Most Often Used Networking Terminology in Business Objects Product Suite

Some of the Networking terminology which is used in the "Business Objects" Product Suite:-

1) Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, Apache has been ported to Windows and other network operating systems (NOS). The name "Apache" derives from the word "patchy" that the Apache developers used to describe early versions of their software.

Apache provides a full range of Web server features, including CGI, SSL, and virtual domains. Apache also supports plug-in modules for extensibility. Apache is reliable, free, and relatively easy to configure.

The Apache HTTP server is free software distributed by the Apache Software Foundation. The Apache Software Foundation promotes various free and open source advanced Web technologies.

2) An API (Appilication Programming Interface) allows computer programmers to access the functionality of pre-built software modules. An API defines data structures and subroutine calls. Networking APIs are entry points to libraries that implement network and data communication protocols.

3) The word "cluster" is used broadly in computer networking to refer to a number of different implementations of shared computing resources. Typically, a cluster integrates the resources of two or more computing devices (that could otherwise function separately) together for some common purpose.

A Web server farm (a collection of networked Web servers, each with access to content on the same site) function as a cluster conceptually. However, purists may debate the classification of a server farm as a cluster, depending on the details of the hardware and software configuration. It is important to recognize that network clustering involves a long past history of research and development with many offshoots and variations.

4) The term "crash" refers to a critical failure in a computer, network device, or software. Crashes often occur with little or no warning. As evidenced by the number of different synonyms employed over the years, crashes have a long and colorful history in computer networking.

5) DMZ (De-Militarized Zone) is a firewall configuration for securing local area networks (LANs).

In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet. One or more computers also run outside the firewall, in the DMZ. Those computers on the outside intercept traffic and broker requests for the rest of the LAN, adding an extra layer of protection for computers behind the firewall.

Traditional DMZs allow computers behind the firewall to initiate requests outbound to the DMZ. Computers in the DMZ in turn respond, forward or re-issue requests out to the Internet or other public network, as proxy servers do. The LAN firewall, though, prevents computers in the DMZ from initiating inbound requests.

6) The DNS (Domain Name Server) translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites.

DNS implements a distributed database to store this name and address information for all public hosts on the Internet. DNS assumes IP addresses do not change (are statically assigned rather than dynamically assigned).

7) An extranet is a computer network that allows controlled access from the outside for specific business or educational purposes. Extranets are extensions to, or segments of, private intranet networks that have been built in many corporations for information sharing and ecommerce.

8) Filesharing in computer networking involves copying files from one computer to another using a live network connection. Filesharing is sometimes called "file swapping."

9) A network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two.

Network firewalls guard an internal computer network (home, school, business intranet) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users.

10) FTP allows one to transfer files between computers on the Internet. Technically, FTP is a simple network protocol based on IP, but many also use the term "FTP" to refer to this type of file sharing service.

The FTP service is based on a client/server architecture. An FTP client program initiates a connection to a remote computer running FTP server software. After the connection is established, the client can choose to send and/or receive copies of files, singly or in groups. To connect to an FTP server, a client generally requires a username and password as set by the administrator of the server.

11) HTTP (Hyper Text Transfer Protocol) is an application layer network protocol built on top of TCP. HTTP allows Web browsers and Web servers to communicate. HTTP clients and servers communicate via request and response messages.

HTTP utilizes TCP port 80 by default, though other ports such as 8080 are also used.

12) A hub is a small, simple, inexpensive network device that joins multiple computers together.

13) IIS (Internet Information Server) is Microsoft's business-class Web server. Although Apache boasts more total worldwide installations than IIS, many corporations choose IIS as their Web server because it is supported by a commercial organization.

14) Intranet is the generic term for a collection of private computer networks within an organization. Intranets are communication tools designed to enable easy information sharing within workgroups.

15) Ping (Packet Internet Gopher) is the name of a standard network utility packaged with popular network operating systems. The utility can be used to determine if a remote device (such as Web or game server) can be reached on the network and, if so, roughly how fast the current connection is.

16) A port number represents an endpoint or "channel" for network communications. Port numbers allow different applications on the same computer to utilize network resources without interfering with each other.

17) A VPN (Virtual Private Network) utilizes public telecommunications networks to conduct private data communications. Most VPN implementations use the Internet as the public infrastructure and a variety of specialized protocols to support private communications through the Internet.

18) A WAN (Wide Area Networks) spans a large geographic area, such as a state, province or country. WANs often connect multiple smaller networks, such as local area networks (LANs) or metro area networks (MANs).

19) In computer networking, a workgroup is a collection of computers on a local area network (LAN) that share common resources and responsibilities. Workgroups provide easy sharing of files, printers and other network resources. Being a peer-to-peer (P2P) network design, each workgroup computer may both share and access resources if configured to do so.

20) Authentication is a procedure that establishes the legitimacy of users and defines the parameters of the sessions they establish. As such, authentication can be thought of as a security measure that controls and defines network access. It is always the first part of a session; the range of authentication parameters that can be set depend upon the specific authentication system employed.