CS 2310 Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

User Datagram Protocol

(More efficient but less reliable.) This transport layer sends a message without first establishing a connection.

Transmission Control Protocol

(More reliable but less efficient.) This transport layer is said to establish a connection before sending a message. The layers at the origin and destination work together to assure that all segments of a message are successfully transmitted. It also implements flow control.

Telnet

(and Secure Shell) This is a protocol system established to allow computers to access other computers from great distances.

Server Side

(cgi, servlets, server pages, php.) These activities by the web server are performed by the server.

URL

(http://eagle.mu.edu/authors/Shakespeare/Julius_Caesar.html) This contains the protocol required to access the document; the mnemonic name of the host holding the document; the directory path indicating the location of the document within the host's file system; and the document name.

Client Side

(javascript, macromedia flash.) These activities by the browser are performed by the client.

IP Address

A pattern of 32 or 138 bits often represented in dotted decimal notation.

Open Network

A way of classifying networks whose internal operation is based on designs that are in the public domain.

Closed Network

A way of classifying networks whose internal operation is based on innovations owned and controlled by a particular entity such as an individual or a corporation.

Electronic Mail

Also known as email, this early internet application features a domain mail server which collects incoming mail and transmits outgoing mail. The mail server delivers collected incoming mail to clients via POP3 or IMAP.

Hidden Terminal Problem

Although all of the end systems can communicate with the access point, none of the end systems can hear each other.

The Internet

An internet that spans the world. The original goal was to develop a means of connecting networks that would not be disrupted by local disasters. Today this is a commercial undertaking that links a worldwide combinations of PANs, LANs, MANs, and WANs involving millions of computers.

Bus

Computers are connected via Ethernet. (network topology)

Star

Computers are connected via wireless networks with a central access point. (network topology)

Distributed Systems

Systems with parts that run on different computers.

Internet Security Risks

The Internet can lead to attacks such as malware, denial of service, and spam. However, protective measures include firewalls, spam filters, proxy servers, and antivirus software.

Public-Key Encryption

The public key is used to encrypt messages and the private key is used to decrypt messages.

N-unicast

The technique in which an internet radio station could merely establish a server that would send program messages to each of the clients who requested them.

Network Classifications

These include personal area network (PAN), local area network (LAN), metropolitan area (MAN), and wide area network (WAN).

Browsers

These present web materials to the user.

Webservers

These provide access to web documents, which are identified by URLs and are transferred using HTTP.

Application

This (1st) layer of internet software constructs the message with the address.

Transport

This (2nd) layer of internet software chops the message into packets.

Network

This (3rd) layer of internet software handles routing through the Internet.

Link

This (4th) layer of internet software handles the actual transmission of packets.

Tier-1 ISP

This Internet Service Provider consists of high-speed, high-capacity, international WANs that serve as the backbone of the Internet.

Tier-2 ISP

This Internet Service Provider is more regional in scope and is less potent in capabilities. These networks tend to be operated by companies in the communications business.

Tier-3 ISP

This Internet Service Provider provides connectivity to the Internet through wireless hotspots, telephone lines, cable/satellite systems, or fiber optics.

Hypertext

This combines internet technology with the concept of linked documents, embedding hyperlinks to other documents.

Internet Corporation for Assigned Names and Numbers

This community allocates IP addresses to ISPs who then assign those addresses within their regions and oversees the registration of domains and domain names.

Switch

This connects several compatible networks to make a bigger network.

Bridge

This connects two compatible networks to make a bigger network.

Router

This connects two incompatible networks resulting in a network of networks called an internet.

Repeater

This extends a network to make a bigger network.

Client-Server Communication

This inter-process communication involves one server and many clients where the client initiates communication and the server must execute continuously.

Peer-to-Peer Communication

This inter-process communication involves two processes communicating as equals, and can thus be short-lived.

File Transfer Protocol

This is a client/server protocol for transferring files across the internet by establishing connections between computers.

Cluster Computing

This is a distributed system in which many independent computers work closely together to provide computation or services comparable to a much larger machine.

Grid Computing

This is a distributed system that is more loosely coupled than clusters but still work together to accomplish large tasks. It can involve specialized software to make it easier to distribute data and algorithms to the machines participating in the grid.

Cloud Computing

This is a distributed system where huge pools of shared computers on the network can be allocated for use by clients as needed.

Voice-Over IP

This is a protocol in which the Internet infrastructure is used to provide voice communication similar to that of traditional telephone systems.

Simple Mail Transfer Protocol

This is a protocol used to transfer mail between mail servers as well as to send a new message from its author's local machine to the author's mail server.

HTML

This is encoded as a text file and contains tags to communicate with the browser.

Domain Name System

This looks up name servers through the DNS lookup.

CSMA/CD

This protocol is used in Ethernet, and a silent bus provides the right to introduce new messages.

CSMA/CA

This protocol is used in Wi-Fi and faces the hidden terminal problem.

Hypertext Transfer Protocol

This protocol is used to transfer hypertext documents between browsers and webservers.

Multicast

This technique features a server that transmits a message to multiple clients by means of a single address and relies on the routers in the Internet to recognize the significance of that address and to produce and forward copies of the message to the appropriate destinations.

Mnemonic Address

Used for addressing domain names.


Ensembles d'études connexes

Female Reproductive System: Oogenesis and Folliculogenesis...Ovulation and Fertilization.

View Set

OSHA: Emergency Action Plans & Fire Protection

View Set

Chapter4: Security and Compliance Quiz

View Set

NEW EC-6 Math: Probability and Statistics

View Set

Small Business Management Chapter 13

View Set

Revolution and the Constitution: 1776-1789 (#2)

View Set

Wildland fire behavior chapter 4

View Set