Tech Terms 5

SIP:
Stands for "Session Initiation Protocol." SIP is a protocol defined by the Internet Engineering Task Force (IETF). It is used for establishing sessions between two or more telecommunications devices over the Internet.
SIP has many applications, such as initiating video conferences, file transfers, instant messaging sessions, and multiplayer games. However, it is most well known for establishing voice and video calls over the Internet. VoIP companies, such as Vonage, Phone Power, and others, use SIP to provide Internet-based telephone services. This system, called "SIP trunking" allows clients to communicate over standard phone lines using IP phones or computers with VoIP software installed. A SIP server provides the translation from the VoIP connection to the public switched telephone network (PSTN).
Similar to HTTP, SIP uses simple request and response messages to initiate sessions. For example, the INVITE request message is used to invite a user to begin a session and ACK confirms the user has received the request. The response code 180 (Ringing) means the user is being alerted of the call and 200 (OK) indicates the request was successful. Once a session has been established, BYE is used to end the communication. While SIP codes are not always seen by users, they can be useful when troubleshooting unreliable connections.
NOTE: SIP may also stand for "Standard Interchange Protocol," which is a library system communication standard developed by 3M. SIP and SIP2 were designed to handle basic inventory operations, such as checking in and checking out library books. Both versions of the Standard Interchange Protocol have been largely replaced by the National Information Standards Organization Circulation Interchange Protocol (NCIP).

LED:
Stands for "Light-Emitting Diode." An LED is an electronic device that emits light when an electrical current is passed through it. Early LEDs produced only red light, but modern LEDs can produce several different colors, including red, green, and blue (RGB) light. Recent advances in LED technology have made it possible for LEDs to produce white light as well.
LEDs are commonly used for indicator lights (such as power on/off lights) on electronic devices. They also have several other applications, including electronic signs, clock displays, and flashlights. Since LEDs are energy efficient and have a long lifespan (often more than 100,000 hours), they have begun to replace traditional light bulbs in several areas. Some examples include street lights, the red lights on cars, and various types of decorative lighting. You can typically identify LEDs by a series of small lights that make up a larger display. For example, if you look closely at a street light, you can tell it is an LED light if each circle is comprised of a series of dots.
The energy efficient nature of LEDs allows them to produce brighter light than other types of bulbs while using less energy. For this reason, traditional flat screen LCD displays have started to be replaced by LED displays, which use LEDs for the backlight. LED TVs and computer monitors are typically brighter and thinner than their LCD counterparts.

Node:
Any system or device connected to a network is also called a node. For example, if a network connects a file server, five computers, and two printers, there are eight nodes on the network. Each device on the network has a network address, such as a MAC address, which uniquely identifies each device. This helps keep track of where data is being transferred to and from on the network.
A node can also refer to a leaf, which is a folder or file on your hard disk. In physics, a node, or nodal point, is a point of minimum displacement or where multiple waves converge, creating a net amplitude of zero.

Rootkit:
A rootkit is a software program designed to provide a user with administrator access to a computer without being detected. Rootkits are are considered one of the most serious types of malware since they may be used to gain unauthorized access to remote systems and perform malicious operations.
The name "rootkit" includes the word "root," because the goal of a rootkit is to gain root access to a computer. By logging in as the root user of a system, a hacker can perform nearly any operation he or she wishes. This includes installing software and deleting files. The word "kit" refers to the software files that make up the rootkit. These may include utilities, scripts, libraries, and other files.
Rootkits often work by exploiting security holes in operating systems and applications. Others create a "back door" login to the operating system, which allows a user to bypass the standard login procedure when accessing a system. Once root access has been enabled, a rootkit may attempt to hide any traces of unauthorized access by modifying drivers or kernel modules, hiding certain files, and quitting active processes.
Fortunately, most operating systems and software programs are designed to prevent unauthorized access via rootkits or other malware. Therefore, it is difficult to use a rootkit to gain access to modern systems. However, rootkits are constantly modified and updated in order to try and breach security holes. Therefore, it is wise to install antivirus or other security software on your computer to monitor any attempts of unauthorized access to your system.




Zebibyte:
A zebibyte is a unit of data storage that equals 2 to the 70th power, or 1,180,591,620,717,411,303,424 bytes.

While a zettabyte can be estimated as 10^21 or 1,000,000,000,000,000,000,000 bytes, a zebibyte is exactly 1,180,591,620,717,411,303,424 bytes. This is to avoid the ambiguity associated with the size of zettabytes. A zebibyte is 1,024 exbibytes and precedes the yobibyte unit of measurement.
SHARE

About df

    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment