Upgrade to remove ads
Terms in this set (62)
Collection of large national and international networks, most of which are owned by commercial, educational, or government organizations.
Optical Carrier (OC) line
A high-speed fiber optic line
Carry digital data ove twisted-pair wires.
Internet Exchange point (IXP)
A way of connecting Internet service providers (ISPs) that's made up of one or more network switches to which the ISP's connect (switches are devices that send data on a specific route through a network)
Point of Presence (POP)
How individual Internet users enter an ISP. Uses a bank of modems, servers, routers, and switches.
What type of network model does the Internet use?
Client/Server model. Clinets are devices like computers, tablets, smartphones that use browsers to request services such as web pages.
Computers that run specialized operating systems, enabling them to host web pages and other information and to provide requested information to clients
Computers that host software that enables users to buy goods and services over the web. Protects sensitive information
Computers that are deployed to provide remote storage space or to act as storehouses for files that users can download. Cloud services.
Set of rules for exchanging electronic information. Communicating, collaborating, creating content in the same fashion
Protocol with design made public for access by any interested party
Private system opposite of open system
A dedicated connection is formed between two points (such as two people on phones), and the connection remains active for the duration of the transmission. Ineffective for computers because either the circut would have to remain open and unavailable to any other system, or it would have to be reestablished for each burst of information sent
Communications method for computers. Data is broken into smaller chunks called PACKETS and are sent over various routes at the same time.
1. An address to which the packet is being sent
2. The address from where the packet originates
3. Reassembly instructions, if the original data is split between packets
4. The data that's being tansmitted
Transmission Control Protocol/Internet Protocol (TCP/IP)
The main suite of protocols used for transmitting data over the Internet
A unique identification number that defines each computer, service, or other device connected to the internet (like street addresses).
Internet Corporation for Assigned Names and Numbers (ICANN)
IP addresses must be registered here to ensure they're unique
Dotted Decimal Number
IP address form where the numbers are separated by decimals
Each of the 4 numbers in a dotted decimal number is referred to as...
Requires two computers to exchange control packets, thereby setting up parameters of the data-exchange (handshaking).
Doesn't require any type of connection to be established or maintained between two computers exchanging information
Positive Acknowledgement (ACK)
When Y receives a data packet that it can read from X, it sends back...
Negative Acknowledgement (NAK)
If packet is unreadable (damaged in transit), Y sends a NAK to X
Section of your hardrive that stores information that you may need again, such as IP addresses and frequently accessed web pages.
Internet Protocol version 4
The original protocol addressing scheme. Did not predict the explosive growth of the Internet
Internet of Things
A term for the explosive growth of Internet-enabled devices. Appliances, light bulbs, smoke detectors all now send messages over the internet!!
Internet Protocol version 6
an IP addressing scheme developed to make IP addresses longer, providing more available (128 bit instead of 32 bit)
A base 16 number system, each hexadecimal digit is one of 16 possible values 0-9 or A-F
The IP address for a computer never changes and is most likely assigned manually by a network administrator or an ISP
Your computer is assigned a temporary address from an available pool of IP addresses (more common)
Dynamic Host Configuration Protocol (DHCP)
Dynamic addressing is normally handled by the DHCP, which belongs to the TCP/IP protocol suite. It takes a pool of IP addresses and shares them with hosts on the network on an as-needed bases. (as-needed because not everyone is logged on to the internet at one time).
Top-level vs Second-level Domain names
Top level is what comes after the dot and second level comes before the dot
Domain Name System (DNS) server
Like a phone book for the internet. When you enter a URL in your browser, your computer converts the URL to an IP address using this.
Root DNS server
Contains the master listings for an entire top-level domain. When your own default DNS server doesn't know the address, it has to consult this to find out.
Not a programming language; is a set of rules for marking up blocks of text so that a browser knows how to display them.
Surround and define HTML content (such as <b> and </b> indicate bolding)
Each pair of tags and text in between them are collectively referred to as an element
Current version of the HTML standard
Cascading Style Sheet
List of rules that defines in one single location how to display HTML elements. Style rules enable web developers to define a kind of formatting for each HTML element and apply it to all those elements on a set of web pages (essentially, a template).
Where does the "cascading" come in?
In web documents, there are
1. External (stored in separate file)
2. Embedded (stored inside the current HTML document)
3. Inline (stored within a single line inside the HTML document).
Each style has a different weight that can override the rule/style with a lower weight
Extensible Markup Language (XML)
Describes the content in terms of what data is being described rather than how it's to be displayed. Users can build their own markup languages to accommodate particular formats and needs
Data validation: If we needed a tag for an age field, we know a person's age can only be between 0 and 120 but any data may be inserted between <p> tags. XML allows this
Hypertext Transfer Protocol (HTTP)
Browsers use this Internet protocol to send requests. Created especially for the transfer of hypertext documents across the Internet (recall that hypertext documents are documents in which text is linked to other documents or media)
Hypertext Transfer Protocol Secure (HTTPS)
Ensures that data is sent securely over the web. Combination of Secure Sockets Layer (SSL) and Transport Layer Security (TLS). These provide data integrity and security for transmissions over the Internet
A type of program that runs on a web server rather than on your computer
Common Gateway Interface (CGI)
Provides a method by which your browsers can request that a program file be executed instead of just being delivered to the browser. Enables the website to be interactive.
Program that runs on the client computer and requires no interaction with a web server. Once a web server processes a web page and sends the page to the client computer, the receiving computer can't get new data unless a new request is made. More efficient to run programs on your computer
HTML Embedded Scripting Language
Part of client-side programming. Tucks programming code directly within the HTML of a web page.
Part of client-side programming. A small application actually located on the server is downloaded to the client. It's there ready to run when needed without addition data transfers between client and server.
Document Object Model (DOM)
Simple Mail Transfer Protocol (SMTP)
Email has its own protocol. SMTP is responsible for sending email along the Internet to its destination.
Specialized computers whose sole function is to store, process, and send email
Multipurpose Internet Mail Extensions (MIME)
All email client software now uses this protocol to attach files. It handles the encoding and decoding of attachments for its users
The process of coding your email so that only the person with the key to the code can decode and read the message
Only the two parties involved in sending the message have the code. If someone steals a copy of the code, however, the code is broken.
A type of encryption where two keys, known as a key pair, are created. One key is used for coding and the other is for decoding. The key for coding is distributed as a public key (anyone wishing to send you a message can download your public key), while the private key is retained for decoding (You're the only one who ever possesses the private key so it's highly secure).
Pretty Good Privacy (PGP)
Public key packages available for download. Can use free of charge.
How does IM work?
The client software running on your device makes a connection with the chat server and provides it with connection information for your device. Chatting takes place directly between the two devices over the Internet.
THIS SET IS OFTEN IN FOLDERS WITH...
TIA Chapter 13
TIA chapter 12
CIS 250 Test 2
CIS 300 - Test 2
YOU MIGHT ALSO LIKE...
Ch 13: Behind the Scenes: How the Internet Works
Chapter 13 - Behind the Scenes: How the Internet W…
TIA Chapter 13
TIA Chapter 13
OTHER SETS BY THIS CREATOR
Top 200 Practice
40 Common Drugs
PCAT Solubility Rules