1,963
14
Essay, 6 pages (1500 words)

Tia 13

Internet BackboneCollection of large national and international networks, most of which are owned by commercial, educational, or government organizations.

Optical Carrier (OC) lineA high-speed fiber optic line

T LineCarry digital data ove twisted-pair wires.

Internet Exchange point (IXP)A way of connecting Internet service providers (ISPs) that’s made up of one or more network switches to which the ISP’s connect (switches are devices that send data on a specific route through a network)

Point of Presence (POP)How individual Internet users enter an ISP. Uses a bank of modems, servers, routers, and switches.

What type of network model does the Internet use? Client/Server model. Clinets are devices like computers, tablets, smartphones that use browsers to request services such as web pages.

Web ServersComputers that run specialized operating systems, enabling them to host web pages and other information and to provide requested information to clients

Commerce ServersComputers that host software that enables users to buy goods and services over the web. Protects sensitive information

File ServersComputers that are deployed to provide remote storage space or to act as storehouses for files that users can download. Cloud services.

Computer ProtocolSet of rules for exchanging electronic information. Communicating, collaborating, creating content in the same fashion

Open SystemProtocol with design made public for access by any interested party

Proprietary SystemPrivate system opposite of open system

Circuit switchingA dedicated connection is formed between two points (such as two people on phones), and the connection remains active for the duration of the transmission. Ineffective for computers because either the circut would have to remain open and unavailable to any other system, or it would have to be reestablished for each burst of information sent

Packet SwitchingCommunications method for computers. Data is broken into smaller chunks called PACKETS and are sent over various routes at the same time.

Packets Contain: 1. An address to which the packet is being sent
2. The address from where the packet originates
3. Reassembly instructions, if the original data is split between packets
4. The data that’s being tansmitted

Transmission Control Protocol/Internet Protocol (TCP/IP)The main suite of protocols used for transmitting data over the Internet

IP AddressA unique identification number that defines each computer, service, or other device connected to the internet (like street addresses).

Internet Corporation for Assigned Names and Numbers (ICANN)IP addresses must be registered here to ensure they’re unique

Dotted Decimal NumberIP address form where the numbers are separated by decimals

OctetEach of the 4 numbers in a dotted decimal number is referred to as…

Connection-Oriented ProtocolRequires two computers to exchange control packets, thereby setting up parameters of the data-exchange (handshaking).

Connectionless ProtocolDoesn’t require any type of connection to be established or maintained between two computers exchanging information

Positive Acknowledgement (ACK)When Y receives a data packet that it can read from X, it sends back…

Negative Acknowledgement (NAK)If packet is unreadable (damaged in transit), Y sends a NAK to X

Internet CacheSection of your hardrive that stores information that you may need again, such as IP addresses and frequently accessed web pages.

Internet Protocol version 4The original protocol addressing scheme. Did not predict the explosive growth of the Internet

Internet of ThingsA term for the explosive growth of Internet-enabled devices. Appliances, light bulbs, smoke detectors all now send messages over the internet!!

Internet Protocol version 6an IP addressing scheme developed to make IP addresses longer, providing more available (128 bit instead of 32 bit)

Hexadecimal DigitA base 16 number system, each hexadecimal digit is one of 16 possible values 0-9 or A-F

Static AddressingThe IP address for a computer never changes and is most likely assigned manually by a network administrator or an ISP

Dynamic AddressingYour computer is assigned a temporary address from an available pool of IP addresses (more common)

Dynamic Host Configuration Protocol (DHCP)Dynamic addressing is normally handled by the DHCP, which belongs to the TCP/IP protocol suite. It takes a pool of IP addresses and shares them with hosts on the network on an as-needed bases. (as-needed because not everyone is logged on to the internet at one time).

Top-level vs Second-level Domain namesTop level is what comes after the dot and second level comes before the dot

Domain Name System (DNS) serverLike a phone book for the internet. When you enter a URL in your browser, your computer converts the URL to an IP address using this.

Root DNS serverContains the master listings for an entire top-level domain. When your own default DNS server doesn’t know the address, it has to consult this to find out.

HTMLNot a programming language; is a set of rules for marking up blocks of text so that a browser knows how to display them.

HTML TagsSurround and define HTML content (such asand indicate bolding)

ElementEach pair of tags and text in between them are collectively referred to as an element

HTML5Current version of the HTML standard

Cascading Style SheetList of rules that defines in one single location how to display HTML elements. Style rules enable web developers to define a kind of formatting for each HTML element and apply it to all those elements on a set of web pages (essentially, a template).

Where does the ” cascading” come in? In web documents, there are
1. External (stored in separate file)
2. Embedded (stored inside the current HTML document)
3. Inline (stored within a single line inside the HTML document).
Each style has a different weight that can override the rule/style with a lower weight

Extensible Markup Language (XML)Describes the content in terms of what data is being described rather than how it’s to be displayed. Users can build their own markup languages to accommodate particular formats and needs

XML ExamplesData validation: If we needed a tag for an age field, we know a person’s age can only be between 0 and 120 but any data may be inserted between

tags. XML allows this

JSONJavaScript Object Notation: data interchange standard that is easy for humans to read and write.

Hypertext Transfer Protocol (HTTP)Browsers use this Internet protocol to send requests. Created especially for the transfer of hypertext documents across the Internet (recall that hypertext documents are documents in which text is linked to other documents or media)

Hypertext Transfer Protocol Secure (HTTPS)Ensures that data is sent securely over the web. Combination of Secure Sockets Layer (SSL) and Transport Layer Security (TLS). These provide data integrity and security for transmissions over the Internet

Server-Side programA type of program that runs on a web server rather than on your computer

Common Gateway Interface (CGI)Provides a method by which your browsers can request that a program file be executed instead of just being delivered to the browser. Enables the website to be interactive.

Client-Side programProgram that runs on the client computer and requires no interaction with a web server. Once a web server processes a web page and sends the page to the client computer, the receiving computer can’t get new data unless a new request is made. More efficient to run programs on your computer

HTML Embedded Scripting LanguagePart of client-side programming. Tucks programming code directly within the HTML of a web page.

AppletPart of client-side programming. A small application actually located on the server is downloaded to the client. It’s there ready to run when needed without addition data transfers between client and server.

Dynamic HTMLCombination of technologies: HTML, cascading style sheets, JavaScript that’s used to create lively and interactive websites.

JavaScriptCommonly used scripting language for creating DHTML effects. With JavaScript, HTML documents can be made responsive to mouse clicks and typing.

Document Object Model (DOM)Just as cascading style sheets organize and combine the attributes of objects on a web page, JavaScript uses this to organize objects and page elements. Defines every item on a web page including graphics, tables, headers…

Simple Mail Transfer Protocol (SMTP)Email has its own protocol. SMTP is responsible for sending email along the Internet to its destination.

Email ServersSpecialized computers whose sole function is to store, process, and send email

Multipurpose Internet Mail Extensions (MIME)All email client software now uses this protocol to attach files. It handles the encoding and decoding of attachments for its users

EncryptionThe process of coding your email so that only the person with the key to the code can decode and read the message

Private-key EncryptionOnly the two parties involved in sending the message have the code. If someone steals a copy of the code, however, the code is broken.

Public-key EncryptionA type of encryption where two keys, known as a key pair, are created. One key is used for coding and the other is for decoding. The key for coding is distributed as a public key (anyone wishing to send you a message can download your public key), while the private key is retained for decoding (You’re the only one who ever possesses the private key so it’s highly secure).

Pretty Good Privacy (PGP)Public key packages available for download. Can use free of charge.

How does IM work? The client software running on your device makes a connection with the chat server and provides it with connection information for your device. Chatting takes place directly between the two devices over the Internet.

ONTIA 13 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags:

  • JavaScript
  • Smartphone

Thank's for Your Vote!
Tia 13. Page 1
Tia 13. Page 2
Tia 13. Page 3
Tia 13. Page 4
Tia 13. Page 5
Tia 13. Page 6
Tia 13. Page 7
Tia 13. Page 8
Tia 13. Page 9

This work, titled "Tia 13" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Tia 13'. 28 September.

Reference

AssignBuster. (2022, September 28). Tia 13. Retrieved from https://assignbuster.com/tia-13/

References

AssignBuster. 2022. "Tia 13." September 28, 2022. https://assignbuster.com/tia-13/.

1. AssignBuster. "Tia 13." September 28, 2022. https://assignbuster.com/tia-13/.


Bibliography


AssignBuster. "Tia 13." September 28, 2022. https://assignbuster.com/tia-13/.

Work Cited

"Tia 13." AssignBuster, 28 Sept. 2022, assignbuster.com/tia-13/.

Get in Touch

Please, let us know if you have any ideas on improving Tia 13, or our service. We will be happy to hear what you think: [email protected]