Title: Technical Terms We Cant Avoid
1Technical Terms We Cant Avoid
2Contents
- Network components
- TCP/IP
- IP-address
- Gateway
- Domain Name System
- Nameserver
3Network Components
4- Client - software that allows files and printers
to be shared with other network computers. - Adapter - hardware device that physically
connects your computer to the network. - Protocol - "language" a computer uses to
communicate over a network. Computers must use
the same protocol to communicate with each other. - Service - One type of service enables you to
share your files and printers with other people
on the network. Examples of other services are
automatic system backup, remote registry, and
network monitor agent.
5- Client
- Microsoft Network, Novell Netware,
- Windows NT Workstation
6- Adapter
- ethernet card, wireless LAN card, dial-up
adapter, radio-modem card, etc.
7- Service
- file sharing, printer sharing, system backup,
personal web server
8(No Transcript)
9TCP/IP Transmission Control Protocol/Internet
Protocol
- basic communication language of the Internet. It
can also be used as a communications protocol in
private networks called intranets and in
extranets.
10TCP/IP is a two-layered program
- Transmission Control Protocol
- higher layer
- manages the assembling of a message or file into
smaller packets that are transmitted over the
Internet - reassembles the packets into the original
message.
11Internet Protocol (IP)
- lower layer
- method or set of rules by which data is sent from
one computer to another on the Internet. - handles the address part of each packet so that
it gets to the right destination.
12IP address
13IP-address
- example 208.160.242.35
- Unique
- scarce
- 4 octets (8-bit-bytes)
- value of each octet 0-255
- classes of networks (A,B,C, CIDR)
14- Each computer (known as a host) on the Internet
has at least one address that uniquely identifies
it from all other computers on the Internet. When
you send or receive data (for example, an e-mail
note or a Web page), the message gets divided
into little chunks called packets. Each of these
packets contains both the sender's Internet
address and the receiver's address.
15- Return-Path
- Received from rmit.EDU.AU (tardis.its.rmit.edu.au
131.170.2.30) - by kuanyin.isiswomen.org (8.8.7/8.8.7) with
ESMTP id TAA26756 - for Sun, 6 Jun 1999 193804
0800 - Received from ems.rmit.edu.au (ems.rmit.edu.au
131.170.2.134) by rmit.EDU.AU
(8.8.8/8.7.3/ram4/ANTI-SPAM/ANTI-RELAY/VOGA) with
SMTP id NAA27352 for Sun, 6
Jun 1999 133242 1000 (EST) - Received from INTERNET-Message_Server by
ems.rmit.edu.au - with Novell_GroupWise Sun, 06 Jun 1999 133118
1000 - Message-Id
- X-Mailer Novell GroupWise 5.5
- Date Sun, 06 Jun 1999 133052 1000
- From "Justina Curtis"
- To
- Subject greetings from netcafe on sarawak
river... - Mime-Version 1.0
- Content-Type text/plain charsetUS-ASCII
- Content-Disposition inline
- Content-Transfer-Encoding 8bit
- X-MIME-Autoconverted from quoted-printable to
8bit by kuanyin.isiswomen.org id TAA26756
16Gateway
17Gateway
- network point that acts as an entrance to another
network. - the Internet is made up of gateway nodes and host
nodes. - computers of network users and the computers that
serve content, such as Web pages, are host nodes.
- computers that control traffic within your
company's network or at your local Internet
service provider (ISP) are gateway nodes.
18Domain Name System
19Domain Name System
The domain name system (DNS) is the way that
Internet domain names are located and translated
into IP (Internet Protocol) addresses. A domain
name is a meaningful and easy-to-remember
"handle" for an Internet address. Because
maintaining a central list of domain name/IP
address correspondences would be impractical, the
lists of domain names and IP addresses are
distributed throughout the Internet in a
hierarchy of authority.
20- Domain Name
- a domain name locates an organization or other
entity - on the Internet.
- Example kuanyin.isiswomen.org
- kuanyin host server
- .org the part of the domain name that reflects
the purpose of the organization or entity, also
known as top level domain name - isiswomen part of the domain name defines the
organization or entity and together with the
top-level is called the second-level domain name.
Also known as second-level domain name, this is
the "readable" version of the Internet address.
21- top level identifies geographic or purpose
commonality .com, .net, .org, .net,
.gov .kr, .ph - second level identifies a unique place within the
top level domain and is, in fact, equivalent to a
unique address on the Internet (or
IP). isiswomen - lower levels of domain may also be used.
22 type on browser address barhttp//www.isiswome
n.org
23 type on browser address barhttp//208.160.242.
35
24 type on browser address barhttp//kuanyin.isis
women.org
25Nameserver
- converts natural names to IP-numbers
- converts IP-numbers to names
- example
- isiswomen.org 208.160.242.35
kuanyin.isiswomen.org
26- type on browser address bar
- http//www.networksolutions.com/cgi-bin/whois/whoi
s/
27More information
- History of the Internet (non-Technical)
- http//www.isoc.org/internet/history/
- Answers to What is questions
- http//whatis.com/index.htm
- DNS discussions
- http//www.isoc.org/internet/issues/dns/
- http//www.ispo.cec.be/eif/dns/conclusions.html
28More information
- APNIC (Asia-Pacific Network Information Centre
- http//www.apnic.net/index.html