vault backup: 2024-09-26 20:25:35
This commit is contained in:
1
.obsidian/community-plugins.json
vendored
1
.obsidian/community-plugins.json
vendored
@@ -19,7 +19,6 @@
|
|||||||
"obsidian-completr",
|
"obsidian-completr",
|
||||||
"execute-code",
|
"execute-code",
|
||||||
"nldates-obsidian",
|
"nldates-obsidian",
|
||||||
"obsidian-livesync",
|
|
||||||
"obsidian-dynamic-toc",
|
"obsidian-dynamic-toc",
|
||||||
"obsidian-excalidraw-plugin",
|
"obsidian-excalidraw-plugin",
|
||||||
"obsidian-wordnet-plugin",
|
"obsidian-wordnet-plugin",
|
||||||
|
|||||||
16692
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
16692
.obsidian/plugins/obsidian-completr/scanned_words.txt
vendored
File diff suppressed because it is too large
Load Diff
55
.obsidian/workspace.json
vendored
55
.obsidian/workspace.json
vendored
@@ -4,26 +4,26 @@
|
|||||||
"type": "split",
|
"type": "split",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "1062235cbed9b5d7",
|
"id": "ba6139fad469ea6a",
|
||||||
"type": "tabs",
|
"type": "tabs",
|
||||||
"children": [
|
"children": [
|
||||||
{
|
{
|
||||||
"id": "578ae6f5e736bbd8",
|
"id": "73f411185e0f46d7",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "pdf",
|
"type": "pdf",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "SS24/SWT2/KW16/01_SWT2_Einfuehrung.pdf"
|
"file": "WS2425/Web Tech/Übung/1/uebung01.pdf"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": "171c7c673a2d1f20",
|
"id": "9e83e3066760685a",
|
||||||
"type": "leaf",
|
"type": "leaf",
|
||||||
"state": {
|
"state": {
|
||||||
"type": "pdf",
|
"type": "pdf",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "SS24/SWT2/KW16/01_SWT2_Einfuehrung.pdf"
|
"file": "WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -102,7 +102,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "backlink",
|
"type": "backlink",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "SS24/SWT2/KW16/01_SWT2_Einfuehrung.pdf",
|
"file": "WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf",
|
||||||
"collapseAll": false,
|
"collapseAll": false,
|
||||||
"extraContext": false,
|
"extraContext": false,
|
||||||
"sortOrder": "alphabetical",
|
"sortOrder": "alphabetical",
|
||||||
@@ -119,7 +119,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outgoing-link",
|
"type": "outgoing-link",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "SS24/SWT2/KW16/01_SWT2_Einfuehrung.pdf",
|
"file": "WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf",
|
||||||
"linksCollapsed": false,
|
"linksCollapsed": false,
|
||||||
"unlinkedCollapsed": true
|
"unlinkedCollapsed": true
|
||||||
}
|
}
|
||||||
@@ -142,7 +142,7 @@
|
|||||||
"state": {
|
"state": {
|
||||||
"type": "outline",
|
"type": "outline",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "SS24/SWT2/KW16/01_SWT2_Einfuehrung.pdf"
|
"file": "WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
@@ -194,8 +194,7 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"direction": "horizontal",
|
"direction": "horizontal",
|
||||||
"width": 200,
|
"width": 200
|
||||||
"collapsed": true
|
|
||||||
},
|
},
|
||||||
"left-ribbon": {
|
"left-ribbon": {
|
||||||
"hiddenItems": {
|
"hiddenItems": {
|
||||||
@@ -208,36 +207,35 @@
|
|||||||
"table-editor-obsidian:Advanced Tables Toolbar": false,
|
"table-editor-obsidian:Advanced Tables Toolbar": false,
|
||||||
"obsidian-advanced-slides:Show Slide Preview": false,
|
"obsidian-advanced-slides:Show Slide Preview": false,
|
||||||
"juggl:Juggl global graph": false,
|
"juggl:Juggl global graph": false,
|
||||||
"obsidian-livesync:Replicate": false,
|
|
||||||
"obsidian-livesync:Show log": false,
|
|
||||||
"obsidian-excalidraw-plugin:Create new drawing": false,
|
"obsidian-excalidraw-plugin:Create new drawing": false,
|
||||||
"obsidian-wordnet-plugin:WordNet Dictionary": false,
|
"obsidian-wordnet-plugin:WordNet Dictionary": false,
|
||||||
"omnisearch:Omnisearch": false
|
"omnisearch:Omnisearch": false
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"active": "171c7c673a2d1f20",
|
"active": "b8336cb3c3d06be9",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
"SS24/SWT2/KW17/09_SWT2_ Middleware 2022.pdf",
|
"WS2425/Web Tech/Übung/1/Ü1.md",
|
||||||
"SS24/SWT2/KW16/KW16.md",
|
"WS2425/Theoretische Informatik",
|
||||||
"SS24/SWT2/KW24/06_SWT2-Businesslogik.pdf",
|
"WS2425/Web Tech/Übung/1/uebung01.pdf",
|
||||||
|
"WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf",
|
||||||
|
"WS2425/Web Tech",
|
||||||
|
"WS2425/Web Tech/Übung/1",
|
||||||
|
"WS2425/Web Tech/Übung",
|
||||||
|
"WS2425",
|
||||||
"SS24/SWT2/KW23/07_SWT2_Entwurfsmuster (1).pdf",
|
"SS24/SWT2/KW23/07_SWT2_Entwurfsmuster (1).pdf",
|
||||||
"SS24/SWT2/KW23/05_SWT2_Architekturstile_III.pdf",
|
"SS24/TdS/Canvas.canvas",
|
||||||
"SS24/SWT2/KW20/12_SWT2_Persistente_Datenhaltung_II.pdf",
|
|
||||||
"SS24/SWT2/KW20/04_SWT2_Architekturstile_II.pdf",
|
"SS24/SWT2/KW20/04_SWT2_Architekturstile_II.pdf",
|
||||||
"SS24/SWT2/KW19/10_SWT2_Persistente_Datenhaltung_I.pdf",
|
"SS24/SWT2/KW19/10_SWT2_Persistente_Datenhaltung_I.pdf",
|
||||||
"SS24/SWT2/KW19/03_SWT2_Architekturstile_I.pdf",
|
|
||||||
"SS24/SWT2/KW17/KW17.md",
|
|
||||||
"SS24/SWT2/KW17/Kommunikationsorientierte Middleware.ts",
|
|
||||||
"SS24/SWT2/KW17/Architekturmodellierung.ts",
|
|
||||||
"SS24/SWT2/KW17/Architekturmodellierung-2.ts",
|
|
||||||
"SS24/SWT2/KW24/KW24.md",
|
|
||||||
"SS24/SWT2/KW23/KW23.md",
|
|
||||||
"SS24/SWT2/KW20/KW20.md",
|
|
||||||
"SS24/SWT2/KW19/KW19.md",
|
"SS24/SWT2/KW19/KW19.md",
|
||||||
"SS24/SWT2/SWT2.canvas",
|
|
||||||
"CCN/Ex02/Exercise 2.md",
|
"CCN/Ex02/Exercise 2.md",
|
||||||
"CCN/Ex01/Exercise 1.md",
|
"CCN/Ex01/Exercise 1.md",
|
||||||
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
||||||
|
"SS24/SWT2/KW16/KW16.md",
|
||||||
|
"SS24/SWT2/KW17/KW17.md",
|
||||||
|
"SS24/SWT2/KW24/KW24.md",
|
||||||
|
"SS24/SWT2/KW23/KW23.md",
|
||||||
|
"SS24/SWT2/KW20/KW20.md",
|
||||||
|
"SS24/SWT2/SWT2.canvas",
|
||||||
"SS24/SWT2/KW18/KW18.md",
|
"SS24/SWT2/KW18/KW18.md",
|
||||||
"Untitled 1.md",
|
"Untitled 1.md",
|
||||||
"README.md",
|
"README.md",
|
||||||
@@ -262,7 +260,6 @@
|
|||||||
"SS23/Informationssicherheit/Ueb4/Ueb4.md",
|
"SS23/Informationssicherheit/Ueb4/Ueb4.md",
|
||||||
"WS2324/Datenbank/Unterricht/12. Trigger (09.01.2024)/Praktikum/Aufgaben.md",
|
"WS2324/Datenbank/Unterricht/12. Trigger (09.01.2024)/Praktikum/Aufgaben.md",
|
||||||
"WS2324/Datenbank/Unterricht/11. Funktionen und Prozeduren (19.12.2023)/Praktikum/Aufgaben.md",
|
"WS2324/Datenbank/Unterricht/11. Funktionen und Prozeduren (19.12.2023)/Praktikum/Aufgaben.md",
|
||||||
"SS23/Algorithmen und Datenstrukturen 1/UEB01/UEB01.md",
|
"SS23/Algorithmen und Datenstrukturen 1/UEB01/UEB01.md"
|
||||||
"SS23/CCN 1/Ex02/Exercise 2.md"
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
17
SS24/TdS/Canvas.canvas
Normal file
17
SS24/TdS/Canvas.canvas
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
{
|
||||||
|
"nodes":[
|
||||||
|
{"id":"019a35b3bd2c7f1f","type":"text","text":"Gute/Benutzte Quelle","x":-780,"y":-400,"width":250,"height":60},
|
||||||
|
{"id":"387cfc31df6c4458","type":"text","text":"Verworfene Quelle","x":320,"y":-400,"width":250,"height":60},
|
||||||
|
{"id":"ed063f0893b24501","type":"text","text":"Mögliche Quelle","x":-220,"y":-400,"width":250,"height":60},
|
||||||
|
{"id":"ce36483564c2eb7c","type":"text","text":"Quellen","x":-220,"y":-580,"width":250,"height":60},
|
||||||
|
{"id":"229cc629dd65faff","type":"text","text":"https://www.xenonstack.com/insights/virtualization-in-devops/\ngefunden mit SearNGX","x":-220,"y":-270,"width":250,"height":110},
|
||||||
|
{"id":"9cc67a42e4105b5d","type":"text","text":"https://www.ibm.com/topics/virtualization\nIBM: vertrauenswürdig","x":-220,"y":-100,"width":250,"height":100},
|
||||||
|
{"id":"6ef6e9a2d035610d","type":"file","file":"SS24/TdS/Quellen/VirtualizationSurveyTR179.pdf","x":-295,"y":90,"width":400,"height":400},
|
||||||
|
{"id":"92992735a934dbe7","type":"text","text":"https://www.splunk.com/en_us/blog/learn/virtualization.html\nStephen Watts:\n-degree in Philosophy\n-contributes to a variety of publications including CIO.com, [Search Engine Journal](https://www.searchenginejournal.com/author/stephen-watts/), ITSM.Tools, [IT Chronicles](https://itchronicles.com/author/stephenwatts/), [DZone](https://dzone.com/users/3139494/wattssw.html), and [CompTIA](https://www.comptia.org/blog/listing/author/stephen%20watts).\n","x":-780,"y":-270,"width":250,"height":110},
|
||||||
|
{"id":"76526aea4f72089e","x":1342,"y":-399,"width":400,"height":400,"type":"file","file":"SS24/TdS/Hilfe/Beispielarbeit1.pdf"},
|
||||||
|
{"id":"b49abf2438df3de3","x":1780,"y":-399,"width":400,"height":400,"type":"file","file":"SS24/TdS/Hilfe/Beispielarbeit2.pdf"},
|
||||||
|
{"id":"7c84bd1478532b5b","x":2220,"y":-399,"width":400,"height":400,"type":"file","file":"SS24/TdS/Hilfe/Beispielarbeit3.pdf"},
|
||||||
|
{"id":"b0e0992e88e0469c","type":"text","text":"Hilfe","x":1855,"y":-560,"width":250,"height":60}
|
||||||
|
],
|
||||||
|
"edges":[]
|
||||||
|
}
|
||||||
BIN
SS24/TdS/Hilfe/Beispielarbeit1.pdf
Normal file
BIN
SS24/TdS/Hilfe/Beispielarbeit1.pdf
Normal file
Binary file not shown.
BIN
SS24/TdS/Hilfe/Beispielarbeit2.pdf
Normal file
BIN
SS24/TdS/Hilfe/Beispielarbeit2.pdf
Normal file
Binary file not shown.
BIN
SS24/TdS/Hilfe/Beispielarbeit3.pdf
Normal file
BIN
SS24/TdS/Hilfe/Beispielarbeit3.pdf
Normal file
Binary file not shown.
BIN
SS24/TdS/Quellen/VirtualizationSurveyTR179.pdf
Normal file
BIN
SS24/TdS/Quellen/VirtualizationSurveyTR179.pdf
Normal file
Binary file not shown.
BIN
WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf
Normal file
BIN
WS2425/Theoretische Informatik/Blatt0-Einfuehrung (1).pdf
Normal file
Binary file not shown.
BIN
WS2425/Web Tech/Übung/1/uebung01.pdf
Normal file
BIN
WS2425/Web Tech/Übung/1/uebung01.pdf
Normal file
Binary file not shown.
68
WS2425/Web Tech/Übung/1/Ü1.md
Normal file
68
WS2425/Web Tech/Übung/1/Ü1.md
Normal file
@@ -0,0 +1,68 @@
|
|||||||
|
# 1
|
||||||
|
|
||||||
|
### 1. Schichten des OSI-Modells und deren Aufgaben:
|
||||||
|
|
||||||
|
**OSI-Modell** (Open Systems Interconnection)
|
||||||
|
|
||||||
|
1. **Schicht 1: Bitübertragungsschicht (Physical Layer)**
|
||||||
|
- Aufgabe: Überträgt die Rohdatenbits über ein physisches Medium (z.B. Kabel, Funk).
|
||||||
|
|
||||||
|
2. **Schicht 2: Sicherungsschicht (Data Link Layer)**
|
||||||
|
- Aufgabe: Verantwortlich für die fehlerfreie Übertragung der Datenrahmen über das physische Medium, inklusive Fehlererkennung und -korrektur.
|
||||||
|
|
||||||
|
3. **Schicht 3: Vermittlungsschicht (Network Layer)**
|
||||||
|
- Aufgabe: Bestimmt den optimalen Weg für die Datenpakete und ermöglicht Routing zwischen Netzwerken (z.B. durch IP-Adressen).
|
||||||
|
|
||||||
|
4. **Schicht 4: Transportschicht (Transport Layer)**
|
||||||
|
- Aufgabe: Sorgt für eine zuverlässige Datenübertragung zwischen Endsystemen, stellt die Fehlerkontrolle und die Flusskontrolle sicher (z.B. durch TCP/UDP).
|
||||||
|
|
||||||
|
5. **Schicht 5: Sitzungsschicht (Session Layer)**
|
||||||
|
- Aufgabe: Baut Sitzungen auf, verwaltet diese und beendet sie zwischen Anwendungen (Synchronisation und Wiederherstellung).
|
||||||
|
|
||||||
|
6. **Schicht 6: Darstellungsschicht (Presentation Layer)**
|
||||||
|
- Aufgabe: Übersetzt die Datenformate zwischen Sender und Empfänger, sorgt für Verschlüsselung und Kompression der Daten.
|
||||||
|
|
||||||
|
7. **Schicht 7: Anwendungsschicht (Application Layer)**
|
||||||
|
- Aufgabe: Stellt den Anwendungen Netzwerkdienste zur Verfügung (z.B. E-Mail, Dateitransfer).
|
||||||
|
|
||||||
|
### 2. Schichten des TCP/IP-Modells und Unterschiede zum OSI-Modell:
|
||||||
|
|
||||||
|
Das **TCP/IP-Modell** (Internet-Protokollsuite) besteht aus 4 Schichten:
|
||||||
|
|
||||||
|
1. **Netzzugangsschicht (Network Access Layer)**
|
||||||
|
- Kombiniert die OSI-Schichten 1 (Physisch) und 2 (Data Link). Sie regelt den Zugriff auf das physische Netzwerk.
|
||||||
|
|
||||||
|
2. **Internetschicht (Internet Layer)**
|
||||||
|
- Entspricht der OSI-Schicht 3 (Vermittlungsschicht) und ist für das Routing und die Adressierung der Pakete im Netzwerk zuständig (z.B. mit IP).
|
||||||
|
|
||||||
|
3. **Transportschicht (Transport Layer)**
|
||||||
|
- Entspricht der OSI-Schicht 4 (Transportschicht). Sie stellt entweder eine zuverlässige (TCP) oder unzuverlässige (UDP) Datenübertragung sicher.
|
||||||
|
|
||||||
|
4. **Anwendungsschicht (Application Layer)**
|
||||||
|
- Kombiniert die OSI-Schichten 5 bis 7 (Sitzung, Darstellung, Anwendung). Sie stellt die Protokolle bereit, die für Anwendungen benötigt werden (z.B. HTTP, SMTP).
|
||||||
|
|
||||||
|
#### Unterschiede zum OSI-Modell:
|
||||||
|
- Das **TCP/IP-Modell** hat nur 4 Schichten, während das OSI-Modell 7 hat.
|
||||||
|
- Im **TCP/IP-Modell** sind die Aufgaben der Sitzungs-, Darstellungs- und Anwendungsschicht in einer einzigen Schicht zusammengefasst (Anwendungsschicht).
|
||||||
|
- Das **TCP/IP-Modell** ist älter und praktisch orientierter, während das OSI-Modell eher theoretischer Natur ist.
|
||||||
|
|
||||||
|
### 3. Zuordnung der Protokolle zum TCP/IP-Modell:
|
||||||
|
|
||||||
|
a. **UDP (User Datagram Protocol)**: Transportschicht
|
||||||
|
b. **TCP (Transmission Control Protocol)**: Transportschicht
|
||||||
|
c. **Ethernet**: Netzzugangsschicht
|
||||||
|
d. **ICMP (Internet Control Message Protocol)**: Internetschicht
|
||||||
|
e. **IMAP (Internet Message Access Protocol)**: Anwendungsschicht
|
||||||
|
f. **HTTP (Hypertext Transfer Protocol)**: Anwendungsschicht
|
||||||
|
|
||||||
|
|
||||||
|
# 2
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
# 3
|
||||||
|
1 **Protokoll** (in diesem Fall HTTPS)
|
||||||
|
2 **Hostname** (Domainname und Port, hier: `www.fh-dortmund.de:443`)
|
||||||
|
3 **Pfad** (der spezifische Pfad zur Ressource, hier: `search/suche.php`)
|
||||||
|
4 **Abfrageparameter** (Query-String, hier: `?q=Corona`)
|
||||||
|
5 **Fragment** (Anker oder Abschnitt innerhalb der Ressource, hier: `#results`)
|
||||||
Reference in New Issue
Block a user