You are on page 1of 20

Glossary for CreativeOn

Dedicated Servers/VPS
1. Dedicated Server:
Dedicated server, a type of internet hosting in which an entire server is leased by the client
which is not shared with anyone. It is more secure and better than shared hosting as organizations
have complete control over their server including many aspects like hardware, selection of
operating system etc.

2. VPS (Virtual Private Server):


A server can be divided into a few number of private servers called VPS, Virtual Private Server.
Each VPS share resources of the server and functions the same as a standard server.
3.

Propagation:

When DNS is updated to DNS servers, this process is call propagation. It takes up to 72 hours.
Its concern is with those who have just bought, transferred or updated a domain.

4. Data Transfer:
Data Transfer is that amount of data that can be transferred or the total capacity of information
that can be consumed over your servers network. In Webhosting, Data Transfer offered is
usually for a period of one month.
5.

Disk Space:

A specific amount of space called disk space, is allocated to your account from servers disk
storage in which you can store your log files, HTML files, audio clips, graphics and all other
files necessary to make up your website including email messages.

6. Guaranteed RAM:

Guaranteed RAM is the RAM allocated to VPS and meant to be available always no matter how
much RAM is used by other VPSs.

7. Bandwidth:
In a digital communication system, bandwidth can be defined as the net bit rate that can be
transmitted in a fixed amount of time (usually a second). It is also known as peak bit rate
expressed in bits per second (bps) or bytes per second. But in modern networks, speed is
measured in millions of bits per second (Mbps) or billions of bit per second (Gbps). It is also
important to note that in terms of web hosting services and computer networks bandwidth is
incorrectly used as a synonym for Data Transfer.

8. Burstable RAM:
Burstable RAM is the RAM provided to VPS (Virtual Private Servers) on a
server which comes into play when the usage exceeds from the allocated
amount of guaranteed RAM. So in other words Burstable RAM is the RAM
which can be used in emergency by VPS when it encounters high amount of
traffic. During normal traffic, this RAM is not used by any VPS on a server and
can be allocated to any VPS on a server in case of need. But this is not a RAM
to be constantly dependent upon because it is not guaranteed to be
available always.
For Example, If 2GB of guaranteed RAM is available for your VPS with 2GB
Burstable RAM then 2GB of Burstable RAM can be used after you have
consumed your guaranteed RAM.

9. CGI (Common Gateway Interface):


Web servers interface with the executable programs installed on a server in a
standard way, that standard way is called CGI, Common Gateway Interface.
Such programs are called CGIs or CGI scripts. These scripts are mostly
written

in

scripting

languages like

Perl but

can

be

written

in

any

programming language like C/C++. A special directory is used to store these


programs like /cgi-bin.

10.

SSL (Secure Socket Layer):

SSL, the secure socket layer is used for safe and secure transmission of private and confidential
data over the internet by encrypting it. For example, credit card numbers by using https protocol.

11.

SSL certificate:

SSL certificate ensures secure communication. For online business or transactions, it is necessary
build trust with your customers which is made sure by SSL certificate. SSL certificate is installed
on pages for the end users to submit sensitive information like passwords, credit cards etc. It is
intended for many purposes e.g. to ensure the identity of remote computer, prove the identity of
remote computer etc.

12.

DPA (Data Protection Act):

Data Protection Act gives you the right to know the information held about you. DPA governs the
rules to make sure this data or information is processed properly.
13. Firewall:
A firewall is a device or a set of devices in which instructions are set up for network
transmissions. A firewall permits or denies network transmissions according to predefined set of
rules. Networks are protected from unauthorized access with the help of firewalls but
communications which are legitimate are allowed to pass.
It can also be regarded as a network security system that monitors and controls the incoming and
outgoing network traffic based on predefined security rules.

14.

Gateway:

Gateway is a system for exchanging information across networks that are incompatible and use
different protocols. It is basically a combination of hardware and software that connects two
different networks so that information can be exchanged. The hardware devices (called
"bridges") and the computer programs perform the necessary translations.

15.

Host:

A company which provides hosting services is called host.

16.

SLA (Service Level Agreement):

A contractual agreement by which a service provider defines the level of service, responsibilities,
priorities, and guarantees regarding availability, performance, and other aspects of the service.

Control Panels
17.

Control Panel:

Control Panel is part of the GUI, Graphical Use Interface which allows users to
control the basic settings of their system. Most widely used control panels
are Webmin, CentOS Web Panel, CPanel, Direct Admin, H-Sphere, ISP
manager, Plesk etc.

18.

CPanel:

CPanel is a web hosting control panel build to control and manipulate the
basic settings of website like emails, databases, domains, security etc. It
provides basic and necessary automation tools necessary for hosting a
website. It provides these services via web interface. It provides functionality
for administrators, resellers and end users website owners by utilizing 3 tier
structure

to

control

the

numerous

aspects

of

website

and

server

administration through a web browser.

19.

Plesk:

Plesk Panel by Parallels allows a server administrator to set up new websites, reseller accounts,
e-mail accounts, and DNS entries through a web-based interface. The administrator can create

client and site templates, which predetermine resource-allocation parameters for the domains
and/or clients.

Domain Name
20.

Domain name:

Conventionally, the name of your website is called Domain name. Suffix of your domain
indicates which TLD (Top Level Domain) it belongs to. For instance, .com, .org, .net, .gov etc.

20.

Registrar:

Registrar is the one from which you have bought your domain or technically registered.

20.

Registry:

A place where registers or records are kept.

20.

Registrant:

A person who registers something

20.

Cctld:

21.

Pending Delete:

Pending delete is the final and last stage before domain is released back to the domain market i.e.
registration of domain expires. This only occurs after quarantine.

20.

Quarantine:

Quarantine is the period in which domain is neither available for the original owner to re-register
nor available to the general public to purchase. This period occurs after the redemption period
which is explained below.

20.

Redemption:

Redemption period is the period when a domain expires, the existing registry keeps a hold on the
domain name instead of deleting it. So that the original owner of the domain can retrieve his
domain and prevent it from deletion by contacting the registrar as soon as possible.

20.

Administrative contact

20.

Technical contact

20.

Backorder

20.

Billing contact

20.

Dispute policy

20.

TLD (Top Level Domain):

TLD stands for top level domain. This is the domain with extension .com, .org, .gov etc.

20.

DNS:

Its easy to remember names or words instead of numbers (IP addresses). So the need of DNS
arises. DNS stands for Domain Name System which directs the domain names to their
corresponding IP addresses. The database of DNS is distributed and replicated among many DNS
servers. So if you change the IP address of your domain, it takes a while to change on all DNS
servers.

20.

Expiration date:

20.

Upgradation date:

20.

Creation date:

20.

Name servers /primary name server/ secondary name

20.

IAANA

20.

ICANN

20.

Internal transfer

20.

Transfer

20.

URL Forwarding

20.

Masked forwarding

20.

Renewal

20.

Infrastructure Top-level Domain (arpa)

20.

Generic Top-level Domains (gtld)

20.

Restricted Generic Top-level Domains (grtld)

20.

Sponsored Top-level Domains (stld)

20.

Country Code Top-level Domains (cctld)

20.

Test Top-level Domains (ttld)

20.

Gtld

20.

Whois:

Whois is an internet service that offers information about the owners of the domain names.

IP
54. IP address:
IP address stands for Internet Protocol Address necessary for communication. Everything in the
universe requires a specific identity. Therefore, in the world of internet IP addresses were
introduced to identify all the devices connected to the internet. An IP address is a unique number
shown in groups from 0 to 255, separated by periods (.). Each group is of 8 bits which implies
that an IP address is of 32 bits. For Example, 192.168.1.1, 156.1.255.148 etc.
A name indicates what we seek. An address indicates where it is. A route indicates how to get
there.

55.

LAN (Local Area Network):

LAN, Local Area Network is a computer network that interconnects computers within a limited
area like same building of office, school, residence or laboratory.

Shared Hosting
57.

Shared Web Hosting:

In shared web hosting many websites reside on a server and share resources of a single server.
Each website uses its own partition or section/place on the server for its operations. This helps to
keep it separate from other sites.

57.

Spam:

Unsolicited or irrelevant messages sent over the internet usually to a large number of
group of people for the purpose of advertisement or selling something. It is also called
junk email or unsolicited bulk email.

57.

Traffic:

Traffic can be easily defined as the number of users on a website. Technically it is the load on a
communication device or a system.

57.

Load Balancing:

Load balancing is a computer networking methodology used to share or distribute load in order
to minimize response time, get rid of overload, maximize throughput and to achieve resource
optimal resource utilization. It distributes workload across multiple computers or a computer
cluster, network links, central processing units, disk drives, or other resources.

57.

Service migration

57.

Service provider

Languages, Scripts
63.

VB Script:

The Microsoft Visual Basic programming language, is a fast, portable, lightweight interpreter for
use in World Wide Web browsers and other applications that use Microsoft ActiveX Controls,
Automation servers, and Java applets.

63.

ASP.NET (Active Server Pages):

ASP.net is a server side scripting language developed by Microsoft. It is


abbreviated as Active Server Pages and is also used to develop web pages
with .asp extension. HTML and scripting code are mixed by ASP. Scripting
code is written in VBScript or Jscript. ASP.NET is also a fundamental part of
Microsofts .NET framework.

63.

CSS (Cascading Style Sheets):

CSS, Cascading style sheets is used to apply different design styles to


multiple web pages. These design styles are contained in a CSS file. Changes
to formats can be easily applied by using an external CSS file. So using an
external CSS file gives you the benefit to easily change formats and prevents
the need of changing every web page.

63.

PHP:

PHP stands for Hypertext Pre-processor. Its an open source server side scripting language used
for general purposes and web development. PHP files have extension .php and its code can be
embedded into HTML.

63.

Java:

Sun Microsystems introduced a network-oriented programming language that is specifically


designed for writing programs that can be securely downloaded to your computer via Internet
and immediately run without headache of dealing with viruses or other harm to your computer or
files. Small Java programs are called "Applets". Web pages can include functions such as
animations using these applets.

63.

Round Robin:

Round-robin is one of the simplest scheduling algorithms for processes in an operating system.
As the term is generally used, time slices are assigned to each process in equal portions and in
circular order, handling all processes without priority.

63.

MySQL:

MySQL (My Structured Query Language) is the most commonly used RDBMS, relationship
database management system. It was named after the daughter of its co-founder Michael
Widenius.

63.

Perl:

Perl is the open source scripting language for CGI scripts. Powerful text manipulation facilities
of Perl makes it one of the best and most popular web programming languages.

Protocols:
71.

HTTP

71.

RDP

71.

Telnet

71.

SSH

71.

WIFI/WIMAX Protocols

71.

Bluetooth protocol

71.

Fibre Channel network protocols

71.

Internet Protocol Suite or TCP/IP model or TCP/IP stack

71.

IP / ipv4

71.

IPv6

71.

SSH Secure Shell

71.

SMB Server Message Block, one version of which was

also known as CIFS (Common Internet File System)


71.

FTP (File Transfer Protocol):

File Transfer Protocol, as the name describes, is used to transfer (download and upload) files
between client (your computer) and server (your webhosting area). Widely used software for
FTP are Leech FTP, Filezilla, Cute FTP, Cyberduck, SmartFTP, Flash FXP etc.

71.

SMTP Simple Mail Transfer Protocol

71.

TCP Transmission Control Protocol

71.

Telnet Telephone Network

71.

HTTP Hyper Text Transfer Protocol

71.

HTTPs Secure Hyper Text Transfer Protocol

71.

POP Post Office Protocol

71.

MTP Media Transfer Protocol

71.

SFTP Secure File Transfer Protocol

71.

TLS Transport Layer Security

71.

NTP Network time protocol

71.

PPP Point to Point Protocol

71.

NNTP Network News Transfer Protocol

71.

IMAP Internet Message Access Protocol

MISC
97.

E-Commerce:

Electronic Commerce refers to the general exchange of goods and services via the Internet.

98.

URL (Uniform Resource Locator):

Uniform Source Locator is the web address which is typed in the address bar to access a website.
Domain name and TLD together make a web address or URL.

99.

Browser:

Browser is your gateway to the World Wide Web. It is computer software or


an android application which allows everyone to access web pages anywhere
in the world. For Example, Google Chrome, Mozilla Firefox, Safari, Internet
Explorer etc.

Operating System
100. Kernel:
Kernel is the central module of an operating system, it loads first and remains in memory to
control memory management, disk management, and process and task management. It stays as
small as possible while still providing all the essential nutrients required by other applications
therefore, it is called a kernel.

101.
102.
103.
104.

Linux:
Windows
Unix
Linux flavours
a. Ubuntu
b. Fedora
c. Debian

d. Centos
e. Opensuse
f. Slackware linux

Cloud
105. CDN (Content Delivery Network):
Content delivery network is a system which consists of multiple computers. These computers
contain copies of data and these computers are located at different places on the network so the
users can access the copy closest to them.

106. Cloud:
Cloud is a basically a metaphorical word for the global internet network. Data stored on
the cloud means data that can be accessed from anywhere in the world through internet.
Its better to store data on the cloud rather than on your computers hard drive because
that can be accessed by you wherever you go.

107.

Cloud Application:

Cloud application is a software accessed over the internet via web browser and that is never
installed on your local machine. The top layer of the Cloud Pyramid where applications are
run and interacted with via a web-browser. Cloud Applications are tightly controlled, leaving
little room for modification. Examples include: Gmail or SalesForce.com.

107.

Cloud Arcs:

It is a short form for cloud architectures. Cloud arcs are the designs for software applications that
can be accessed and used over the internet.

107.

Cloud as a service (CaaS):

Cloud as a service is a cloud computing service that can be regarded as a platform for others to
build upon.

107.

Cloudburst:

What about if your cloud encounters an outage or security breach and your data is unavailable.
The term cloudburst has dual meanings, negative and positive:

a. Cloudburst (negative):
The failure of a cloud computing environment due to the inability to handle a spike in demand.

b. Cloudburst (positive):
The dynamic deployment of a software application that runs on internal organizational compute
resources to a public cloud to address a spike in demand.

107.

Cloud Center:

A data center in the cloud which utilizes standards-based virtualized components as a


datacenter-like infrastructure. For Example, a large company, such as Amazon, that rents its
infrastructure to Netflix and Pinterest.

107.

Cloud Client:

A cloud client is specifically designed for delivery of cloud services and it consists of computer
hardware and/or software that relies on cloud computing for application delivery and that, in
either case, is essentially useless without cloud services. For example some computers, phones
and other devices, operating systems and browsers.

107.

Cloud Hosting:

It is a type of internet hosting in which the client leases virtualized, dynamically scalable
infrastructure on an as-needed basis. Users frequently have the choice of operating system and
other infrastructure components. Typically cloud hosting is self-service, billed hourly or monthly,
and controlled via a web interface or API.

107.

Cloud OS:

A computer operating system that is specially designed to run in a providers datacenter and be
delivered to the user over the Internet or another network. Windows Azure is an example of a
cloud operating system or cloud layer that runs on Windows Server 2008. The term is also
sometimes used to refer to cloud-based client operating systems such as Googles Chrome OS.

107.

Cloud Provider:

A company that provides cloud-based platform, infrastructure, application, or storage services to


other organizations and/or individuals, usually for a fee.

107.

Cloud Security:

The same security principles that apply to on-site computing apply to cloud computing security.

107.

Cloud Servers:

Virtualized servers running Windows or Linux operating systems that are instantiated via a web
interface or API. Cloud Servers behave in the same manner as physical ones and can be
controlled at an administrator or root level, depending on the server type and Cloud Hosting
provider.

107.

Cloud Storage:

A service that allows customers to save data by transferring it over the Internet or another
network to an offsite storage system maintained by a third party.

107.

Cloud ware:

A general term referring to a variety of software, typically at the infrastructure level, that enables
building, deploying, running or managing applications in a cloud computing environment.

107.

Cluster:

A group of linked computers that work together as if they were a single computer, for high
availability and/or load balancing.

107.

Consumption-based pricing model/Pay as you go:

A pricing model whereby the service provider charges its customers based on the amount of the
service the customer consumes, rather than a time-based fee. For example, a cloud storage
provider might charge per gigabyte of information stored.

107.

Subscription-based pricing model:

A pricing model that lets customers pay a fee to use the service for a particular time period, often
used for SaaS services.

107.

Disruptive technology:

A term used in the business world to describe innovations that improve products or services in
unexpected ways and change both the way things are done and the market. Cloud computing is
often referred to as a disruptive technology because it has the potential to completely change the
way IT services are procured, deployed, and maintained.

107.

Elasticity and Scalability:

The cloud is elastic, meaning that resource allocation can get bigger or smaller depending on
demand. Elasticity enables scalability, which means that the cloud can scale upward for peak
demand and downward for lighter demand. Scalability also means that an application can scale
when adding users and when application requirements change.

107.

Hosted Application:

An Internet-based or Web-based application software program that runs on a remote server and
can be accessed via an Internet-connected PC or thin client. For example, Microsoft office
online.

107.

Hybrid Cloud:

A networking environment that includes multiple integrated internal and/or external providers.
Hybrid clouds combine aspects of both public and private clouds.

107.

Infrastructure as a Service (IaaS):

Cloud infrastructure services or Infrastructure as a Service (IaaS) delivers computer


infrastructure, typically a platform virtualization environment, as a service. Rather than
purchasing servers, software, data center space or network equipment, clients instead buy those
resources as a fully outsourced service. The service is typically billed on a utility computing
basis and amount of resources consumed (and therefore the cost) will typically reflect the level
of activity. It is an evolution of web hosting and virtual private server offerings.

107.

PaaS (Platform as a Service):

Platform as a service Cloud platform services, whereby the computing platform (operating
system and associated services) is delivered as a service over the Internet by the provider. The
PaaS layer offers black-box services with which developers can build applications on top of the
compute infrastructure. This might include developer tools that are offered as a service to build
services, or data access and database services, or billing services. For example, Microsoft Azure.

107.

SaaS (Software as a Service):

Cloud application services, whereby applications are delivered over the Internet by the provider,
so that the applications dont have to be purchased, installed, and run on the customers
computers. SaaS providers were previously referred to as ASP (application service providers). In
the SaaS layer, the service provider hosts the software so you dont need to install it, manage it,
or buy hardware for it. All you have to do is connect and use it. SaaS Examples include customer
relationship management as a service.

107.

Internal Cloud:

A type of private cloud whose services are provided by an IT department to those in its own
organization.

107.

Personal Cloud:

It synonymous with something called MiFi, a personal wireless router. It takes a mobile wireless
data signal and translates it to Wi-Fi. Its pronounced ME-fi, as in the personal cloud belongs to
me but if youre nice Ill let you connect.

107.

Private clouds:

Private clouds virtualized cloud data centers inside your companys firewall. It may also be a
private space dedicated to your company within a cloud providers data center. An internal cloud
behind the organizations firewall. The companys IT department provides softwares and
hardware as a service to its customers the people who work for the company. Vendors love the
words private cloud.

107.

Public Cloud:

Services offered over the public Internet and available to anyone who wants to purchase the
service.

107.

Vertical Cloud:

A cloud computing environment that is optimized for use in a particular industry, such as health
care or financial services.

107.

Virtual Private Data Center:

Resources grouped according to specific business objectives.

Famous cloud services

141.

Windows Live Services:

Microsofts cloud-based consumer applications, which include Windows Live Mail, Windows
Live Photo Gallery, Windows Live Calendar, Windows Live Events, Windows Live SkyDrive,
Windows Live Spaces, Windows Live Messenger, Windows Live Writer, and Windows Live for
Mobile.

141.

Amazon ec2:

Amazon e

141.

Microsoft Azure:

Microsoft cloud services that provide the platform as a service (see PaaS), allowing developers
to create cloud applications and services.

141.

Google Apps:

Googles SaaS offering that includes an office productivity suite, email, and document sharing,
as well as Gmail, Google Talk for instant messaging, Google Calendar and Google Docs,
spreadsheets, and presentations.

145.

Encryption:

Encryption is the process of converting data into a form called cipher text, in which messages or
information is encoded in such a way that only authorized people can access it. Unencrypted data
is called plain text.

145.

Decryption:

The process of converting encrypted data into plain text is called decryption.

Cloud is a marketing term / It means little different to everyone /


except for some basic properties.

Elastic
Scalable
Move
What is cloud (computing clouds, database clouds, storage clouds?)
IaaS
PaaS
SaaS
Vertical Cloud
Cloud Arcs

You might also like