Wednesday, November 10, 2010

22 The Definition Of Terms in the Operating Systems and Communication

Abbreviated ARP Address Resolution Protocol is a protocol in the TCP / IP Protocol Suite responsible in performing IP address resolution into the address Media Access Control (MAC Address). ARP is defined in RFC 826.

1. DNS (Domain Name System, the Indonesian language: Domain Naming System) is a system which stores information about hostnames and domain names in the form of a database scattered (distributed database) within a computer network, for example: the Internet.

2.Nslookup is a command function is aware of information relating to a domain such as DNS Name servers and other.

3. Trace router Part of the TCP / IP protocols that are popularly used by network administrators to identify the path / route between two machines / network components and to check contribution of each component to the overall Round Trip Time.

4. Ping (Packet Internet Groper acronym) is a utility program that is used for check the network connectivity technology-based Transmission Control Protocol / Internet Protocol (TCP / IP). By using this utility, can be tested whether a computer connect with other computers. This is done by sending a packet to
IP addresses are about to be tested connectivity and wait for a response from him.

5. UDP - User Datagram Protocol. One of the protocols for data transfer that is part of the TCP / IP. UDP refers to data packets that do not provide information about their home address when the data packet is received.

6. TCP / IP - Transmission Control Protocol / Internet Protocol. A set of standard protocols used for connecting computer networks and put address traffic in the network. These protocols set the allowable data format, error handling (error handling), then message traffic, and other communications standards. TCP / IP must be able to work on all types of computer, without any unaffected by differences in hardware and operating systems used.

7. DHCP (Dynamic Configuration Protocol) is a service that automatically assigns numbers IP to the computer that requested it. Computers that provide IP number called DHCP server, while the computer that requested the IP number is called the DHCP Client. With so administrators no longer need to give IP numbers manually at the moment configuration of TCP / IP, but simply pass a reference to the DHCP Server.

8. ICMP is an error reporting mechanism (error reporting mechanism). ICMP is used only to report the error to the original source. If errors occur due to problems with a router, ICMP cannot be used to tell the router about the errors that arise. Original source not responsible for the control of the routers that are problematic, even actually the original source was unable to determine the router that caused the problem.

9. CGI - Common Gateway Interface. A set of rules that direct how a server web to communicate with some software in the same machine and how most of software (CGI program) communicates with the web server. Any software can be a CGI program if the software can handle input and output based CGI standard.

10. The walls of fire wall barrier. The combination of hardware and software that separates a network into two or more parts for security reasons. A computer or system manage network traffic, either incoming or outgoing, to prevent the occurrence of something undesirable. Some of them function as a barrier to prevent outsiders entering the local network.

11. Reverse-Proxy: a proxy server that serves to forward all requests from client browsers to one or more web server with a different URL which is behind reverse of this proxy. Reverse-proxy is very useful if we only have one Public IP,while we have more than one web server.

12. Proxy mechanism whereby one system makes itself available to other systems in response to request for a protocol. Proxy systems are used in network management for prevent the implementation of the protocol stack fully in the device that is simple,such as a modem.

13. Techniques to implement paging virtual memory. Virtual address space is divided into a number of sized blocks, called page.Masing each can be mapped in any address physically available on the system.

14. IN MIME brief. Additional functions of mail from the Internet, which allows us to insert data that form rather than writing in an e-mail, for example in the form of picture or sound. At first, e-mail systems on the Internet mostly can only be used to send information in the form of an ASCII (text). It was difficult to transmit data to a file binary, or multimedia objects. A common way is by using the program uuencode to convert the binary file into an ASCII file, then new sent via e-mail. At their destination, otherwise the process done. The ASCII file changed back to binary file using the uudecode program. In this way too complex (not integrated with e-mail system). MIME was created to facilitate delivery through the attachment file. MIME will
find a suitable program to handle the file. For example, to file form the image in GIF format, then a display image will be run to view the file GIF is. In addition MIME can also be used for other things, such file does not need sent via e-mail but the instructions to retrieve the file that is sent in e-mail.

15. Imap standard protocols to access or retrieve e-mail from the server. IMAP allows user selects the e-mail messages are retrieved, create a folder on the server, looking for an e-mail particular, even delete e-mail messages that exist. This capability is much better than POP (Post Office Protocol), which only allows us to take / download all messages there are no exceptions.

16. POP (Post Office Protocol) is a protocol used to manage e-mail. With this facility will make it easier to get an e-mail from a mail server without need the old connection from the Internet. POP3 (POP - Version 3) is a standard POP Internet. This protocol will allow the client to access e-mail on the POP server dynamically and also allow to leave or delete the e-mail in POP Server via POP client.

17. Push email service which allows mobile users to send and receive emails from their mobile phones, in real-time. E-mails received will come as well as SMS, so that it can directly be read only by pressing one button. This service can be enjoyed as long as customers are in a GPRS network.

18. DES stands for Data Encryption Standard {}, which is the standard encryption technique that
inaugurated by the government of the United States (U.S.) in 1977. DES then used as the standard ANSI in 1981. Horst Feistel is one of the researchers who originally developed DES while working at IBM's Watson Laboratory in Yorktown Heights, New York. DES is a block cipher that operates with a block size of 64-bit and 56-bit key. Brute-force attack against DES requires a combination of 2 to the power 56, or about 7 x 10
rank 16, or 70 million billion. DES has been successfully solved, either individual and in groups (as done by Distributed.net). In an attempt to break the DES, indicated that the team could break DES Distributed.net in time less than 30 days. Meanwhile, a special machine designed to break the DES can DES resolve within 3 days. This does not include machines that are owned by the NSA.

19. MDS Facilities used by ICM to communicated multiple nodes with each other. MDS play a key in keeping the dual components in sync.

20. Represents RSA algorithm for public key cryptography (public key cryptography) that general use today. RSA is an abbreviation of the name of the late inventor of this algorithm: Ron Rivest, Adi Shamir, and Len Adleman of MIT.

21. Secure Hash Algorithm (SHA), designed by the National Institute of Standards and Technology (NIST) USA., Part of the standard DSS (Decision Support System), USA and work with DES to digital signature., SHA-1 provides 160-bit message digest, Version: SHA-256, SHA-384, SHA-512 (Integrated with AES).

22. Triple DES is one of the three-layered encryption systems from pre-existing system, the DES (Data Encryption Standard). Triple DES is more secure than DES, because of the encryption three times.

    Other related articles:

No comments:

Post a Comment