• Keyboard Shortcuts

    Shortcut keys help provide an easier and quicker method of navigating and executing commands in the computer software.

  • Hardware Tips

    Learn about the latest computer hardware and find out how to diagnose

  • Knowledge Practise questions and answers

    Here you can practise more questions and answers to improve your knowledge on computer

Showing posts with label Network terms. Show all posts
Showing posts with label Network terms. Show all posts

Saturday 2 November 2019

Ping, Echo, Game terms, HELO, ICMP, Latency, LPB, Network terms, Ping of death, Ping pong

Ping may refer to any of the following:

Ping is a utility first developed by Michael Muss in 1983 that is used to verify whether or not a network data packet is capable of being distributed to an address without errors. The ping utility is commonly used to check for network errors.



The image is an example of what happens when a ping is sent. The user would first start by using the ping command to ping the IP address 206.224.150.3. Next, the request is sent over the network hub and router, in this example, to the other computer with this IP address. Once successfully received, the computer replies to the ping with a pong response. The time between these two transmissions is calculated to generate an average response or latency time.
In the example above, we access the Windows command line to use the ping command. 




Then we ping "xxxxx.com" and get four responses from the server. In the above example, each reply has the size of the packet (bytes), the time it took in ms, and the TTL.

If the ping does not reach its destination due to an error or because it is being blocked, the sending computer encounters a request timed out error or shows no received packets.


The ping command output can also be directed to a file instead of the command prompt window. Working with the example ping command above, we could use the following command.


 

ping xxxxx.com > ping.txt
 


The command above will output the results of pinging xxxx.com to a file named ping.txt. The file will be created in the directory where the ping command was executed. In the first example above, the directory is c:\cgi-bin\update and this is where the ping.txt file will be created. To change the directory where the output file is created, we can enter a different directory in the ping command itself, as in the example below.
 

ping xxxx.com > c:\output\ping.txt
 

The example command above creates the ping.txt file in the c:\output directory, instead of in the c:\cgi-bin\update directory.

What is ping short for?

Ping is not an acronym or short for anything. It is sometimes thought of as the backronym packet Internet groper. The word "ping" comes from the sound sonar generates when it detects objects under water.


In networked computer gaming, ping is a measurement of the latency of the game's network connection to the server, measured in ms (milliseconds). Low ping, indicating low latency, indicates a good connection, resulting in more responsive gameplay. High ping indicates network congestion or problems with the server, and may result in poor responsiveness, or "lag." For example, a player with a low 50 ms ping is going to have a better gaming experience than a player with a 250 ms ping.

Sunday 25 February 2018

Network terms

Database terms - Internet terms - Network protocols - Network ports - Security terms
 

Top 10 Network Terms
 

Class A
Internet
Network
Bus topology
Hub
Network protocols
TCP/IP
Network server
Ring topology
Network adapter

Number
10 Gigabit Ethernet
1000BASE-CX
1000BASE-LX
1000BASE-SX
1000BASE-T
100BASE-T
100BASE-T4
100BASE-TX
100BASE-FX
100BASE-X
100VG-AnyLAN
10BASE-2
10BASE-5
10BASE-T
1U
2U
3GPP
3U
4U
586A
586B
5U
6to4
6U
7U
802 standards
802.3
802.3ab
802.3ae
802.3u
802.3z
802.11
802.11a
802.11b
802.11c
802.11d
802.11e
802.11f
802.11g
802.11i
802.11j
802.11n
802.12
802.16


A

A record
Access log
Access point
Access rights
Access server
Account
Ack
ACL
ACR
Active directory
Active topology
Ad
Ad hoc
Address resolution protocol
ADSI
ADSL
Agent
APIPA
Aloha
Anonymous
Antenna
Anycast
Apache server
Apple Airport
AppleTalk
Application layer
Application server
ARCnet
ARP
ARPA
ARPANET
AS
ASN.1
ASP
Asynchronous Transfer Mode
ATM
Attachment Unit Interface
AUI
Autonomous system
AWS

B
Backbone
Bandwidth
Base station
Baseband
BDC
Beowulf
BER
BERT
BGMP
BGP
Bind
Bisync
Bit stuffing
Bitnet
Bittorrent
BlackBerry Enterprise Server
BlackBerry Messenger
Blade
Blade server
BNC
BNC Connector
BOOTP
Bootstrap protocol
Border Gateway Protocol
Bottleneck
BPDU
BPL
BPSK
BranchCache
Bridge
Broadband
Broadcast
Broadcast address
Broadcast domain
BSDI
BSS
BSSID
Brouter
Burst
Bus topology


C

Cable
Cable tester
CAP
Cascading hubs
CAT1
CAT3
CAT4
CAT5
CAT5e
CAT6
CAT7
CCIE
CCNA
CCNP
CCS
CDDI
CDN
CHAP
Chernobyl packet
CIDR
CIFS
CIM
CIR
Citrix
Class A
Class B
Class C
Class D
Class E
Clear text
CLI
Client
Cloud computing
Clustering
CNAME
CNE
CNST
CO
Coaxial cable
Co-location
Coaxial cable
Collision
Colo
Colocation
Command Line Interface
Communication device
Communications
Communications protocol
Communications controller
Computer name
Connectionless
Contention
Convergence
Core router
CREN
Crimp
Crimping tool
Crossover cable
Cross-platform network
Crosstalk
CSMA/CD
CSNET
CSU/DSU
CTCP
cURL

D

Data center
Data line
Data link layer
Data transfer
Data transfer rate
Datagram Delivery Protocol
DB-9
DB-15
DCOM
DDP
DDR
Dedicated server
Decentralized process
Deep Space Network
Default user
Denial Of Service
DHCP
Dial-on-Demand Routing
Digital data transmission
Directory harvest attack
Disk quota management
Disk server
Diskless workstation
Distributed systems
DIX
DNS
DNS hijacking
DNS record
DoCoMo
Domain
Domain controller
Domain forwarding
Domain join
Domain local group
Domain name
Domain name registrar
Domain namespace
Domain Name System
Domain tree
DOS
Down
Download
Downtime
DS3
DSAP
DSL
DSR
DTX
Dumb terminal
Dynamic allocation
Dynamic Host Configuration Protocol



E
E-mail
E-1
Echo
Edge device
Edge router
EDIINT
Egress filtering
EIGRP
Encapsulation
Enterprise-Wide Network
Entry
Error rate
Ethereal
Ethernet
Ethernet adapter
Ethernet controller
Ethernet frame
Ethernet SNAP
EtherPEG
Ethertalk
Evil twin
Exchange
Expect
External IP address
External LAN adapter
Extrenet port
Extranet

F
F connector
Fast Ethernet
Fault tolerance
FCIP
FDDI
FDDI-2
FEC
FEP
FFDT
Fiber-optic
FidoNet
File server
File sharing
File transfer
File Transfer Protocol
FiOS
Firewall
Flood
FOIRL
Forests and trees
Forward error correction
FQDN
FR
Frame
Frame relay
Free Space Optics
Freenet
Front End Processor
FSO
FSP
FTAM
FTP

G
G.SHDSL
Gateway
GBIC
Geocast
Glass house
Ground loops
Group policy
GroupWare
Guest

H

H.323
Handshake
HDLC
HDSL
HELO
Heterogeneous network
Hidden share
Home network
HomeGroup
Homogeneous Network
Hop
Hops
Host
Host computer
Host priority
Hosts file
Hostid
Hostname
HSS
HTTP server
Httperf
Hub
Hubbed mode
Hybrid cloud
Hybrid topology
Hyper-V

I

IANA
ICA
Icacl
ICANN
ICMP
ICT
IDSL
IEEE 802 standards
IEN
IGES
IGMP
IGRP
IIS
IMAP
Infrared broadband
Internal IP address
Internet
Internet Information Server
Internet node
Internet Packet eXchange \ Sequential Packet eXchange
Internet Protocol
Internet Protocol Television
Intranet
InterNIC
Interoperability
IP
IP cloaking
IP spoofing
IPP
IPsec
Iptables
IPTV
IPX/SPX
IPv4
IPv6
IS
ISATAP
ISDN
ISIS
ISP

J
Jabber

K
Kerberos

L

L2TP
LAN
LAN segment
Latency
LAWN
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
Layer 8
Leased line
Leech
LFAP
Line-side T1
Link aggregation
Link state packet
LLC
Lmhost
Load balancing
Local
Local Area Network
Local IP address
Localhost
Locking
Lockout
Log on
Log off
Logical unit
LOF
Loopback
LOS
LSP
LU

M

MAC
Mail server
Mainframe
MAN
Map
MAPI
MAU
MCSA
MCSE
MDaemon
Mesh topology
Metcalfe's Law
MIB
Miroring
MMS
Modbus
MPLS
MPP
MRU
MSAU
MSCS
MTU
Multi-mode fiber
Multi-user system
Multicast
Multiplex
MX record
My Network Places

N


N+
NAK
Nameserver
Name server protocol
NAP
NAPT
Narrowband transmission
NAS
NAT
NBT
NCP
NDIS
NDR
NDRO
Negate
'Net
Net architect
Net neutrality
NetBEUI
NetBIOS
NetBIOS over TCP/IP
Netio
Netmask
Netstat
Netting
NetWare
Network
Network+
Network Access Protection
Network adapter
Network address
Network administrator
Network architecture
Network Control Panel
Network database
Network directory
Network drive
Network engineer
Network layer
Network media
Network Management System
Network Neighborhood
Network operating system
Network printer
Network segment
Network server
Network socket
Network structure
Network terminal number
NFS
NIC
NIT
NMS
NNTP
Node
Node address
NOS
Notwork
NSAP
NSFNET
Nslookup
NSP
NSPA
NTN
NTP

O
Octet
ODI
OID
Open
OpenSSL
OpenStack
Optical fiber
Optical wireless
Oracle public cloud
OSPF
Overlay network


P

PaaS
Packet
Packet aggregation
Packet switching
PAD
PAN
PAT
Patch cable
Patch panel
Payload
PDC
PDU
Peer
Peer-to-peer communications
Peer-to-peer network
Permission
Physical layer
Physical unit
Piggyback
PIM
Ping
Ping of death
Ping pong
POP
POP3
Port
Port forwarding
Port scanner
Port triggering
Power user
PPP
PPPoE
PPTP
Presentation layer
Print server
Promiscuous mode
Protocol
Proxy
Proxy server
Pseudo terminal
Ptm
Pts
Pty
Push e-mail
Putty
PXE

Q
QMAC
QoS
QPSK

R

Rackmount
RADIUS
RADSL
RAP
RAS
rDNS
RDP
Remote access
Remote Access Server
Remote Desktop
Remote Media Streaming
Remote user
Repeater
RequestTTY
Reserved address space
Resource record
REST
Reverse DNS lookup
Reverse resolving
RF
Ring sequence
Ring status
Ring topology
RJ-45
RLP
Roam
Rollover cable
Round robin
Route
Route aggregation
Router
Routing
Routing algorithm
Routing table
RPC
RRAS
RTCP
RTP
RTSP
RTTP


S

S band
SaaS
Samba
SAN
SAP
SATAN
Satellite
S-band Multiple Access
SDLC
SDSL
SDU
Sequenced Packet eXchange
Serial
Server
Server Farm
Service Advertising Protocol
Session layer
SFTP
Shared directory
Share
Shared folder
Shielded Twisted-Pair cable
Short-haul
Sign off
Sign on
Single-mode fiber
Sitename
SLA
SLIP
SMA
Smart terminal
SMS
SMTP
SNA
Sneakernet
Sniffing
SNMP
SOA
Socks
SONET
Spanning tree
Spanning tree protocol
SPI
Spoof
Spoofing
SPX
SSAP
SSH
SSHD
SSID
SSL
SSTP
Stack
Star topology
Stateful firewall
Stateless
Static
Static allocation
STM
STM-1
STM-4
STM-8
STM-16
STM-64
Store-and-forward
STP
STP Cable
Straight through
Streaming content
STS
STS-1
STS-3
STS-12
STS-24
STS-48
STS-192
Subdomain
Subnet
Subnet mask
Subnetwork
Supercomputer
Switch
SYN
SYN attack
Syslog
SYSOP
System administrator
System operator

T

T1
T2
T3
TA
TACACS
TCP
TCP fingerprinting
TCP/IP
TeamViewer
Telecommunications
Telepresence
Teleprocessing
Telnet
Teredo
Terminal
Terminal emulation
TFTP
Thick client
Thick Ethernet
Thin client
Thin Ethernet
Throttle
Throughput
Time server
Time-out
TLD
Token
Top-level domain
Topology
TOPS
TOS
TP-PMD
Trace
Tracepath
Traceroute
Traffic
Traffic shaping
Transfer rate
Transit network
Transmit
Transport layer
Trunk
TTL
Tunnel
Turnpike effect
Twisted-pair cable


U

UDSL
Unethical hack
Unicast
Uniformity
UNC
Unshielded Twisted Pair cable
Uplink
Upload
UPnP
Upstream
User
User account
User group
User profile
Username
uTorrent

V

VAN
VADSL
VBR
VC
VCI
VDD
VDSL
Vhost
Virtual computing
Virtual host
Virtual router
Virtualization
VLAN
VMware vSphere
VNC
VOIP
VPN
VPS
VRRP
VSAT

W


Wake On LAN
Walled garden
WAN
WAP
WBEM
Web farm
Web forwarding
Web host
Web server
Webcast
WEP
WFW
WHOIS
Wide Area Network
Wideband transmission
Wi-Fi
WiMAX
Winpopup
WINS
Winsock
Wire stripper
Wireless
Wireless adapter
Wirelessly
WireShark
WISP
WLAN
WOL
Workgroup
Workstation
WPAN
WPS

X
X.25
X.400
Xerox network services
XMT

Y
Currently no listings

Z
ZAK
Zarafa
Zero configuration network
Zeroconf
ZIP
Zombie
Zone

Good Morning Beautiful

Do you know????

Do you know????
/