Com Sci Assessment Unit 2

Ace your homework & exams now with Quizwiz!

Pick the 2 statements that are true about the Internet Protocol (IP)

! Each device or computer on the Internet is assigned a unique IP address. x IP is a secret protocol shared between the sender and receiver. x Each network on the Internet uses its own protocol to address messages. x In order to communicate two devices on the Internet must have the same IP address. ! IP is the shared way that all devices and computers label their messages with the sender and receiver's addresses.

What is a GET request and what are you requesting?

'GET (name of the documents you're requesting)' in the HTTP

How does the DNS help the internet scale?

- 1 DNS server cannot handle all the requests from all devices - DNS servers are connected in a distributed hierarchy, and are divided into zones, splitting up responsibility for the major domains such as .org, .com, .net, etc.

What do certificate authorities do and why are they necessary?

- are trusted entities that verify the identities of websites and issue certificates for them - ensures that you are connecting to the real website - if website tries to start connection w 'janky certificate' your browser will warn you

What problem is HTTP solving?

- the language used to communicate between browsers and servers - the language that a computer uses to ask another computer for a document

HTML (hypertext markup language)

--> language used to tell a web browser how to make a page look - <strong> (bold) - <font> - <A> (link to other pages) - < IMG ALIGN = "middle"> (image alignment) * images and videos have unique URLS that aren't included in the HTML; browser sends separate http request, displays them as they arrive

Packet -- made of 1s and 0s

A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all.

Router

A type of computer that forwards data across a network

What are the benefits of building redundancy into a network? What are the potential issues with building redundancy?

Building redundancy into a network allows the system to be fault tolerant. Even if individual components fail, the information may take an alternative path so it can still reach the intended recipient. Redundancy can become an issue when information takes longer, less efficient paths to reach a destination. The network would run slower than it could.

Fault Tolerant

Can continue to function even in the event of individual component failures. This is important because elements of complex systems like a computer network fail at unexpected times, often in groups.

Packet metadata

Data added to packets to help route them through the network and reassemble the original message

UDP (User Datagram Protocol)

Definition: A protocol for sending packets quickly with minimal error-checking and no resending of dropped packets Main Idea: Like clearing out the library as fast as you can. The goal is to send information quickly without worrying about accuracy. Basics of how it works: Send all the packets but don't check if they all get through or arrive in the correct order Use in real life: useful when split seconds matter more than correcting errors like video-conferencing, live streaming, online gaming

TCP (Transmission Control Protocol)

Definition: a protocol for sending packets that does error-checking to ensure all packets are received and properly ordered Main Idea: Like numbering every book in the library. It's slower but more accurate Basics of how it works: Number packets so they can be re-ordered, confirm all were received, resend any missing packets. Multiple back and forth confirmations between sender and receiver. Use in real life: Useful when accuracy matters more than saving a split second, like sending emails, photos, or just browsing websites

DNS

Domain Name System

HTTP

Hypertext Transfer Protocol - manage the sending and receiving of web files with DNS

Datastream

Information passed through the internet in packets

If the internet were made of direct, dedicated connections, it would be impossible to keep things working as millions of users join. Especially since there's no guarantee that every wire is working in the computer at all times.

Instead, data travels on the Internet in a much less direct fashion.

ISP

Internet Service Provider

How does HTTP rely on other layers of the Internet?

REFER TO ACTIVITY GUIDE

Why are SSL, TLS, and HTTPS necessary?

Secure Socket Layer, Transport layer security --> layers of security wrapped around your communications to prevent hackers from seeing your info: active when you see the lock in your web browser address bar next to the https Hyper Text Transfer Protocol Secure --> ensure that your HTTP requests are secure and protected

World Wide Web vs. Internet

The World Wide Web are files, web pages, and media. The Internet is the network we use to access those files.

Describe how the Internet Protocol (IP) allows devices to easily connect and communicate on the Internet.

Under the Internet Protocol, every device on the network is assigned a unique numerical address and communicates using the same protocol. Using the IP, different devices can exchange information by sending a message and origin address to another IP address. In return, the device that received the message can send information back. This is essentially how the Internet works. When someone looks up a website, the corresponding address to the site is retrieved.

DNS spoofing

When a hacker taps into a DNS server and changes it, to match a domain name with the wrong IP address; sends people to an imposter website

Example of TCP: requesting a song from Spotify

When you request a song on your device, Spotify sends the song as many packets. When your packets arrive, TCP does a full inventory & sends back acknowledgements of each packet received. If all packets are there, TCP signs for your delivery and you're done! If TCP finds packets are missing, it won't sign because you're song won't sound as good or have missing parts. For each missing or incomplete packet, Spotify will resend the packet. When TCP verifies that all packets are there, the song will play.

The internet is . . .

a design philosophy and an architecture expressed in a set of protocols

Computing System

a group of computing devices and programs working together for a common purpose

Computing network

a group of interconnected computing devices capable of sending or receiving data

Computing device

a machine that can run a program, including computers, tablets, servers, routers, and smart sensors

Hypertext Transfer Protocol (HTTP)

a protocol for computers to request and share the pages that make up the world wide web on the Internet

Internet Protocol (IP)

a protocol for sending data across the Internet that assigns unique numbers (IP address) to each connected device

World Wide Web

a system of linked pages, programs, and files

Cookie data

an ID card for site, a number that identifies you web browser holds onto that number, ID number is sent with request now tumblr server sees request and knows its from David

protocol

an agreed-upon set of rules that specify the behavior of some system

Packets travel like cars;

depending on "traffic conditions & congestion" packets may be forced to take different routes -- can change midway through the conversation

Large images or pieces of information may be sent in several different packets that all take different paths

each packet has the Internet address of where it came from and where it's going

HTTP post request

information is sent to web server ('cat videos', survey info) in plain text using HTTP post request Web page & invisible cookie data is sent back for web browser to save --> website can remember who you are

Internet

made up a large number of independently operated networks; information is distributed a communication system that could survive an attack

TCP (Transmission Control Protocol)

manages the sending and receiving of all your data as packets

Information from one computer to another travels in what we call a ____________ of information.

packet

Special computers on the internet called ______________ act like traffic managers to keep the packets moving through the networks smoothly.

packets may arrive at the destination at slightly different times or even out of order

Because of the principles of fault tolerance and redundancy, the more routers we add, the more . . .

reliable the internet becomes

TCP and router systems are __________

scalable

The DNS and IP are designed to . . .

scale

How does the DNS solve the problem of translating domain names like example.com into IP addresses?

the DNS associates names like www.example.com with the corresponding addresses. Your computer uses the DNS to look up domain names and get the associated IP address, which is used to connect your computer to its destination on the internet.

Scalability

the capacity for the system to change size and scale to meet new demands

redundancy

the inclusion of extra components so that a system can continue to work even if individual components fail, for example by having more than one path between any 2 connected devices in a network

bandwidth

the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second

Path

the series of connections between computing devices on a network starting with a sender and ending with a receiver

The Domain Name System (DNS)

the system responsible for translating domain names like example.com into IP addresses - an important system in helping the internet scale

IP address (Internet Protocol address)

unique number (like a street address) that's unique to each device on the network

Which of the following is true regarding the way information is transmitted on the Internet?

x Information flows on a dedicated direct connection from the sender's device to the receiver's device using binary electrical signals. x If a single packet is dropped, the entire file must be resent. x Because of the reliability of the Internet, packets always arrive in the same order they were sent. ! Information does not travel in one piece, but rather as a datastream of packets.

Pick Two: If the post office delivered mail exactly like the routers deliver messages on the Internet, which of the following statements would be true?

x One mailman would be responsible for delivering a letter from sender to receiver ! The mailman would sometimes take a different path to deliver each letter to your home ! Letters would be written on the outside of the envelope for all to read instead of letters put inside envelopes x Your mail could not be delivered if a road your mailman was planning to take were under construction.

Visiting a website is just . . .

your computer asking another computer for information. Your computer sends a message to the other computer's IP address and also sends it's origin address so the other computer knows where to send it's response.


Related study sets

Chapter 10 — Recombinant DNA: Gene Isolation and Manipulation

View Set

Final Interpersonal communication

View Set

Content Marketing Fundamentals, Content Curation vs. Creation, Curation and Creation Strategy

View Set

Application Layer - Kap 2- Uke 4-5

View Set

General Biology 2: Chapter 20 - HW Q's

View Set