100%(1)Il 100% ha trovato utile questo documento (1 voto)
400 visualizzazioni3 pagine
This document defines and describes 15 common computer networking acronyms: UTP, STP, IP, TCP/IP, HTTP, FTP, SSH, IMAP, SMTP, POP, DHCP, DNS, TTL, LAN, and VPN. It provides a brief 1-2 sentence description of what each acronym stands for and its basic function, such as IP defining the fundamental protocol for internet communication and TCP/IP establishing the set of rules governing internet data transmission.
This document defines and describes 15 common computer networking acronyms: UTP, STP, IP, TCP/IP, HTTP, FTP, SSH, IMAP, SMTP, POP, DHCP, DNS, TTL, LAN, and VPN. It provides a brief 1-2 sentence description of what each acronym stands for and its basic function, such as IP defining the fundamental protocol for internet communication and TCP/IP establishing the set of rules governing internet data transmission.
This document defines and describes 15 common computer networking acronyms: UTP, STP, IP, TCP/IP, HTTP, FTP, SSH, IMAP, SMTP, POP, DHCP, DNS, TTL, LAN, and VPN. It provides a brief 1-2 sentence description of what each acronym stands for and its basic function, such as IP defining the fundamental protocol for internet communication and TCP/IP establishing the set of rules governing internet data transmission.
- 1st developed by IBM -it consist of two individual wires wrapped in a foil shielding that helps provide more reliable data transmission.
3. IP- Internet Protocol
- is the fundamental protocol for communication in internet. It specifies the way information is packetized, addressed, transferred, routed, and received by networked devices.
4. TCP/IP- Transmission Control Protocol/ Internet Protocol
- is a set of rules (protocols) governing communications among all computers on the internet. More specifically, TCP/IP dictates how information should be packaged (turned into bundles of information called packets, sent, and received, as well as how to get to its destination.
5. HTTP- Hypertext Transfer Protocol
- is a set of standard s that allow users of the World Wide Web to exchange information found on web pages. When Accessing any web page entering http:// in front of the address tells the browser to communicate over HTTP. For example, the URL for computer hope is https://www.computerhope.com URL- uniform resource locator
6. FTP- File Transfer Protocol
- is the most common way of sending and receiving files between two computers. 7. SSH- Secure Shell - is a secure protocol for remote log-ins. Using an SSH client, a user can connect to a server to transfer information in a more secure manner than other method.
8. IMAP- Internet Message Access Protocol
- it is a protocol for retrieving e-mail from a server, similar to POP. The secure version of IMAP is called IMAPS, which stands for for IMAP over SSL.
9. SMTP- Simple Mail Transfer Protocol
-is an Internet standard for the sending of e-mail messages over port 25. While it is mostly used for transfer from one mail server to another, some client mail applications use SMTP for relaying messgaes, whereas receiving happens viA POP or IMAP. POP- means Post Offfice Protocol- one of the most commonly used protocols used to receive e-mail on many e-mail clients.
10. DHCP- Dynamic Host Configuration Protocols
- is a protocol used to assign an IP address to a computer or device connected to a network automatically. Routers, switches, or servers that use DHCP to assign addresses to other computers can make setup and management easier for the network administrator.
11. DNS- Domain Name System
- is a service that receives a request containing a domain name host name and responds with the corresponding IP address.
12. TTL- Time-to-Live
- is a field in the internet Protocol that specifies how many more hops a packet can travel before that packet is disregarded or returned. 13. LAN- Local Area Network - has a networking equipment or computers in close proximity to each other, capable of communicating, sharing resources and information. For example, most home and business networks are on a LAN.
14. VPN- Virtual Private Network
- is a network that allows a user to connect to a network through a tunneling protocol and access internal internet and intranet websites and e-mail. Virtual private networks are used to allow an employee with a large company to connect to the company’s intranet.
15. NIC- Network Interface card
- it is an expansion card that enables a computer to connect to a network; such as a home network, or the internet using an ethernet cable with an RJ-45 connector.