Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
61 Cards in this Set
- Front
- Back
DHCP stands for....?
|
Dynamic Host Configuration Protocol
|
|
What the theoretical transmission speed achieved on a medium?
|
Bandwidth
|
|
____ is the actual transmission speed experienced?
|
Throughput
|
|
Dynamic Host Configuration Protocol (DHCP) does what?
|
distributes temporary IP address to computers
|
|
How does Dynamic Host configuration Protocol (DHCP) work? (2 points)
|
Loans out IP addresses while computer is connected to LAN
When computer is disconnected, IP address is made available to others |
|
DNS Stands for....?
|
Domain Name System
|
|
What does Domain Name System (DNS) Do?
|
Converts user-friendly names into public IP address
|
|
How many bits are in a byte?
|
8 bits in a byte
|
|
how many bytes are in a kilobyte?
|
1024 bytes (Remember: Not 1000 bytes!)
|
|
How many bits are in a kilobyte?
|
8,192 bits (1024 bytes x 8)
|
|
Name all the data sizes in order and the number of bytes in each.
|
8 bits=1 bytes
1 kilobyte (KB) =1024 bytes 1 megabyte (MB)= 1,048,576 bytes |
|
What types of devices use byte storage?
|
Rand access memory (RAM), Hard disk drive space (HDD), CDs, DVDs, and MP3 Players
|
|
MUA
|
(Mail User Client) the client program like MS Outlok used to access mail
|
|
POP
|
(Post Office Protocol) the protocol an MUA uses to retrieve mail from the server
|
|
IMAP
|
(Internet Message Access Protocol) alternative to POP3 that is more feature rich
|
|
SMTP
|
(Simple Mail Transfer Protocol) the standard for email message transfer
|
|
MTA
|
(Mail Transfer Agent) forwards mail when the destination is not local
|
|
MDA
|
(Mail Delivery Agent) deliver email to local email account mailbox
|
|
MIME
|
(Multipurpose Internet Mail Extensions) an internet standard that extends the format of email to support text in character sets other than ASCII, non-text attachments, message bodies with multiple parts, and header information in non-ASCII character sets
|
|
FTP
|
(File Transfer Protocol) used to upload and download files from servers
|
|
DHCP
|
(Dynamic Host Configuration Protocol) distributes temporary IP addresses to computers while they are connected to LAN
|
|
Socket
|
the IP Address and Port Number
|
|
Circuit Switching
|
provides dedicated point-to-point connection
|
|
Packet Switching
|
breaks transmissions into messages ( or packets, frames)
|
|
Multiplexing
|
money saving way to transfer data where packets from many transmissions are mixed (multiplexed) over each transmission line so that users only pay for the line capacity that they use
|
|
GUI
|
(Graphical User Interface)
|
|
http
|
(hypertext transfer protocol) allows browsers and servers to communicate
|
|
IP Address
|
(Internet Protocol) unique address that identifies any device connected to the internet
|
|
DNS
|
(Domain Name System) hierarchical system of name servers that map host-domain name combinations to IP addresses
|
|
URL
|
(Uniform Resource Locator) Document's Web Address
|
|
"Resolve" a domain name
|
Find the corresponding IP address to a domain name
|
|
subnet mask
|
divides the network and the host ip addresses
|
|
VoIP
|
(Voice over IP) allows voice and phone systems to become an application traveling over the internet
|
|
GSM
|
(Global System for Mobil Communications) 3G standards used by At&t, the most used around the world
|
|
CDMA
|
(Code Division Multiple Access) 3g standard used by Verizon, limited by its inability to supposed voice and data communications at the same time
|
|
net neutrality
|
the principle that all internet traffic should be treated equally
|
|
LAN
|
(Local Area Connection) a computer network that connects computers in a limited area such as home, school, or office building
|
|
NIC
|
(Network Interface Card)
|
|
Firewall
|
Computer device that prevents unauthorized network access
|
|
VPN
|
(Virtual Private Network) uses internet to or private network to create appearance of point-to-point, secure, and encripted connections
|
|
workstations
|
"Beefed-up" computers that can run computer intensive applications such as Computer Aided Design (CAD) or Game Development
|
|
BIOS
|
(Basic Inputer Output System)
|
|
protocols
|
control sending, receiving messages
|
|
DoS
|
(Denial of Service) attckers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resrouce with bogus traffic
|
|
Unicast
|
From one host to one host
|
|
Multicast
|
From one host to multiple hosts
|
|
Broadcast
|
From one host to all other hosts (ff:ff:ff:ff:ff:ff)
|
|
ARP
|
(Address Resolution Protocol) Broadcast to find the MAC address for a given IP address
|
|
CSMA/CD
|
(Carrier Sense Multiple Access/Collission Detection) when frames collide, all devices are notified with a Jam Signal, random backoff timing make hosts wait before retransmitting, hosts try again
|
|
half-duplex
|
one host can either receive or send at a time
|
|
CRC
|
(Cyclic Redundancy Check) check for data corruption
|
|
FCS
|
(Frame Check Squence) area in a frame where the results of CRC are stored
|
|
Subnet mask
|
identifies the network protion and host portion
|
|
default gateway
|
router handling inter-networking
|
|
collision domains
|
encompasses the connected hosts in a LAN that are notified when two frames collide, broken up by routers and switches
|
|
Broadcast domain
|
encompasses the connected hosts in a LAN that are notified when any hosts send a broadcast using the broadcast MAC address (ff:ff:ff:ff:ff:ff) as the destination MAC address, broken up by routers
|
|
best effort
|
unreliable method of transferring frames, no overhead is used to guarantee packet delivery
|
|
classful addressing
|
(class A, B, C or /8, /16, /24) main problem is the wastage of IP addresses
|
|
NAT
|
(Network Address Translation) technology that allows a private IP address to be translated to a publically routable IP address
|
|
DMZ
|
(Demilatarized Zone) behind a firewall but more open to the public than other systems
|
|
SDL
|
(Security Development Lifecycle) a software development security assurance process consisting of security practices grouped by seven phases: training, requirements, design, implementation, verification, release, and response
|