Internet Flashcards

1
Q

What is the internet?

A

interconnected group of computing devices that uses open protocols to standardize how information is sent and received across our planet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the relationship between servers and clients?

A

clients request information that exist on servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is defined by protocols?

A

form of the client request, and how it is sent through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a server?

A

computer connected to internet that responds to requests – machine that ‘serves’ content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What lives in server?

A

HTML (or other website info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Server Example

A

canvas.ubc.ca

NO ‘WWW’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a file server?

A

machine that serves up files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ie. machine www.cs.ubc.ca lives in ICICS/CS building

A

this machine is networked with a file server, which allows different machines on cs.ubc.ca network to access same files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do most interactions over the internet use?

A

client/server interaction protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the client/server interaction protocol?

A
  • when you click web link, computers gets the page for you… beginning the client/server interaction
  • computer = client
  • computer with web page = server (web server)
  • client gets services from server
  • when the page is returned, operation is completed and client/server relationship ends
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is synchronous communication?

A

both sender and receiver are active at same time (ie. talking on telephone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is asynchronous communication?

A

sending and receiving occur at different times (ie. email, answering machine)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can servers handle many clients at a time?

A

yes – server is busy only for as long as it takes to perform your request

ie. between two consecutive client requests from your browser (getting page, and asking for another), that server could have serviced hundreds of other clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is data transmitted via?

A

open protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do protocols do?

A

standardize communication, so all data is sent by same rules for sending and receiving data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are open protocols?

A

protocols available for use by anyone to ensure that anyone can build systems that connect to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are two of the most important protocols?

A
  • transmission control protocol (TCP)

- internet protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP

How do packets travel?

A
  • information is divided into numbered packets
  • packets are sent over the internet by the most expedient route
  • don’t necessarily all take the same route
  • don’t necessarily arrive in sequential order
  • arranged in order after they all arrive, and reassemble
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP/IP

What information do packets hold?

A
  • one unit of information
  • destination IP
  • their sequence number (which packet they are)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP/IP

Why is each packet independent?

A

because each packet can take different route – congestion and service interruptions do not delay transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does TCP/IP protocol work under adverse conditions?

A

if traffic is heavy and pack progress is slow, protocol allows packet to be thrown away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What do routers do?

A

perform traffic directing functions on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In what form is data sent through internet (such as webpage or email)?

A

data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where do packets travel?

A

forwarded from one router to another router through networks that constitute an internetwork until it reaches its destination node – routers direct the packet through the network to the server with the given IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is point-to-point routing?
computers send data to their neighbours, which send data to their neighbours... somehow, data gets from one computer across network to another
26
How is each packet sent along a path?
routing algorithm
27
Why is the internet fault-tolerant?
it is a redundant network
28
Whys is the internet a redundant network?
there are multiple pathways among its physical connections to create redundancy even if one pathway is unavailable, there is still another way to transmit message from sender to receiver - software in connection points knows how to re-route data if one connection fails
29
What are 3 types of addresses?
- email address - URL - domain name
30
What are addresses for?
key to performing networking tasks
31
What do email addresses do?
identify people
32
What do URLs do?
identify webpage
33
What do domain names do?
identify computers?
34
Do email addresses and URLs have domain names?
yes
35
What is uniform resource locator (URL)?
specifies location (address) of web resource, and mechanism to retrieve it
36
kemiola@cs.ubc.ca
user ID = kemiola computer addressed by cs.ubc.ca will figure it out for us cs.ubc.ca is an address designed for humans
37
What is an address designed for computers?
IP address
38
What does a transport layer do?
switches from human-readable domain names to machine-friendly IP addresses
39
What is an internet protocol address (IP address)?
unique address (series of numbers and letters separated by dots) that each computer connected to internet is given
40
Is IP address temporary or permanent?
either temporarily or permanently assigned by internet service provider (ISP) - old IPv4 (1983): 4 billion (109) IPv4 addresses (32 bits) – we’ve almost run out - new IPv6 (2017): about 1038 IPv6 addresses (128 bits) – enough addresses for every atom in every person
41
What is a domain name?
name that identifies one or more IP addresses
42
Can a server have more than one IP address attached to them?
yes
43
What are domain name servers (DNSs)?
keep a directory connecting domain names to IP addresses - every computer connected to internet needs IP address of its ‘nearest’ DNS - this DNS is used to resolve, or translate, a domain name to IP address - DNS names need to be constantly updated
44
URL = http://www.phdcomics.com/comics.php
protocol = http:// domain = www.phdcomics.com file, directory, and additional information = /comics.php
45
What does a URL have to begin with?
protocol - most of the time, protocol is http (hyper text transfer protocol), but it can be other things - https = secure hyper text transfer protocol
46
How do domain names form a hierarchy?
- each ‘.’ separates a different level - higher level = further towards end - read from right to left (←)
47
Hierarchy – Domain Names www.students.cs.ubc.ca
top-level domain is Canada (ca) which contains UBC domain (ubc.ca) which contains computer science department domain (cs.ubc.ca) which contains undergrad domain (students.cs.ubc.ca) which contains computer (www.students.cs.ubc.ca)
48
File Organization http://imgs.xkcd.com/comics/phishing_license.png
protocol = http:// domain = imgs.xkcd.com/ directory = comics/ file = phishing_license.png
49
Hierarchy – File Paths
- each ‘/’ separates different level - higher level = closer to front - read from left to right
50
How can file paths end?
can end in ‘file type’ (after trailing period) that provide important information
51
What is '?' in a URL?
everything after ‘?’ is data needed to process the request
52
What is spam?
unsolicited or undesired messages sent in bulk by email
53
What is phishing?
type of social engineering where attacker sends fraudulent (‘spoofed’) message designed to trick human victim into revealing sensitive information to attacker, or to deploy malicious software on victim's infrastructure (like ransomware)
54
What is encryption?
taking data and changing it so that it’s hard to understand
55
What are cookies?
store information about your web browsing
56
What are first party cookies?
save information about you for that website - relevant to experience you are trying to have ie. that you’ve authenticated yourself, Fahrenheit vs. Celsius, language option
57
What are third party cookies?
save information about you that is not used for that website - largely why we see targeted ads
58
What is disinformation?
false information that is deliberately created and spread "in order to influence public opinion or obscure the truth"
59
What are filter bubbles (echo chambers)?
algorithms have isolated you from info & perspectives that you haven’t already expressed an interest in
60
Why are filter bubbles (echo chambers) dangerous?
- don’t ask for your permission - don’t tell you when they’re active - don’t say what they’re keeping from you
61
What is end to end encryption?
only you and the people you talk to can decrypt the message no one else has the ability to see what you are saying
62
Will your information be encrypted if you back it up to a third party?
no