CH 3 Section B
Terms in this set (28)
created in 1969, connected computers at UCLA, the Stanford Research Institute, the University of Utah, and the University of California at Santa Barbara. Essentially a pilot program for what later became the Internet
1.074 billion gigabytes.
a set of shared protocols, procedures, and technologies that evolve through common agreement among network providers.
The organization that supervises Internet addressing.
The way these networks fit together is referred to as the ________.
a system of high-capacity routers and fiber-optic communication links providing the main routes for data speeding across the Internet.
Internet service providers
Networks that form the Internet are maintained by_____ that supply routers and other data communication equipment, as well as physical and wireless channels to carry data.
Internet exchange points
ISPs exchange data at _____.
a parcel of data that is sent across a computer network.
Some communication networks, such as telephone systems, use a technology called __________, which essentially establishes a dedicated, private link between one telephone and another for the duration of a call.
A more efficient alternative to circuit switching is _______ technology, which divides a message into several packets that can be routed independently to their destination.
responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and verifying that the data was not corrupted while in transit (a process called error checking).
faster than TCP but does not perform error checking and cannot reorder packets if they are received out of order.
a virtual end point for data entering and leaving a digital device.
defines two sets of addresses: IPv4 and IPv6.
uses 32-bit addresses to uniquely identify devices connected to the Internet.
uses 128 bits for each address, producing billions and billions of unique Internet addresses.
Many, but not all, devices on the Internet have permanently assigned IP addresses, called ______.
Internet addresses that are temporarily assigned are called ______.
IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by ________.
private IP address
can be allocated by any network without supervision from ICANN.
public IP address
An address that is routable over the Internet.
a private IP address can protect you from some threats. For example, a hacker who randomly enters IP addresses looking for unauthorized access will never find your private IP address because the only address that is visible to the public is the address of your local router. This security technique is usually referred to a ______.
People find it difficult to remember the string of numbers in an IP address. Therefore, most Internet destinations also have an easy-to-remember ________.
domain name system (DNS)
The mechanism for tracking domain names and their corresponding IP addresses is called the ______.
level domain- A domain name ends with an extension that indicates its _______.
domain name servers
Scattered around the world are several _________ that maintain lists of all domain names and their corresponding IP addresses.
Unauthorized changes to the DNS are called _______.