Networking
3G/4G
3rd Generation and 4th Generation- standards for wireless communication that operate using the mobile phone network
MAC
A Media Access Control Addressi s a unique identifier assigned to network interfaces for communications at the data link layer of a network segment
client-server networks
A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected.
broadband routers
A device that provides high-speed access to the Internet for two or more computers. Essentially, all routers today are broadband routers, and they typically include three or four Ethernet ports for wired connections to desktop and laptop computers.
bandwith
A lot of bandwidth is wasted sendind unnecessary data over the network
metropolitan area network
A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
network hub
A network hub is directly connected by the shared devices, and it may be attached to a server or client computer.
network administration
A person who manages a local area communications network(LAN) or wide area network (WAN) for an organization.
Personal area network
A personal area network (PAN) is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants.
HyperText Transfer Protocol Secure
A secure form of Hypertext Transfer Protocol (HTTP) that is used to exchange information between webpages or access information found on a webpage.
protocol
A set of technical rules
thin client network
a lightweight computer that is purpose-built for remote access to a server (typically cloud or desktop virtualization environments). It depends heavily on another computer (its server) to fulfill its computational roles.
virtual private network
a method employing encryption to provide secure access to a remote computer over the Internet.
storage area network
a network which provides access to consolidated, block level data storage. SANs are primarily used to enhance storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear to the operating system as locally attached devices.
firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
backbone
a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.
web server
a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users, in response to their requests, which are forwarded by their computers' HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well.
blogs
a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
microblogs
a social media site to which a user makes short, frequent posts.
RSS-Push Technology
a style of Internet-based communication where the request for a given transaction is initiated by the publisher or central server. It is contrasted with pull/get, where the request for the transmission of information is initiated by the receiver or client.
asynchronous transfer
a switching technique used by networks that uses time-division to encode data into small, fixed-sized cells.
social bookmarking
a user-defined taxonomy system for bookmark s. Such a taxonomy is sometimes called a folksonomy and the bookmarks are referred to as tags. Unlike storing bookmarks in a folder on your computer, tagged pages are stored on the Web and can be accessed from any computer.
wikis
a website that allows collaborative editing of its content and structure by its users.
aunthentication server
an application that facilitates authentication of an entity that attempts to access a network. Such an entity may be a human user or another server. An authentication server can reside in a dedicated computer, an Ethernet switch, an access point or a network access server.
Transport Layer Security
an application that provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers.
Podcasts/Vodcasts
an episodic series of digital media files which a user can set up so that new episodes are automatically downloaded via web syndication to the user's own local computer or portable media player.
read/write web
capable of reading existing data and accepting alterations or further input.
fat client
does not rely on servers for the bulk of their work means that the client can not have very low specifications.
domain namesprotocols and ports
domain names- access to particular web sites, such as social networks, can be blocked by specifying their name. Protocols and Ports- different protocols such as HTTP , SMTP, and FTP can be blocked or allowed as needed. these protocols use a standard port for example port 80 for HTTP. Either protocol or port can be blocked.
log file
a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software. [citation needed] Logging is the act of keeping a log. In the simplest case, messages are written to a single logfile.
personal firewall
a firewall os a hardware or software that determines which data is allowed to enter and leave a network. A personal firewall is when a software firewall is installed in a desktop computer rather than a server.
IP address
a form of firewall that is configured to allow or block traffic. the IP addresses of specific computerscan be allowed or denied access.
broadband
a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously
WiMax
Worldwide Interoperability for Microwave Access- wireless technology designed to transfer data over 50 kilometers
Internet Service Providers
a company that provides subscribers with access to the Internet.
application servers
a component-based product that resides in the middle-tier of a server centric architecture. It provides middleware services for security and state maintenance, along with data access and persistence.
wide area network
a computer network in which the computers connected may be far apart, generally having a radius of half a mile or more.
Local Area Network
a computer network that links devices within a building or group of adjacent buildings.
servers
a computer or computer program that manages access to a centralized resource or service in a network.
database servers
a computer program that provides database services to other computer programs or to computers, as defined by the client-server model.
ports
a connection point or interface between a computer and an external or internal device.
synchronous transfer
a data transfer method which is characterized by a continuous stream of data in the form of signals which are accompanied by regular timing signals which are generated by some external clocking mechanism meant to ensure that both the sender and receiver are synchronized with each other.
DSL
Digital Subscriber Line- use existing telephone networks
public IP address
Represents an entire network on the Internet
social networks
a dedicated website or other application that enables users to communicate with each other by posting information, comments, messages, images, etc.
tagging systems
a deterministic computational model published by Emil Leon Post in 1943 as a simple form of Post canonical system.
wireless LAN
A wireless local area network (WLAN) is a wireless computer network that links two or more devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
wireless hotspot
Allows internet access while on the move
cache
Cache can be either a reserved section of main memory or an independent high-speed storage device.
client computers
Client computers are regular desktop, laptop, or mobile computers that connect to a network to use its services.
backbone
Connections which deal with huge volumes of traffic
virtual LAN
Connects geographically separated computers or LANs into one virtual network.
email server
Email server handles email for a network if an external service is not used.
peer-to-peer network
Every client (peer) has equal status and there is no central authority or server.
GBPS
Gigabits per second
Internet Protocol
Governs how devices on a network are identified and how information is routed between them
Hubs
Hubs are the most basic and cheapest of these devices: when a hub receives data, it simply rebroadcasts it to every connected device---including the one that sent it.
private adresses
IP Protocol used by computers on private networks such as LANs
proxy server
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
Dynamic Host Control Protocol server
Keeps track of the addresses it has assigned
KBPS
Kilobits per second
modem
Modulator Demodulator- used to convert data for use over a network
hardware address
Nickname for MAC address
narrowband
Older, dialup network connections
cable internet access
One of th emost common forms of broadband Internet access in homes
transmission control protocol
One of the main protocols of the Internet protocol suite. TCP provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating by an IP network.
dialup
Relatively old technology that connects computers to a network using a standard telephone line.
bandwith
The amount of data a network can transfer at once
print servers
a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally to accommodate the fact that work may arrive more quickly than the printer can actually handle.
file servers
a device that controls access to separately stored files, as part of a multi-user system.
routers
a device that forwards data packets to the appropriate parts of a computer network.
HyperText Transfer Protocol
The unabbrivated form of HTTP
audit trail
This is where individual users are monitored. It is a chronological list of all actions taken.
caching
To store data locally in order to speed up subsequent retrievals.
fibre optic cables
Transfer data by sending light down an extrememly thing glass tube
IP Address
Uniquely identifies a machine on a network
cable modem
Used to convert the data for use over the network
aunthenticate
When connecting to a network, clients normally have to authenticate themselves using a username and password.
Wi-Fi
Wi-Fi capabilities allow clients to connect wirelessly.
bluetooth
Wireless technology used only for a short distance
network monitoring systems
he use of a system that constantly monitors a computernetwork for slow or failing components and that notifies the network administrator (via email, SMS or other alarms) in case of outages or other trouble. Network monitoring is part of network management.
application program
individual programs can be granted or denied network access. This can be useful for programs that connect to the internet without consent.
MBPS
megabits per second
encrypted tunnel
private network that encrypts from one computer to a local network in another location over a public network
switches
switches are like smarter versions of hubs. they inspect the data they receive to determine the intended destination, and then forward it to only the intended recipient. this saves a bandwidth compared to a hub.
URL
the address of a World Wide Web page.
gateway
the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISPthat connects the user to the internet. In enterprises, the gateway node often acts as a proxy server and a firewall.
ethernet
the ethemet ports allows multiple computers to be connected to hubs, routers, and switches.
HTTP protocol
the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.
Web 2.0
the second stage of development of the World Wide Web, characterized especially by the change from static web pages to dynamic or user-generated content and the growth of social media.
remote access
used to investigate different problems. allows user to login to a system as though they were actually physically present.
Denial of service
when the IP address of the attacking machine is blocked.
