What is Dyn? - A DNS hosting service that was hit by Mirai. It was used by Netflix,
Tumblr, Amazon, Twitter, Spotify and Tumblr
When did the internet first become commercial? - 1995
Prior to that the "Internet's Acceptable Use Policy" prohibited commercial use because it
was supported by the National Science Foundation (NSF).
In 1995 NSF pulled out and the internet became commercial
What is an ISP? - Internet Service Provider
What are hosts? - All computers connected to a network that participate directly in
network communication are classified as hosts.
Hosts are also called end devices.
What is e-commerce? - Conducting business on the internet (buying/selling on the
internet)
,What accounts for 33% of the internet's traffic? - Netflix
What network came before the internet? - ARPNET
When was the internet created? - Late 1970s
Who sets standards for the internet? - Internet Engineering Task Force (IETF)
But standards are optional
Who controls internet addresses? - Internet Assigned Name Authority (IANA)
Word/Phrase - Definition
2.4 GHz Unlicensed Service Band - Unlicensed frequency band around 2.4 GHz. Used
for Wi-Fi, Bluetooth, and other services.
4-Pair Unshielded Twisted Pair (UTP) - The type of wiring typically used in Ethernet
networks. 4-pair UTP contains eight copper wires organized as four pairs. Each wire is
covered with dielectric insulation, and an outer jacket encloses and protects the four
pairs.
5 GHz Unlicensed Service Band - Unlicensed radio band around 5 GHz. Used for Wi-Fi
and other services.
64-bit modified extended unique identifier (EUI-64) - In most IPv6 addresses, the
interface ID that specifies a particular device on a subnet is 64 bits long. Typically the
64-bit address is derived from a 48-bit EUI-48 address (formerly called a MAC address).
If so, it is a modified extended unique identifier (EUI-64).
802 LAN/MAN Standards Committee - The IEEE committee responsible for Ethernet
standards.
802.11ac - In W-Fi, the fastest physical transmission standard for sale today.
802.11ad - 802.11 physical layer standard in the 60 Ghz unlicensed band. Has a
theoretical top speed of 7 Gbps.
802.11ax - Planned successor to the 802.11ac standard. Will be able to accommodate
a substantial increase in density—the number of wireless hosts that can be served by
an access point.
802.11ay - In the 60 GHz band, the Wi-Fi successor to 802.11ad. Adds MU-MIMO and
other improvements, should raise the basic speed to 20 to 30 Gbps and is likely to allow
bonding for even higher speeds. Under development.
,802.11i - An advanced form of 802.11 wireless LAN security.
802.11n - Version of the 802.11 WLAN standard that uses MIMO and sometimes
doubled bandwidth to achieve a rated speed of 100 Mbps or more and longer range
than earlier speed standards.
802.1X Authentication Server - Authentication server used in 802.1X initial
authentication mode.
802.1X Authenticator - In Wi-Fi transmission, the wireless access point.
802.1X Initial Authentication Mode - An initial authentication mode used in 802.11i.
Requires the use of an authentication server. Called enterprise mode by the Wi-Fi
Alliance.
802.1X Port-Based Network Access Control - In Ethernet, a standard for access control
on switch ports.
802.3 MAC Layer Standard - The data link layer standard for Ethernet.
802.3 Working Group - Working group in the IEEE 802 LAN/MAN Standards Committee
that creates Ethernet standards.
Absorptive Attenuation - In wireless transmission, the attenuation of a signal but water
along the way absorbing its signal power. In optical fiber, attenuation due to the
absorption of signal strength as a signal propagates.
Access Card - Small card with a magnetic stripe or microprocessor that gives you
access to your computer or to a room.
Access Control List (ACL) - An ordered list of pass/deny rules for a firewall or other
device.
Access Control - Limiting who may have access to each resource and limiting his or her
permissions when using the resource.
Access Link - In networks, a transmission line that connects a station to a switch. In
telephony, the line used by the customer to reach the PSTN's central transport core.
Acknowledgment (ACK) - An acknowledgment message, sent by the receiver when a
message is received correctly. An acknowledgment frame, sent by the receiver
whenever a frame is received; used in CSMA/CA+ACK in 802.11.
Acknowledgment Number Field - In TCP, a header field that tells what TCP segment is
being acknowledged in a segment.
, Ad-hoc wireless network - A self-organizing wireless network.
ADSL Modem - Modem used in Asynchronous Digital Subscriber line service.
Terminates the carrier's connection.
Advanced Persistent Threat (APT) - Attack occurring over a long period of time. The
user employs many advanced methods to get deeper and deeper into the target
system.
Advanced Research Projects Agency (ARPA) - An agency within the U.S. Department
of Defense that funded the creation of the ARPANET and the Internet.
Advertisement Message - Bluetooth LE clients periodically send this type of message to
advertise their presence.
Aggregate Throughput - Throughput shared by multiple users; individual users will get a
fraction of this throughput.
Agility - The ability to rapidly change how the network operates when conditions
change.
Alphanumeric - Strictly speaking, letters and numbers. However, often used to refer to
all keyboard characters and, often, some control codes.
Alternative States - In physical transmission, a change in a transmission medium that
can signal one data pattern that represents a particular bit pattern. Different (alternative)
states signal different bit patterns.
Amazon Web Services (AWS) - A cloud service provided by Amazon.
American Standard Code for Information Interchange (ASCII) - Code for representing all
American keyboard characters plus some control codes.
Amplitude - The maximum (or minimum) intensity of a wave. In sound, this corresponds
to volume (loudness).
Antenna - A physical structure that transmits radio signals.
Antivirus (AV) Program - Program to remove malware from arriving messages and from
the computer's disk drive.
Application Architecture - The arrangement of how application layer functions are
spread among computers to deliver service to users.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Succeed. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.99. You're not tied to anything after your purchase.