Lori (cocoajava) wrote in we_love_jo,
Lori
cocoajava
we_love_jo

  • Mood:

Yay For Mondays! Shall I Sing You A Song, Jo?

Taken from A Systems Manager's guide to Network Management

The whole thing's amusing, but this bit jumped out at me somehow. And yes, I DID Google the words Postal Pixie and stumbled on this!

So, how do these networks work?

Basically, networks operate by having a number of pixies work together in order to move packets of data from one place to another. To control the movement and interaction of these pixies, various types of protocol exist which we will look at in greater detail in the rest of this document. At this point, it must be pointed out that Microsoft use imps instead of pixies, and Novell use both. Various different pixie control protocols are in common use, and we will look in more detail at some: This is an oversimplfication since it sort of bundles transport protocols with other things. To networks people this is important to systems managers it isn't.

TCP:

TCP stands for "Totally Controllable Pixies" - This protocol was invented by the Americans who are well known for exaggerating many claims. In actuality, the pixies are not under much control and do pretty much what they want. Often seen in association with the Totally Controllable Pixie protocol are two other phrases, "IP" (Intelligent Pixies) and "UDP" (Unusually Dumb Pixies). As a general rule, if you use the Intelligent Pixie protocol, you stand a better chance of the packets being delivered than if you use the Unusually Dumb Pixie protocol. Since TCP is by far the most common pixie protocol these days, we will look at this in more detail later, but for completeleness, we will look at some others.
Subscribe
  • Post a new comment

    Error

    default userpic
    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 3 comments