Section+3+-+Week+10+-+How+the+Internet+Works

For Week 10, be sure to understand both information from the PDF as well as the slide show.

From the slides:


 * Different types of servers
 * The two different types of signals. (Analog vs Digital.)


 * What bandwith is and how it works (Plumbing pipes example)
 * Sendin information and how packets work
 * What a packet is
 * What happens as it's sent across a network
 * How the data finishes transmitting.
 * The two ways of sending data
 * What repeaters do
 * Protocols and how they work
 * What is an IP address made of and what does it represent

ALL keywords and definitions from the slides. Notable Examples:


 * VPN A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network
 * Wireless N
 * Backbone a larger transmission line that carries data gathered from smaller lines that interconnect with it.
 * Router a device or, in some cases, software in a computer, that determines the next network point to which apacket should be forwarded toward its destination.
 * Relevance connected to the matter at hand
 * Torrent
 * Packet Jam
 * Buffer Overflow A buffer overflow occurs when a program or process tries to store more data in a buffer(temporary data storage area) than it was intended to hold
 * Logic Bomb also called //slag code//, is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a a program user to respond to a program command.
 * Social Engineering a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
 * Strong Passwords is one that is designed to be hard for a person or program to discover.
 * Confidentiality a set of rules or a promise that limits access or places restrictions on certain types of information.
 * Authentication the process of determining whether someone or something is, in fact, who or what it is declared to be.
 * Wireless G
 * Switch a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
 * Internet 2 a collaboration among more than 100 U.S. universities to develop networking and advanced applications for learning and research.
 * TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet.
 * Popularity the favor of the general public
 * Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
 * IP address The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet
 * Virus a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.
 * Firewall A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks.
 * Spam is unsolicited e-mail on the Internet
 * PKI A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
 * Integrity is the assurance that information can only be accessed or modified by those authorized to do so.
 * DNS The domain name system (DNS) is the way that Internet domain names are located and translated intoInternet Protocol addresses.
 * Hub is the central part of a wheel where the spokes come together. is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions.
 * LAN A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link.
 * NLR
 * FTP File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet
 * Bit is the smallest unit of data in a computer.
 * P2P On the Internet, peer-to-peer (referred to as P2P) is a type of transient Internet network that allows a group of computer users with the same networking program to connect with each other and directly access files from one another's hard drives.
 * Cookie A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.records your preferences when using a particular site

Things from the PDF of import:


 * Protocols ** - rules that ensure the orderly and accurate transmission and reception of data; start and end transmission, recognize error, sent data at the appropriate speed, and identify the correct senders and recipients


 * Handshaking ** - protocols helps help network devices negotiate and establish communications


 * Packets ** - the process by which you send a file or an e-mail over a network,the file is actually broken up into small pieces. It is a "parcel" of dad that is sent across a computer network


 * Packet Switching ** - the technology of dividing a message into several packets that can be routed or independently to their destination to avoid out-of-service or congested links


 * Circuit Switching ** - establishes a dedicated, private link between one telephone and another for the duration of a call; more efficient alternative to circuit switching


 * TCP/IP (Transmission Control Protocol/Internet Protocol ** ) - breaks messages into packets and addresses them for the transmission over the Internet


 * HTTP (Hypertext Transfer Protocol) ** - Exchanges information over the web


 * FTP (File Transfer Protocol) ** - Transfers files between local and remote host computers


 * POP (Post Office Protocol) ** - Transfers mail from an e-mail server to a client inbox


 * SMTP (Simple Mail Transfer Protocol) ** - transfers e-mail messages from client computers to an e-mail server


 * IMAP (Internet Mail Access Protocol) ** - an alternative to POP


 * TELNET (Telecommunications Network) ** - allows users who are logged on to one host to access another host


 * SSL (Secure Sockets Layer) ** - Provides secure data transfer over the Internet


 * Ethernet ** - broadcasts data packets to all networks is accepted only by the device to which it is addressed


 * CSMA/CD Protocol (Carrier Senese Multiple Access with Collision Detection) ** - takes care of situation in which two network devices attempt to transmit packets at the same time


 * Uplink Port ** - simple step up from a basic single-humb network is to connect several hubs


 * Wi-Fi Network - ** transmits data as radio waves over predefined frequencies, much like cordless phones.


 * War Driving/LAN-Jacking ** - occurs when hackers cruise around with a Wi-Fi equipped notebook computer that is set up to search for Wi-Fi signals coming from home or corporate Wi-Fi networks. War drivers can access and use unsecured Wi-Fi networks


 * WEP (Wired Equivalent Privacy) ** - essential step in making Wi-Fi-transmitted data useless to intruders


 * Wi-Fi card ** - transmitter, receiver, and antenna to transmit signals


 * Wireless Access Point ** - provides a central point for data transmitted over a wireless network by broadcasting signals to any devices with compatible Wi-Fi cards


 * Bluetooth ** - short-range wireless network technology that is designed to make its own connections between electronic devices - without wires, cables or any direct action from a user


 * Network Service Providers (NSPs) ** - such as AT&T, backbone links and routers are maintained by NSPs


 * ISP (Internet Service Provider) ** - operates network devices that handle the physical aspect of transmitting and receiving data from your computer


 * Ping - (Packet Internet Grouper) ** - sends a signal to a specific Internet address and waits for a reply.


 * Traceroute ** - records packet's path, including intermediate routers from your computer to its destination


 * Domain name- ** An easy to remeber name that translates into a computer IP address


 * Top level domain- ** ex: ".com" ".org" ".edu" .com would imply the host name is owned by a commercial busniess


 * Voiceband modem- ** Usually refferred to as a modem, converts the digital signals from your computer into signals that can travel through telephone lines.


 * DSL(Digital Subscriber Line)- ** a high speed, digital, always on internet access technology that uses standard phonelines to transport data


 * ISDN (Integrated Services Digital Network)- ** connections move data faster that a dial-up connection, but not as fast as DSL or cable modems


 * DOCSIS (Date over cable service interface specification)- ** a security technology that filters packets to certain ports, including the port the windows operating system uses for network

Bandwidth- a communications channel like your CATV cable carries packets at a constant speed


 * DSS (digital sattellite servcie)- ** uses a geosynchronous or low-earth sattellite to transmit television, voice, or computer data directly to and from a sattelite dish or base station owned or leased by an individual


 * WAP (Wireless access protocol)- ** a communications protocol that provides wireless internet access from handheld devices, such as cell phones and pda's