denial of service attacks
bad attackers try to overwhelm a web server by making requests at the same time, using up all the resources on the web server; makes it difficult to distinguish between fake and legitimate traffic
event-driven programming
rather than using blocking system calls, event-driven programming allows higher performance and resource utilization by allowing functionality to continue or sleeping until the desired event occurs
network stack: OSI model
a formal, standard representation of networking that splits the network functionality into seven layers
network stack: internet model
an informal representation of networking that splits the network functionality into five layers; this model groups the application, presentation, and session layers of the OSI model together
interface
accepted form of representing and accessing data such that the user can decode the information
protocol
rules and formats that govern the communication over network boxes
data link layer
data frame: grouping of raw data bits; the recipient can identify the frames by the particular sequences of bits that represent the start and end
MAC address: unique address that identifies your network card; 48 bit address space
network layer
packet - a method of wrapping data with its control information
router - a networking device that is connected to multiple network links and determines where to send a packet based
switch - switches forward messages between devices
encapsulation
each layer can only see the service provided by the layer immediately below it