SoFunction
Updated on 2025-04-14

Must-read Internet nouns

ADSL
ADSL (Asymmetric Digital Subscriber Loop) technology, which is asymmetric digital user loop technology, uses an existing pair of copper wires to provide users with an up and downlink asymmetric transmission rate (bandwidth). Uplink (from the user to the network) is a low-speed transmission, which can reach 640Kbps; downlink (from the network to the user) is a high-speed transmission, which can reach 7Mbps. It was originally mainly developed for video on demand business. With the development of technology, it has gradually become a more convenient broadband access technology and is valued by the telecommunications department.
This broadband access technology has the following characteristics:
1. You can directly use existing user telephone lines without laying additional cables to save investment;

2. Strong penetration capability and fast access, suitable for centralized and scattered users;

3. Can provide users with up and downlink asymmetric transmission bandwidth;

4. Adopt a dot-point topology, and users can enjoy high bandwidth exclusively;

5. It can be widely used for accessing data such as video services and high-speed INTERNET.
At present, since ordinary INTERNET users access the network using dial-up MODEM, the sharp increase in INTERNET users may cause network congestion (this case has occurred abroad), and using ADSL can be avoided.

◎ BBS

BBS is the electronic billboard. It is a popular method of information exchange in the early days on the Internet. Users can generally publish information after registering, or search for information they are more interested in. BBS is generally divided into Unix character mode and WWW graphics mode. Most BBSs use Unix characters. Logging into this BBS system generally uses remote login (that is, using Telnet to connect to the host of the BBS system). The famous domestic BBS system is such as: "Blue Sky BBS" ().

◎ Moderator

Moderators refer to the maintainer of a column on the website's homepage or website, and are sometimes nicknamed "Bao". Usually moderators are mainly responsible for maintaining the relevant homepage. Including information update management, answering visitors' questions, etc.

◎ DDN

DDN (Digital Data Network) is also called digital data network. DDN is one of the earliest forms of backbone data networks. It is a purely physical layer, semi-permanent network, which means it is only responsible for transmitting data from point A to point B, regardless of the form of data being encapsulated.

DDN is characterized by its high transmission rate, guaranteed and low latency. User access method is generally a dedicated line, with an access rate of N*64k and up to 2M. Users can freely choose DDN services:

1. Provides "point to multi-point" circuit connection, which is suitable for users to broadcast and send various news, weather, securities and other information, and is also suitable for centralized monitoring, credit card verification, sales terminal (POS) verification, reservation system and other services;

2. Provide "multipoint to multipoint" circuit connection, suitable for users' network interconnection;

3. Provide users with voice and fax services on a dedicated line, and can perform standard voice compression functions.

◎ Plug-in

Plug-in, that is, English Plug-in, is a program. Browsers can generally call plug-in programs directly. After the plug-in is installed, it becomes part of the browser and can handle specific files. The use of plug-ins enhances the browser's ability to process different web files.
◎ FTP

FTP is the abbreviation of File Transfer Protocol. That is, text transfer protocol. It is a communication protocol that is widely used on the Internet. It is a collection of various rules that support Internet file transfer. These rules allow Internet users to transfer files from one host to another. FTP usually also represents the application used by users to execute this protocol, such as CutFTP, etc. The method for users to use is very simple. Start the FTP software and establish a connection with the remote host first, and then want to issue instructions remotely.
◎ Firewall

Firewalls are like security bridges connecting internal and external networks. Information can be intercepted and filtered through a firewall, allowing only information that meets security standards to pass. This maximizes the isolation of the internet and prevents hackers from invading.

◎ HTTP

HTTP (Hypertext Transfer Protocol), which is the hypertext transfer protocol. It is the application layer communication protocol between the WWW browser and the WWW server. The HTTP protocol is based on a protocol above TCP/IP. It not only ensures the correct transmission of hypertext documents, but also determines which part of the document is transmitted, and which part of the content is displayed first (such as text and graphics first), etc.

◎ Hacker

Hacker is the transliteration of English Hacker. Also known as "hacker". Originally, it means those programmers who are keen to have an in-depth understanding of how the internal workings of computer systems or networks are working. It was later used to refer to those who use the Internet technology they master to sabotage or create pranks online.

◎ Internet

The Chinese name of the Internet is also called "Internet" or "International Internet". It was developed by the ARPA of the US military in the 1970s. It is a global computer network consisting of computer networks independently operated and managed by various types and sizes. Information can be exchanged smoothly between networks.

The computer networks that make up the Internet include local area networks (LANs), geographic networks (MANs), and large-scale wide area networks (WANs). These networks connect networks of universities, companies, scientific research institutions, military and government organizations in different countries through communication lines such as ordinary telephone lines, high-speed dedicated lines, satellites, microwaves and optical cables.

The Internet provides people with a huge growing treasure house of information resources and service tools, and users can use the various tools they provide to obtain the huge information resources and advanced services they provide. You can also publish information from personal or corporate departments through the Internet, and be available for other users to access and browse at any time.

◎ ISP

ISP (Internet Service Provider) is an Internet service provider. Users can only access the Internet through ISP and enjoy various services. As an intermediary for providing access services, ISP rents international channels and a large number of local telephone lines, purchases a series of computer equipment, and provides access services to local users through centralized use and dispersed pressure. If the Internet is compared to an information highway, then the ISP is the person who takes you on this highway.

◎ ICP

ICP (Internet Content Provider) is an information content provider on the Internet. ICP mainly focuses on information services on the Internet, using a large number of or unique information resources to attract people to the Internet. If the Internet is compared to an information highway, then whether there are any scenery on this highway that fascinates you is determined by the ICP.

◎ IP address

The IP address is the digital form of the host address on the Internet, and corresponds to the host's domain name address one by one. An IP address is a 32-bit binary number, usually written in the form of four decimal trees separated by periods, such as: 202.112.223.12, etc. IP addresses are usually divided into three categories: A, B, and C. This classification is related to the use of bytes in IP addresses. In actual applications, you can choose the type format of using IP addresses according to the specific situation. The ranges that can be represented by the three types of addresses A, B, and C are:

Class A: 0.0.0.0-127.255.255.255.255

Class B: 128.0.0.0-191.255.255.255

Class C: 192.0.0.0-223.255.255.255

IP addresses and domain addresses cannot be assigned at will, otherwise it will lead to an inestimable chaos, just like the communication addresses in our lives. When an IP address or domain address is required, the user must apply to the International Network Information Center NIC. After the application for approval, you can use the IP address wherever you can use the Internet domain address.

◎ Intranet

A network designed to process information within companies and organizations. It is an application of Internet technology within an enterprise or within a closed user group. It is unique to a company and does not necessarily have a physical connection relationship with the Internet. Its purpose includes providing services such as document distribution, software release, access to databases and training. It is named Intranet because it uses Internet-related applications such as Web pages (web pages), web browsers, FTP sites, emails, news groups and mailing lists, but its scope is limited to the company or organization.

◎ Broadband Network

It is also called wideband transmission. A local area network in which signals are transmitted in the form of radio frequency signals on different inbound and outbound channels. The nodes in the broadband network are connected by coaxial cables or fiber optic cables. Data, voice and video signals can be transmitted simultaneously through multiple transmission channels, and frequency distinction between channels is used. Broadband networks are suitable for high-speed operation (20 megabytes or faster), but are more expensive and difficult to install than baseband networks.

◎ Browser

Browser "(Browser)" is a visual noun, it is a client program used to access WWW services. It can also be understood as the software used by users to view the homepage after surfing the Internet. Currently, there are two most commonly used mainstream browsers in WWW environments: one is Internet Explorer (IE) from Microsoft, and the other is Navigator from Netscape, the other is. Others include Opera, etc.


◎ POP3

POP3 is the abbreviation of Post Office Protocol version3. That is, Post Office Agreement Version 3. Generally, through the POP3 protocol standard, mail sending and receiving services are provided to hosts that do not have mail systems running.

◎ SMTP

SMTP is the abbreviation of Simple Mail Transmission Protocol. That is, simple mail delivery protocol. Emails are usually sent via SMTP on the international Internet

◎ Upload and download

Uploading and downloading refers to the special terms for file transfer on the Internet. When a netizen copies files from his computer to a remote computer, we say Upload, that is, upload; on the contrary, when a netizen copies files from a remote computer to his computer, we call them Download, or Down file for short, that is, download.

◎ SET protocol

The SET protocol (Secure Electronic Transaction) is a specification jointly launched by two major credit card companies, VISA and MasterCard, in May 1997. SET is mainly designed to solve the transactions made by credit card between users, merchants and banks, so as to ensure the confidentiality of payment information, the completeness of payment process, the legal identity of merchants and cardholders, and the operability of them. The core technologies in SET mainly include public key encryption, electronic digital signature, electronic envelope, electronic security certificate, etc.

The SET protocol is more complex than the SSL protocol because the former not only encrypts a single session between two endpoints, it can also encrypt and identify multiple information between three parties.

◎ SSL protocol

The SSL protocol (Secure Socket Layer) is a secure communication protocol launched by Netscape, which can provide strong protection for credit cards and personal information.

SSL is a protocol that encrypts the entire session between computers. In SSL, two encryption methods are adopted: public key and private key.

◎ WAP

WAP is the abbreviation of Wireless Application Protocol, which is the wireless application protocol. It is equivalent to TCP/IP for wireless Internet access. Terminal devices with WAP functions, such as WAP mobile phones, log into the Internet through the built-in micro browser of the phone, via a digital wireless network, such as a GSM network.

WAP content is written in WML, and the content displayed on the mobile phone is mainly text, without many images and colors.

The biggest advantage of WAP is mobility. With your mobile phone, you can surf the Internet at any time and anywhere, and you can read news, send and receive emails, etc.

In addition, the user's location can be known through the Internet, so the location-related information may be provided to the user, such as traffic information, nearby hospitals, hotels, bars, cinemas, cash machines and other information.

Currently, mobile phones that can access the Internet include Nokia7110, Siemens3568i, Motorola a6188 and other models.

◎ Network protocol

Network protocols are some specifications for transmitting and managing information in the network (including the Internet). Just as communication between people requires certain rules to follow, communication between computers requires common compliance with certain rules, and these rules are called network protocols.

A computer can communicate normally with other computers on the network only if it complies with the network protocol. Network protocols are usually divided into several levels, each layer completing its own separate functions. The two parties to the communication can only be connected with each other at a common level. Common protocols include: TCP/IP protocol, IPX/SPX protocol, NetBIOS protocol, etc. The TCP/IP protocol is widely used on the Internet, and IPX/SPX is used more frequently in local area networks. If a user accesses the Internet, he or she must add the TCP/IP protocol to the network protocol.






◎ Virtual host

Virtual hosts use special software and hardware technology to divide a server host running on the Internet into "virtual" hosts. Each virtual host has an independent domain name and has complete Internet server (WWW, FTP, Email, etc.). Generally speaking, if a company wants to build a website with its own independent domain name online, it must invest in a expensive server, and set up dedicated lines and maintain them with dedicated personnel. The virtual host uses the telecommunications bureau’s host to open a website for the enterprise. The website looks like the enterprise has a high-speed network exit to the outside world. This is usually the way companies build home pages.

◎ Domain name

Sites on the Internet, just like institutions or families in our lives, must have an address so that netizens can access them based on this address. The identity of its computer is a 32-bit binary code, which is the so-called IP address. For the convenience of memory, the name given to the computer on the Internet is called a domain name according to certain rules. For example, the domain name of CCTV is:/. According to the Internet organizational model, domain names are classified. There are mainly the following first-level domain names: .com (commercial organization), .net (network center), .edu (educational institution), .gov (government department), .mil (military organization), .org (international organization), etc. Most countries and regions have their own independent domain names, such as: cn (China), us (US), uk (UK), hk (*), etc. Secondary domain names such as: supercool.

◎ First-line ISDN

ISDN is the abbreviation of Intergrated Services Digital Network, which is the integrated service digital network. Commonly known as "first-line connection", as the name suggests, ISDN integrates telephone voice and computer multimedia data into a high-speed digital transmission network line, and can provide customers with voice services and data services through just one "line". Currently, 8 terminals or telephones can be connected, and 2 terminals (for example: a telephone, a computer or a data terminal) can be used at the same time. It has the following characteristics:

1. Multi-energy in the first line - using a pair of user lines, it can realize communications of various services such as telephone, fax, visual text, and data communication.

2. High-speed Internet access - On a normal telephone line, digital connections can be provided based on 64Kbps speeds and can reach 128Kbps Internet access speeds.

◎ Hosting

Hosting is to place an individual or company's hosting on the Internet network of a hosting provider (such as the Telecommunications Bureau), playing the role of a server on the Internet network. This host is completely used and controlled by the customer or company. Hosting providers charge certain hosting fees.


◎ Payment Gateway

Payment Gateway is a group of servers connecting the bank's dedicated network and the Internet. Its main function is to complete communication, protocol conversion, and data addition and decryption between the two to protect the security of the bank's internal network.

The main functions of the payment gateway are: decrypting data packets from the Internet and repackaging the data according to the communication protocol within the banking system; receiving response messages feedback from the banking system, converting the data into the data format transmitted by the Internet, and encrypting it.
Article entry: dnbm     Editor: dnbm