Thursday, February 15, 2007

NETWORKING pinpointed

1. 'Finger 'is an Internet tool for locating people on other sites. It gives access to non-personal information.

2. The term 'petabit ' is used in discussing possible volumes of data traffic per second in a large network.

3. RDF(Resource Definition Framework) is a set of rules for creating descriptions of informations available on the World Wide Web.

4.SOAP( Simple Object Access Protocol) is a protocol for client-server communication that sends and receives information on top of HTTP.

5.Wake-on-LAN (WOL) is a technology that enables a computer motherboard to switch itself on (and off) based on signals arriving at the computer;s network card.

6. A hacker with benign intentions is called a "white hat".

7. A 'blue bomb' is a technique for causing the Windows operating system of someone you are communicating with to crash.

8. OSCP(Online Certificate Status Protocol) is one of two common schemes for maintaing the security of server.

9.Certificate Revocation List (CRL) is a method of using a public key infrastructure for maintaining the access to a server

10. South Pacific Railroad laid down telegraph wires across trak\cks to help railway stations keep in touch.

11. The high-speed data highways of the Internet are called backbones. Sprint and AT&T own the major backbones in the US.


12.Silver is the most conductive material, but copper is widely used in communication because it costs much less and is better in terms of strength and glexibility.

13. A typical fibre-optic cable five thousandths of an inch thick can carry up to 2.5 billion bits of data per secon, or 32000 simultaneous telephone calls.

14.The idea of Blue tooth technology was born in 1994. The name Bluetooth is derived from a Danish Viking King. Harald Blatand-translated as Bluetooth in English-who lived in the latter part of the 10th century. Blatand united and controlled Denmark and Norway, hence the inspiration for the name, as in 'uniting devices through Bluetooth'.

15. Long before the expression 'local area network' (LAN) became part of the world's technical vocabulary, IBM researchers were working on this type of technology that connects printers,work stations and various serversin office building, factories and college campuse. IBM devised token-ring technology to control LAN traffic more efficiently and reliably. A token ring controls access of individual computers to the network, or ring. Since its introduction in 1985, IBM's token-ring architecture has become an industry standard for LANs.

16. Modems use ASCII character encoding.

17. Vannevar Bush, later the vice-president and dean of the Electrical Engineering department, MIT, first proposed the basics of hypertext in 1945. Tim Berners-Lee set down the basics of the World Wide Web, HTML (hypertextmarkup language), HTTP(Hyper Text Transfer Protocol) and URLs (Universal Resource Locators) in 1990.

18. Chuq von Rospach of Apple computer, CIrca 1983, coined the word 'netiquette'.

19. NANA is the newsgroups news.admin.net-abuse.*, devoted to fisghting network abuse sand spam. Each individual newsgroup is often reffered to by adding a letter to NANA. For example, NANAU would refer to news.admin.net-abuse.usenet.

20. Programs that are small and un-useful, but demonstrate a point are caleed 'Noddy' programs,Noddy programs are often written by people learning a new language or system. The archetypal noddy program is the "hello world" progra. In north America this might be called a 'Mickey Mouse' program

21. In the mid 1980s, engineers at Apple Computer developed a high- speed method of transferring data to and from the hard drives in Macintosh desktops while simplifying the internal cabling. They called it firewire.

22. About 60 million devices shipped with Firewire ports in 200, according to research firm in Stat/MDR.

23. In 1994, Ericsson Mobile Communications Initiated a stduy to investigate the feasibiltiy of low-power low-cost radiointerface between mobile phones and their accessories. In 1998, a special interest group was formed, codenamed "Bluetooth" by five Companies; Ericsson,IBM, Intel, Nokia, and Toshiba.

24. 'Toothing' is random sending of sexually charged, flirtatious messages that users of Bluetooth enabled mobile devices broadcast to other Bluetooth enable devices in the area.

0 comments:

Copyright © 2014
Designed by Navin