• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/91

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

91 Cards in this Set

  • Front
  • Back

network

a collection of devices that share a common communication protocol and a communication medium

network cards


routers


hubs


gateways

elements forming network physical architecture (NRHG)

network cards

hardware devices added to a computer to allow it to talk to a network

routers

are machines that acts as switches

hubs

provide connections that allow multiple computers to access a network

gateways

connect one network to another

nodes

raw data passed across various points in the network

network interface card (NIC)

ensures no two devices address alike

hardware address


ethernet address


MAC address


NIC address

physical address (HEMN)

packets

consists of header and data segment

header

contains addressing information, checksums, etc.

data segment

contains sequences of bytes, comprising actual data

Physical Layer


Data Link Layer


Network Layer


Transport Layer


Session Layer


Presentation Layer


Application Layer

name all the OSI Model

Physical Layer

most basic level, netwok hardware, cables, cards

Data Link Layer

-responsible for providing more reliable data, grouping data into frames


-sends frames into network


-to ensure garbled data frames will not be passed to higher layers

Network Layer

this layer deals with data packets

Transport Layer

this layer controlling how data is transmitted

Session Layer

to facilitate application to application data exchange, and establishment & termination communication session

Presentation Layer

this layer deals with data representation ams data conversion

Application Layer

The final OSI layer, which is where the vast majority of programmerswrite code. its protocols dictate the semantics of how requests for services aremade, such as requesting a file or checking for e-mail.

TCP/IP

aworldwide collection of smaller networks that share a common communication suite



aka intranet

The Internet

is an open system, built on common network, transport, and application layerprotocols, while granting the flexibility to connect a variety of computers, devices, and operatingsystems to it

The Internet Protocol (IP)

is a Layer 3 protocol (network layer) that is used to transmit datapackets over the Internet. It is undoubtedly the most widely used networking protocol in the world

IP datagrams

Information is exchanged betweentwo hosts in the form of IP packets

version field

describes which version of the Internet Protocol is being used

header length field

specifies the length of the header, in multiples of 32 bits

type of service field

requests that a specific level of service be offered to the datagram

total length field

states the total length of the datagram (including both header and data)

identification field

allows datagrams that are part of a sequence to be uniquely identified.

flags field

controls whether these datagrams may be fragmented (sent assmaller pieces and later reassembled).

time-to-livecounter (TTL) field

So thatdatagrams don't get caught in infinite loops and congest the network even further,

protocol type field

identifies the transport level protocol that is using a datagram forinformation transmission.

header checksum

is used to detectwhether data has been scrambled to safeguard against incorrect transmission of a datagram

version


header length


type of service


total length


identification


flag


TTL


header checksum


source & destination IP address


datagram options



IP Datagram format (VHTT-IFTH-SD)

datagram options field

the field is of variable length, and contains flags to control security settings, routinginformation, and time stamping of individual datagrams. the last field

IP address

Each host machine under the InternetProtocol has a unique address


is a four-byte (32-bit) address, which is usually expressed in dotted decimal format(e.g., 192.168.0.6).

Host Name

A much simpler addressingmechanism to associate an easy-to-remember textual name with an IP address

Destination Unreachable


Parameter Problem


Redirect


Source Quench


Time Exceeded

The ICMP defines five error messages (DPRST)

Transmission Control Protocol (TCP)

is a Layer 4 protocol (transport layer) that providesguaranteed delivery and ordering of bytes

User Datagram Protocol (UDP)

is a Layer 4 protocol (transport layer) that applications canuse to send packets of data across the Internet (as opposed to TCP, which sends a sequence ofbytes)

Telnet

is a service that allows users to open a remote-terminal session to a specific machine

File Transfer Protocol (FTP)

ability to transfer files is extremely important. Even before the World Wide Web, peopledistributed images, documents, and software using the ________________

Post Office Protocol,version 3 (POP3)

With the exception of Web-based e-mail orspecialized accounts, the majority of people access their e-mail using this protocol


Messages are stored on a server, retrieved by an email client, and then deleted from the server. This allows users to read mail offline, without beingconnected to the Internet.

InternetMessage Access Protocol (IMAP)

This protocol is less popular, as it requires a continualconnection to the mail server, and thus increases bandwidth consumption and disk usage sincemessages are not stored on the user's system.

Simple Mail Transfer Protocol (SMTP)

allows messages to be delivered over the Internet

HyperText Transfer Protocol (HTTP)

is one of the most popular protocols in use on the Internet today; it made the World WideWeb possible.

Finger

is a handy protocol that allows someone to look up a person's account and find out certaininformation, such as when they last logged in and checked their mail

Network News Transport Protocol (NNTP)

allows users to access Usenet newsgroups. Usenet is acollection of discussion forums on a colorful and diverse number of topics

WHOIS

protocol allows users to look up information about a domain name

firewall

is a special machine that has been configured specifically to prohibit harmful incoming or outgoing data

Proxy Servers

is a machine that acts as a proxy for application protocols.

Java

a is applied to a variety of technologies created by Sun Microsystems

The Java programming language


The Java platform


The Java API

three main components of Java

The Java programming language

a programming language used to write software forthe Java platform

The Java platform

a range of runtime environments that support execution of softwarewritten in Java

The Java API

a rich, fully featured class library that provides graphical user interface,data storage, data processing, I/O, and networking support

James Gosling

affectionately known as the father of the Java language

HotJava

the first Web browser capable of running Java software released in March 1995

•Object orientation


• Simplicity


• Automatic garbage collection


• Portability


• Multi-threaded programming


• Security


• Internet awareness

Some of the most important properties of Java are its (OSAP-MSI)

"Write Once, Run Anywhere,"

The vision of Java is to WORA

The Java Virtual Machine

is an emulation of a hardware device

Java 2 Platform, Standard Edition (J2SE)

used to run Java software as stand-aloneapplications, either in a user console or as a windowed application with a GUI interface

Java 2 Platform, Enterprise Edition (J2EE)

used to run Java software within largeenterprises, using a diverse suite of Java technologies for distributed systems, transactionmanagement, and electronic commerce.

Java 2 Platform, Micro Edition (J2ME)

This is acut-down version of the Java 2 platform, with the emphasis on a lightweightimplementation suitable for use on low-memory systems.

Browser runtime environments

allowing Java code to execute within the browser, toserve up interactive content that is downloaded from a Web site




This form of Javasoftware is called an applet

Web-server runtime environments

allowing Java code to run within a Web server, todynamically generate Web pages and content

J2SE


J2EE


J2ME


Browser runtime environments


Web-server runtime environments

Java Runtime Environments

The Java Application Program Interface (API)

If a programming language is viewed as the mind of software, and the JVM as the heart that keepsthat software beating, then this must surely be Java's armsand legs.

Package java.net

comprises the majority of classes that deal with Internet programming.

Package java.rmi.*

a set of packages that support remote method invocation (RMI),

Package org.omg.*

a set of packages that support the Common Object Request BrokerArchitecture (CORBA)

JavaMail

an extension that provides access to e-mail services, allowing Java softwareto send and receive electronic mail.

Java Servlets

an extension that allows Java software to produce dynamic content for aWeb site, by executing within a Web server.

software agent

is a software process that acts on the behalf of one or more users, toperform specific commands and tasks or to fulfill a set of goals

Exception handling

is a mechanism for dealing with errors that occur in software at runtime.

java.lang.Throwable

all exceptions share a common class inheritance

AWTError

thrown when a serious error occurs in the Abstract Windowing Toolkit

NoClassDefFoundError

thrown when the JVM is unable to locate the classdefinition file (.class) for a class

OutOfMemoryError

thrown when the JVM can no longer allocate memory to objectsand the garbage collector can free no further objects

the Error class

are serious errors that typical Java softwareshould not encounter, and which in any case the developer will have no control over

NoSuchElementException

an exception thrown when an attempt is made to access the nextelement of an enumeration, but all elements have been exhausted.

NullPointerException

an exception thrown when an attempt to reference an object has beenmade, but the reference was null.

SecurityException

an exception thrown by the current security manager when an attempt toaccess a resource, object, or method has been made but not permitted

exception handler

This is aspecial section of code that catches any thrown exceptions

try statement

indicates a block of code that can generate exceptions.

catch statement

is used to catch exceptions thrown within a try block of code.

finally statement

is a generic catchall for cleaning up after a try block.

Integrated Development Environments (IDE)

is a suite of tools that a developer uses to design,create, modify, compile, and test software

Borland JBuilder, Symantec Visual Café, Visual Age for Java, Visual J++, Forte for Java Community Edition

(5) commercial IDE packages available.

Java SDK

The most important system development kit (SDK) available for Java developers

127.0.0.1

loopback