Term
|
Definition
Tell Java which names you plan to use and what types of value or object can be associated with each name 1. Instance variable declaration 2. Local variable declarations 3 Formal parameter declarations |
|
|
Term
| Ex of Instance Variable declaration |
|
Definition
| private Netconnection toServer; |
|
|
Term
| Ex of Local Variable declaration |
|
Definition
|
|
Term
| Ex of parameter declaration |
|
Definition
the JButton which in public void buttonClicked(JButton which) { |
|
|
Term
|
Definition
Tell Java to perfrom a particular action, commands 1. mutator method invocations 2. assignments 3. Compound statements 4. if statements |
|
|
Term
| Ex of mutator method invocations |
|
Definition
| contentPane.add(aButton); (change objects states) |
|
|
Term
|
Definition
| toServer = new NetConnection(...); |
|
|
Term
|
Definition
|
|
Term
|
Definition
if(condition) { statement }else if{ statement |
|
|
Term
|
Definition
Describes variables or objects. They appear on the right hand side of assignments or as actual parameters in invocations and constructions 1. constructions 2. accessor method invocations 3. literals 4. variable names 5. formulas |
|
|
Term
|
Definition
| new JButton("Click Here"); |
|
|
Term
| Ex of accessor method invocations |
|
Definition
hostName.getText(); toServer.in.nextLine(); Accessor methods access information about a the state of an object |
|
|
Term
|
Definition
"cortland.cs.williams.edu" 300 |
|
|
Term
|
Definition
|
|
Term
|
Definition
"USER" + id.getText() WINDOW_WIDTH/2 |
|
|
Term
|
Definition
| Having digits, Expressed in digits, using or giving a reading in digits |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| one unit signal that is not part of message but signals when it begins |
|
|
Term
| Ethernet time variables (R,D,L,T,c,W,Q,M |
|
Definition
R = the rate at which bits are transmitted (measured in bits per second. This is what the Ethernet paper calls C) D = number of data bits in each entry L = the maximum allowed length of a network (measured in meters) c = the speed at which signals propagate on network cables (measured in meters/second --- close to the speed of light) W = the expected number of slots of contention before a successful transmission Q = the number of active stations attached to the network M = the minimum allowable packet size (measured in bits) |
|
|
Term
|
Definition
| variable to measure true/false |
|
|
Term
|
Definition
|
|
Term
|
Definition
| D/R (amount it takes to get the entire message on the wire) |
|
|
Term
|
Definition
| L/C (amount it takes for a bit of that message to travel down the wire) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Get a substring for tom in addr1 which is tom@cortland.edu |
|
Definition
|
|
Term
| what indexOf will spit out if addr1 which is tom@cortland.edu addr1.indexOf( d, 12); |
|
Definition
|
|
Term
| Common structure of while loops |
|
Definition
1. Initialize (buttonDisplayed =1) 2. Condition 3. Does the work of the loop 4. Increment step - makes sure condition becomes false so loop doesn't run forever |
|
|
Term
| Worst Case amount of time you have to wait to detect a collision |
|
Definition
|
|
Term
|
Definition
| any collection is a thing (or empty) that is that thing plus everything else in the collection next to it |
|
|
Term
| number of bits in ASCII code |
|
Definition
|
|
Term
|
Definition
| 16 (65536 = 2^16 possible symbols - used for all the world's alphabet |
|
|
Term
|
Definition
| no codeword used in the scheme appears as a prefix of any other codeword. Guaranteed to produce coded messages that are uniquely decodable |
|
|
Term
|
Definition
Replace the two least used symbols with a new symbol: • Represent the new symbol as pair composed of symbols it replaces • Assume new symbol occurs as often as the symbols it replaces • REPEAT UNTIL THERE IS ONLY ONE SYMBOL LEFT! |
|
|
Term
|
Definition
| Sender and Sendee agree to a certain amount of time that a signal for that amount of time is one bit of information |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| informs the computer that the text that follows describes a new class (ex:public class TouchyButton extends GUIManager |
|
|
Term
|
Definition
| specifies the actions to be performed when this program is first started ex:public TouchyButton(){ |
|
|
Term
|
Definition
| named sequence of program instruction Ex: public void buttonClicked() { |
|
|
Term
|
Definition
| branching broadcast communication system for carrying digital data among locally distributed computing stations |
|
|
Term
| Time division multiplexing |
|
Definition
| refers to taking turns when two computers try to use a network at the same time |
|
|
Term
| self-synchronizing transmission system |
|
Definition
| based on the contents of the message sender and receiver can figure out the message without precise time measurements |
|
|
Term
| carrier sense multiple access with collision detection (CSMA/CD) |
|
Definition
Transmissions initiated by a station defer to any which may already be in progress. Once started, if interference with other packets is detected, a transmission is aborted and rescheduled by its source station. After a certain period of interference-free transmission,a packet is heard by all stations and will run to completion without interference. Ethernet controllers in colliding stations each generate random retransmission intervals to avoid repeated collisions. The mean of a packet's retransmission intervals is adjusted as a function of collision history to keep Ether utilization near the optimum with changing network load. |
|
|
Term
|
Definition
| Each packet has a source and destination, both of which are identified in the packet's header. A packet placed on the Ether eventually propagates to all stations. Any station can copy a packet from the Ether into its local memory, but normally only an active destination station matching its address in the packet's header will do so as the packet passes. |
|
|
Term
|
Definition
| packet with address 0 that will go to everyone |
|
|
Term
|
Definition
A = (1-(l/Q))^(Q-l) where Q is the # of computers with a message to transmit. Comes from the equation N/Q*(1-(1/Q))^(N-1) with assumption N=Q where N = The total number of computers that are trying to send |
|
|
Term
|
Definition
| w = (1 - A)/A where A is probability exactly one computer attempts a transmission in a given slot |
|
|
Term
|
Definition
| E = (P/C)/((P/C) + (W*T)) where W is the average number of times it takes to succeed in sending and T is the delay that one collision causes |
|
|
Term
|
Definition
| Preamble: 8 bytes Destination address: 6 bytes Source Address: 6 bytes Length 2 bytes Data: Min 46 Checksum: 4bytes |
|
|
Term
|
Definition
| data in transmission is based only on whether a signal is or is not being sent regardless of any underlying signal frequency; ethernet uses this |
|
|
Term
|
Definition
| different frequencies are used to encode different signals |
|
|
Term
|
Definition
| computers do not transmit when the computer is aware of a signal on the cable |
|
|
Term
|
Definition
| while a computer is transmitting it continues to listen to the message. If it changes to sound like a different signal than the one it was supposed to transmit it will detect a collision and stop transmitting |
|
|
Term
|
Definition
| after carrier sense detects there is a something being transmitted it will continue to sense the cable until it detects the entire packet has been sent. Then it begins to send its own packet. |
|
|
Term
|
Definition
| once a computer senses a collusion it sends a jamming signal then stops transmitting until system is idle then it picks a "random" wait time and will repeat if necessary until the messages get through |
|
|
Term
|
Definition
| high delay good line sharing |
|
|
Term
|
Definition
| low delay reserved lines waste capacity |
|
|
Term
|
Definition
| medium delay and line sharing better error check |
|
|
Term
|
Definition
| optimal fiber network that connects computers in a circle which takes turns in order |
|
|
Term
|
Definition
| Computers take IP and puts it in correct protocol which when it arrives gets translated back into IP |
|
|
Term
|
Definition
| takes message from server and then adds it to cache and fetches it recursively |
|
|
Term
|
Definition
| if(the packet is for this comp) {deliver to the correct application} else if(the destination is on one of my networks) { send packet to destination } else { send packet to a good router} |
|
|
Term
|
Definition
| the first three bytes are for network address the next three you make up |
|
|
Term
|
Definition
| computer that is part of two or more distinct networks and is configured to relay messages between networks to which it is connected |
|
|
Term
| Frame format for wireless network |
|
Definition
Control/16/Duration/16/DestinationAdd1 /48/SourceAdd1/48/DestinationAdd2/48 /SequenceControl/48/SourceAdd2/48/ Data/2312/Checksum/32/ Wireless frame also has a preamble but it goes in a few different places...longer than ethernet preamble |
|
|
Term
| Control and duration field wireless packets |
|
Definition
| help the process wireless networks use to approximate carrier sense |
|
|
Term
| Control field in wireless packets |
|
Definition
| used to distinguish special RTS and CTS packets from data packets |
|
|
Term
| Duration field in wireless packet |
|
Definition
| used to hold transition duration info essential to the process of virtual carrier sense |
|
|
Term
| purpose of Internet Protocl |
|
Definition
| serves as an intermediate language used to simplify the construction of software required to translate between other protocols |
|
|
Term
| translation after/for receiving packet |
|
Definition
| In hardware, there will be wireless and Ethernet transmission/wireless then there will be software that translate both forms to IP and then can untranslate IP into the other format |
|
|
Term
| How IP can simplify the task of constructing client programs |
|
Definition
| our program will send and receive all of its messages in IP to the software that translates it into either Ethernet or wireless |
|
|
Term
|
Definition
| program associated with the top-most window on your screen |
|
|
Term
| How information is displayed on your computer |
|
Definition
input comes in from the keyboard or network messages and the operating system decides what application program the information should be sent to then the application program sends what they what displayed to the operating systems display software which will display it on the screen |
|
|
Term
| Where all incoming messages are translated to IP |
|
Definition
| operating system before being sent out to application programs |
|
|
Term
|
Definition
| the illusion that all the networks connected by routers form a single network |
|
|
Term
|
Definition
| independent networks that make up the virtual network |
|
|
Term
|
Definition
Goes in data field of Ethernet or wireless packet IP version/4/Hdr len/4/Service class/8/ Packet Length/16/Packet Number/16/ FragmentNumber/16/TTL/8/Protocol/8/ Error Check/16/From Addr/32/To Addr/32/ DATA (up to 65516 bytes) |
|
|
Term
|
Definition
| packet # and fragment # are used to enable the receiving comp to identify and reassemble the fragments of a single message |
|
|
Term
|
Definition
| putting one packet inside the data field of another packet of a different format |
|
|
Term
| physical network standards |
|
Definition
| 802.3 Ethernaet, 802.11 wireless |
|
|
Term
|
Definition
| groups of 4 binary digits are replaced by a single hexadecimal equivalent |
|
|
Term
| how 802.xx address are assigned |
|
Definition
| first 24 bits of an address notates a manufacturer next 24 bits are chosen so they do not overlap with any other next 24 bits that the manufacturer has made |
|
|
Term
|
Definition
| Ethernet Broadcast address |
|
|
Term
| convert to dotted decimal notation |
|
Definition
| take an IP address and break the sequence of binary digits that form the address into four 8 bit subsequences then translate them to decimal notation and put periods in between |
|
|
Term
|
Definition
| first 16 bits (6 digits) are associated with a physical network operated by my Internet service provider |
|
|
Term
| How classes open up new IP address |
|
Definition
| Three classes for size of network...machines on smaller networks will have no network prefix while machines on bigger networks will have network prefix |
|
|
Term
|
Definition
| maintains a database listing the names and IP addresses of many machines and the addresses of servers that can be used to look up other names |
|
|
Term
|
Definition
| collection of saved IP addresses that correspond to domain name servers |
|
|
Term
|
Definition
| Dynamic Host Configuration Protocol. DHCP server must be installed in each physical network. Tells computers their IP address, the IP address of a good router and IP address of at least one DNS |
|
|
Term
|
Definition
| when machine is first connected to the internet they will send a broadcast packet out to every machine in the network. All the machines will ignore it except for the DHCP server which will send back the information |
|
|
Term
|
Definition
| if it is important to limit access to authorized users than a list of hardware addresses and IP addresses can be set up so that a when the DHCP server recieves a hardware address they just look at the list. If you don't have to limit access the server can just assign any number not in use. To ensure this number is not in use it put it in a list for a time limit called lease. Once the lease is up, the server sends a message to the machine saying that it must renew its IP address. When the machine leaves the network, once the lease is up the number will be usable once again |
|
|
Term
| How to fill out Ethernet source address |
|
Definition
|
|
Term
| How to fill out ethernet destination address |
|
Definition
| ARP - will place IP address in a broadcast packet...if machine is that IP address than they will send back a packet with their Ethernet address |
|
|
Term
|
Definition
| list of recently used Ethernet address and their corresponding IP addresses |
|
|
Term
|
Definition
| every entry in the table contains network prefix and the address of the best router to use as the first step to get to that network |
|
|
Term
|
Definition
| 1. Mark starting point as KNOWN with length 0 2. Identify eacn neighbor of start as ADJACENT 3. Set first step of each neighbor to itself 4. Set route length of each neighbor to first step distance 5. While you don't know how to reach all the cities {6. Select adj city with shortest route 7. Identify adj city with shortest route as KNOWN 8. Mark neighbors of new KNOWN city that were DISTANT as ADJACENT 9. update path lengths and record first steps to ADJACENT neighbors of new KNOWN city} |
|
|
Term
|
Definition
| periodic messages from every other machine in the network about hwo long it takes for info to travel to all destinations connected to the sender that would provide the necessary complete description of the network |
|
|
Term
|
Definition
| Important Internet routing protocol with the basis of Dijkstra's algorithm |
|
|
Term
|
Definition
| Transport Control Protocol- a general purpose transport protocol |
|
|
Term
|
Definition
| Connection orientation, point to point communication, complete reliability, Full duplex communication, stream interface, reliable connection startup and graceful connection close |
|
|
Term
|
Definition
| protocol that provides a connection from one application on one computer to another application on another computer |
|
|
Term
|
Definition
| Each TCP packet is encapsulated in a IP packet which sends it to another computer and the TCP packet gets delivered to the application |
|
|
Term
|
Definition
| when TCP receives data it sends an acknowledgment back to the sender. Whenever it sends data TCP starts a timer. If the timer expires before an acknowledgment arrives the sender retransmits the data |
|
|
Term
|
Definition
| TCP monitors current delay on each connection and adapts the retransmission timer to accommodates changing transmissions |
|
|
Term
|
Definition
| TCP uses this to control flow of data. When a connection is established each end of the connection allocates a buffer to hold incoming data. acks also send back the remaining buffer size...if buffer size equals 0 than the receiver will receive a zero window and must stop sending data |
|
|
Term
|
Definition
| describes messages in in three way handshake used to create a connection |
|
|
Term
|
Definition
| describes messages in three way handshake used to close a connection |
|
|
Term
|
Definition
| used to establish or end connections where host 1 will send FIN + ACK to host 2 who will send FIN+ACK back to host 1 who will send an ACK to host 2 if creating a connection a random 32 bit sequence is generated |
|
|
Term
| Network Address Translation |
|
Definition
| a router like a home router takes from IP addresses and replaces them with its own IP address than it puts those values in a chart with inside/outside IP address and Port number |
|
|
Term
| 3d matching problem, partition problem |
|
Definition
|
|