Internet Programing Abbreviations Thilina
Internet Programing Abbreviations Thilina
Internet Programing Abbreviations Thilina
1. Protocol
2. Network edge
3. Network core
4. Circuit switching
5. Packet switching
6. ISPS
7. TIER1, TIER2, TIER3
8. ISO-OSI reference model
9. TCP/IP
10. SMTP
11. HTTP
12. FTP
13. DNS
14. TCP
15. UDP
16. SYN message, SYN ACK message
17. Port
18. Logical address
19. Subnet
20. Subnet mask
21. IPv4
22. IPv6
23. Classless Inter Domain Routing (CIDR)
24. Network Address Translation (NAT)
25. Dynamic Host Configuration Protocol (DHCP)
26. P2P
27. UPnP
28. ICMP
29. IPsec
30. Client-Server Architecture
31. Peer-peer Architecture
32. Socket
33. Stream socket
34. Datagram socket
35. RTT- The round-trip time
36. Get method
37. Post method
38. Head method
39. Cookies
40. Web caching
41. SMTP
1
42. RFC
43. POP3
44. IMAP
45. HTTP
46. TLD
47. RTSP
48. VLAN
49. VLAN Trunk
50. RMI
51. Stub
52. Skeleton
53. Serializability
1. Protocol: A protocol is a set of rules and conventions that govern communication between
devices or entities in a network. It defines the format, timing, sequencing, and error handling
for data exchange. Simply, An agreed upon format for transmitting data between two devices.
Common examples include HTTP, TCP/IP, and SMTP.
2. Network Edge: The network edge refers to the boundary or interface between a user's local
network (such as a home or business network) and the wider internet. It's where end-user
devices connect to the network.
3. Network Core: The network core, also known as the backbone or infrastructure of the
network, is the central part of the network that facilitates data transmission between different
parts of the internet. It consists of high-capacity, long-distance communication links and
routers.
2
5. Packet Switching: Packet switching is a communication method where data is divided into
packets for transmission. Each packet is individually routed across the network to its
destination. It is the basis of modern internet communication.
6. ISPs (Internet Service Providers): ISPs are companies that provide internet access to
customers. They offer various types of internet connections, such as DSL, cable, fiber, and
wireless.
7. Tier 1, Tier 2, Tier 3: These refer to different levels of internet service providers. Tier 1
providers are the highest-level providers with a global network. Tier 2 and Tier 3 providers
are regional or local ISPs that connect to Tier 1 providers to access the broader internet.
8. ISO-OSI Reference Model: The OSI model is a conceptual framework that standardizes
network communication into seven layers, each with its specific functions. It helps in
understanding and designing network protocols. Example layers include the application layer
and transport layer.
10. SMTP (Simple Mail Transfer Protocol): SMTP is a protocol for sending email messages
between servers. It's used for the transmission of outgoing email. Example:
"smtp.thilina.com."
11. HTTP (Hypertext Transfer Protocol): HTTP is a protocol for transferring data on the
World Wide Web. It governs how web browsers request and display web pages. Example:
"http://www.thilina.com."
12. FTP (File Transfer Protocol): FTP is a protocol for transferring files over a network. It is
commonly used for uploading and downloading files from a server. Example:
"ftp://thilina.com."
3
13. DNS (Domain Name System): DNS is a system that translates human-readable domain
names (e.g., www.thilina.com) into IP addresses that computers use to identify each other.
15. UDP (User Datagram Protocol): UDP is a connectionless protocol in the TCP/IP suite that
is faster but less reliable than TCP. It is used for applications where speed is more critical
than error checking.
16. SYN Message, SYN ACK Message: In TCP, the "SYN" (synchronize) message is used to
initiate a connection, and "SYN-ACK" is the acknowledgment of the "SYN" message during
the connection establishment.
17. Port: Ports are endpoint addresses in a network used to distinguish different services or
applications on the same device. For example, port 80 is commonly associated with HTTP,
port 21 is commonly associated with FTP, port 25 is commonly associated with SMTP.
18. Logical Address: A logical address is a network address that identifies a device at the network
layer (e.g., an IP address).
19. Subnet: A subnet is a logically segmented portion of a larger network. It allows network
administrators to divide an IP network into smaller, more manageable sections.
20. Subnet Mask: A subnet mask is a 32-bit number that segments an IP address into network
and host portions. It specifies which part of the IP address is the network ID and which part
is the host ID.
4
21. IPv4 (Internet Protocol version 4): IPv4 is the most widely used version of the Internet
Protocol. It uses 32-bit addresses and is the foundation of the current internet.
22. IPv6 (Internet Protocol version 6): IPv6 is the successor to IPv4, designed to address the
shortage of available IPv4 addresses. It uses 128-bit addresses and offers enhanced features.
23. CIDR (Classless Inter-Domain Routing): CIDR is a method for IP address allocation that
allows for flexible and efficient address assignment without being limited by traditional class-
based addressing.
24. NAT (Network Address Translation): NAT is a technology that maps private IP addresses
to a single public IP address, allowing multiple devices to share the same public IP address
for internet access.
25. DHCP (Dynamic Host Configuration Protocol): DHCP is a network protocol that
automatically assigns IP addresses and network configuration to devices on a network.
26. P2P (Peer-to-Peer): P2P refers to a decentralized network architecture where devices
communicate directly with each other without relying on a central server.
27. UPnP (Universal Plug and Play): UPnP is a set of networking protocols that allow devices to
discover and interact with each other without manual configuration.
28. ICMP (Internet Control Message Protocol): ICMP is a network protocol used for sending
error and control messages between devices in an IP network.
29. IPsec (Internet Protocol Security): IPsec is a suite of protocols used to secure internet
communication by providing authentication and encryption.
5
30. Client-Server Architecture: In a client-server architecture, client devices request services or
resources from server devices. It's a common model for distributed computing.
31. Peer-to-Peer Architecture: In a peer-to-peer architecture, devices have equal status and
communicate directly with each other, sharing resources and data.
32. Socket: A socket is an endpoint for sending or receiving data across a computer network. It's
a programming interface for network communication.
33. Stream Socket: A stream socket provides a connection-oriented, reliable data stream for
applications, often using the TCP protocol.
34. Datagram Socket: A datagram socket provides a connectionless, best-effort data transfer
using the UDP protocol.
35. RTT (Round-Trip Time): RTT is the time it takes for a packet to travel from the sender to
the receiver and back. It's a measure of network latency.
36. GET Method: The GET method in HTTP is used to request data from a specified resource.
For example, retrieving a web page from a server.
37. POST Method: The POST method in HTTP is used to send data to be processed by the
identified resource. For example, submitting a form to a web server.
38. HEAD Method: The HEAD method in HTTP is similar to GET but only requests the
headers of a resource without the body, useful for checking resource metadata.
39. Cookies: Cookies are small pieces of data stored on a user's device by a web browser. They
are often used for session management and tracking user preferences.
6
40. Web Caching: Web caching is the practice of storing web content on proxy servers or local
devices to reduce latency and improve load times for frequently accessed web pages.
41. SMTP (Simple Mail Transfer Protocol): SMTP is a protocol for sending email messages
between servers. It's used for the transmission of outgoing email.
42. RFC (Request for Comments): RFCs are documents that define standards and protocols for
the internet. They are developed through a collaborative process and serve as reference
guides.
43. POP3 (Post Office Protocol, version 3): POP3 is a protocol for receiving email from a server.
It allows users to download email to their devices.
44. IMAP (Internet Message Access Protocol): IMAP is a protocol for receiving email from a
server, offering more advanced features and remote mailbox management compared to
POP3.
45. HTTP (Hypertext Transfer Protocol): HTTP is a protocol for transferring data on the
World Wide Web, governing how web browsers request and display web pages.
46. TLD (Top-Level Domain): TLD is the highest level in the hierarchical domain name system,
representing the rightmost part of a domain name (e.g., .com, .org).
47. RTSP (Real-Time Streaming Protocol): RTSP is a network control protocol used in
multimedia streaming, such as video and audio streaming.
48. VLAN (Virtual Local Area Network): A VLAN is a logical network created within a physical
network to separate and manage traffic based on different criteria.
7
49. VLAN Trunk: A VLAN trunk is a network link that carries multiple VLANs, allowing data
from different VLANs to be transmitted over the same physical connection.
50. RMI (Remote Method Invocation): RMI is a Java-based system for invoking methods on
remote objects. It enables distributed computing and object communication in Java.
51. Stub: In RMI, a stub is a client-side proxy for a remote object. It marshals method calls and
passes them to the remote object.
52. Skeleton: In RMI, a skeleton is a server-side object that receives method calls from client
stubs and delegates them to the actual remote object.
53. Serializability: Serializability refers to the property of a system that allows objects or data to
be serialized (converted into a byte stream) and deserialized (converted back to objects) for
storage or network transmission. It's commonly used in data persistence and network
communication.
- Thilina -