click below
click below
Normal Size Small Size show me how
Internet without Sec
Scales 1, 2, and 3
| Question | Answer |
|---|---|
| IP | Delivers packets (Using a routing function) to the destination using IP addresses and packet headers. Defines the addressing method used to encapsulate data. |
| TCP | Provides reliable, ordered, and error-checked stream of packets. |
| DNS | The service that translates URLs to IP addresses. |
| IETF (Internet Engineering Task Force) | Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). |
| Internet | A group of computers and servers that are connected to each other. |
| IP Address | A number assigned to any item that is connected to the Internet. |
| Packets | Small chunks of information that have been carefully formed from larger chunks of information. |
| Protocol | A set of rules governing the exchange or transmission of data between devices. |
| Router | A type of computer that forwards data across a network |
| Network Redundancy | Having multiple backups to ensure reliability during cases of high usage or failure. Allows for fault-tolerance. |
| HTTP | The protocol used for transmitting web pages over the Internet |
| URL | An easy-to-remember address for calling a web page (like www.code.org) |
| Hierarchical Nature | There are different levels of classification and adding new subcategories can add more possibilities which allows a system to scale. |
| SSL/TLS | Helps communicate across a network in a way designed to prevent eavesdropping and tampering. Checks a digital certificate from a CA to help ensure the legitimacy of a site. |
| Fault-Tolerant | There is a possibility for things to go wrong. This characteristic means that we are trying to counter that. |
| Open Standards | By giving the protocols out, companies can build their devices to access the internet. This is a form of scaling, since more devices can easily connect so long as they follow protocol. |
| End-to-End Architecture | This is a decentralized structure where much of the processes occur at the ends, rather than between nodes. This makes it difficult to stop the internet since there is not one localized headquarters. |
| Distributed denial-of-service attacks (DDoS) | They compromise a target by flooding it with requests from multiple systems |
| DNS Spoofing | When someone hacks into the DNS and changes a site's IP address so people are taken to a non-intended site. |
| Bandwidth | A measure of bit rate (The amount of data sent in a given amount of time). |
| Latency | The amount of time spent between sending a transmission and receiving the request |
| Scalability | The ability of a system to work just as well for 1000000 things as it did for 10 things |