FAQ

ADSL
Asymmetric Digital Subscriber Line (asymetická digital subscriber line). Technology for connecting to the Internet via a standard two-wire cable used for the conventional telephone connections. The main advantage is considerably higher data transfer rate compared with the traditional dial-up connection. Used to nonstop Internet access for a flat fee with phone calls and surf at the same time.

Apache
Quality and stable web server with SSL support exists for most operating systems (Windows, Unix, Linux)

ASCII
American Standard Code for Information Interchange (American Standard Code for Information Interchange). A code table that defines the characters of the English alphabet. ASCII code is defined by the original seven-bit and contains 128 valid characters.

ASP
Active Server Pages – a technology for generating dynamic HTML pages on the server developed by Microsoft for their IIS

blacklist
Black list. Used to define the e-mail addresses from which you do not receive any mail. Linked to the spam filter settings.

CGI
Common Gateway Interface – way communication browser, server, and running the program executing the respective requirement. CGI script is a term for software running on the server.

CMS
Content Management System (content management system). The program enables management of website content without extensive expertise. The company offers AVONET CMS websystem.

CPS
Carrier pre-selection (preselection). The service enables fixed settings on the operator network through which to answer the telephone. It is thus necessary before each phone call to enter the code and your call is routed to a network provider that you chose.

DHCP
Dynamic Host Configuration Protocol – A protocol for dynamic IP configuration. The DHCP server assigns an IP address to stations when connected to a network, network mask, default gateway address, IP address, DNS servers, WINS servers, so that the user will not be set. Client part include all commonly used operating systems, including a variety of devices supporting IP.

DMZ
The Demilitarized Zone. Network segment with controlled network traffic that is connected to the firewall, which ensures the management of network traffic. Use the DMZ to the Internet published network services on the server to be protected from attacks from the Internet or LAN.

DNS
Domain Name System – a system for transfer of the domain name (eg. Www.avonet.cz) to the numerical IP address.

Ethernet
The most commonly used interface for connecting computers to the network.

FAQ
Frequently Asked Questions. FAQs.

firewall
It is a device or a computer program, which according to a certain set of rules to protect the internal network from attacks from the “outside” (usually the Internet). It protects computers against hackers, viruses and worms (worms).

FTP
File Transport Protocol – a protocol enabling bidirectional transfer of data (files) between two computers

FUP
Fair Use Policy – Rules for the equitable management of Internet traffic. The aim is to ensure the same quality of access to Internet services to all users in a single aggregate (shared) group. When exceeding the agreed border transmitted data provider is entitled to reduce the maximum transmission speed at 64/32 kbps till the end of the calendar month.

ham
Opposite of spam, therefore solicited e-mails.

hotspot
Hotspot is a place where for a fee and provided free access to Wi-Fi services. This technology is mainly used for internet connectivity in public places, cafes, hotels.

HTML
HyperText Markup Language – the basic markup language used when creating static web pages.

HTTP
Hypertext Transfer Protocol – the application layer. Used for distributed hypermedia information systems for the Web service, used since 1990.

HTTP proxy
Buffer between the client and the service provider. Under certain circumstances, accelerate the download site. Its importance is declining thanks to ever faster Internet connection.

HTTPS
HyperText Transfer Protocol over SSL – an extension of the HTTP protocol on security elements (communication with the Web server are encrypted).

ICMP
Internet Control Message Protocol. Service IP protocol through which routers exchange information about network status, availability of machines or ports. Its function uses the ping or traceroute.

IMAP
Internet Mail Access Protocol. To access the e-mail directly on the mail server. According to the e-mail headers allows you to download to your mail client, only those messages that we want.

IP adress
Unique computer address on the Internet. It consists of four eight-bit numbers separated by periods, ie. For example. May be 217,112,162.34.

ipconfig
The program enables all the current network configuration values TCP / IP and MAC addresses of network adapters. It works under Windows XP /, 2000.

IP protocol
Basic Internet protocol based on packet transmission.

LAN
Local Area Network. Designation for the local computer network, which stretches usually not exceeding one building.

LDAP
Lightweight Directory Access Protocol – A protocol for accessing directory services.

Linux
Free operating system, used primarily as a server Internet services (WWW, FTP, e-mail etc.).

MAC address
MAC (Media Access Control) address is a physical address of ethernet interface to each network device (network card, switch, router, etc ..). This address is unique worldwide, is firmly locked to that device from the manufacturer and typically can not be changed. Each manufacturer has previously offered alms to a series of addresses to assign to their products. Is displayed in the format xx-xx-xx-xx-xx-xx and xx: xx: xx: xx: xx: xx, where x is a number (0-9) or letter (a-f).

MPLS
Multiprotocol Label Switching – a protocol that allows routing of network traffic. The router at the edge of the MPLS network allocates packet mark and on that basis it is then routed within the network.

NAT
Network Address Translation. NAT enables to connect to the Internet on multiple computers via a single IP address.

NTP
Network Time Protocol. Used to synchronize time between computers. The company AVONET provides time synchronization via a server time.avonet.cz.

Phishing
Designation for fraudulent emails designed to obtain confidential data. More on www.phishing.cz.

PHP
The scripting language used to create dynamic Web pages.

ping
Diagnostic program that allows you to determine whether the computer or device on a given address available, for how long is responsible if there are no packet losses etc. for the correct functioning of the other party can not block ICMP echo packets.

Sample program output

C:> ping test.avonet.cz

Pinging test.avonet.cz [217,112,162.31] with 32 bytes:

Reply from 217,112,162.31: bytes = 32 time = 14ms TTL = 55
Reply from 217,112,162.31: bytes = 32 time = 13ms TTL = 55
Reply from 217,112,162.31: bytes = 32 time = 17ms TTL = 55
Reply from 217,112,162.31: bytes = 32 time = 13ms TTL = 55
Statistics for ping 217,112,162.31:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss)
The approximate time of the adoption of the response in milliseconds:
Minimum = 13ms, Maximum = 17ms, Average = 14ms

POP3
Post Office Protocol v3 – protocol for accessing e-mail, e-mail clients typically use it to download e-mails to your computer.

POP3S
Post Office Protocol over SSL – protocol used for accessing e-mail, supports encryption, so it is very difficult to eavesdrop on communications.

RBL
Real Time Blackhole List. List SMTP servers that allow anyone to send e-mail (open relay) or from which to spread spam and viruses. The list can serve different SMTP servers to protect against spammers (from SMTP servers on the list to receive mail).

router
Or router is a device that connects two networks that use the same network protocol. It works like a switch, but adds the ability to control traffic. This allows you to set rules for the operation of the router.

RRD
Round Robin Database. The program allows monitoring of different systems (data flow on the network, machine load, temperature, etc.).

network name
It is a unique name that identifies a device on a wireless LAN.

SMB
Server Message Block – network protocol used in Windows file sharing.

SMTP
Simple Mail Transfer Protocol – A protocol for sending and receiving messages. AVONET company enables its clients to use the server: smtp.avonet.cz

SNMP
Simple Network Management Protocol – A protocol for the management and collection of information from network devices.

spam
Annoying spam e-mails that annoy us and flood the mailbox ads.

SQL
Structured Query Language – a query language for working with databases.

SSL
Secure Socket Layer – a program-layer network protocol that enables secure and encrypted network communications. This is the layer that is between the application (such as a browser or HTTP) and internet layer TCP / IP.

T
TCP / IP
Transmission Control Protocol / Internet Protocol – including the entire class labeling protocols (IP, TCP, SMTP, HTTP, FTP, POP, IMAP …), which form the basis for the Internet.

traceroute
see tracert

tracert
The program enables trace the route at the computer to communicate with another computer. It helps identify any errors in routing.

AT
UDP
User Datagram Protocol. Stateless network protocol that runs over IP. Serves as an unreliable datagram service (packets can be duplicated, lost or received in a different order than posting).

UPS
Uninterruptible Power Supply (uninterruptible power supply) – a device used as a backup power supply in case of instability or a complete blackout. network. The purpose is to prevent data corruption and powered devices.

IN
VoIP
Voice over IP (voice over IP). Technology to transmit voice over a data network.

VPN
Virtual Private Network (VPN). Allows you to create a direct connection between two points, which is secured by encrypting all communications encryption algorithms. Used to connect two remote networks (connecting the branches) or connect a PC to a remote network (employee in the company).

W
whitelist
Whitelist. The list of email addresses whose messages you always get. Linked to the spam filter settings.

winipcfg
The program enables display the current configuration of TCP / IP and MAC addresses of network adapters. It is found only in Win9x / ME.

X
XHTML
eXtensible HyperText Markup Language – extensible markup language, HTML extensions for XML options

1
10 GE
10 Gigabit Ethernet – network with transfer speeds up to 10 gigabits per second.

Blacklist
Black list. Used to define the e-mail addresses from which you do not receive any mail. Linked to the spam filter settings.

CPS
Carrier pre-selection (preselection). The service enables fixed settings on the operator network through which to answer the telephone. It is thus necessary before each phone call to enter the code and your call is routed to a network provider that you chose.

DHCP
Dynamic Host Configuration Protocol – A protocol for dynamic IP configuration.

The DHCP server assigns an IP address to stations when connected to a network, network mask, default gateway address, IP address, DNS servers, WINS servers, so that the user will not be set. Client part include all commonly used operating systems, including a variety of devices supporting IP.

DMZ
The Demilitarized Zone. Network segment with controlled network traffic that is connected to the firewall, which ensures the management of network traffic. Use the DMZ to the Internet published network services on the server to be protected from attacks from the Internet or LAN.

DNS
Domain Name System – a system for transfer of the domain name (eg. Www.warnet.cz) to the numerical IP address.

catchall
Catchall used to capture incoming e-mail messages that have the correct information about the domain, inaccurate or insufficient information about the recipient. The address of which is designated as a “catchall” will therefore delivered messages that were sent to a nonexistent address within your domain (eg. Neexistuje@vasedomena.cz).

Ethernet
The most commonly used interface for connecting computers to the network.

E-mail
E-mail. Mutual communication between users and implemented by computers, files, internet and communication lines. Originally, e-mail intended only for text files, nowadays permits sending other formats that of accompanying attachment. E-mail communication is known across the internet and intranet. For work on the Internet user must have a mail program that supports POP3 (IMAP4 better) for receiving mail and SMTP for sending mail. He must already have a mailbox at your Internet service provider – ISP.

FireWall
It is a device or a computer program, which according to a certain set of rules to protect the internal network from attacks from the “outside” (usually the Internet). It protects computers against hackers, viruses and worms (worms).

FTP
File Transport Protocol – a protocol enabling bidirectional data (files) between two computers

FTP server
The computer running the FTP service. Other computers can connect to it and transfer files. To do this, however, you must have permission (user account). There are also so-called. Anonymous ftp servers where the files are accessible to anyone. As you enter the user name “anonymous” (or sometimes “ftp”) and password as your email address.

FUP
Fair Use Policy – Rules for the equitable management of Internet traffic. The aim is to ensure the same quality of access to Internet services to all users in a single aggregate (shared) group. When exceeding the agreed border transmitted data provider is entitled to reduce the maximum transmission speed at 64/32 kbps till the end of the calendar month.

FullDuplex
The ability to simultaneously transfer between sending and receiving station in both directions.

Gateway
Application Gateway – Network equipment working on the seventh application layer according to the OSI (Open Systems Interconnection) and converting information from one protocol stack to another. Previously also used for the router (router).

halfduplex
The ability to transfer data between the sending and the receiving station at a time in one direction only.

Hotspot
Hotspot is a place where for a fee and provided free access to Wi-Fi services. This technology is mainly used for internet connectivity in public places, cafes, hotels.

HTML
HyperText Markup Language – the basic markup language used when creating static web pages
HTTP
Hypertext Transfer Protocol – the application layer. Used for distributed hypermedia information systems for the Web service, used since 1990

HTTP Proxy
Buffer between the client and the service provider. Under certain circumstances, accelerate the download site. Its importance is declining thanks to ever faster Internet connections.

HTTPS
HyperText Transfer Protocol over SSL – an extension of the HTTP protocol on security elements (communication with the Web server are encrypted)

ICMP
Internet Control Message Protocol. Service IP protocol through which routers exchange information about network status, availability of machines or ports. Its function uses the ping or traceroute.

IMAP
Internet Mail Access Protocol. To access the e-mail directly on the mail server. According to the e-mail headers allows you to download to your mail client, only the messages you want.

IP adress
Unique computer address on the Internet. It consists of four eight-bit numbers separated by periods, ie. For example. May be 93,187,104.1

ipconfig
The program enables all the current network configuration values TCP / IP and MAC addresses of network adapters. It works under Windows XP /, 2000.

IP protocol
Basic Internet protocol based on packet transmission.

HIND
Local Area Network. Designation for the local computer network, which stretches usually not exceeding one building.

Linux
Free operating system, used primarily as a server Internet services (WWW, FTP, e-mail etc.).

MX record

Basically MX record says on that particular server to deliver mail for a particular domain. Furthermore, it can identify multiple servers and determine their priorities – the lower the number the state, the higher the priority is.

NAT
Network Address Translation. NAT enables to connect to the Internet on multiple computers via a single IP address

NTP
Network Time Protocol. Used to synchronize time between computers. The company Warnet.cz provides time synchronization via a server ntp.warnet.cz.

NIX.CZ
Neutral Internet eXchange. Association of legal entities (NIX.CZ, z.s.p.o.) brings together the Czech ISP in order to interconnect their networks. More information on http://www.nix.cz.

PHP
The scripting language used to create dynamic Web pages.

POP3
Post Office Protocol v3 – protocol for accessing e-mail, e-mail clients typically use it to download e-mails to your computer.

POP3S
Post Office Protocol over SSL – protocol used for accessing e-mail, supports encryption, so it is very difficult to eavesdrop on communications.

router
Or router is a device that connects two networks that use the same network protocol. It works like a switch, but adds the ability to control traffic. This allows you to set rules for the operation of the router.

SMTP
Simple Mail Transfer Protocol – A protocol for sending and receiving messages.

SNMP
Simple Network Management Protocol – A protocol for the management and collection of information from network devices.

SPAM
Annoying spam e-mails that annoy us and flood the mailbox ads.

SSL
Secure Socket Layer – a program-layer network protocol that enables secure and encrypted network communications. This is the layer which is between the application (such as a browser or HTTP) Internet and TCP / IP layer

TCP / IP
Transmission Control Protocol / Internet Protocol – including the entire class labeling protocols (IP, TCP, SMTP, HTTP, FTP, POP, IMAP …), which form the basis of communication on the Internet

UDP
User Datagram Protocol. Stateless network protocol that runs over IP. Serves as an unreliable datagram service (packets can be duplicated, lost or received in a different order than posting).

URL
(Unique Resource Locator) is the translation of “unambiguous determination zrojů”. Writes to the file location on the Internet. Entered into the address line at the top of your browser and clearly indicates where what the file on the Internet.

VoIP
Voice over IP (voice over IP). Technology to transmit voice over a data network.

VPN
Virtual Private Network (VPN). It allows you to create a direct connection between two points, which is secured by encrypting all communications encryption algorithms. Used to connect two remote networks (connecting the branches) or connect a PC to a remote network (employee in the company).

web browser
Internet browser (MS Internet Explorer, Mozilla, etc.) client application with a graphical interface for displaying hypertext documents and other Internet services.

TOPlist TOPlist VIPLOG database valid