This is the second day of my participation in Gwen Challenge

ARP

Address Resolution Protocol A TCP/IP Protocol that obtains physical addresses based on IP addresses.

dhcp

Dynamic Host Configuration Protocol Dynamic host configuration protocol that centrally manages and allocates IP addresses. Hosts on the network dynamically obtain IP addresses, Gateway addresses, and DNS server addresses, and improve address usage.

dns

Domain name System is a distributed database that maps domain names and IP addresses on the World Wide Web. It enables users to access the Internet more easily without having to remember difficult IP addresses.

FTP

File Transfer Protocol Indicates an application-layer Protocol

http

Hyper Text Transfer Protocol Is a stateless connection established over TCP. The client sends a request and the server sends an HTTP response back to the client.

HTTPS

Hypertext Transfer Protocol Secure Is a Secure version of HTTP. Add SSL layer to HTTP.

IEEE

Institute of Electrical and Electronics Engineers, the world’s largest non-profit professional technical society.

IMAP

Internet Mail Access Protocol

iOS

A mobile operating system developed by Apple, formerly known as iPhone OS and later renamed iOS.

IPC

Inter-process Communication Indicates the Communication between processes

ISO

International Organization for Standardization

LVS

Linux Virtual Server Linux Virtual Server is a Virtual Server cluster system.

NAT

Network Address Translation A method in which a small number of public IP addresses represent a large number of private IP addresses. Broadband sharing: This is the biggest feature of the NAT host. 2. Security protection: When a PC in the NAT connects to the Internet, the IP address displayed is the public IP address of the NAT host. Therefore, the PC on the Client is secure to a certain extent.

nfs

Network File System, which allows computers on a network to share resources over the TCP/IP network. A local NFS client can transparently read and write files located on a remote NFS server as if they were accessing local files. What are the differences between NFS, FTP and Samba

ntp

Network Time Protocol A protocol used to synchronize the time of computers on a network. Accuracy: 0.1ms in LAN, 1-50ms in Internet.

OSI

Open System Interconnection, the OSI model developed by the International Organization for Standardization (ISO). OSI model divides the work of network communication into seven layers, namely physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer.

PC

Personal computer

POP3

Post Office Protocol-Version 3 Post Office Protocol Version 3

ppp

Point to Point Protocol Point-to-point protocol

PPPoE

Point-to-point Protocol over Ethernet Point-to-point protocol

SMTP

Simple Mail Transfer Protocol Simple Mail Transfer Protocol

SQL

Structured Query Language Structured Query Language. The main function of SQL language is to establish contact and communicate with various databases. SQL is the standard language for relational database management systems.

SSH

Secure Shell SSH is a reliable protocol that provides security for remote login sessions and other network services. FTP, POP, and Telnet are inherently insecure because they transfer passwords and data over the network in clear text.

SSL

Secure Sockets Layer, a precursor to TLS

TCP

Transmission Control Protocol IS a connection-oriented, reliable, byte stream – based transport-layer communication Protocol. Advantages: Reliable and stable Disadvantages: slow, low efficiency, occupies high system resources, and is vulnerable to attacks

TFTP

Trivial File Transfer Protocol A simple File Transfer Protocol

TLS

Transport Layer Security Transport Layer Security protocol, formerly SSL

UDP

User Datagram Protocol A Protocol that provides connectionless network services and unreliable, best-effort delivery. Advantages: Fast, slightly safer than TCP: although TCP is embedded with various security functions, but in the actual execution process will take up a lot of system overhead, undoubtedly, the speed is seriously affected. On the other hand, UDP, because of the exclusion of reliable information transmission mechanism, transfers security and sorting functions to the upper application to complete, greatly reducing the execution time, so that the speed is guaranteed. Disadvantages: unreliable and unstable

URI

A Uniform Resource Identifier is a string that identifies the name of an Internet Resource

URL

Uniform Resource Locator: a concise representation of the location and access method of resources available on the Internet. It is the address of a standard Resource on the Internet. Every file on the Internet has a unique URL.

VPN

Virtual Private Network A Private Network is created on a public Network for encrypted communication. The VPN gateway encrypts data packets and translates the destination addresses of data packets to achieve remote access. VPN belongs to remote access technology, which simply means using public network to set up private network. To enable non-local employees to access Intranet resources, a VPN server is set up on the Intranet. After local employees connect to the Internet, they use the VPN server to access the Intranet. Generally, a VPN gateway adopts a dual network adapter structure, and external network adapters use public IP addresses to access the Internet.

WWW

Also called “Web”, “W3” World Wide Web for short Web, divided into Web client and Web server programs. The WWW allows Web clients (common browsers) to access and browse pages on a Web server.