InternetA giant network of networks. Each network is bonded with another by a set of computers that are called routers. Servers is computers behind routers that serve data. Workstations are usually also behind routers much like servers but there is a real living human on them, operating them.
DNSDNS stands for "domain name system". It is a protocol designed to translate between names and IP addresses on the Internet, and vice versa.
IPIP is an Internet Protocol that allows communication on the Internet. Currently it is at version 6 meaning there was predecessors. In order to read these words you must known IPv6 or IP version 6.
TCPTCP stands for "transmission control protocol". This is a stream based protocol involving states. Most applications on the Internet work via TCP.
UDPUDP stands for "User Datagram protocol" unlike TCP it is just a packet and can fragment into many packets up to a 65535 byte limit. This is the default DNS protocol.
SSHIs a TCP based program called "secure shell". It allows a workstation or server to reach another workstation or server and give it commands in what's called a session.
UUCPIs a store-and-forward protocol that predated IP
EthernetIs a layer 1 and 2 hardware that incorporates ethernet cards that send data over ethernet cables. The cables have eight strands of wires but for category 5e only four are used. More strands are used if you use Power over Ethernet.
PoEPower over Ethernet, is a means of powering a device by ethernet cable alone.
ComputerA computer is a machine that can process data in forms of bits which are zeros and ones. Quantum computers use qubits instead of bits and use a third state called superposition. Without computers there is no Internet.
EncryptionEncryption is a means of distorting data so that it cannot be read by a receiver that has no special piece of data called a key. Encryption does not work without receivers.
Meta-DataIs generally thought of as data that can identify a source and a destination on the Internet as well as a timestamp that identifies when this data exchange took place
SpamSpam is usually thought of as unwanted unsolicited e-mail
PhisherA phisher is someone who, by means of email, tricks you into opening a link via email, in order to steal money or information from you
Computer Virusis a malicious program that sits dormant in a computer until a certain time and then it may do harmful things or not
Trojana trojan is a malicious program that you execute on your computer, often hackers or phishers are the cause of this
ExploitAn exploit or exploitation is the means of breaking into a protocol in order to harm a computer
TreeA tree is a set of data that is structured like a tree starting with the top as the root. These are also called Binary Trees but are not limited to just two branches
Mailing listIs a means of repeating an email from someone to a large set of workstations in order to amplify communication
Emailis a means of sending a mail over the Internet to a human recipient (usually). It usually is sent via TCP on a protocol called SMTP.
PPPPoint to Point Protocol, a means to talk to another router from your router. PPP has IPCP and LCP sub-protocols which exchange IP data and give link control.
MulticastingA means of talking to many nodes and routers who have subscribed to the recipient address, it is thought of as a one-to-many
UnicastingThe simplest form of network communication. It has a destination and a source. Unicasting is expensive on the end point, as compared to Multicasting which is expensive on the Router and switch infrastructure.
SwitchIs a means of distributing an Ethernet Network. A switch is usually capable of broadcasting, multicasting or unicasting, a switch is usually using a star topology.
HubAn ethernet Hub is a broadcasting device that bonds computers like a switch, unlike a switch it will repeat a packet to all nodes. And thus is not suitable for fast speeds.
LANLocal Area Network, switches and hubs on layer 2 are usually a LAN.
WANWide Area Network, usually routers speak to other routers over a Wide Area Network
PANPersonal Area Network, are usually wireless networks with limited range beyond the body.
WifiWifi is a wireless LAN, it broadcasts to all stations in nature and avoids collisions by timing.
BGPQuite possibly the most secretive protocol there is, due to its shortcomings in security. Border Gateway Protocol. I don't understand it. Though I do understand when you advertise the Internet (0/0), the Internet will try to route through you.
NNTPNetwork News Transport Protocol? The ol' Usenet.
AnycastIs often advertised by DNS operators to have Anycast DNS, this is a trick with BGP to announce routes at different points on the Internet. Due to the nature of BGP this causes the preferrred route to be taken, which could be the closest.
Geo-DNSAlso called split horizon DNS (aka views) which answer different DNS names to different IP sources. I don't believe in this too much, but there is some people who swear by it.
2022Is a year. In the ever increasing timeline of things.
LoveRobots don't love, they obey.