Internet | A giant network of networks. Each network is bonded
with another by a set of computers that are called routers. Servers is computers behind routers that serve data. Workstations are usually also behind routers much like servers but there is a real living human on them, operating them. |
DNS | DNS stands for "domain name system". It is a protocol designed to translate between names and IP addresses on the Internet, and vice versa. |
IP | IP is an Internet Protocol that allows communication on the Internet. Currently it is at version 6 meaning there was predecessors. In order to read these words you must known IPv6 or IP version 6. |
TCP | TCP stands for "transmission control protocol". This is a stream based protocol involving states. Most applications on the Internet work via TCP. |
UDP | UDP stands for "User Datagram protocol" unlike TCP it is just a packet and can fragment into many packets up to a 65535 byte limit. This is the default DNS protocol. |
SSH | Is a TCP based program called "secure shell". It allows a workstation or server to reach another workstation or server and give it commands in what's called a session. |
UUCP | Is a store-and-forward protocol that predated IP |
Ethernet | Is a layer 1 and 2 hardware that incorporates ethernet cards that send data over ethernet cables. The cables have eight strands of wires but for category 5e only four are used. More strands are used if you use Power over Ethernet. |
PoE | Power over Ethernet, is a means of powering a device by ethernet cable alone. |
Computer | A computer is a machine that can process data in forms of bits which are zeros and ones. Quantum computers use qubits instead of bits and use a third state called superposition. Without computers there is no Internet. |
Encryption | Encryption is a means of distorting data so that it cannot be read by a receiver that has no special piece of data called a key. Encryption does not work without receivers. |
Meta-Data | Is generally thought of as data that can identify a source and a destination on the Internet as well as a timestamp that identifies when this data exchange took place |
Spam | Spam is usually thought of as unwanted unsolicited e-mail |
Phisher | A phisher is someone who, by means of email, tricks you into opening a link via email, in order to steal money or information from you |
Computer Virus | is a malicious program that sits dormant in a computer until a certain time and then it may do harmful things or not |
Trojan | a trojan is a malicious program that you execute on your computer, often hackers or phishers are the cause of this |
Exploit | An exploit or exploitation is the means of breaking into a protocol in order to harm a computer |
Tree | A tree is a set of data that is structured like a tree starting with the top as the root. These are also called Binary Trees but are not limited to just two branches |
Mailing list | Is a means of repeating an email from someone to a large set of workstations in order to amplify communication |
Email | is a means of sending a mail over the Internet to a human recipient (usually). It usually is sent via TCP on a protocol called SMTP. |
PPP | Point to Point Protocol, a means to talk to another router from your router. PPP has IPCP and LCP sub-protocols which exchange IP data and give link control. |
Multicasting | A means of talking to many nodes and routers who have subscribed to the recipient address, it is thought of as a one-to-many |
Unicasting | The simplest form of network communication. It has a destination and a source. Unicasting is expensive on the end point, as compared to Multicasting which is expensive on the Router and switch infrastructure. |
Switch | Is a means of distributing an Ethernet Network. A switch is usually capable of broadcasting, multicasting or unicasting, a switch is usually using a star topology. |
Hub | An ethernet Hub is a broadcasting device that bonds computers like a switch, unlike a switch it will repeat a packet to all nodes. And thus is not suitable for fast speeds. |
LAN | Local Area Network, switches and hubs on layer 2 are usually a LAN. |
WAN | Wide Area Network, usually routers speak to other routers over a Wide Area Network |
PAN | Personal Area Network, are usually wireless networks with limited range beyond the body. |
Wifi | Wifi is a wireless LAN, it broadcasts to all stations in nature and avoids collisions by timing. |
BGP | Quite possibly the most secretive protocol there is, due to its shortcomings in security. Border Gateway Protocol. I don't understand it. Though I do understand when you advertise the Internet (0/0), the Internet will try to route through you. |
NNTP | Network News Transport Protocol? The ol' Usenet. |
Anycast | Is often advertised by DNS operators to have Anycast DNS, this is a trick with BGP to announce routes at different points on the Internet. Due to the nature of BGP this causes the preferrred route to be taken, which could be the closest. |
Geo-DNS | Also called split horizon DNS (aka views) which answer different DNS names to different IP sources. I don't believe in this too much, but there is some people who swear by it. |
2022 | Is a year. In the ever increasing timeline of things. |
Love | Robots don't love, they obey. |
| |