• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
DHCP stands for....?
Dynamic Host Configuration Protocol
What the theoretical transmission speed achieved on a medium?
Bandwidth
____ is the actual transmission speed experienced?
Throughput
Dynamic Host Configuration Protocol (DHCP) does what?
distributes temporary IP address to computers
How does Dynamic Host configuration Protocol (DHCP) work? (2 points)
Loans out IP addresses while computer is connected to LAN

When computer is disconnected, IP address is made available to others
DNS Stands for....?
Domain Name System
What does Domain Name System (DNS) Do?
Converts user-friendly names into public IP address
How many bits are in a byte?
8 bits in a byte
how many bytes are in a kilobyte?
1024 bytes (Remember: Not 1000 bytes!)
How many bits are in a kilobyte?
8,192 bits (1024 bytes x 8)
Name all the data sizes in order and the number of bytes in each.
8 bits=1 bytes
1 kilobyte (KB) =1024 bytes
1 megabyte (MB)= 1,048,576 bytes
What types of devices use byte storage?
Rand access memory (RAM), Hard disk drive space (HDD), CDs, DVDs, and MP3 Players
MUA
(Mail User Client) the client program like MS Outlok used to access mail
POP
(Post Office Protocol) the protocol an MUA uses to retrieve mail from the server
IMAP
(Internet Message Access Protocol) alternative to POP3 that is more feature rich
SMTP
(Simple Mail Transfer Protocol) the standard for email message transfer
MTA
(Mail Transfer Agent) forwards mail when the destination is not local
MDA
(Mail Delivery Agent) deliver email to local email account mailbox
MIME
(Multipurpose Internet Mail Extensions) an internet standard that extends the format of email to support text in character sets other than ASCII, non-text attachments, message bodies with multiple parts, and header information in non-ASCII character sets
FTP
(File Transfer Protocol) used to upload and download files from servers
DHCP
(Dynamic Host Configuration Protocol) distributes temporary IP addresses to computers while they are connected to LAN
Socket
the IP Address and Port Number
Circuit Switching
provides dedicated point-to-point connection
Packet Switching
breaks transmissions into messages ( or packets, frames)
Multiplexing
money saving way to transfer data where packets from many transmissions are mixed (multiplexed) over each transmission line so that users only pay for the line capacity that they use
GUI
(Graphical User Interface)
http
(hypertext transfer protocol) allows browsers and servers to communicate
IP Address
(Internet Protocol) unique address that identifies any device connected to the internet
DNS
(Domain Name System) hierarchical system of name servers that map host-domain name combinations to IP addresses
URL
(Uniform Resource Locator) Document's Web Address
"Resolve" a domain name
Find the corresponding IP address to a domain name
subnet mask
divides the network and the host ip addresses
VoIP
(Voice over IP) allows voice and phone systems to become an application traveling over the internet
GSM
(Global System for Mobil Communications) 3G standards used by At&t, the most used around the world
CDMA
(Code Division Multiple Access) 3g standard used by Verizon, limited by its inability to supposed voice and data communications at the same time
net neutrality
the principle that all internet traffic should be treated equally
LAN
(Local Area Connection) a computer network that connects computers in a limited area such as home, school, or office building
NIC
(Network Interface Card)
Firewall
Computer device that prevents unauthorized network access
VPN
(Virtual Private Network) uses internet to or private network to create appearance of point-to-point, secure, and encripted connections
workstations
"Beefed-up" computers that can run computer intensive applications such as Computer Aided Design (CAD) or Game Development
BIOS
(Basic Inputer Output System)
protocols
control sending, receiving messages
DoS
(Denial of Service) attckers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resrouce with bogus traffic
Unicast
From one host to one host
Multicast
From one host to multiple hosts
Broadcast
From one host to all other hosts (ff:ff:ff:ff:ff:ff)
ARP
(Address Resolution Protocol) Broadcast to find the MAC address for a given IP address
CSMA/CD
(Carrier Sense Multiple Access/Collission Detection) when frames collide, all devices are notified with a Jam Signal, random backoff timing make hosts wait before retransmitting, hosts try again
half-duplex
one host can either receive or send at a time
CRC
(Cyclic Redundancy Check) check for data corruption
FCS
(Frame Check Squence) area in a frame where the results of CRC are stored
Subnet mask
identifies the network protion and host portion
default gateway
router handling inter-networking
collision domains
encompasses the connected hosts in a LAN that are notified when two frames collide, broken up by routers and switches
Broadcast domain
encompasses the connected hosts in a LAN that are notified when any hosts send a broadcast using the broadcast MAC address (ff:ff:ff:ff:ff:ff) as the destination MAC address, broken up by routers
best effort
unreliable method of transferring frames, no overhead is used to guarantee packet delivery
classful addressing
(class A, B, C or /8, /16, /24) main problem is the wastage of IP addresses
NAT
(Network Address Translation) technology that allows a private IP address to be translated to a publically routable IP address
DMZ
(Demilatarized Zone) behind a firewall but more open to the public than other systems
SDL
(Security Development Lifecycle) a software development security assurance process consisting of security practices grouped by seven phases: training, requirements, design, implementation, verification, release, and response