HTTP - common/widely use. Not secured. Transfer in clear text, meaning not encrypted and vulnerable to anybody
HTTPS - secured version of HTTP, with security feature. Transfer in encrypted text, meaning text is converted into unreadable code. Use protocols SSL and TLS
SSL - Secure Sockets Layer
TLS - Transport Layer Security. successor of SSL
SSL and TLS use to authenticate the identity of a website by asking SSLcertificate
FTP - File Transfer Protocol
FTP is used to transfer files between computers and servers over network. NOT secured
Ways to transfer file using FTP : internet browser, FTP client
SFTP - Secure File Transfer Protocol. Secure version of FTP
FTP and SFPT is connection oriented protocols meaning needs to establish connection. They used TCP for file transfer - reliability
TFTP - Trivial File Transfer Protocol. transferring over local area network and not over network. Connectionlessorientedprotocol that used UDP for speed
DHCP - Dynamic Host Configuration Protocol. Allows a network to assign IP addresses to devices automatically.
2 ways computer can be assigned an IP address: Static IP and Dynamic IP
Static IP - user assigns IP manually on every device. Fixed
Dynamic IP: computer gets IP automatically, performed by DHCP
Computer request an IP then the DHCPserver assign an IP Address from its pool and assign a leasetime
DNS - Domain Name System - converts human readable domain names into IP addresses
SMTP - Simple Mail Transfer Protocol. used for sending email. uses TCP protocol
POP3 and IMAP is used to retrieve email from email server
POP3 - Post Office Protocol 3 . download email to your device from mail server and delete the copy from the server once downloaded. Doesn't synch devices. Viewable without internet
IMAP - Internet Message Access Protocol. View email that is on the server from multiple device. Synch all devices
Type Domain name.
Web browser will check its cache.
First to visit is the DNSresolverserver or your ISP check its cache.
Then the rootserver.
Then the rootserver will direct the dns resolver to TopLevelDomain (.com)
AuthoritativeNameserver
Resolver receive IP to initiate connection and store it to cache memeory and computer browser
SMTP terms:
Sender & Receiver - Mail User Agent
SMTP Server - Mail Transfer Agent
POP3 - Mail Delivery Agent
IMAP - Mail Access Agent
Root server - root of DNS Hierarchy, it has 13 location that is handled by 12 organization 2 of which was by verisign. root server is not the boss, just part of the internet that knows where to direct the resolver
Top Level Domain - which stores the address information and directs the resolver to Authoritative Name server
Authoritative Name server that is responsible for knowing all about the domain name including its ip address, retrieve ip address.
Resolver receive IP to initiate connection and store it to cachememeory and computerbrowser
Lossless compression reduces the size of a file without losing any data.
Lossless compression achieves compression by eliminating redundant information within the data. When the compressed file is decompressed, the original data is entirely recovered, bit for bit.
Lossy compression reduces the size of a file by removing certain information deemed less essential.
While lossy compression can achieve higher compression ratios compared to lossless methods, it sacrifices some fidelity in the process.
symmetric encryption, the same key is used for both encryption and decryption. The key must be kept secret and shared securely between the communicating parties.
Symmetric encryption algorithms are generally faster and more efficient than asymmetricalgorithms.
Asymmetricencryption uses two keys: a public key for encryption and a private key for decryption. The public key can be freely distributed, while the private key is kept secret.
Any data encrypted with the public key can only be decrypted with the corresponding private key.
Asymmetric encryption is slower compared to symmetricencryption due to the complexity of the algorithms involved
simplex communication, data flows in only one direction, from the sender to the receiver, with no feedback from the receiver to the sender
half-duplex communication, data can flow in both directions, but not simultaneously. Instead, communication alternates between sending and receiving.