SIP:
Stands for
"Session Initiation Protocol." SIP is a protocol defined by the
Internet Engineering Task Force (IETF). It is used for establishing sessions
between two or more telecommunications devices over the Internet.
SIP has many
applications, such as initiating video conferences, file transfers, instant
messaging sessions, and multiplayer games. However, it is most well known for
establishing voice and video calls over the Internet. VoIP companies, such as
Vonage, Phone Power, and others, use SIP to provide Internet-based telephone
services. This system, called "SIP trunking" allows clients to
communicate over standard phone lines using IP phones or computers with VoIP
software installed. A SIP server provides the translation from the VoIP
connection to the public switched telephone network (PSTN).
Similar to
HTTP, SIP uses simple request and response messages to initiate sessions. For
example, the INVITE request message is used to invite a user to begin a session
and ACK confirms the user has received the request. The response code 180
(Ringing) means the user is being alerted of the call and 200 (OK) indicates
the request was successful. Once a session has been established, BYE is used to
end the communication. While SIP codes are not always seen by users, they can
be useful when troubleshooting unreliable connections.
NOTE: SIP
may also stand for "Standard Interchange Protocol," which is a
library system communication standard developed by 3M. SIP and SIP2 were
designed to handle basic inventory operations, such as checking in and checking
out library books. Both versions of the Standard Interchange Protocol have been
largely replaced by the National Information Standards Organization Circulation
Interchange Protocol (NCIP).
LED:
Stands for
"Light-Emitting Diode." An LED is an electronic device that emits
light when an electrical current is passed through it. Early LEDs produced only
red light, but modern LEDs can produce several different colors, including red,
green, and blue (RGB) light. Recent advances in LED technology have made it
possible for LEDs to produce white light as well.
LEDs are
commonly used for indicator lights (such as power on/off lights) on electronic
devices. They also have several other applications, including electronic signs,
clock displays, and flashlights. Since LEDs are energy efficient and have a
long lifespan (often more than 100,000 hours), they have begun to replace
traditional light bulbs in several areas. Some examples include street lights,
the red lights on cars, and various types of decorative lighting. You can
typically identify LEDs by a series of small lights that make up a larger
display. For example, if you look closely at a street light, you can tell it is
an LED light if each circle is comprised of a series of dots.
The energy
efficient nature of LEDs allows them to produce brighter light than other types
of bulbs while using less energy. For this reason, traditional flat screen LCD
displays have started to be replaced by LED displays, which use LEDs for the
backlight. LED TVs and computer monitors are typically brighter and thinner than
their LCD counterparts.
Node:
Any system
or device connected to a network is also called a node. For example, if a
network connects a file server, five computers, and two printers, there are
eight nodes on the network. Each device on the network has a network address,
such as a MAC address, which uniquely identifies each device. This helps keep
track of where data is being transferred to and from on the network.
A node can
also refer to a leaf, which is a folder or file on your hard disk. In physics,
a node, or nodal point, is a point of minimum displacement or where multiple
waves converge, creating a net amplitude of zero.
Rootkit:
A rootkit is
a software program designed to provide a user with administrator access to a
computer without being detected. Rootkits are are considered one of the most
serious types of malware since they may be used to gain unauthorized access to
remote systems and perform malicious operations.
The name
"rootkit" includes the word "root," because the goal of a
rootkit is to gain root access to a computer. By logging in as the root user of
a system, a hacker can perform nearly any operation he or she wishes. This
includes installing software and deleting files. The word "kit"
refers to the software files that make up the rootkit. These may include
utilities, scripts, libraries, and other files.
Rootkits
often work by exploiting security holes in operating systems and applications.
Others create a "back door" login to the operating system, which
allows a user to bypass the standard login procedure when accessing a system.
Once root access has been enabled, a rootkit may attempt to hide any traces of
unauthorized access by modifying drivers or kernel modules, hiding certain
files, and quitting active processes.
Fortunately,
most operating systems and software programs are designed to prevent
unauthorized access via rootkits or other malware. Therefore, it is difficult
to use a rootkit to gain access to modern systems. However, rootkits are
constantly modified and updated in order to try and breach security holes.
Therefore, it is wise to install antivirus or other security software on your
computer to monitor any attempts of unauthorized access to your system.
Zebibyte:
A zebibyte
is a unit of data storage that equals 2 to the 70th power, or 1,180,591,620,717,411,303,424
bytes.
While a
zettabyte can be estimated as 10^21 or 1,000,000,000,000,000,000,000 bytes, a
zebibyte is exactly 1,180,591,620,717,411,303,424 bytes. This is to avoid the
ambiguity associated with the size of zettabytes. A zebibyte is 1,024 exbibytes
and precedes the yobibyte unit of measurement.
0 comments:
Post a Comment