Cloud
The elastic leasing of pooled conputer resources over the internet
Elastic
The computing resources leased can be decreased/increased dynamically, programmatically, in a short span of time and that organization pay for just the resources that they use
Pooled
Many different organizations use the same physical hardware, they share that hardware through virtualization
Economies of scale
This principle says that the average cost of production decreases as the size of the operation increases
Network
Collection of computers that communicate with one another over transmission lines or wirelessly
Local area network (LAN)
Connects computers that reside in a single geographical location on the premises of the company that operates the LAN
Wide area network (WAN)
Connects computers at different geographic locations
Internet
Network of networks...

Connect LANs WANs and other internets

The INternet
The collection of networks that you use when you send an email or access a web site
Intranet
Private Internet used exclusively within an organization
Protocol
A set of rules and data structures for organizing communication
Small office or a home office (SOHO)
Such LANs have fewer than a dozen or so computers and printers
IEEE 802.3 protocol/Ethernet
Used for wired LAN connections/ specifies hardware characteristics
10/100/1000 ethernet
Conform to the 802.3 specification and allow for transmission at a rate of 10, 100, or 1000 Mbps
Wireless LAN connections use the IEEE 802.11 protocol
Bluetooth
Designed for transmitting data over short distances, replacing cables.
Internet service provider (ISP)
3 important functions 1.

Provides you with a legitimate Internet address. 2. Serves as your gateway to the Internet 3. ISPs pay for the Internet

Digital subscriber line (DSL)
Operates on the same lines as voice telephones but operates so it doesn't interfere with voice telephone service
Cable lines
Type of WAN Provide high speed data transmission using cable tv lines
Hop
Move from one network to another
Carriers
Large telecommunication providers
Net neutrality principle
All data is tested equally
IP address
Internet address, a number that identifies a particular device
Public IP address
Identify a particular device on the public internet
Private IP addresses
Identify a particular device on a private network typically a LAN
IPv4 format
Most common. Four decimal dotted notation
IPv6 format
Longer format
Domain name
Worldwide unique name that is affiliated with a public IP address
URL - uniform resource locator
An address on the Internet.
Three tier architecture
Design of user computers and servers that consist of three categories or tiers.
User tier
Consists of computers, phones and other mobile devices that have browsers that request and process web pages
Server tier
Computers that run web servers and process application programs
Database tier
Consists of computers that run a DBMS that processes requests to retrieve and store data
Web page
Document that is coded in, usually html
Web servers
Programs that run on a server tier computer and manage traffic by sending and receiving web pages to and from clients
Commerce server
Application program that runs on a server tier computer
Service oriented architecture (SOA)
According to the philosophy, all the interactions among computing devices are defined as services in a formal, standardized way
hypertext transfer protocol (http)
Protocol used between browsers and web servers
SMTP
Used for email transmissions
Ftp
Used to move files over the Internet
Software as a service (SaaS)
Provides hardware infrastructure and an operating system and application programs as well.
platform as a service (PaaS)
Vendors provide hosted computers, and operating system and possibly a DBMS
Infrastructure as a service (IaaS)
Cloud hosting of a bare server computer or data storage
Content delivery network (CDN)
System of hardware and software that stores user data in many different geographical locations and makes those data available on demand
Virtual private network (VPN)
Used the Internet to create the appearance of private, secure connections Connection is called a tunnel
Private cloud
Cloud owned and operated by an organization for its own benefit
Virtual private cloud (VPC)
Subset of a public cloud that has a highly restricted, secure access.