Professional Documents
Culture Documents
Dedicated Servers/VPS
1. Dedicated Server:
Dedicated server, a type of internet hosting in which an entire server is leased by the client
which is not shared with anyone. It is more secure and better than shared hosting as organizations
have complete control over their server including many aspects like hardware, selection of
operating system etc.
Propagation:
When DNS is updated to DNS servers, this process is call propagation. It takes up to 72 hours.
Its concern is with those who have just bought, transferred or updated a domain.
4. Data Transfer:
Data Transfer is that amount of data that can be transferred or the total capacity of information
that can be consumed over your servers network. In Webhosting, Data Transfer offered is
usually for a period of one month.
5.
Disk Space:
A specific amount of space called disk space, is allocated to your account from servers disk
storage in which you can store your log files, HTML files, audio clips, graphics and all other
files necessary to make up your website including email messages.
6. Guaranteed RAM:
Guaranteed RAM is the RAM allocated to VPS and meant to be available always no matter how
much RAM is used by other VPSs.
7. Bandwidth:
In a digital communication system, bandwidth can be defined as the net bit rate that can be
transmitted in a fixed amount of time (usually a second). It is also known as peak bit rate
expressed in bits per second (bps) or bytes per second. But in modern networks, speed is
measured in millions of bits per second (Mbps) or billions of bit per second (Gbps). It is also
important to note that in terms of web hosting services and computer networks bandwidth is
incorrectly used as a synonym for Data Transfer.
8. Burstable RAM:
Burstable RAM is the RAM provided to VPS (Virtual Private Servers) on a
server which comes into play when the usage exceeds from the allocated
amount of guaranteed RAM. So in other words Burstable RAM is the RAM
which can be used in emergency by VPS when it encounters high amount of
traffic. During normal traffic, this RAM is not used by any VPS on a server and
can be allocated to any VPS on a server in case of need. But this is not a RAM
to be constantly dependent upon because it is not guaranteed to be
available always.
For Example, If 2GB of guaranteed RAM is available for your VPS with 2GB
Burstable RAM then 2GB of Burstable RAM can be used after you have
consumed your guaranteed RAM.
in
scripting
languages like
Perl but
can
be
written
in
any
10.
SSL, the secure socket layer is used for safe and secure transmission of private and confidential
data over the internet by encrypting it. For example, credit card numbers by using https protocol.
11.
SSL certificate:
SSL certificate ensures secure communication. For online business or transactions, it is necessary
build trust with your customers which is made sure by SSL certificate. SSL certificate is installed
on pages for the end users to submit sensitive information like passwords, credit cards etc. It is
intended for many purposes e.g. to ensure the identity of remote computer, prove the identity of
remote computer etc.
12.
Data Protection Act gives you the right to know the information held about you. DPA governs the
rules to make sure this data or information is processed properly.
13. Firewall:
A firewall is a device or a set of devices in which instructions are set up for network
transmissions. A firewall permits or denies network transmissions according to predefined set of
rules. Networks are protected from unauthorized access with the help of firewalls but
communications which are legitimate are allowed to pass.
It can also be regarded as a network security system that monitors and controls the incoming and
outgoing network traffic based on predefined security rules.
14.
Gateway:
Gateway is a system for exchanging information across networks that are incompatible and use
different protocols. It is basically a combination of hardware and software that connects two
different networks so that information can be exchanged. The hardware devices (called
"bridges") and the computer programs perform the necessary translations.
15.
Host:
16.
A contractual agreement by which a service provider defines the level of service, responsibilities,
priorities, and guarantees regarding availability, performance, and other aspects of the service.
Control Panels
17.
Control Panel:
Control Panel is part of the GUI, Graphical Use Interface which allows users to
control the basic settings of their system. Most widely used control panels
are Webmin, CentOS Web Panel, CPanel, Direct Admin, H-Sphere, ISP
manager, Plesk etc.
18.
CPanel:
CPanel is a web hosting control panel build to control and manipulate the
basic settings of website like emails, databases, domains, security etc. It
provides basic and necessary automation tools necessary for hosting a
website. It provides these services via web interface. It provides functionality
for administrators, resellers and end users website owners by utilizing 3 tier
structure
to
control
the
numerous
aspects
of
website
and
server
19.
Plesk:
Plesk Panel by Parallels allows a server administrator to set up new websites, reseller accounts,
e-mail accounts, and DNS entries through a web-based interface. The administrator can create
client and site templates, which predetermine resource-allocation parameters for the domains
and/or clients.
Domain Name
20.
Domain name:
Conventionally, the name of your website is called Domain name. Suffix of your domain
indicates which TLD (Top Level Domain) it belongs to. For instance, .com, .org, .net, .gov etc.
20.
Registrar:
Registrar is the one from which you have bought your domain or technically registered.
20.
Registry:
20.
Registrant:
20.
Cctld:
21.
Pending Delete:
Pending delete is the final and last stage before domain is released back to the domain market i.e.
registration of domain expires. This only occurs after quarantine.
20.
Quarantine:
Quarantine is the period in which domain is neither available for the original owner to re-register
nor available to the general public to purchase. This period occurs after the redemption period
which is explained below.
20.
Redemption:
Redemption period is the period when a domain expires, the existing registry keeps a hold on the
domain name instead of deleting it. So that the original owner of the domain can retrieve his
domain and prevent it from deletion by contacting the registrar as soon as possible.
20.
Administrative contact
20.
Technical contact
20.
Backorder
20.
Billing contact
20.
Dispute policy
20.
TLD stands for top level domain. This is the domain with extension .com, .org, .gov etc.
20.
DNS:
Its easy to remember names or words instead of numbers (IP addresses). So the need of DNS
arises. DNS stands for Domain Name System which directs the domain names to their
corresponding IP addresses. The database of DNS is distributed and replicated among many DNS
servers. So if you change the IP address of your domain, it takes a while to change on all DNS
servers.
20.
Expiration date:
20.
Upgradation date:
20.
Creation date:
20.
20.
IAANA
20.
ICANN
20.
Internal transfer
20.
Transfer
20.
URL Forwarding
20.
Masked forwarding
20.
Renewal
20.
20.
20.
20.
20.
20.
20.
Gtld
20.
Whois:
Whois is an internet service that offers information about the owners of the domain names.
IP
54. IP address:
IP address stands for Internet Protocol Address necessary for communication. Everything in the
universe requires a specific identity. Therefore, in the world of internet IP addresses were
introduced to identify all the devices connected to the internet. An IP address is a unique number
shown in groups from 0 to 255, separated by periods (.). Each group is of 8 bits which implies
that an IP address is of 32 bits. For Example, 192.168.1.1, 156.1.255.148 etc.
A name indicates what we seek. An address indicates where it is. A route indicates how to get
there.
55.
LAN, Local Area Network is a computer network that interconnects computers within a limited
area like same building of office, school, residence or laboratory.
Shared Hosting
57.
In shared web hosting many websites reside on a server and share resources of a single server.
Each website uses its own partition or section/place on the server for its operations. This helps to
keep it separate from other sites.
57.
Spam:
Unsolicited or irrelevant messages sent over the internet usually to a large number of
group of people for the purpose of advertisement or selling something. It is also called
junk email or unsolicited bulk email.
57.
Traffic:
Traffic can be easily defined as the number of users on a website. Technically it is the load on a
communication device or a system.
57.
Load Balancing:
Load balancing is a computer networking methodology used to share or distribute load in order
to minimize response time, get rid of overload, maximize throughput and to achieve resource
optimal resource utilization. It distributes workload across multiple computers or a computer
cluster, network links, central processing units, disk drives, or other resources.
57.
Service migration
57.
Service provider
Languages, Scripts
63.
VB Script:
The Microsoft Visual Basic programming language, is a fast, portable, lightweight interpreter for
use in World Wide Web browsers and other applications that use Microsoft ActiveX Controls,
Automation servers, and Java applets.
63.
63.
63.
PHP:
PHP stands for Hypertext Pre-processor. Its an open source server side scripting language used
for general purposes and web development. PHP files have extension .php and its code can be
embedded into HTML.
63.
Java:
63.
Round Robin:
Round-robin is one of the simplest scheduling algorithms for processes in an operating system.
As the term is generally used, time slices are assigned to each process in equal portions and in
circular order, handling all processes without priority.
63.
MySQL:
MySQL (My Structured Query Language) is the most commonly used RDBMS, relationship
database management system. It was named after the daughter of its co-founder Michael
Widenius.
63.
Perl:
Perl is the open source scripting language for CGI scripts. Powerful text manipulation facilities
of Perl makes it one of the best and most popular web programming languages.
Protocols:
71.
HTTP
71.
RDP
71.
Telnet
71.
SSH
71.
WIFI/WIMAX Protocols
71.
Bluetooth protocol
71.
71.
71.
IP / ipv4
71.
IPv6
71.
71.
File Transfer Protocol, as the name describes, is used to transfer (download and upload) files
between client (your computer) and server (your webhosting area). Widely used software for
FTP are Leech FTP, Filezilla, Cute FTP, Cyberduck, SmartFTP, Flash FXP etc.
71.
71.
71.
71.
71.
71.
71.
71.
71.
71.
71.
71.
71.
MISC
97.
E-Commerce:
Electronic Commerce refers to the general exchange of goods and services via the Internet.
98.
Uniform Source Locator is the web address which is typed in the address bar to access a website.
Domain name and TLD together make a web address or URL.
99.
Browser:
Operating System
100. Kernel:
Kernel is the central module of an operating system, it loads first and remains in memory to
control memory management, disk management, and process and task management. It stays as
small as possible while still providing all the essential nutrients required by other applications
therefore, it is called a kernel.
101.
102.
103.
104.
Linux:
Windows
Unix
Linux flavours
a. Ubuntu
b. Fedora
c. Debian
d. Centos
e. Opensuse
f. Slackware linux
Cloud
105. CDN (Content Delivery Network):
Content delivery network is a system which consists of multiple computers. These computers
contain copies of data and these computers are located at different places on the network so the
users can access the copy closest to them.
106. Cloud:
Cloud is a basically a metaphorical word for the global internet network. Data stored on
the cloud means data that can be accessed from anywhere in the world through internet.
Its better to store data on the cloud rather than on your computers hard drive because
that can be accessed by you wherever you go.
107.
Cloud Application:
Cloud application is a software accessed over the internet via web browser and that is never
installed on your local machine. The top layer of the Cloud Pyramid where applications are
run and interacted with via a web-browser. Cloud Applications are tightly controlled, leaving
little room for modification. Examples include: Gmail or SalesForce.com.
107.
Cloud Arcs:
It is a short form for cloud architectures. Cloud arcs are the designs for software applications that
can be accessed and used over the internet.
107.
Cloud as a service is a cloud computing service that can be regarded as a platform for others to
build upon.
107.
Cloudburst:
What about if your cloud encounters an outage or security breach and your data is unavailable.
The term cloudburst has dual meanings, negative and positive:
a. Cloudburst (negative):
The failure of a cloud computing environment due to the inability to handle a spike in demand.
b. Cloudburst (positive):
The dynamic deployment of a software application that runs on internal organizational compute
resources to a public cloud to address a spike in demand.
107.
Cloud Center:
107.
Cloud Client:
A cloud client is specifically designed for delivery of cloud services and it consists of computer
hardware and/or software that relies on cloud computing for application delivery and that, in
either case, is essentially useless without cloud services. For example some computers, phones
and other devices, operating systems and browsers.
107.
Cloud Hosting:
It is a type of internet hosting in which the client leases virtualized, dynamically scalable
infrastructure on an as-needed basis. Users frequently have the choice of operating system and
other infrastructure components. Typically cloud hosting is self-service, billed hourly or monthly,
and controlled via a web interface or API.
107.
Cloud OS:
A computer operating system that is specially designed to run in a providers datacenter and be
delivered to the user over the Internet or another network. Windows Azure is an example of a
cloud operating system or cloud layer that runs on Windows Server 2008. The term is also
sometimes used to refer to cloud-based client operating systems such as Googles Chrome OS.
107.
Cloud Provider:
107.
Cloud Security:
The same security principles that apply to on-site computing apply to cloud computing security.
107.
Cloud Servers:
Virtualized servers running Windows or Linux operating systems that are instantiated via a web
interface or API. Cloud Servers behave in the same manner as physical ones and can be
controlled at an administrator or root level, depending on the server type and Cloud Hosting
provider.
107.
Cloud Storage:
A service that allows customers to save data by transferring it over the Internet or another
network to an offsite storage system maintained by a third party.
107.
Cloud ware:
A general term referring to a variety of software, typically at the infrastructure level, that enables
building, deploying, running or managing applications in a cloud computing environment.
107.
Cluster:
A group of linked computers that work together as if they were a single computer, for high
availability and/or load balancing.
107.
A pricing model whereby the service provider charges its customers based on the amount of the
service the customer consumes, rather than a time-based fee. For example, a cloud storage
provider might charge per gigabyte of information stored.
107.
A pricing model that lets customers pay a fee to use the service for a particular time period, often
used for SaaS services.
107.
Disruptive technology:
A term used in the business world to describe innovations that improve products or services in
unexpected ways and change both the way things are done and the market. Cloud computing is
often referred to as a disruptive technology because it has the potential to completely change the
way IT services are procured, deployed, and maintained.
107.
The cloud is elastic, meaning that resource allocation can get bigger or smaller depending on
demand. Elasticity enables scalability, which means that the cloud can scale upward for peak
demand and downward for lighter demand. Scalability also means that an application can scale
when adding users and when application requirements change.
107.
Hosted Application:
An Internet-based or Web-based application software program that runs on a remote server and
can be accessed via an Internet-connected PC or thin client. For example, Microsoft office
online.
107.
Hybrid Cloud:
A networking environment that includes multiple integrated internal and/or external providers.
Hybrid clouds combine aspects of both public and private clouds.
107.
107.
Platform as a service Cloud platform services, whereby the computing platform (operating
system and associated services) is delivered as a service over the Internet by the provider. The
PaaS layer offers black-box services with which developers can build applications on top of the
compute infrastructure. This might include developer tools that are offered as a service to build
services, or data access and database services, or billing services. For example, Microsoft Azure.
107.
Cloud application services, whereby applications are delivered over the Internet by the provider,
so that the applications dont have to be purchased, installed, and run on the customers
computers. SaaS providers were previously referred to as ASP (application service providers). In
the SaaS layer, the service provider hosts the software so you dont need to install it, manage it,
or buy hardware for it. All you have to do is connect and use it. SaaS Examples include customer
relationship management as a service.
107.
Internal Cloud:
A type of private cloud whose services are provided by an IT department to those in its own
organization.
107.
Personal Cloud:
It synonymous with something called MiFi, a personal wireless router. It takes a mobile wireless
data signal and translates it to Wi-Fi. Its pronounced ME-fi, as in the personal cloud belongs to
me but if youre nice Ill let you connect.
107.
Private clouds:
Private clouds virtualized cloud data centers inside your companys firewall. It may also be a
private space dedicated to your company within a cloud providers data center. An internal cloud
behind the organizations firewall. The companys IT department provides softwares and
hardware as a service to its customers the people who work for the company. Vendors love the
words private cloud.
107.
Public Cloud:
Services offered over the public Internet and available to anyone who wants to purchase the
service.
107.
Vertical Cloud:
A cloud computing environment that is optimized for use in a particular industry, such as health
care or financial services.
107.
141.
Microsofts cloud-based consumer applications, which include Windows Live Mail, Windows
Live Photo Gallery, Windows Live Calendar, Windows Live Events, Windows Live SkyDrive,
Windows Live Spaces, Windows Live Messenger, Windows Live Writer, and Windows Live for
Mobile.
141.
Amazon ec2:
Amazon e
141.
Microsoft Azure:
Microsoft cloud services that provide the platform as a service (see PaaS), allowing developers
to create cloud applications and services.
141.
Google Apps:
Googles SaaS offering that includes an office productivity suite, email, and document sharing,
as well as Gmail, Google Talk for instant messaging, Google Calendar and Google Docs,
spreadsheets, and presentations.
145.
Encryption:
Encryption is the process of converting data into a form called cipher text, in which messages or
information is encoded in such a way that only authorized people can access it. Unencrypted data
is called plain text.
145.
Decryption:
The process of converting encrypted data into plain text is called decryption.
Elastic
Scalable
Move
What is cloud (computing clouds, database clouds, storage clouds?)
IaaS
PaaS
SaaS
Vertical Cloud
Cloud Arcs