Completion Vocabulary

SESION
In computer science, including computer networking, a session is the duration of a session using a layer of a network protocol, or duration of a connection between a user (the agent) and a server connection, usually involving the exchange of multiple data packets between the user's computer and the server. A session is typically implemented as a layer in a network protocol (such as Telnet and FTP).


. SOFTWARE
It is known as the logical software1 equipment or software of a computer system, comprising all the necessary software components that enable specific tasks, as opposed to the physical components are called hardware.


SOHO
Acronym for Small Office-Home Office (Small Office-Home Office). Ues a term that applies to refer to devices intended for professional use or profes but, unlike other models, are not intended to take on a heavy workload.


SSID
The SSID (Service Set Identifier) ​​is a name included on all packages in a (Wi-Fi) network to identify them as part of that network. The code consists of a maximum of 32 characters that most often are alphanumeric (although the standard does not specify, so it can be any character). All wireless devices attempting to communicate with each other must share the same SSID.


. STATIC IP ADDRESS
In the early days of the World Wide Web (www or global computer network), each computer received its own IP address, known as a static IP address from the ISP. Every computer connected to the Internet using the same IP address every time.


STATIC ROUTING
With network masks subnets we can communicate with each other but this is not enough because we need to communicate with the outside world. Here the routing concept appears. It is known as a gateway or gateway which defines the extent of our network connects with other networks ..


SUBNET MASK
The netmask or network is a combination of bits used to define the scope of a network of computadoras.1 Its function is to indicate the devices which part of the IP address is the network number including the subnet, and what part is for the host.



SWITCHES
Switch translated means switch. This is a clever device used in local area networks (LAN - Local Area Network), a local network is one that has a relatively nearby computers interconnected by wires. The primary function of the switch is to connect multiple networks together without considering the information allowing you to work in a very fast way, since it only evaluates the destination address, but now combined with the Router technology to act as filters and avoid step corrupt data frame

.
TCP
Transmission Control Protocol (in Spanish 'Transmission Control Protocol') or TCP is one of the core Internet protocols. It was created between 1973 and 1974 by Vint Cerf and Robert Kahn.1 


  TRANSACTION

A transaction is an interaction with a complex data structure, comprised of several processes which are to be applied one after the other. The transaction must be performed at once and without medium handling structure can be reached by the rest of the system until all processes are completed.


TRANSMISSION

Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) for a communication channel point to point or point to multipoint. Examples of these channels are twisted pair cables, optical fibers, wireless communication channels, and storage media. Data are represented as an electromagnetic signal, an electrical voltage signal, radio waves, microwave or infrared.

TRAFFIC

Web traffic is the amount of data sent and received by visitors to a website. This is a large proportion of Internet traffic. Web traffic is determined by the number of visitors and pages visited.

TCP/IP
The TCP / IP model is a description of network protocols developed in the 70s by Vinton Cerf and Robert E. Kahn. It was introduced in the ARPANET, the first wide area network developed by DARPA commissioned, an agency of the United States Department of Defense, and the predecessor of today's Internet. THE TCP / IP model is sometimes referred to as Internet Model Model Model DoD or DARPA.

TELNET

Telnet (Telecommunication Network) is the name of a network protocol that allows us to travel to another machine to manage it remotely as if we were sitting in front of her. It is also the name of the computer program that implements the client. For the connection to work, as with all Internet service machine to which access must have a special program that receives and manages connections. The port that is usually used is 23.
TFTP

TFTP stands for Trivial File Transfer Protocol (Trivial File Transfer).
It is a very simple transfer protocol like a basic version of FTP. TFTP is often used to transfer small files between computers on a network, such as when an X Window terminal or any other thin client boots from a network server.

TKIP

TKIP (Temporal Key Integrity Protocol) is also called WPA WEP key hashing, including the emerging 802.11i mechanisms for improving wireless data encryption. WPA is TKIP, which uses the same algorithm as WEP, but builds keys in a different way. This was necessary because the breaking of WEP had left WiFi networks without security at the link layer, and a solution for already deployed hardware needed.

TLS

Transport Layer Security - Transport Layer Security. IETF standard version of SSL that would cover the transport layer of the OSI model.

TOKEN RING

Token Ring is a network architecture developed by IBM in the 1970s with physical ring topology and technical access token passing, using a 3-byte frame called a token that travels around the ring. Token Ring is included in the IEEE 802.5 standard. Disused for popularizing Ethernet; It is not currently used in network designs.

TOPOLOGY

The network topology is defined as a family of communication used by computers to form a network to exchange data. In other words, the way the network is designed, either physical or logical level. The concept of network can be defined as "a set of interconnected .nodes". A node is a point where a curve intersects itself. What a node is specifically dependent on the type of network to which we refer

TRANSLATION

In computer science, an interpreter or interpreter is a computer program capable of analyzing and run other programs, written in a high level language. Interpreters differ from that while these compilers translate a program from its description in a programming language to machine code of the system, the performers just do the translation as needed, typically, instruction by instruction, and usually not store the result of this translation.

TX RATE

In computing and telecommunication, the term bit rate (bit rate in English often transfer rate) defines the number of bits transmitted per unit time through a digital transmission system or between two digital devices. Thus, it is the data transfer rate.

UDP

User Datagram Protocol (UDP) is a transport layer protocol based on the exchange of datagrams (encapsulated OSI Layer 4). Allows sending datagrams through the network without previously established a connection, since the datagram itself incorporates sufficient routing information in its header. Nor has confirmation or flow control, so that packets can preempt each other; nor is it known whether it has arrived properly, as there is no confirmation of delivery or receipt. Its main use is for protocols such as DHCP, BOOTP, DNS and other protocols in packet switching connection / disconnection are older, or are not cost effective relative to the transmitted information, as well as streaming audio and video real, where retransmissions are not possible by the stringent requirements of delay has in these cases.

UPDATE

The term Update is used just for the word in Spanish for use in the update, which involves the modification of data in either a file as a database or a eplicación generally being generally associated with the word "Patch" also is used synonymously.

URL
A Uniform Resource Locator, or URL -siglas in English locator- uniform resource is a uniform resource identifier (URI) with referral resources may change, that is, the address may point to variable resources in time.1 They consist of a string, according to a model and standard format designating resources on a network such as the Internet.

VPN

A virtual private network, VPN, or VPN stands for Virtual Private Network, is a network technology that allows safe extension of the local network (LAN) or over a public network like the Internet uncontrolled. Allows the computer on the network to send and receive data on shared or public networks like a private network with all the functionality, security and management policies for a network privada.1 This is done by establishing a virtual point-to-point by use of dedicated connections, encryption, or the combination of both methods.

WORK STATION

In computer workstation (workstation in English) is a high-performance minicomputer designed for technical or scientific work. On a network computer, is a computer that provides users access to servers and network peripherals. Unlike an isolated computer has a network card and is physically connected by cables or other means unguided servers. Components for servers and workstations to new levels of computing performance, while delivering reliability, compatibility, scalability, and advanced architecture ideal for multithreaded environments.

WAN

The structure has a characteristic pattern called a network. This term, which comes from the Latin word rete, is used in various fields, but it is very common in computer science to name the set of computers that are interconnected and share resources.

WEP

WEP stands for Wired Equivalent Privacy, or "Wired Equivalent Privacy" encryption system is included in the IEEE 802.11 protocol for wireless networks as it can encrypt the information transmitted. Provides 2 level encryption based on the RC4 encryption algorithm using 64-bit keys (40 bits + 24 bits of the starting vector IV) or 128 bits (104 bits plus 24 bits of IV). Broadcast messages in wireless networks are transmitted by radio waves, making them more susceptible compared to wired networks, to be captured with relative ease. Introduced in 1999, WEP was intended to provide comparable to that of a traditional wired network confidentiality.

WIFI
The name is an abbreviation of Wifi English term "Wireless Fidelity". It is common to find the term written as wireless Wi-Fi, Wi-fi or wifi. All these names refer to the same technology.

WINIPCFG

With this command you can see the address we have on each network adapter cards in our PC.
It is used in the version of Windows98.

WLAN

(Wireless Local Area Network) is a system of flexible wireless data communication is widely used as an alternative to the wired LAN or as an extension of it. It uses RF technology that allows users greater mobility by minimizing wired connections. WLANs are gaining importance in many fields, such as warehouses or manufacturing, where the information in real time to a central terminal is transmitted. They are also very popular in homes to share an Internet connection among multiple computers.

WPA
Wi-Fi Protected Access, WPA also called (in Spanish "Wi-Fi Protected accseso ') is a system to protect (Wi-Fi) wireless networks; designed to correct the deficiencies of the previous system, Wired Equivalent Privacy (WEP) .1 Researchers have found several weaknesses in the WEP algorithm (such as the reuse of initialization vector (IV), which are derived statistical attacks that can recover the WEP key, etc.). WPA implements most of the IEEE 802.11i standard, and was created as an intermediate measure to take the place of WEP while 802.11i was finished. WPA was created by the Wi-Fi Alliance ("Alliance Wi-Fi").

WPA2

WPA2 (Wi-Fi Protected Access 2 - Wi-Fi Protected Access 2) is a system to protect wireless networks (Wi-Fi); created to correct identified vulnerabilities in WPA

WPA2 is based on 802.11i again. WPA, as a previous version, you might consider "migration" does not include all the features of IEEE 802.11i, while it can be inferred that WPA2 is the certified version of the 802.11i standard.

WPA-ENTERPRISE

Adopts WPA user authentication using a server, where the credentials and user passwords are stored on the network. To not demand the use of such a server for network deployment, WPA provides authentication using a pre-shared key, which is similar to WEP mode requires entering the same password on all computers in the network.

WPA-PERSONAL

WPA Personal provides adequate security for home and small office wireless networks. Virtually all routers commercial manufacturers - including Linksys, Belkin, D-Link and Apple - enable WPA2 Personal settings on their devices. In most cases, WPA2 Personal provides adequate protection against hackers and other online threats to wireless networks.

WWW

En informática, la World Wide Web (WWW) o Red informática mundial1 comúnmente conocida como la web, es un sistema de distribución de documentos de hipertexto o hipermedios interconectados y accesibles vía Internet. Con un navegador web, un usuario visualiza sitios webcompuestos de páginas web que pueden contener texto, imágenes, vídeos u otros contenidos multimedia, y navega a través de esas páginas usando hiperenlaces.

No hay comentarios:

Publicar un comentario