IIS stands for Internet Information Services which is a web server software from Microsoft. This web server comes built-in with Windows NT 4.0 and Windows 2000 server operating systems. As IIS is tightly integrated with the operating system, it is quite easy to administer.
IMAP stands for Internet Message Access Protocol. It is a program that allows a local client to access e-mail or bulletin board messages that are stored on a remote mail server. The protocol includes operations for creating, deleting and renaming mailboxes, checking for new messages, message parsing, searching, and setting and clearing flags. IMAP was originally designed by Mark Crispin in 1986 at Stanford as a remote Mailbox protocol. Earlier it was also known as Internet Mail Access Protocol, Interactive Mail Access Protocol and Interim Mail Access Protocol. The current version is IMAP version 4 revision 1 (IMAP4rev1).
Internet Group Management Protocol (IGMP) is a network control protocol that runs on top of the IP protocol. This protocol is used by Internet hosts for maintaining informations related to multicast. It is necessary for machines to have the IGMP implemented for using multicast. IGMP, the communication protocol can be used for online video and gaming. For managing the membership of Internet protocol multicast groups, there is nothing best than IGMP.
InterNIC is the short form for Internet Network Information Center. This was a registered service mark of the U.S. Department of Commerce which assigned domain name registration for .com, .net and .org domains. Now, this role was assumed by the ICANN body. During its active period, it was accessed through the website internic.net which was run by Network Solutions, Inc and AT&T.
The InterNIC is currently an informational Web site that provides the public with informations related to domain name registration.
Intranet is a private computer network based on TCP/IP protocols that belongs to an organization or a corporation. This private network can be accessed only by authorized members, employees and individuals of the organization to share informations or operations. Any unauthorized access gets fends off by the firewall surrounding the Intranet. The websites in an Intranet look and act just like any other web sites.
An intranet is very similar to the Internet as it offers the same services and uses the same protocols. It is not wrong to say that Intranet is a private version of the Internet.
IP which stands for Internet Protocol is the main protocol used on the Internet by which data is sent from one computer to another. It is a data-oriented protocol used for communicating data across a packet-switched internetwork. It identifies devices connected to the Internet including computers/servers, printers and modems. The location of each device is described using an address.
IP Address or Internet Protocol Address is a unique number that identifies all devices connected to an internal network or the Internet. The format of an IP address is a 32-bit numeric address divided into four parts and are separated by periods. Each number can be in between 0 to 255. For example say 18.104.22.168. could be an IP address.
Every client, server and network device must have a unique IP address for each network connection (network interface). The IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA).
An IP packet or Internet Protocol Packet is a chunk of data that can be sent over the Internet using standard Internet Protocol (IP). All the data is partitioned into IP packets on the sending computer and reassembled on the receiving computer. Each packet starts with a header that contains informations related to addressing and system control. Depending on the amount of the data being transmitted, the length of the IP packets differ.
IPX which stands for Internetwork Packet Exchange is a datagram or packet protocol. It is the connectionless OSI-model Network layer protocol in the IPX/SPX protocol stack. This networking protocol is used by the Novell NetWare operating systems.
ISP or Internet Service Provider is a company that provides its subscribers with access to the Internet and related services. Subscribers with their username and password can dial-up or use a cable or DSL line to connect to ISP’s network which is connected to the Internet. Presently, the biggest ISP is AOL.
Earlier, ISPs were run by the phone companies only, but any individual or group with enough money and expertise can start an ISP company. Different ISPs are connected to one another through Network Access Points (NAPs). Some times, an ISP is also referred to as an IAP (Internet access provider).
IP Number or Internet Protocol Number is also referred sometimes as a dotted quad. It is a unique number consisting of 4 parts separated by dots, like 22.214.171.124 that gives specific identity to a computer on the Internet. If a computer does not have an IP number, then it is not really on the Internet. No two computers can have the same IP number.
JDBC is the short form for Java Database Connectivity. It is an application programming interface (API) that allows the Java programming language to execute SQL statements. It shows how a client may access different databases and ways for querying and updating data in a database. JDBC is oriented towards relational databases.
kbps stands for Kilobits per second is a measuring unit that is used to measure the speed of transmission in a digital connection. Modems are measured in Kbps. One Kbps is equal to 1,000bps (Bits per second). However, it is sometimes mistaken to as 1,024 bps with the wrong use of kilo prefix. Technically, kbps should be spelled with a lowercase ‘k’ to indicate that it is decimal but most of the times it is spelled with a capital K.
A kilobyte, derived from the SI prefix kilo, is a unit used for measuring the memory capacity. This is a unit of information or computer storage that is equal to either 1024 or 1000 bytes, depending on the context. Kilobyte is usually abbreviated as K or KB. For example, 128K of RAM means a computer has 256,000 bytes of Random Access Memory.
LAN which stands for Local Area Network is a computer network that spans a small geographical area like a home, office or a group of buildings. However, one LAN can be connected to other LAN over any distance with the help of telephone lines and radio waves. A system of LANs connected in this manner is known as a wide-area network (WAN).
Each computer in the LAN has its own computing power but with proper permissions it can access other devices on the LAN. With LAN, data transformation rate is much higher and faster as compared to WAN.
LZW compression which stands for Lempel Ziv Welch compression is a popular lossless data compression algorithm. This table-based lookup algorithm compresses large files into a smaller one. It was collectively invented by Abraham Lempel, Jacob Ziv and Terry Welch. Two file formats in which LIZ compresses is used extensively are the GIF image format served from Web sites and the TIFF image format.
The algorithm was designed to be fast to implement but in actuality its not that as it performs only limited analysis of the data.
Linux Hosting means a web hosting that supports Linux. Linux is a freely-distributable open source operating system derived from Unix that runs on a number of hardware platforms. The Linux kernel was developed mainly by Linus Torvalds.
Linux hosting plans are basically less expensive than hosting plans using operating systems by Microsoft.
In reference to computer networking, load balancing is a method of distributing equally the processing and communications activity over a computer network. It is done in order to ensure that no single web server get overloaded with work, thereby affecting performance. With load balancing, one can get optimal resource utilization and decrease computing time.
Log Analyzer is a program that takes the "raw" log file data from a server and then reiterates it into easily-understood reports.
Log File is a file that keeps record of the activities of a web server. Log files makes a list of every request made to the server with details of date and time of the request, location of resource requested, server response to the request, IP address of requesting computer, user agent of requesting browser and referral string of requesting browser along with some more technical information.