expand for answer

Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)

A standard that uses port 443 to negotiate encrypted communications sessions between web servers and browser clients.


Similar items:
A communication protocol used to connect to serves on the World Wide Web. Its primary function is to establish a connection with a Web server and transmit HTML pages to the client browser. The protocol used to transport hypertext files across the Internet.
[view]
Private VLANs that are configured to use a dedicated or reserved uplink port. The members of a private VLAN or a port isolated VLAN can interact only with each other and over the predetermined exit port or uplink port. A common implementation of port isolation occurs in hotels.
[view]
An encryption protocol developed by Netscape to protect the communications between a web server and a web browser.
[view]
A mechanical, electrical, or electronic device that opens or closes circuits, completes or breaks an electrical path, or selects paths or circuits. A switch looks at incoming data to determine the destination address. Based on that address, a transmission path is set up through the switching matrix between the incoming and outgoing physical communications ports and links. A network device that is an intelligent hub because it knows the addresses of the systems connected on each outbound port. Instead of repeating traffic on every outbound port, a switch repeats only traffic out of the port on which the destination is known to exist. Switches offer greater efficiency for traffic delivery, create separate broadcast and collision domains, and improve the overall throughput of data.
[view]
Most Web servers produce “log files,” timestamped lists of every request that the server receives. For each request, the log file contains anonymous information such as date and time, the IP address of the browser making the request, the document or action that is being requested, the location of the document from which the request was made, and the type of browser that was being used. Log files are usually used to ensure quality of service. They also can be used in a limited way to analyze visitor activity.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in