This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Fall 2009 M IS 301 – Patton Study Guide for Exam 2 Chapter 6: “Data Communications” and Chapter Ext. 10 “How the I nternet Works” Terms : Access Control List (ACL) – encodes the rules stating which addresses are to be allowed and which are to be prohibited (firewalls) Access Point – used for wireless connections and can use 802.3 and 802.11 Analog Signal – old way of doing things, cheaper, wavy signal Digital Signal – new way modems convert from digital to analog Domain Name System – convert user friendly names into their IP addresses Domain Name Resolution – the process of converting the name into a public IP address Dynamic Host Configuration Protocol (DHCP) –your computer will request a temporary IP address from DHCP when you are connected to a LAN Encryption – assigning specific keys to the message to protect your data or information Firewall – serves a protector from outside invaders H T TPS – safest internet communication I nternet Service Provider (ISP) – provides internet to everyone I P Address – internet protocol, every computer has its own address and so do websites Last mile problem – fiber optic cables for most of the way but still copper wires for last mile. Local Area Network (LAN) – computers linked together in a single physical location MAC address – media access control physical address Modem – converts from digital to analog and vice versa Network I nterface Card (NIC) – connects a computer to the cables Ethernet Protocols – IEEE 802, specifies hardware characteristics Public Key / Private Key – for the encryption process, public key everyone can see but private key is secret Router – special purpose computer that moves network traffic from one node on a network to another Top- level domain- .com Uniform Resource Locator (URL) – regular name that gets converted into an IP 1 Vi rtual Private Network (VPN) – uses the internet or a private internet to create the appearance of private point to point connections Concepts : What I EEE standard is used for wired Ethernet connections? For wireless connections? 802.3 802.11 What are the components of a wired and a wireless LAN? How are these components connected? Switches and NIC with a UTP wire How does encryption work? Assigns a key and uses public and private keys What is the purpose of a firewall? Keep bitches out What is a VPN and why is it important? Why does Dee need one? Makes it like a private network, to make it more secure What are the important standards organizations related to data communications? (IEEE, ICANN) keep it all good How are I P addresses related to URLs? Urls are the words easy to remember for IPs What is the difference between an analog signal and a digital signal? Analog is circuit switching while digital is packet switching What is the difference between a WAN and a LAN? Wan is multiple locations while lan isnt BE SURE TO READ Dee case associated with Chapter 6 M IS in Use case for Chapter 6: Keeping up with Wireless (scan Figure 1 so you get the...
View Full Document
This note was uploaded on 06/24/2011 for the course MIS 301 taught by Professor Mccleod during the Fall '08 term at University of Texas at Austin.
- Fall '08
- The Land