The internet Flashcards

1
Q

While not all computer networks use internet technologies these das, most do. So, we could also call this topic

A

Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

this exists when a device is connected to another device, if you r PC/MAC can ‘connect’ to another device you can pull up this courses home page, it is part of a_____

A

Computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

________, connecting many private, business, academic, and government computers worldwide into an infrastructure upon which many services are delivered.

A

Network of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Millions of smaller digital networks linking a wide-range of intelligent devices (nodes)

A

the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organizational networks connect to the internet through an _________ like Verizon, AT&T, Comcast, cogent

A

ISP (internet service provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Different portions owned by different entities

A

distributed ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

computers communicating with each other via the internet need instruction set/rules that standardize communications

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

agreed upon set of rules or conventions governing communication among internet nodes

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

protocols are _______ agreed-up rules for doing something, they can be “codified” into software that is instaled on communication devices, such as your browser

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the univesal use of protocols _____ and __enables the flow of data on the internet. They are commonly named together:

A

TCP, IP, TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the internet has its own _____
- the protocol stack shown in this image

A

IT stack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does protocol stack enable data communications?

A

ability to move data between different nodes on the internet. Higher levels rely on the proper function of the lower levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

to enable the client and server to communication with each other
what data is determined by the needs of the server

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ensuring the data gets through. Interfacing the application with the network

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

outing data through the pipes to get to its destination

A

NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the physical pipes are :

A

data link
physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is needed to enable a device to take part in a network?

A

a physical connection, the ability to transmit some type of physical signal that has an agreeed upon meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the link layer is responsible for ________

A

the movement of individual bits from one node to the next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How are the bits from one node to the next moved?

A

there must be a phhysical link between nodes to transfer electrical signals
there must be some device to create/recieve these signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

transmission medium can be:

A

Satellite, fiberoptic, ethernet cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

this layer is happy to send/ receive 1,0s- it does not care who asks it to do so

A

transmission medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

to participate, devices need a unique

A

hardware address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____ addresses are physically attahed to a hardware device

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

responsible for delivering packets from the source host to the destination host by looking at the IP addresses in the packet headers

A

network (internet) layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what are the main functions of the network layer
addressing and routing
26
IP protocol is a set of rules for
defining the format of IP data packets - routing and adressing - interacting with the underlying data link/ physical laye rto move IP data packets
27
ip protocol define sthe components of
data packets
28
what holds a lot of additional info to help with moving data?
ip data packet
29
what is needed to move IP data packets
interenet addressing system
30
Instead of a physical address, the internet has a system of
software addresses
31
software address is also known as an
IP address
32
to create an IP address it needs to be ____ numbers separated by periods and represented by ____ bits
4, 8
33
what is a major problem in IPv4?
exhaustion of IPv4 addresses
34
routing of IP data packets (deciding which path to take to send an IP data packet toward the destination software address) is done via special computers called
routers
35
Routers on the internet have a ______, and communicate with other routers and computers using the internet protocol(ip)
public ip address
36
the IP protocol also defines ______ on the internet from any origin to any destination
rules for routing packets
37
routers do not _______ information on how to contact all points on the internet
posses perfect end-to-end
38
a_____ network design refers to the possibility of many alternate paths to route communication
fault-tolerant
39
a common transport layer protocol for the internet is the
TCP (transmision control protocol)
40
the focus of TCP is _____ communication
host-to-host
41
bytes that need to be sent between the client and server are grouped into _____, which are then given to the IP layer (network layer) for transmission to the destination
segments
42
TCP program breaks application data into segments. Segmenets are numbered. the stream of segments are then passed to a local IP program to be further packaged into IP data packets
Source host
43
TCP program recieves incoming IP data packets from local IP program, resemebles them into correct order and presents exactly what was sent to the waiting appliction
destination host
44
Source TCP and Destination TCP use ____ to verify what exactly what was sent was also recieved
Acknowledgements
45
TCP also manages the _____ of the message interchange
reliability
46
the main focus of the application layer is
session, aka session layer
47
what are e-mail, oice over, instant messaging examples of
services applications
48
interactive service supported by a global network of information servers that are connected to the internet
the world wide web
49
the WWW refers to the ____, whereas "the internet" refers to the underlying ____
content, infrastructure
50
resources on the web are identified by their:
URL (uniform,resource locator)
51
this includes the exact location of the resource on the web, the protocol necessary to access it, and, if necessary, more specific indentifiers
url
52
what part http://www.example.com:80/path/to/myfile.html?key1=val1&key2=val2#somewhereinthedoc is the protocol
http
53
what part of http://www.example.com:80/path/to/myfile.html?key1=val1&key2=val2#somewhereinthedoc is the domain name
www.example.com
54
which part of http://www.example.com:80/path/to/myfile.html?key1=val1&key2=val2#somewhereinthedoc is the port
80, this is a well known port number and can be omitted when contacting a web server if you specify protocol
55
which part of http://www.example.com:80/path/to/myfile.html?key1=val1&key2=val2#somewhereinthedoc is the path to the file?
/path/to/myfile.html this indicates a specific resource on the server
56
which part of http://www.example.com:80/path/to/myfile.html?key1=val1&key2=val2#somewhereinthedoc is the parameters
?key1=val1&key2=val2, further instructions to the web server
57
what part of http://www.example.com:80/path/to/myfile.html?key1=val1&key2=val2#somewhereinthedoc is the anchor
#somewhereinthedoc, a bookmark inside the resource to jump to
58
break down the domain name : www.gatech.edu
www- host, gatech- second-level domain, edu-top-level domain
59
fulfilling a specific function or providing access to a specific type of resources. By far most common is WWW
host
60
maps 'readable' domain names to difficult to remember and understand IP addresses that computer and network equipment use
the DNS
61
what does DNS stand for
Domain Name system
62
this protocol is used for exchanigng files via the internet
HTTPS
63
what does HTTPS stand for
HyperText, Transfer, protocol, s= encrypted
64
www communications use the _____-
HTTP
65
this is a set of rules for transferring files such as texts, images, sound, or videos, between a server and client over the internet
HTTP
66
What are two other protocols
FTP, POP
67
what is FTP
used for filed sharing
68
what is POP
popular procotol for transffering email messages
69
what is an intenret service provider (isp)
an organization or firm that provides access to the internet
70
what is hypertext transfer protocol
application transfer protocol that alllows web browsers and web servers to communicate with eachother
71
What is secure sockets layer (SSL)
security standard that creates an encrypted link between a web server and a browser.
72
What is load balancing
distributing a computing or networkinng workload across multiple systems to avoid congestion and slow performance
73
What is fault tolerance
the ability of a system to continue operation even if a component fails
74
What is a web hosting serbvices
a firm that provides hardware and services to run the website of others
75
Wha tis ICANN (internet corporation for assigning names and numbers)
nonprofit organization responsbile for managing the internets domain and numbering systems
76
What is a ccTLDs
Two character country code top-level domains
77
What is cybersquatting?
Aquiring a domain that refers to a firm, individual, product, or trademark with the goal of exploiting it for financial gain.
78
What is hypertext markup language
language used to compose web pages
79
what is IP address
value used to indentify a device that is connected to the internet
80
What is networking translation (NAT)
technique used to conserve IP addresses by mapping devices on a private network to a single internet-connected device that acts on their behalf
81
what is domain name. services?
internet directory service that allows devices and services to be named and discoverable