
Farms:
Through a dedicated scheduler will coordinate multiple common servers to handle large tasks, as if using a powerful computer instead of
multiple computers for the user.
Load Balancing:
To compare the value of each server based on the pressure. It’s a mechanism that will assign current computing tasks to the idlest server.
Printer Mapping:
The printer on the client is mapped to the server, although customers using applications on the server, but for this application, it considers the
printer is connected to a terminal device instead of a printer on the host.
Driver Mapping:
The disk on the terminal is mapped to the host, although customers using applications on the host, but the application can also use a disk drive
on the terminal.
Sound Mapping:
The sound on the terminal device is mapped to the host, although the client application on the host, but the sound output of the application does
not come from the host's sound card, but from the terminal equipment's sound card.
USB Mapping:
The USB device on the terminal is mapped to the host, although customers using applications on the host, but the application can also use USB
devices on the terminal, such as: USB disk or USB key.
Clipboard Mapping:
The terminal and host clipboard mapped to each other, on a host of copy things you can paste to the terminal, the terminal can paste the copied
something to the host.
AD Policy:
The full name of AD policy is Microsoft Windows Active Directory security policy. It refers to all of the Windows operating system security policy,
such as NTFS, Local Security Policy, and Domain Security Policy and so on.
Firewall:
Firewall generally refers to a gateway device located on all machines on the network packets out to allow them to select whether the route
filtering module.
Gateway (Gateway):
The entrance from one network into another network is responsible for the correct forwarding incoming and outgoing packets to the local network
of computers.
IP Address:
An IP address consists of a unique 32 numbers and be used to identify an IP network of each computer.
Subnet mask (subnet mask):
Subnet mask, also known as network mask, address mask , subnet mask, etc., it is used to specify a single IP address which bit identify the
subnet the host locates and which bits identify the host bits mask. The subnet mask is not alone. It must be combined with the use of IP
addresses. The subnet mask is only one role, it is to divide an IP address into two parts a network address and a host address.
DNS:
The Domain Name System is a computer's (Domain Name System or Domain Name Service) acronym, it consists of the parser and domain
name servers. Domain name server refers to a server that has preserved all hosts domain names in the network and corresponding IP
addresses also can turn domain names into IP address. The domain name must correspond to an IP address, and the IP address does not
necessarily correspond to only one domain name.
LAN (Local Area Network):
Local LAN (Local Area Network) refers to an interconnected group of computers can share resources.
MAC Address:
Media Access Control address refers to physical address of the network card, usually in the link layer.
NAT:
NAT (Network Address Translation), also known as IP masquerading, is the source IP packet header address can be converted and route on
WAN.
Port (Port):
Port is a 16 numbers (in the range 1-65535) and is used in TCP/UDP communication layer. The port is used to distinguish between different
services on a single host. For example, the default port http protocol using a 80, SMTP is used for 25 and so on.
Port Mapping (Port Mapping):
Port Mapping (Port Address Translation - PAT) refers to when a packet arrives at an IP port being relocated to another IP port. This is what we
are talking about static NAT, port mapping can be used for load balancing, security isolation.
TCP/IP:
TCP/IP (Transmission Control Protocol/Internet Protocol in the translation of the Transmission Control Protocol/Internet interconnection
agreements, also known as network communication protocol, is the most basic Internet and the basis of Internet, composed by network layer
IP protocol and transport layer TCP protocol. TCP/IP defines how electronic devices connected to the Internet, and how the data transmission
standard between them. Protocol uses a hierarchy of four layers, each layer calls its next network provided to accomplish their needs. Generally
speaking: TCP is responsible for finding transmission problems, sending signal as long as issue occurs, and requiring re-transmission until all
the data is transferred to the destination safely and correctly. The IP is to give each computer specified an Internet address.