1,808
17
Essay, 3 pages (600 words)

Ch 6 mis

CloudThe elastic leasing of pooled conputer resources over the internet

ElasticThe computing resources leased can be decreased/increased dynamically, programmatically, in a short span of time and that organization pay for just the resources that they use

PooledMany different organizations use the same physical hardware, they share that hardware through virtualization

Economies of scaleThis principle says that the average cost of production decreases as the size of the operation increases

NetworkCollection of computers that communicate with one another over transmission lines or wirelessly

Local area network (LAN)Connects computers that reside in a single geographical location on the premises of the company that operates the LAN

Wide area network (WAN)Connects computers at different geographic locations

InternetNetwork of networks… Connect LANs WANs and other internets

The INternetThe collection of networks that you use when you send an email or access a web site

IntranetPrivate Internet used exclusively within an organization

ProtocolA set of rules and data structures for organizing communication

Small office or a home office (SOHO)Such LANs have fewer than a dozen or so computers and printers

IEEE 802. 3 protocol/EthernetUsed for wired LAN connections/ specifies hardware characteristics

10/100/1000 ethernetConform to the 802. 3 specification and allow for transmission at a rate of 10, 100, or 1000 Mbps

Wireless LAN connections use the IEEE 802. 11 protocol

BluetoothDesigned for transmitting data over short distances, replacing cables.

Internet service provider (ISP)3 important functions
1. Provides you with a legitimate Internet address.
2. Serves as your gateway to the Internet
3. ISPs pay for the Internet

Digital subscriber line (DSL)Operates on the same lines as voice telephones but operates so it doesn’t interfere with voice telephone service

Cable linesType of WAN
Provide high speed data transmission using cable tv lines

HopMove from one network to another

CarriersLarge telecommunication providers

Net neutrality principleAll data is tested equally

IP addressInternet address, a number that identifies a particular device

Public IP addressIdentify a particular device on the public internet

Private IP addressesIdentify a particular device on a private network typically a LAN

IPv4 formatMost common.
Four decimal dotted notation

IPv6 formatLonger format

Domain nameWorldwide unique name that is affiliated with a public IP address

URL – uniform resource locatorAn address on the Internet.

Three tier architectureDesign of user computers and servers that consist of three categories or tiers.

User tierConsists of computers, phones and other mobile devices that have browsers that request and process web pages

Server tierComputers that run web servers and process application programs

Database tierConsists of computers that run a DBMS that processes requests to retrieve and store data

Web pageDocument that is coded in, usually html

Web serversPrograms that run on a server tier computer and manage traffic by sending and receiving web pages to and from clients

Commerce serverApplication program that runs on a server tier computer

Service oriented architecture (SOA)According to the philosophy, all the interactions among computing devices are defined as services in a formal, standardized way

hypertext transfer protocol (http)Protocol used between browsers and web servers

SMTPUsed for email transmissions

FtpUsed to move files over the Internet

Software as a service (SaaS)Provides hardware infrastructure and an operating system and application programs as well.

platform as a service (PaaS)Vendors provide hosted computers, and operating system and possibly a DBMS

Infrastructure as a service (IaaS)Cloud hosting of a bare server computer or data storage

Content delivery network (CDN)System of hardware and software that stores user data in many different geographical locations and makes those data available on demand

Virtual private network (VPN)Used the Internet to create the appearance of private, secure connections

Connection is called a tunnel

Private cloudCloud owned and operated by an organization for its own benefit

Virtual private cloud (VPC)Subset of a public cloud that has a highly restricted, secure access.

ONCH 6 MIS SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Ch 6 mis. Page 1
Ch 6 mis. Page 2
Ch 6 mis. Page 3
Ch 6 mis. Page 4
Ch 6 mis. Page 5
Ch 6 mis. Page 6

This work, titled "Ch 6 mis" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Ch 6 mis'. 26 September.

Reference

AssignBuster. (2022, September 26). Ch 6 mis. Retrieved from https://assignbuster.com/ch-6-mis/

References

AssignBuster. 2022. "Ch 6 mis." September 26, 2022. https://assignbuster.com/ch-6-mis/.

1. AssignBuster. "Ch 6 mis." September 26, 2022. https://assignbuster.com/ch-6-mis/.


Bibliography


AssignBuster. "Ch 6 mis." September 26, 2022. https://assignbuster.com/ch-6-mis/.

Work Cited

"Ch 6 mis." AssignBuster, 26 Sept. 2022, assignbuster.com/ch-6-mis/.

Get in Touch

Please, let us know if you have any ideas on improving Ch 6 mis, or our service. We will be happy to hear what you think: [email protected]