1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Switch
A device that connects multiple "buses" (and/or computers) to a network.
Router
A device that connects multiple different networks to an internet
Client/server model
A model for inter-process communication where clients request services from servers.
Peer-to-peer model
A model for inter-process communication where each participant can act as both a client and a server.
IP address
A unique numerical address for a computer connected to the Internet.
DNS
Domain Name System that translates domain names to IP addresses.
Bus topology
A network topology where all devices are connected to a common communication line.
Star topology
A network topology where all devices are connected to a central device, called an access point.
Cloud computing
Large pools of shared computers allocated for use based on demand.
HTTP
Hypertext Transfer Protocol, the protocol used by the World Wide Web application.
UDP
User Datagram Protocol, which belongs to the transport layer of Internet software.
IPv4
Internet Protocol Version 4, which uses 32-bit addresses.
IPv6
Internet Protocol Version 6, which uses 128-bit addresses.
FTP
File Transfer Protocol, which belongs to the application layer of Internet software.
Certificate
A package consisting of name/identity and public key, certifying identity in public key encryption.
Malware
Malicious software, such as viruses, worms, or Trojan horses.
LAN
Local Area Network, a network that connects computers in a limited area.
TCP
Transmission Control Protocol, which belongs to the transport layer of Internet software.
Distributed system
A system consisting of software units executing on several different computers.
ICANN
Internet Corporation for Assigned Names and Numbers, responsible for assigning IP numbers.
DNS lookup
The process of translating a domain name to an IP address using DNS.
Hub
A device that connects computers to a network and sends all traffic to all connected devices.
SMTP
Simple Mail Transfer Protocol, which belongs to the application layer of Internet software.
Web server
A server that provides access to various web resources, such as web pages.
URL/URI
A unique identifier for a web resource, such as a web page.
TCP and UDP
The two common Internet protocols for the transport layer.
IPv6 protocol
Belongs to the network layer of Internet software.
Public key encryption
An encryption technique that allows parties to communicate without needing a common key in advance.
Internet domains
Mnemonic names for numerical IP addresses, making them easier to remember.
Open protocols
Examples include HTTP and FTP, which are publicly available.
HTTP vs
HTTP traffic is not encrypted, while HTTPS traffic is encrypted.
Hub vs
A hub connects all devices, a switch connects devices intelligently, and a router connects multiple networks.
FTP
Transfers files; HTTP:Transfers web resources; SMTP:Transfers electronic mail.
Certificate trust
Depends on the trust in the issuer; not all certificates are equally trustworthy.
DNS query
When a web client queries a server to translate a domain name to an IP number.
Most reliable transport layer protocol
TCP (Transmission Control Protocol).
Digital signature
Guarantees the sender's identity by encrypting the file with the sender's private key.
Distributed system characteristics
Software units executing on several different computers.
IPv6 vs
2^128 / 2^32 = 2^96.
Internet software layers
Application, transport, network, link.
HTML
A language used to create and describe web pages.
Certificate authority
An organization that issues certificates to verify identities.
TCP advantage
More reliable; disadvantage:Slower.
UDP advantage
Faster; disadvantage:Less reliable.
Client-server concept
Clients request services from servers that provide those services.
SMTP purpose
A protocol for handling electronic mail.
Public key encryption message encryption
Needs to be encrypted with person B's public key.
Public key encryption sender verification
Needs to be encrypted with person A's private key.
Firewall
A system used to inspect, block, and filter network traffic for protection.
Proxy server
An intermediary computer used to protect a network by mediating communication.