click below
click below
Normal Size Small Size show me how
Internet without Sec
Scales 1, 2, and 3
Question | Answer |
---|---|
IP | Delivers packets (Using a routing function) to the destination using IP addresses and packet headers. Defines the addressing method used to encapsulate data. |
TCP | Provides reliable, ordered, and error-checked stream of packets. |
DNS | The service that translates URLs to IP addresses. |
IETF (Internet Engineering Task Force) | Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP). |
Internet | A group of computers and servers that are connected to each other. |
IP Address | A number assigned to any item that is connected to the Internet. |
Packets | Small chunks of information that have been carefully formed from larger chunks of information. |
Protocol | A set of rules governing the exchange or transmission of data between devices. |
Router | A type of computer that forwards data across a network |
Network Redundancy | Having multiple backups to ensure reliability during cases of high usage or failure. Allows for fault-tolerance. |
HTTP | The protocol used for transmitting web pages over the Internet |
URL | An easy-to-remember address for calling a web page (like www.code.org) |
Hierarchical Nature | There are different levels of classification and adding new subcategories can add more possibilities which allows a system to scale. |
SSL/TLS | Helps communicate across a network in a way designed to prevent eavesdropping and tampering. Checks a digital certificate from a CA to help ensure the legitimacy of a site. |
Fault-Tolerant | There is a possibility for things to go wrong. This characteristic means that we are trying to counter that. |
Open Standards | By giving the protocols out, companies can build their devices to access the internet. This is a form of scaling, since more devices can easily connect so long as they follow protocol. |
End-to-End Architecture | This is a decentralized structure where much of the processes occur at the ends, rather than between nodes. This makes it difficult to stop the internet since there is not one localized headquarters. |
Distributed denial-of-service attacks (DDoS) | They compromise a target by flooding it with requests from multiple systems |
DNS Spoofing | When someone hacks into the DNS and changes a site's IP address so people are taken to a non-intended site. |
Bandwidth | A measure of bit rate (The amount of data sent in a given amount of time). |
Latency | The amount of time spent between sending a transmission and receiving the request |
Scalability | The ability of a system to work just as well for 1000000 things as it did for 10 things |