (OSAP-MSI) |
|
"Write Once, Run Anywhere," |
The vision of Java is to WORA |
|
The Java Virtual Machine |
is an emulation of a hardware device |
|
Java 2 Platform, Standard Edition (J2SE) |
used to run Java software as stand-aloneapplications, either in a user console or as a windowed application with a GUI interface |
|
Java 2 Platform, Enterprise Edition (J2EE) |
used to run Java software within largeenterprises, using a diverse suite of Java technologies for distributed systems, transactionmanagement, and electronic commerce. |
|
Java 2 Platform, Micro Edition (J2ME) |
This is acut-down version of the Java 2 platform, with the emphasis on a lightweightimplementation suitable for use on low-memory systems. |
|
Browser runtime environments |
allowing Java code to execute within the browser, toserve up interactive content that is downloaded from a Web site This form of Javasoftware is called an applet |
|
Web-server runtime environments |
allowing Java code to run within a Web server, todynamically generate Web pages and content |
|
J2SE J2EE J2ME Browser runtime environments Web-server runtime environments |
Java Runtime Environments |
|
The Java Application Program Interface (API) |
If a programming language is viewed as the mind of software, and the JVM as the heart that keepsthat software beating, then this must surely be Java's armsand legs. |
|
Package java.net |
comprises the majority of classes that deal with Internet programming. |
|
Package java.rmi.* |
a set of packages that support remote method invocation (RMI), |
|
Package org.omg.* |
a set of packages that support the Common Object Request BrokerArchitecture (CORBA) |
|
JavaMail |
an extension that provides access to e-mail services, allowing Java softwareto send and receive electronic mail. |
|
Java Servlets |
an extension that allows Java software to produce dynamic content for aWeb site, by executing within a Web server. |
|
software agent |
is a software process that acts on the behalf of one or more users, toperform specific commands and tasks or to fulfill a set of goals |
|
Exception handling |
is a mechanism for dealing with errors that occur in software at runtime. |
|
java.lang.Throwable |
all exceptions share a common class inheritance |
|
AWTError |
thrown when a serious error occurs in the Abstract Windowing Toolkit |
|
NoClassDefFoundError |
thrown when the JVM is unable to locate the classdefinition file (.class) for a class |
|
OutOfMemoryError |
thrown when the JVM can no longer allocate memory to objectsand the garbage collector can free no further objects |
|
the Error class |
are serious errors that typical Java softwareshould not encounter, and which in any case the developer will have no control over |
|
NoSuchElementException |
an exception thrown when an attempt is made to access the nextelement of an enumeration, but all elements have been exhausted. |
|
NullPointerException |
an exception thrown when an attempt to reference an object has beenmade, but the reference was null. |
|
SecurityException |
an exception thrown by the current security manager when an attempt toaccess a resource, object, or method has been made but not permitted |
|
exception handler |
This is aspecial section of code that catches any thrown exceptions |
|
try statement |
indicates a block of code that can generate exceptions. |
|
catch statement |
is used to catch exceptions thrown within a try block of code. |
|
finally statement |
is a generic catchall for cleaning up after a try block. |
|
Integrated Development Environments (IDE) |
is a suite of tools that a developer uses to design,create, modify, compile, and test software |
|
Borland JBuilder, Symantec Visual Café, Visual Age for Java, Visual J++, Forte for Java Community Edition |
(5) commercial IDE packages available. |
|
Java SDK |
The most important system development kit (SDK) available for Java developers |
|
127.0.0.1 |
loopback |