Glossary

Numbers and Symbols

568A/568B Standards  568A and 568B are telecommunications standards from the Telecommunications Industry Association (TIA) and the Electronics Industry Association (EIA). These 568 standards specify the pin arrangements for the RJ-45 connectors on UTP or STP cables. The number 568 references the order in which the wires within the UTP cable are terminated and attached to the connector.

10Base2  The IEEE 802.3a specification for ethernet at 10Mbps over thin coaxial cable. The maximum length of a 10Base2 segment is 185 meters (that is, 607 feet). 10Base2 operates at 10Mbps and uses a baseband transmission method.

10Base5  The IEEE 802.3 specification for 10Mbps ethernet using thick coaxial cable. The maximum length of a 10Base5 segment is 500 meters (that is, 1,640 feet).

10BaseFL  The IEEE 802.3 specification for running ethernet at 10Mbps over fiber-optic cable. The maximum length of a 10BaseFL segment is 2,000 meters.

10BaseT  The IEEE 802.3i specification for running ethernet at 10Mbps over twisted-pair cabling. The maximum length of a 10BaseT segment is 100 meters (that is, 330 feet).

100BaseFX  The IEEE 802.3 specification for running Fast Ethernet at 100Mbps over fiber-optic cable. The maximum length of a 100BaseFX segment is 2,000 meters (6,561 feet), in full-duplex mode.

100BaseT4  The IEEE specification that allows the use of Fast Ethernet (100Mbps) technology over existing Category 3 and Category 4 wiring, utilizing all four pairs of wires. The maximum length of a 100BaseT4 segment is 100 meters (that is, 330 feet).

100BaseTX  An IEEE 802.3u specification, also known as Fast Ethernet, for running ethernet at 100Mbps over STP or UTP. The maximum length of a 100BaseTX segment is 100 meters (that is, 330 feet).

1000BaseT  IEEE 802.3ab standard that specifies Gigabit Ethernet over Category 5 UTP cable. The standard allows for full-duplex transmission using the four pairs of twisted cable.

1000BaseCX  IEEE802.3z standard that uses a special shielded copper cable. 1000BaseCX can be used up to a maximum distance of 25 meters.

1000BaseLX  IEEE 802.3zstandard that specifies Gigabit Ethernet over fiber-optic cable. 1000BaseLX can be used up to 5,000 meters.

1000BaseSX  IEEE 802.3z standard that specifies Gigabit Ethernet over fiber-optic cable. 1000BaseSX uses 62.5/125 and 50/125 multimode fiber.

1000BaseX  The IEEE 802.3z specification, also known as Gigabit Ethernet, that defines standards for data transmissions of 1000Mbps (1Gbps). 1000BaseX is most often associated with fiber or STP cable. 1000BaseX refers collectively to three distinct standards: 1000BaseLX, 1000BaseSX, and 1000BaseCX.

10GbE  Term commonly used to refer to the 10Gbps ethernet networking standards such as 10Gbase-ER, 10Gbase-LR, and 10Gbase-SR. 10 Gigabit Ethernet is defined in the IEEE 802.3ae standard.

10GBaseER  10Gbps ethernet networking standard that can be used up to 40,000 meters.

10GBaseLR  10Gbps ethernet networking standard that can be used up to 10,000 meters. 10Gbase-LR uses single mode fiber-optic cabling.

10GBaseSR  10Gbps ethernet networking standard that can be used over relatively short distances, up to 300 meters.

10GBaseSW  Both SR and SW are designed for deployment over short wavelength multimode fiber. The distance range for both classifications ranges from as little as 2 meters to 300 meters. The difference between the two classifications is that SR is designed for use over dark fiber. The 10GBaseSW standard is designed for longer distance data communications and connects to Sonet equipment.

10GBaseLW  The 10GBaseLW ethernet standard is over single mode fiber. Both the LR and LW standards are designed to be used over long wavelength single mode fiber, giving it a potential transmission range of anywhere from 2 meters to 10 kilometers. The LW standard is designed to connect to Sonet equipment.

10GBaseEW  Both the ER and EW gigabit standards are deployed with extra long wavelength single-mode fiber. This medium provides transmission distances ranging from 2 meters to 40 kilometers. As with the previous two standards, ER is deployed over dark fiber, whereas the EW standard is used primarily with Sonet equipment.

10GBaseT  The 802.3an standard specifying 10 gigabit speed over regular copper cabling. 802.3an allows the upgrade from 1000 gigabit networking to 10 gigabit networking using the current wiring infrastructure.

A

AAA  AAA refers to authentication, authorization, and accounting. Authentication is the process of determining if someone is authorized to use the network; that is, if they can log on to the network. Authorization refers to identifying the resources a user can access after they are authenticated, and accounting refers to the tracking methods used to identify who is using the network and what they are doing on the network.

ACK  The acknowledgment message sent between two hosts during a TCP session.

ACL (access control list)  The list of trustees assigned to a file or directory. A trustee can be any object available to the security subsystem. The term ACL is also used with routers and firewall systems to refer to the list of permitted computers or users.

Active Directory  Active Directory is used in Windows network environments. It is a directory services system that allows network objects to be stored in a database. This database can then be divided up and distributed among different servers on the network.

active hub  A hub that has power supplied to it for the purposes of regenerating the signals that pass through it.

active termination  A termination system used on a SCSI bus. Unlike passive termination, which uses voltage resistors, active termination uses voltage regulators to create the termination voltage.

address  A set of numbers used to identify and locate a resource or device on a network. An example is an IP address such as 192.168.2.1.

ad-hoc topology  Defines a wireless network layout whereby devices communicate directly without using an access point. Sometimes called an unmanaged or peer-to-peer wireless topology.

administrator  A person responsible for the control and security of the user accounts, resources, and data on a network.

Administrator account  On a Windows system, the default account that has rights to access everything and to assign rights to other users on the network. Unlike other user accounts, the Administrator account cannot be deleted.

ADSL (Asymmetric Digital Subscriber Line)  A service that transmits digital voice and data over existing (analog) phone lines. ADSL uses asymmetrical communication, meaning that upload and download speeds are faster than upload speeds.

AES (Advanced Encryption Standard)  AES is an encryption algorithm for securing sensitive for networks used by U.S. government agencies and may become the encryption standard for corporate networks.

ANSI (American National Standards Institute)  An organization that publishes standards for communications, programming languages, and networking.

antivirus software  A software application that detects and removes virus programs.

AP (access point)  A transmitter and receiver (transceiver) device commonly used to facilitate communication between a wireless client and a wired network. Wireless APs are used with the wireless infrastructure network topology to provide a connection point between WLANs and a wired ethernet LAN.

APIPA (Automatic Private IP Addressing)  Technology implemented on certain Windows platforms through which a system assigns itself an IP address in the absence of a DHCP server. Addresses are assigned from the 169.254.x.x address range.

application layer  Layer 7 of the OSI model, which provides support for end users and for application programs using network resources.

application log  A log file on a Windows system that provides information on events that occur within an application.

archive bit  A flag that is set on a file after it has been created or altered. Some backup methods reset the flag to indicate that it has been backed up.

ARIN (American Registry for Internet Numbers)  The regional Internet registry responsible for the management of both IPv4 and IPv6 IP number distribution.

ARP (Address Resolution Protocol)  A protocol in the TCP/IP protocol suite that is used to resolve IP addresses to MAC addresses.

ARP ping  The ARP utility is used to resolve IP addresses to MAC addresses. The ARP ping utility tests connectivity by pinging a MAC address directly.

ARP table  A table of entries used by ARP to store resolved ARP requests. Entries can also be stored manually.

array  A group of devices arranged in a fault-tolerant configuration. See also RAID.

ATM (asynchronous transfer mode)  ATM is a packet-switching technology that provides transfer speeds commonly ranging from 1.544Mbps to 622Mbps. ATM uses fixed-length packets, or cells, that are 53 bytes long.

attenuation  The loss of signal that is experienced as data is transmitted over distance and across the network media.

authentication  The process by which a user’s identity is validated on a network. The most common authentication method is a username and password combination.

authorization  Authorization determines if the person, previously identified and authenticated, is allowed access to a particular network resource.

B

B (bearer) channel  In ISDN, a 64Kbps channel that carries data. See also D channel.

backbone  A network segment that acts as a trunk between other network segments. Backbones are typically high-bandwidth implementations such as fiber-optic cable.

backup schedule  A document or plan that defines what type of backups are made, when, and what data is backed up.

bandwidth  The width of the range of electrical frequencies, or amount of channels that the media can support. Bandwidth correlates to the amount of data that can traverse the media at one time, but other factors determine what the maximum speed supported by a cable will be.

bandwidth shaper  A bandwidth shaper describes the mechanisms used to control bandwidth usage on the network. A bandwidth shaper essentially performs two key functions: monitoring and shaping. Monitoring includes identifying where bandwidth usage is high and at what time of day. After that information is obtained, administrators can customize or shape bandwidth usage for the best needs of the network.

baseband  A term applied to any media capable of carrying only a single data signal at a time. Compare with broadband.

baseline  A measurement of performance of a device or system for the purposes of future comparison. Baselining is a common server administration task.

basic switch  See switch.

baud rate  The rate of signal transfer. Baud rate is measured in cycles per second, or Hertz (Hz). The word baud is derived from the name of French telegraphy expert J. M. Baudot.

BDF (Building Distribution Frame)  A BDF refers to a network wiring closet typically housing wiring distribution equipment and hardware. Two common network BDFs are the Intermediate Distribution Frame (IDF) and the Main Distribution frame (MDF). See IDF and MDF in this glossary for more information.

beaconing  Within wireless networking is a frame type known as the beacon management frame (beacon). Beaconing refers to the process of advertising the presence of the access point so systems can locate it. Wireless clients automatically detect the beacons and attempt to establish a wireless connection to the access point.

BGP (Border Gateway Protocol)  BGP is used between gateway hosts on the Internet. The BGP protocol examines the routing table, which contains a list of known routers, the addresses they can reach, and a cost metric associated with the path to each router so that the best available route is chosen. The BGP protocol communicates between the routers using the TCP protocol.

binary  The base 2 numbering system used in digital signaling. It uses only the numbers 1 and 0.

binding  The process of associating a protocol with a NIC.

biometrics  The science and technology of measuring and analyzing biological data. Biometrics is used for security purposes, to analyze and compare characteristics such as voice patterns, retina patterns, and hand measurements.

BIOS (Basic Input/Output System)  A basic set of instructions that a device needs to operate.

bit  An electronic digit used in the binary numbering system. Bit is a contraction of the terms binary and digit.

blackout  A total loss of electrical power.

Blue Screen of Death  The term for the blue-screen STOP errors that occur and halt the system on Windows server based systems.

BNC (Bayonet Neill Concelman)  A family of connectors typically associated with thin coaxial cabling and 10Base2 networks. BNC connectors use a twist and lock mechanism to connect devices to the network.

bound media  A term used to describe any media that have physical constraints, such as coaxial, fiber-optic, and twisted pair. Compare with unbound media.

boundless media  See unbound media.

BPDU (Bridge Protocol Data Unit)  BPDUs identify the status of ports and bridges across the network. BPDUs are simple data messages that are exchanged between switches and contain information on ports and provide status of those ports to other switches.

BRI (Basic Rate Interface)  An ISDN digital communications line that consists of three independent channels: two B channels, each at 64Kbps, and one D channel, at 16Kbps. ISDN BRI is often referred to as 2B+D. See also ISDN, PRI.

bridge  A device that connects and passes packets between two network segments that use the same communications protocol. Bridges operate at the data-link layer of the OSI model. A bridge filters, forwards, or floods an incoming frame based on the MAC address of that packet.

bridging address table  A list of MAC addresses that a bridge keeps and uses when it receives ethernet frames. The bridge uses the bridging address table to determine which segment the destination address is on before it sends the packet to the next interface or drops the data (if it is on the same segment as the sending node).

broadband  A communications strategy that uses analog or digital signaling over multiple communications channels.

broadcast  A packet delivery system in which a copy of a packet is given to all hosts attached to the network.

broadcast storm  An undesirable condition in which broadcasts become so numerous as to bog down the flow of data across the network.

brownout  A short-term decrease in the voltage level, usually caused by the startup demands of other electrical devices.

BSS (Basic Service Set)  Refers to a wireless network that uses a single AP and one or more wireless clients connecting to the AP. Many home offices are an example of a BSS design. The BSS is an example of the infrastructure wireless topology.

buffer  An area of memory in a device used to store data before it is forwarded to another device or location.

bus topology  A linear LAN architecture in which all devices are connected to a common cable, referred to as a bus or backbone.

byte  A set of bits (usually 8 bits) that operate as a unit to signify a character or a number.

C

cable Internet  An Internet access technology where connectivity is achieved by using a device called a cable modem. It has a coaxial connection for connecting to the provider’s outlet and an unshielded twisted-pair (UTP) connection for attaching directly to a system, hub or switch.

cable modem  A device that provides Internet access over cable television lines.

cable tester  A device used to check for electrical continuity along a length of cable. Cable tester is a generic term that can be applied to devices such as volt/ohm meters and TDRs.

caching-only server  A type of DNS server that operates the same way as secondary servers except that a zone transfer does not take place when the caching-only server is started.

carrier  A signal that carries data. The carrier signal is modulated to create peaks and troughs, which represent binary bits.

change control  A process in which a detailed record of every change made to the network is documented.

channel  A communications path used for data transmission.

CIDR (classless interdomain routing)  An IP addressing scheme that allows a single IP address to designate many unique IP addresses. CIDR addressing uses an IP address followed by a “/” and the IP network prefix. A sample CIDR address would be 192.168.100.0/16. CIDR is sometimes referred to as supernetting.

circuit switching  A method of sending data between two parties, in which a dedicated circuit is created at the beginning of the conversation and broken at the end. All data transported during the session travels over the same path, or circuit.

Class A network  A TCP/IP network that uses addresses from 1 to 126 and supports up to 126 subnets with 16,777,214 unique hosts each.

Class B network  A TCP/IP network that uses addresses from 128 to 191 and supports up to 16,384 subnets with 65,534 unique hosts each.

Class C network  A TCP/IP network that uses addresses from 192 to 223 and supports up to 2,097,152 subnets with 254 unique hosts each.

client  A node that uses the services from another node on a network.

client/server networking  A networking architecture in which front-end, or client, nodes request and process data stored by the back-end, or server, node.

clustering  A technology that allows two or more computers to act as a single system to provide improved fault tolerance, load balancing, and failover capability.

CNAME (canonical name)  A CNAME specifies an alias or nickname for a canonical hostname record in a domain name system (DNS) database. CNAME records are used to give a single computer multiple names (aliases).

coaxial cable  A data cable, commonly referred to as coax, that is made of a solid copper core insulated and surrounded by braided metal and covered with a thick plastic or rubber covering. Coax is the standard cable used in cable television and in older bus topology networks.

collision  The result of two frames transmitting simultaneously on an ethernet network and colliding, thereby destroying both frames.

collision domain  A segment of an ethernet network that is between managing nodes, where only one packet can be transmitted at any given time. Switches, bridges, and routers can be used to segment a network into separate collision domains.

collision light  An LED on networking equipment that flashes to indicate a collision on the network. A collision light can be used to determine whether the network is experiencing many collisions.

communication  The transfer of information between nodes on a network.

concentrator  A device that combines several communications channels into one. It is often used to tie multiple terminals together into one line.

connectionless protocols  Packet transfer in which delivery is not guaranteed. A common connectionless protocol is UDP, which is used for such applications as streaming video.

connection-oriented protocols  Protocols that enable packet transfers in which delivery is guaranteed. TCP is a protocol that has error checking mechanisms built in that guarantee packet delivery.

connectivity  The linking of nodes on a network for communication to take place.

content switching  Content switching is a technique whereby incoming data is directed to specific application servers to help distribute the load.

copy backup  Normally, a backup of the entire hard drive. A copy backup is similar to a full backup, except that the copy backup does not alter the state of the archive bits on files.

cost  A value used to encourage or discourage the use of a certain route through a network. Routes that are to be discouraged are assigned a higher cost, and those that are to be encouraged are assigned a lower cost. See also metric.

cracker  A person who attempts to break software code or gain access to a system to which he or she is not authorized. See also hacker.

cracking  The process of attempting to break software code, normally to defeat copyright protection or alter the software’s functioning. Also the process of attempting to gain unauthorized access to a computer system.

CRC (cyclical redundancy check)  A method used to check for errors in packets that have been transferred across a network. A computation bit is added to the packet and recalculated at the destination to determine whether the entire content of the packet has been transferred correctly.

crimper  A tool used to join connectors to the ends of network cables.

cross talk  Electronic interference caused when two wires are too close to each other, and interference is caused by the adjacent cable.

crossover cable  A UTP cable in which the 1 and 3 wires and the 2 and 6 wires are crossed for the purposes of placing the transmit line of one device on the receive line of the other. Crossover cables can be used to directly connect two devices—for example, two computer systems—or as a means to expand networks that use devices such as hubs or switches.

CSMA/CA (carrier-sense multiple-access with collision avoidance)  A contention media access method that uses collision-avoidance techniques.

CSMA/CD (carrier-sense multiple-access with collision detection)  A contention media access method that uses collision-detection and retransmission techniques.

CSU/DSU (Channel Service Unit/Data Service Unit)  A CSU/DSU acts as a translator between the LAN data format and the WAN data format. Such a conversion is necessary because the technologies used on WAN links are different from those used on LANs.

cut-through packet switching  A switching method that does not copy the entire packet into the switch buffers. Instead, the destination address is captured into the switch, the route to the destination node is determined, and the packet is quickly sent out the corresponding port. Cut-through packet switching maintains a low latency.

D

D (delta) channel  The channel used on ISDN to communicate signaling and other related information. Use of the D channel leaves the B channels free for data communication. See also B channel.

D-shell connector  A connector shaped like the letter D and uses pins and sockets to establish connections between peripheral devices, using serial or parallel ports. The number that follows DB in the name of a D connector is the number of pins used for connectivity; for example, a DB-9 connector has 9 pins, and a DB-25 connector has 25 pins.

DAT (digital audio tape)  A tape recording technology that uses the helical scan recording method. This technology has been used in videotape recorders and VCRs since the 1950s.

data field  In a frame, the field or section that contains the data.

datagram  An information grouping transmitted as a unit at the network layer.

data-link layer  Layer 2 of the OSI model, which is above the physical layer. Data comes off the cable, goes through the physical layer, and goes into the data-link layer. The data-link layer has two distinct sublayers: MAC and LLC.

DB-9  A 9-pin connector used for serial port or parallel port connection between PCs and peripheral devices.

DB-25  A 25-pin connector used for serial port or parallel port connection between PCs and peripheral devices.

DDNS (dynamic DNS)  A form of DNS that allows systems to be registered and deregistered with the DNS system dynamically. DDNS is facilitated by DHCP, which passes IP address assignments to the DNS server for entry into the DNS server records. This is in contrast with the conventional DNS system, in which entries must be made manually.

DDS (digital data storage)  A format for storing computer data on a DAT. DDS-formatted tapes can be read by either a DDS or DAT drive. The original DDS standard specified a 4mm tape cartridge with a capacity of 1.3GB. Subsequent implementations of DDS have taken the capacity to 40GB with compression.

dedicated line  A dedicated circuit used in WANs to provide a constant connection between two points.

default gateway  Normally a router or a multihomed computer to which packets are sent when they are destined for a host on a different network.

demarcation point  The point at which communication lines enter a customer’s premises. Sometimes shortened to simply “demarc.”

destination address  The network address to which data is being sent.

DHCP (Dynamic Host Configuration Protocol)  A protocol that provides dynamic IP addressing to workstations on the network.

DHCP server  The network device responsible for automatically assigning all IP information, including IP address, subnet mask, DNS, gateway, and so on to client systems.

dial-up networking  Refers to the connection of a remote node to a network using POTS.

differential backup  A backup of only the data that has been created or changed since the previous full backup. In a differential backup, the state of the archive bits is not altered.

dig  On a Linux, UNIX, or Macintosh system you can use the dig command to perform manual DNS lookups.

directional antenna  A wireless antenna designed to focus the wireless signal in a direct line. Directional antennas are designed for establishing a point-to-point wireless signal.

disaster recovery plan  A plan for implementing duplicate computer services in the event of a natural disaster, a human-made disaster, or another catastrophe. A disaster recovery plan includes offsite backups and procedures to activate information systems in alternative locations.

disk duplexing  A fault-tolerant standard based on RAID 1 that uses disk mirroring with dual disk controllers.

disk mirroring  A fault-tolerant standard that is defined as RAID 1 and mirrors data between two disks to create an exact copy.

disk striping  An implementation of RAID in which data is distributed across multiple disks in a stripe. Some striping implementations provide performance improvements (RAID 0), whereas others provide fault tolerance (RAID 5).

distance-vector routing  A type of routing in which a router uses broadcasts to inform neighboring routers on the network of the routes it knows about. Compare with link-state routing.

DNS (domain name service)  A system used to translate domain names, such as www.quepublishing.com, into IP addresses, such as 165.193.123.44. DNS uses a hierarchical namespace that allows the database of hostname-to-IP address mappings to be distributed across multiple servers.

DNS server  The DNS server provides name resolution from hostnames to IP addresses. A DNS server answers clients requests to translate hostnames to IP addresses.

domain  A logical boundary of an Active Directory Structure on Windows Servers. Also, a section of the DNS namespace.

domain name server  A server that runs application software that allows the server to perform a role associated with the DNS service.

DoS (denial of service) attack  A type of hacking attack in which the target system is overwhelmed with requests for service, resulting in it not being able to service any requests, legitimate or otherwise.

downtime  A period of time during which a computer system or network is unavailable. This may be due to scheduled maintenance or to hardware or software failure.

drive mapping  A process through which an alias makes a network path appear as if it were a local drive.

DSL (digital subscriber line)  A public network technology that delivers high bandwidth over conventional copper wiring over limited distances.

DSU (data service unit)  A network communications device that formats and controls data for transmission over digital lines. A DSU is used in conjunction with a CSU.

DTE (data terminal equipment)  A device used at the user end of a user network interface that serves as a data source, a destination, or both. DTE devices include computers, protocol translators, and multiplexers.

dumb terminal  A keyboard/monitor combination that allows access to a multiuser system but provides no processing or storage at the local level.

duplexing  In RAID, a RAID 1 mirror set in which each drive is connected to a separate controller to eliminate the single point of failure that the controller created.

dynamic routing  A routing system that allows routing information to be communicated between devices automatically and can recognize changes in the network topology and update routing tables accordingly. Compare with static routing.

dynamic window  A flow control mechanism that prevents the sender of data from overwhelming the receiver. The amount of data that can be buffered in a dynamic window varies in size, hence its name.

E

EAP (Extensible Authentication Protocol)  An extension of the PPP protocol that supports authentication methods more secure than a standard username and password combination. EAP is commonly used as an authentication protocol for token cards, smart cards, and digital certificates.

EIGRP (Enhanced Interior Gateway Protocol)  A protocol that lets routers exchange information more efficiently than with earlier network protocols. Routers configured to use EIGRP keep copies of their neighbors’ routing information and query these tables to help find the best possible route for transmissions to follow.

EMI (electromagnetic interference)  External interference of electromagnetic signals that causes a reduction of data integrity and increased error rates in a transmission medium.

encapsulation  A technique used by protocols in which header and/or trailer information is added to the protocol data unit as it is passed down through the protocol stack on a sending system. The reverse process, called decapsulation, is performed at the receiving system as the packet travels up through the protocol suite.

encryption  The modification of data for security purposes prior to transmission so that it is not comprehendible without the decoding method.

ESD (electrostatic discharge)  A condition created when two objects of dissimilar electrical charge come into contact with each other. The result is that a charge from the object with the higher electrical charge discharges itself into the object with the lower-level charge. This discharge can be harmful to computer components and circuit boards.

ESSID  The ESSID and the SSID are used interchangeably, but there is a difference between the two. The SSID is the name used with BSS networks, and the ESSID is the network name used with an ESS wireless network design. With an ESS, not all APs necessarily use the same name.

ethernet  The most common LAN technology. Ethernet can be implemented using coaxial, twisted-pair, or fiber-optic cable. Ethernet typically uses the CSMA/CD media access method and has various implementation standards.

Event Viewer  A utility available on Windows server systems commonly used for gathering systems information and used in the troubleshooting process.

F

F-Type  Screw-type connector used with coaxial cable. In computing environments, most commonly used to connect cable modems to ISP equipment or incoming cable feeds.

failover  The automatic switching from one device or system to another. Servers can be configured in a failover configuration so that if the primary server fails, the secondary server takes over automatically.

Fast Ethernet  The IEEE 802.3u specification for data transfers of up to 100Mbps over twisted-pair cable. See also 100BaseFX, 100BaseTX, 100BaseT, and 100BaseT4.

fault tolerance  The capability of a component, system, or network to endure a failure.

FDM (Frequency-Division Multiplexing)  A technology that divides the output channel into multiple smaller-bandwidth channels, each of which uses a different frequency range.

fiber-optic cable  Also known as fiber optics or optical fiber, a physical medium capable of conducting modulated light transmissions. Compared with other transmission media, fiber-optic cable is more expensive, but it is not susceptible to EMI or cross talk, and it is capable of very high data rates and increased distances.

fibre channel  A technology that defines full gigabit-per-second data transfer over fiber-optic cable. Commonly used with storage area network (SAN) implementations.

firewall  A program, system, device, or group of devices that acts as a barrier between one network and another. Firewalls are configured to allow certain types of traffic to pass while blocking others.

FireWire  A high-speed serial bus technology that allows up to 63 devices to be connected to a system. FireWire provides sufficient bandwidth for multimedia operations and supports hot swapping and multiple speeds on the same bus.

fixed wireless  A technology that provides data communication capabilities between two fixed locations. Fixed wireless can be used as a private networking method but is also becoming increasingly common as an Internet access method.

flow control  A method of controlling the amount of data transmitted within a given period of time. There are different types of flow control. See also dynamic window, static window.

FQDN (fully qualified domain name)  The entire domain name that specifies the name of the computer as well as the domain in which it resides and the top-level DNS domain (for example, www.marketing.quepublishing.com).

fragment-free switching  A switching method that uses the first 64 bytes of a frame to determine whether the frame is corrupted. If this first part is intact, the frame is forwarded.

frame  A grouping of information transmitted as a unit across the network at the data-link layer of the OSI model.

Frame Length field  In a data frame, the field that specifies the length of a frame.

Frame Type field  In a data frame, the field that names the protocol being sent in the frame.

frequency  The number of cycles of an alternating current signal over a unit of time. Frequency is expressed in Hertz.

FTP (File Transfer Protocol)  A protocol that provides for the transfer of files between two systems. FTP is part of the TCP/IP protocol suite and operates at Layer 7 of the OSI model.

full backup  A backup in which files, regardless of whether they have been changed, are copied to the backup media. In a full backup, the archive bits of the files are reset.

full-duplex  A system in which data is transmitted in two directions simultaneously. Compare with half-duplex.

G

gateway  A hardware or software solution that enables communications between two dissimilar networking systems or protocols. A gateway can operate at any layer of the OSI model but is commonly associated with the application layer.

Gb (gigabit)  1 billion bits or 1,000Mb.

Gbps (gigabits per second)  The throughput of a given network medium in terms of 1 billion bps.

GFS (Grandfather-Father-Son)  A backup strategy of maintaining backups on a daily, weekly, and monthly schedule. Backups are made on a five-day or seven-day schedule. A full backup is performed at least once a week. On all other days full, incremental, or differential backups (or no backups at all) are performed. The daily incremental, or differential, backups are known as the son. The father is the last full backup in the week (the weekly backup). The grandfather is the last full backup of the month (the monthly backup).

Gigabit Ethernet  An IEEE 802.3 specification that defines standards for data transmissions of 1Gbps. See also 1000BaseX.

H

hacker  A person who carries out hacking on a computer software program. See also cracker.

half-duplex  A connection in which data is transmitted in both directions but not simultaneously. Compare with full-duplex.

handshake  The initial communication between two data communication devices, during which they agree on protocol and transfer rules for the session.

hardware address  The hardware-encoded MAC address burned into every NIC.

hardware loopback  A device that is plugged into an interface for the purposes of simulating a network connection and thus enabling the interface to be tested as if it is operating while connected.

high availability  High availability refers to mechanisms used to ensure that a network is operational without failing. These mechanisms include RAID and the use of redundant hardware.

high-speed token ring  A version of token ring that has a maximum speed of 100Mbps. This is in contrast with other token ring standards, which have maximum speeds of 4Mbps or 16Mbps.

hop  The means by which routing protocols determine the shortest way to reach a given destination. Each router constitutes one hop; so if a router is four hops away from another router, there are three routers, or hops, between itself and the destination. In some cases, the final step is also counted as a hop.

horizontal cross connect  Horizontal cross connect ties the telecommunication room to the end user. Specifically, the horizontal cabling extends from the telecommunications outlet, or network outlet with RJ-45 connectors, at the client end, includes all cable from that outlet to the telecommunication room to the horizontal cross connect. The term horizontal cross connect refers to the distribution point for the horizontal cable.

host  Typically refers to any device on the network that has been assigned an IP address.

host ID  An identifier used to uniquely identify a client or resource on a network.

hostname  A name assigned to a system for the purposes of identifying it on the network in a more user-friendly manner than by the network address.

HOSTS file  A text file that contains hostname-to-IP address mappings. All commonly used platforms accommodate static name resolution using the HOSTS file.

hot site  A disaster recovery term used to describe an alternate network site that can be immediately functional in the event of a disaster at the primary site.

hot spare  In a RAID configuration, a drive that sits idle until another drive in the RAID array fails, at which point the hot spare takes over the role of the failed drive.

hot swap  The removal and replacement of a component in a system while the power is still on and the system is functioning.

hotspot  An area in which an access point provides public wireless broadband network services to mobile visitors through a WLAN. Hotspots are often located in heavily populated places such as airports, hotels, and coffee shops.

hub  A simple hub is used to connect devices on a ethernet twisted-pair network. The hub forms the central connecting device of an ethernet star network.

HSSI (High Speed Serial Interface)  The network standard for high-speed serial communications over WAN links, including various T-carrier technologies.

HTTP (Hypertext Transfer Protocol)  A protocol used by web browsers to transfer pages, links, and graphics from the remote node to the user’s computer.

HTTPS (Hypertext Transfer Protocol Secure)  A protocol that performs the same function as HTTP but does so over an encrypted link, ensuring the confidentiality of any data that is uploaded or downloaded. Also referred to as S-HTTP.

hub  A hardware device that acts as a connection point on a network that uses twisted-pair cable. Also known as a concentrator or a multiport repeater.

hybrid  Hybrid refers to combination network topologies. An example is a star bus topology that has elements of a star and bus topology.

HyperTerminal  A Windows-based communications program that allows users to establish host/shell access to a remote system.

I

IANA (Internet Assigned Numbers Authority)  An organization responsible for IP addresses, domain names, and protocol parameters. Some functions of IANA, such as domain name assignment, have been devolved into other organizations.

ICMP (Internet Control Message Protocol)  A network-layer Internet protocol documented in RFC 792 that reports errors and provides other information relevant to IP packet processing. Utilities such as ping and tracert use functionality provided by ICMP.

IDF (intermediate distribution frame)  In some networks, multiple wiring closets are used. When this is the case, the wiring closet, known as the main distribution frame (MDF), connects to secondary wiring closets, or intermediate distribution frames (IDF). See also MDF.

IEEE (Institute of Electrical and Electronics Engineers)  A professional organization that among other things, develops standards for networking and communications.

IEEE 1394  A standard that defines a system for connecting up to 63 devices on an external bus. IEEE 1394 is commonly used with consumer electronic devices such as video cameras and MP3 players. IEEE 1394 is based on a technology developed by Apple Computers called FireWire.

IEEE 802.1  A standard that defines the OSI model’s physical and data-link layers. This standard allows two IEEE LAN stations to communicate over a LAN or WAN and is often referred to as the internetworking standard.

IEEE 802.1X  An IEEE security standard designed for authenticating wireless devices. This standard uses the Extensible Authentication Protocol (EAP), to provide a central authentication server to authenticate each user on the network.

IEEE 802.2  A standard that defines the LLC sublayer of the data-link layer for the entire series of protocols covered by the 802.x standards. This standard specifies the adding of header fields, which tell the receiving host which upper layer sent the information.

IEEE 802.3  A standard that specifies physical-layer attributes, such as signaling types, data rates, and topologies, as well as the media access method used. It also defines specifications for the implementation of the physical layer and the MAC sublayer of the data-link layer, using CSMA/CD. This standard also includes the original specifications for Fast Ethernet.

IEEE 802.4  A standard that defines how production machines should communicate and establishes a common protocol for use in connecting these machines. It also defines specifications for the implementation of the physical layer and the MAC sublayer of the data-link layer, using token-ring access over a bus topology.

IEEE 802.5  A standard used to define token ring. However, it does not specify a particular topology or transmission medium. It provides specifications for the implementation of the physical layer and the MAC sublayer of the data-link layer, using a token-passing media-access method on a ring topology.

IEEE 802.6  A standard that defines the distributed queue dual bus technology to transfer high-speed data between nodes. It provides specifications for the implementation of MANs.

IEEE 802.7  A standard that defines the design, installation, and testing of broadband-based communications and related physical media connectivity.

IEEE 802.8  A standard that defines a group, called the Fiber Optic Technical Advisory Group, that advises the other 802 standard committees on various fiber-optic technologies and standards.

IEEE 802.9  A standard that defines the integration of voice and data transmissions using isochronous ethernet.

IEEE 802.10  A standard that focuses on security issues by defining a standard method for protocols and services to exchange data securely by using encryption mechanisms.

IEEE 802.11  The original IEEE wireless standard defining standards for wireless LAN communication.

IEEE 802.11a  A wireless networking standard operating in the 5GHz band. 802.11a supports a maximum theoretical data rate of 54Mbps. Depending on interference, 802.11a could have a range of 150 feet at the lowest speed setting. Higher-speed transmissions would see a lower range. 802.11a uses the CSMA/CA media access method and is not compatible with 802.11b and 802.11g.

IEEE 802.11b  A commonly deployed IEEE wireless standard that uses the 2.4GHz RF range and offers speeds up to 11Mbps. Under ideal conditions, the transmission range can be as far as 75 meters.

IEEE 802.11g  An IEEE wireless standard that is backward compatible with 802.11b. 802.11g offers a data rate of 54Mbps. Like 802.11b, 802.11g uses the 2.4GHz RF range.

IEEE 802.11n  The goal of the 802.11n standard is to significantly increase throughput in both the 2.4GHZ and the 5GHz frequency range. The baseline goal of the standard was to reach speeds of 100Mbps, but given the right conditions, it is estimated that the 802.11n speeds might reach a staggering 600 Mbps. In practical operation, 802.11n speeds will be much less.

IEEE 802.12  A standard that defines 100BaseVG-AnyLAN, which uses a 1Gbps signaling rate and a special media access method that allows 100Mbps data traffic over voice-grade cable.

IETF (Internet Engineering Task Force)  A group of research volunteers responsible for specifying the protocols used on the Internet and for specifying the architecture of the Internet.

ifconfig  A command used on Linux, UNIX, and OS/2 systems to obtain configuration for and configure network interfaces.

IGMP (Internet Group Management Protocol)  Protocol used for communication between devices within the same multicast group. IGMP provides a mechanism for systems to detect and make themselves aware of other systems in the same group.

IMAP4 (Internet Message Access Protocol 4)  A protocol that allows email to be retrieved from a remote server. It is part of the TCP/IP protocol suite, and it is similar in operation to POP but offers more functionality.

incremental backup  A backup of only files that have been created or changed since the last backup. In an incremental backup, the archive bit is cleared to indicate that a file has been backed up.

infrared  A wireless data communication method that uses light pulses in the infrared range as a carrier signal.

infrastructure topology  Wireless topology that defines a wireless network composed of an access point connected to a wired LAN. Wireless devices communicate with the wired LAN through the access point (AP).

intelligent hub/switch  A hub or switch that contains some management or monitoring capability.

intelligent UPS  A UPS that has associated software for monitoring and managing the power provided to the system. For information to be passed between the UPS and the system, the UPS and system must be connected, which is normally achieved through a serial or USB connection.

interface  A device, such as a card or a plug, that connects pieces of hardware with a computer so that information can be moved from place to place (for example, between computers and printers, hard disks, and other devices, or between two or more nodes on a network). Also, the part of an application or operating system that the user sees.

interference  Anything that can compromise the quality of a signal. On bound media, cross talk and EMI are examples of interference. In wireless environments, atmospheric conditions that degrade the quality of a signal are considered interference.

internal loopback address  Functionality built in to the TCP/IP protocol stack that allows one to verify the correct functioning of the stack by pinging any address in the 127.x.x.x range, except the network address (127.0.0.0) or the broadcast address (127.255.255.255). The address 127.0.0.1 is most commonly used.

Internet domain name  The name of an area of the DNS namespace. The Internet domain name is normally expressed along with the top-level domain to which it belongs (for example, comptia.org).

Internet layer  In the TCP/IP architectural model, the layer responsible for addressing, packaging, and routing functions. Protocols that operate at this layer are responsible for encapsulating packets into Internet datagrams. All necessary routing algorithms are run here.

internetwork  A group of networks connected by routers or other connectivity devices so that the networks function as one network.

intrusion detection  The process or procedures that provide a warning of successful or failed unauthorized access to a system.

I/O (input/output)  An operation in which data is either entered into a computer or taken out of a computer.

IP (Internet Protocol)  A network-layer protocol, documented in RFC 791, that offers a connectionless internetwork service. IP provides features for addressing, packet fragmentation and reassembly, type-of-service specification, and security.

IP address  The unique address used to identify the network number and node address of a device connected to a TCP/IP network. IP addresses are typically expressed in dotted decimal format, for example, 192.168.1.1.

ipconfig  A Windows command that provides information about the configuration of the TCP/IP parameters, including the IP address.

IPsec (IP security)  A protocol used to provide strong security standards for encryption and authentication on VPNs.

IPv6 (Internet Protocol version 6)  The new version of IP, which has a larger range of usable addresses than the current version of IP, IPv4, and enhanced security.

IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)  The default protocol used in NetWare networks. It is a combination of IPX, to provide addressing, and SPX, to provide guaranteed delivery for IPX. IPX/SPX is similar in nature to its counterpart, TCP/IP.

IrDA  Wireless networking technology that uses infrared beams to send data transmissions between devices.

IRTF (Internet Research Task Force)  The research arm of the Internet Architecture Board that performs research in the areas of Internet protocols, applications, architecture, and technology.

ISA (Industry Standard Architecture)  The standard of the older, more common, 8-bit and 16-bit bus and card architectures.

ISDN (Integrated Services Digital Network)  An internationally adopted standard for providing end-to-end digital communications between two points. ISDN is a dial-up technology allowing data, voice, and other source traffic to be transmitted over a dedicated link.

ISDN terminal adapter  A device that enables communication over an ISDN link.

IS-IS (Intermediate System to Intermediate System)  A link state protocol that discovers the shortest path for data travel using the shortest path first (SPF) algorithm. IS-IS routers distribute topology information to other routers, allowing them to make the best path decisions.

ISO (International Organization for Standardization)  A voluntary organization founded in 1946 that is responsible for creating international standards in many areas, including communications and computers. This also includes the development of the OSI model.

ISP (Internet service provider)  A company or an organization that provides facilities for clients to access the Internet.

J

jumpered (or jumpering)  Refers to the physical placement of shorting connectors on a board or card.

K

Kb (kilobit)  1,000 bits.

KB (kilobyte)  1,000 bytes.

Kerberos  Network authentication protocol designed to ensure that the data sent across networks is encrypted and safe from attack. Its primary purpose is to provide authentication for client/server applications.

kernel  The core of an operating system. The kernel provides basic functions and services for all other parts of the operating system, including the interface with which the user interacts.

L

L2TP (Layer 2 Tunneling Protocol)  A dial-up VPN protocol that defines its own tunneling protocol and works with the advanced security methods of IPsec. L2TP allows PPP sessions to be tunneled across an arbitrary medium to a home gateway at an ISP or a corporation.

LACP (Link Aggregation Control Protocol)  A protocol used to control the bundling of several physical ports together to form a single logical channel. This allows for greater throughput and redundancy.

LAN (local area network)  A group of connected computers located in a single geographic area—usually a building or office that share data and services.

latency  The delay induced by a piece of equipment or device used to transfer data.

latency sensitivity  Refers to those applications that need bandwidth for quick delivery where network lag time impacts their effectiveness. This includes voice and video transfer. For example, VoIP would be difficult to use if there was a significant lag time in the conversation.

LC (local connector)  A snap-type media connector used with fiber-optic cabling.

LDAP (Lightweight Directory Access Protocol)  Protocol used to access and query compliant directory services systems such as Microsoft Active Directory or Novell Directory services.

learning bridge  A bridge that builds its own bridging address table instead of requiring someone to enter information manually. Most modern bridges are learning bridges. Also called a smart bridge.

line conditioner  A device used to stabilize the flow of power to the connected component. Also known as a power conditioner or voltage regulator.

link light  An LED on a networking device such as a hub, switch, or NIC. The illumination of the link light indicates that, at a hardware level, the connection is complete and functioning.

link-state routing  A dynamic routing method in which routers tell neighboring routers of their existence through packets called link-state advertisements (LSAs). By interpreting the information in these packets, routers can create maps of the entire network. Compare with distance-vector routing.

Linux  A UNIX-like operating system kernel created by Linus Torvalds. Linux is distributed under an open-source license agreement, as are many of the applications and services that run on it.

LLC (logical link control) layer  A sublayer of the data-link layer of the OSI model. The LLC layer provides an interface for network-layer protocols and the MAC sublayer.

LMHOSTS file  A text file used in a Windows network environment that contains a list of NetBIOS hostname-to-IP address mappings used in TCP/IP name resolution.

load balancing  Load balancing increases redundancy by distributing the load to multiple servers, devices, or network cards. The purpose of load balancers is to decentralize the workload between multiple devices to increase overall redundancy and performance.

logical addressing scheme  The addressing method used in providing manually assigned node addressing.

logical topology  The appearance of the network to the devices that use it, even if in physical terms the layout of the network is different. See also physical topology.

loop  A continuous circle that a packet takes through a series of nodes in a network until it eventually times out.

loopback plug  A device used for loopback testing.

loopback testing  A troubleshooting method in which the output and input wires are crossed or shorted in a manner that allows all outgoing data to be routed back into the card.

LPD (Line Printer Daemon)  Service on a system (normally UNIX or Linux) that acts as a print server. Print jobs are submitted to the LPD application using a protocol such as LPR.

LPR (Line Printer Remote)  Network service that allows printing jobs to be sent to a remote print service such as LPD.

M

MAC (Media Access Control) address  A six-octet number, described in hexadecimal, that uniquely identifies a host on a network. It is a unique number that is burned into the network interface.

Mac OS X  Version 10 of an operating system designed for Macintosh computer systems. Mac OS X represents a complete shift in Apple operating systems because it is based on UNIX code and as such can be managed using UNIX utilities and procedures.

MAC layer  In the OSI model, the lower of the two sublayers of the data-link layer. It is defined by the IEEE as being responsible for interaction with the physical layer.

MAN (metropolitan area network)  A network that spans a defined geographical location such as a city or suburb.

master name server  The supplying name server that has authority in a DNS zone.

MAU (media access unit)  A transceiver specified in IEEE 802.3. Not to be confused with a token-ring multistation access unit, which is abbreviated MSAU.

Mb (megabit)  1 million bits. Used to rate transmission transfer speeds.

MB (megabyte)  1 million bytes. Usually refers to file size.

Mbps (megabits per second)  The number of millions of bits that can travel across a given medium in a second.

MDF (main distribution frame)  The main distribution frame identifies a type of wiring closet. The primary wiring closet for a network typically holds the majority of the network gear, including routers, switches, wiring, servers and so on. This is also typically the wiring closet where outside lines run into the network. This main wiring closet is known as the MDF. One of the key components in the MDF is a primary patch panel. The network connector jacks attached to this patch panel lead out to the building for network connections. See also IDF.

MDI (medium-dependent interface)  A type of port found on ethernet networking devices, such as hubs and switches, in which the wiring is straight through. MDI ports are sometimes referred to as uplink ports and are intended for use as connectivity points to other hubs and switches.

MDI-X (medium-dependent interface crossed)  A type of port found on ethernet networking devices in which the wiring is crossed so that the transmit line of one device becomes the receive line of the other. MDI-X is used to connect hubs and switches to client computers.

media  The cabling and wireless technologies used to create the network.

media converters  Hardware devices often used to connect newer Gigabit Ethernet technologies with older 100BaseT networks or older copper standards with fiber.

mesh  Mesh is a type of network design in which every node is interconnected to every other node. The mesh can be a wired to wireless mesh. It is used to create redundant paths between devices.

message switching  Message switching divides data transmissions into messages that contain the destination address. Devices on the network that forward the message use this destination address. Each intermediate device in the message’s path stores the message momentarily and then forwards it to the next device in the network, until it finally reaches its destination.

metric  A value that can be assigned to a route to encourage or discourage the use of the route. See also cost.

MIB (Management Information Base)  A data set that defines the criteria that can be retrieved and set on a device, using SNMP.

microsegmentation  The process of using switches to divide a network into smaller segments.

microwaves  A wireless technology sometimes used to transmit data between buildings and across vast distances.

mirroring  A fault-tolerant technique in which an exact duplicate of data on one volume is created on another. Mirroring is defined as RAID 1. See RAID.

MMF (multimode fiber)  A form of fiber media that allows hundreds of light rays to flow through the fiber simultaneously. Compare to SMF.

modem (modulator-demodulator)  A device used to modulate and demodulate the signals that pass through it. It converts the direct current pulses of the serial digital code from the controller into the analog signals that are compatible with the telephone network.

MPLS (Multiprotocol Label Switching)  MPLS is a technology designed to speed up network traffic flow by moving away from the use of traditional routing tables. Instead of the routing tables, MPLS uses short labels to direct packets and forward them through the network.

MSAU (multistation access unit)  A device used in an IBM Token Ring network. It organizes the connected nodes into an internal ring and uses the RI and RO connectors to expand to other MSAUs on the network. Sometimes referred to as MAU.

MTBF (mean time between failure)  The amount of time, normally expressed in hours, that represents the average amount of time a component will function before it fails.

mtr (my traceroute)  A command is used on Linux/UNIX systems and essentially combines the functionality of ping with that of traceroute. After it is issued, the command provides details of the path between two hosts (similar to the traceroute command) and additionally, statistics for each node in the path based on samples taken over a time period (similar to the ping command).

MTRJ  Media connector used with fiber-optic cabling.

multicast  A single-packet transmission from one sender to a specific group of destination nodes.

multifunction network device  A multifunction device is one that combines multiple network services into a single device, reducing cost and easing administrative difficulty.

multihomed  A term used to refer to a device that has more than one network interface.

multilayer switch  A device that operates as both a switch and a router.

multiplatform  A term used to refer to a programming language, technology, or protocol that runs on different types of CPUs or operating systems.

multiplexing  Multiplexing is a technique of combining multiple channels over a transmission path and then recovering or demultiplexing the separate channels at the receiving end. Examples include FDM, TDM, CDM, and WDM.

multitasking  The running of several programs simultaneously. In actuality, during multitasking the processor is sharing its time between the programs, and it only appears as if they are running concurrently.

N

name server  A server that contains a database of name resolution information used to resolve network names to network addresses.

NAT (Network Address Translation)  A standard that enables the translation of IP addresses used on one network to a different IP address that is acceptable for use on another network. This translation allows multiple systems to access an external network, such as the Internet, through a single IP address.

NBNS (NetBIOS name server)  A central server that provides name resolution for NetBIOS names to IP addresses. Commonly referred to as a WINS server.

nbtstat  A Windows operating system command-line utility that displays protocol statistics and current TCP/IP connections using NetBIOS over TCP/IP (NBT).

NetBEUI (NetBIOS Extended User Interface)  A nonroutable, Microsoft-proprietary networking protocol designed for use in small networks.

NetBIOS (Network Basic Input/Output System)  A software application that allows different applications to communicate between computers on a LAN.

netstat  A Windows operating system command-line utility that displays protocol statistics and current TCP/IP network connections.

network card  See NIC.

network ID  The part of a TCP/IP address that specifies the network portion of the IP address. The network ID is determined by the class of the address, which in turn is determined by the subnet mask used.

network interface layer  The bottom layer of the TCP/IP architectural model, which is responsible for sending and receiving frames.

network layer  The network layer of the OSI model is primarily concerned with providing a mechanism by which data can be moved between two networks or systems. IP is a Layer 3 protocol.

network operating system  An operating system that runs on the servers on a network. Network operating systems include NetWare, UNIX, Windows NT Server, and Windows Server systems.

newsgroup  A discussion group that focuses on a specific topic and is made up of a collection of messages posted to an Internet site. Newsgroups are useful resources for support personnel.

NIC (network interface card)  A hardware component that serves as the interface, or connecting component, between a network and the node. It has a transceiver, a MAC address, and a physical connector for the network cable. Also known as a network adapter or a network card.

NMS (Network Management System)  An application that acts as a central management point for network management. Most NMS systems use SNMP to communicate with network devices.

NNTP (Network News Transfer Protocol)  An Internet protocol that controls how news articles are to be queried, distributed, and posted. NNTP uses port 119.

noise  Another name for EMI. See EMI.

NTP (Network Time Protocol)  A protocol used to communicate time synchronization information between devices on the network. NTP is part of the TCP/IP protocol suite. NTP uses port 123.

O

omnidirectional antenna  An omnidirectional antenna disperses the wireless signal in a 360 degree radius. Compare with directional antenna.

operating system  The main computer program that manages and integrates all the applications running on a computer. The OSs handles all disk interactions with the processor.

OSI (Open Systems Interconnect) reference model  A seven-layer model created by the ISO to standardize and explain the interactions of networking protocols.

OSPF (Open Shortest Path First)  A link-state routing protocol used on TCP/IP networks. Compare with distance-vector routing.

OTDR  The OTDR is a tool used to locate problems with optical media. An OTDR is used to locate cable breaks in optical cable.

P

packet filtering  A firewall method in which each packet that attempts to pass through the firewall is examined to determine its contents. The packet is then allowed to pass, or it is blocked, as appropriate.

packet sniffer  A device or an application that allows data to be copied from the network and analyzed. In legitimate applications, it is a useful network troubleshooting tool.

packet switching  A messaging system in which data is broken into packets that contain source and destination information. The packets are then independently forwarded through the network and reassembled at the destination.

PAN (personal area network)  A network layout whereby devices work together in close proximity to share information and services, commonly using technologies such as Bluetooth or infrared.

PAP  A simple authentication protocol in which the username and password are sent to the remote access server in clear text, making it possible for anyone listening to network traffic to steal both. PAP is typically used only when connecting to older UNIX-based remote access servers that do not support any additional authentication protocols.

passive hub  A hub that has no power and therefore does not regenerate the signals it receives. Compare with active hub.

password  A set of characters used with a username to authenticate a user on a network and to provide the user with rights and permissions to files and resources.

PAT (Port Address Translation)  A variation on NAT. With PAT, all systems on the LAN are translated to the same IP address, but with a different port number assignment. See NAT.

patch  A fix for a bug in a software application. Patches can be downloaded from the Internet to correct errors or security problems in software applications.

patch cable  A cable, normally twisted-pair, used to connect two devices. Strictly speaking, a patch cable is the cable that connects a port on a hub or switch to the patch panel, but today the term commonly refers to any cable connection.

patch panel  A device in which the cables used in coaxial or twisted-pair networks converge and are connected. The patch panel is usually in a central location.

peer-to-peer networking  A network environment that does not have dedicated servers, where communication occurs between similarly capable network nodes that act as both clients and servers.

permissions  Authorization provided to users that allows them to access objects on a network. The network administrators generally assign permissions. Permissions is slightly different from but often used with rights.

physical address  The MAC address on every NIC. The physical address is applied to a NIC by the manufacturer and, except for rare occurrences, is never changed.

physical layer  Layer 1 of the OSI model, where all physical connectivity is defined.

physical topology  The actual physical layout of the network. Common physical topologies include star, bus, and ring. Compare with logical topology.

ping  A TCP/IP protocol stack utility that works with ICMP and uses echo requests and replies to test connectivity to other systems.

PKI (Public Key Infrastructure)  A collection of software, standards, and policies that are combined to allow users from the Internet or other unsecured public networks to securely exchange data. PKI uses a public and a private cryptographic key pair that is obtained and shared through a trusted authority.

plenum  The space between the structural ceiling and a drop-down ceiling that is commonly used for heating, ventilation, and air-conditioning systems as well as for running network cables.

PoE (Power over Ethernet)  A technology that allows electrical power to be transmitted over twisted-pair ethernet cable. The power is transferred, along with data, to provide power to remote devices.

Point to multipoint  A wireless connection designed to link multiple wired networks. Signals in point-to-multipoint networks travel from a central node, such as a base station of a cellular system, an access point of a WLAN, or a satellite.

Point to point  Refers to a wireless topology configuration. It identifies the communication link that travels from one node directly to one other node. Wireless point-to-point systems are often used in wireless backbone systems, such as microwave relay communications, or as a replacement for a single wired communication cable.

PoP (point-of-presence)  The physical location where a long-distance carrier or a cellular provider interfaces with the network of the local exchange carrier or local telephone company.

POP3 (Post Office Protocol 3)  A protocol that is part of the TCP/IP protocol suite and is used for retrieving mail stored on a remote server. The most commonly used version of POP is POP3. POP is an application layer protocol.

port  In physical networking terms, a pathway on a networking device that allows other devices to be connected. In software terms, a port is the entry point into an application, system, or protocol stack.

port authentication  Port authentication identifies the process of authenticating users on a port-by-port basis. 802.1X is an example of a port authentication protocol.

port mirroring  A process by which two ports on a device, such as a switch, are configured to receive the same information. Port mirroring is useful in troubleshooting scenarios.

POTS (plain old telephone system)  The current analog public telephone system. See also PSTN.

PPP (Point-to-Point Protocol)  A common dial-up networking protocol that includes provisions for security and protocol negotiation and provides host-to-network and switch-to-switch connections for one or more user sessions.

PPPoE (Point-to-Point Protocol over Ethernet)  Internet connection authentication protocol that uses two separate technologies, ethernet and the point-to-point protocol (PPP), to provide a method for multiple users to share a common digital subscriber line (DSL), cable modem, or wireless connection to the Internet.

PPTP (Point-to-Point Tunneling Protocol)  A protocol that encapsulates private network data in IP packets. These packets are transmitted over synchronous and asynchronous circuits to hide the underlying routing and switching infrastructure of the Internet from both senders and receivers. PPTP is widely used for VPN deployment.

presentation layer  Layer 6 of the OSI model, which prepares information to be used by the application layer. The presentation layer deals with both encryption and compression.

PRI (Primary Rate Interface)  A high-level network interface standard for use with ISDN. PRI is defined as having a rate of 1.544Mbps, and it consists of a single 64Kbps D channel plus 23 T1 B channels for voice or data. See also BRI, ISDN.

primary name server  The DNS server that offers zone data from files stored locally on the machine.

private network  A network to which access is limited, restricted, or controlled. Most corporate networks are private networks. Compare with public network.

proprietary  A standard or specification created by a single manufacturer, vendor, or other private enterprise.

protocol  A set of rules or standards that control data transmission and other interactions between networks, computers, peripheral devices, and operating systems.

proxy  A device, an application, or a service that acts as an intermediary between two hosts on a network, eliminating the capability for direct communication.

proxy server  A server that acts as a go-between for a workstation and the Internet. A proxy server typically provides an increased level of security, caching, NAT, and administrative control.

PSTN (public switched telephone network)  A term that refers to all the telephone networks and services in the world. The same as POTS, PSTN refers to the world’s collection of interconnected public telephone networks that are both commercial and government owned. All of the PSTN is digital, except the connection between local exchanges and customers (which is called the local loop or last mile), which remains analog.

public network  A network, such as the Internet, to which anyone can connect with the most minimal of restrictions. Compare with private network.

punchdown block  A device used to connect network cables from equipment closets or rooms to other parts of a building. Connections to networking equipment such as hubs or switches are established from the punchdown block. Also used in telecommunications wiring for distributing phone cables to their respective locations throughout the building.

punchdown tool  A hand tool that enables the connection of twisted-pair wires to wiring equipment such as a patch panel.

PVC (Permanent Virtual Circuit)  A PVC is a permanent dedicated virtual link that is shared in a Frame Relay network replacing a hardwired dedicated end to-end line.

Q

QoS (Quality of Service)  Describes the strategies used to manage and increase the flow of network traffic. The QoS feature allows administrators to predict bandwidth use, monitor that use, and control it to ensure that bandwidth is available to the applications that need it.

R

RADIUS (Remote Authentication Dial-in User Service)  A security standard that employs a client-server model to authenticate remote network users. Remote users are authenticated using a challenge and response mechanism between the remote access server and the RADIUS server.

RAID (redundant array of inexpensive disks)  A method of storing data on multiple hard drives, allowing the overlapping of I/O operations. Depending on the level of RAID, there are either fault-tolerant or performance advantages.

RAID 0  A RAID configuration that employs data striping but lacks redundancy because no parity information is recorded (see RAID 5). As a result, RAID 0 offers no fault tolerance, but it does offer increased performance. Requires a minimum of two disks.

RAID 1  A fault-tolerant method that uses disk mirroring to duplicate the information stored on a disk. Also referred to as disk duplexing when the two drives in a RAID 1 array are connected to separate disk controllers.

RAID 2  A fault-tolerant method that uses disk striping with error correction.

RAID 3  A fault-tolerant method that uses disk striping with a single disk for parity.

RAID 4  A fault-tolerant method that uses disk striping with a single disk for parity. Striping is done across the disks in blocks.

RAID 5  A fault-tolerant method that uses disk striping with distributed parity. Striping is done across the disks in blocks.

RAID 10  Also referred to as RAID 1/0, a RAID configuration in which stripe sets (RAID 0) are mirrored (RAID 1). This combination provides the fault-tolerant aspects of RAID 1 and the performance advantages of RAID 0.

RARP (Reverse Address Resolution Protocol)  A protocol, part of the TCP/IP protocol suite, that resolves MAC addresses to IP addresses. Its relative ARP resolves IP addresses to MAC addresses. RARP resides on the network layer of the OSI model.

RAS (Remote Access Service)  A Windows NT/2000 service that allows access to the network through remote connections.

RDP (Remote Desktop Protocol)  Presentation layer protocol that supports traffic between a Windows terminal client and Windows Terminal Server. RDP is also used for the Remote Desktop feature of Windows XP/Vista and Windows Server products.

read-only  An assigned right that allows the user to open a file and look at the contents or to execute the file if it is an application. The user cannot change the file or delete it.

remote control  In networking, having physical control of a remote computer through software such as PCAnywhere or Microsoft Systems Management Server.

remote node  A node or a computer connected to a network through a remote connection. Dialing in to the Internet from home is an example of the remote node concept.

repeater  A device that regenerates and retransmits signals on a network. Repeaters are usually used to strengthen signals going long distances.

resolver  A system that is requesting the resolution of a name to an IP address. This term can be applied to both DNS and WINS clients.

resource conflict  A problem that occurs when multiple devices are using the same IRQ or I/O address at the same time, usually causing the devices to fail and the program to halt.

restore  To transfer data from backup media to a server. The opposite of back up.

RFC (Request for Comments)  The process by which standards relating to the Internet, the TCP/IP suite, and associated technologies are created, commented on, and approved.

RG-6/8/58/59  Designations for the coaxial cable used in thin coaxial networks that operate on the ethernet standard.

RI (ring in)  A connector used in an IBM Token Ring network on an MSAU to expand to other MSAUs on the network. The counterpart to the RO, the RI on the MSAU connects to the media to accept the token from the ring.

rights  An authorization provided to users that allows them to perform certain tasks. The network administrator generally assigns rights. Slightly different from but often used with the term permissions.

ring  In a ring topology, data flows in a physical or logical ring. In the ring topology, the network layout forms a complete ring. Computers connect to the network cable directly or, far more commonly, through a specialized network device called an MSAU.

RIP (Routing Information Protocol)  A protocol that uses hop count as a routing metric to control the direction and flow of packets between routers on an internetwork. There are versions of RIP for use on both TCP/IP- and IPX/SPX-based networks.

RJ-11 connector  A connector that is used with telephone systems and can have up to six conductors.

RJ-45 connector  An connector that is used with twisted-pair cable and can support eight conductors for four pairs of wires.

RO (ring out)  A connector used in an IBM Token Ring network on an MSAU to expand to other MSAUs on the network. The counterpart to the RI, the RO on the MSAU connects to the medium to send the token out to the ring.

rollover  The rollover cable is a Cisco proprietary cable used to connect a computer system to a router or switch console port.

route  The entire path between two nodes on a network.

router  A device that works at the network layer of the OSI model to control the flow of data between two or more network segments.

RS-232  A communications standard that defines the flow of serial communications and the particular functions assigned to the wires in a serial cable.

RSA  An algorithm for public-key cryptography that can be used for encryption purposes. RSA is used as a secure solution for e-commerce.

RSH Remote Shell  UNIX utility used to run a command on a remote machine. RSH sends data in clear text and SSH is used when secure transmission is required.

RTP (Real-time Transport Protocol)  The Internet-standard protocol for the transport of real-time data, including audio and video.

S

sag  A momentary drop in the voltage provided by a power source.

SC (standard connector)  A push/pull type of fiber optic connector.

SCP (Secure Copy Protocol)  Basic file copying protocol that uses Secure Shell (SSH) technology to provide security to the transfer.

secondary name server  A type of DNS server that gets its zone data from another DNS name server that has authority in that zone.

security log  A log located in the Windows Event Viewer that provides information on audit events that the administrator has determined to be security related. These events include logons, attempts to log on, attempts to access areas that are denied, and attempts to log on outside normal hours.

security policy  In general terms, a written policy that defines the rules and regulations pertaining to the security of company data and the use of computer systems. More specifically, the policy configuration on a server system or a firewall that defines the security parameters for a system.

segment  A physical section of a network.

segmentation  The process of dividing a network into smaller areas through a process known as segmentation. A bridge is a network device which can segment networks.

server  A network node that fulfills service requests for clients. Usually referred to by the type of service it performs, such as file server, communications server, or print server.

server-based application  An application run from a network share rather than from a copy installed on a local computer.

server-based networking  A network operating system dedicated to providing services to workstations, or clients. See also client/server networking.

service pack  A software update that fixes multiple known problems and in some cases provides additional functionality to an application or operating system.

session  The time period for which the dialog remains open between two nodes.

session layer  Layer 5 of the OSI model, which establishes, manages, and terminates sessions between applications on different nodes.

SFTP (Secure File Transfer Protocol)  A implementation of the File Transfer Protocol (FTP) that uses Secure Shell (SSH) technology to provide additional authentication and encryption services for file transfers.

shared system  The infrastructure component routed directly into the backbone of an internetwork for optimal systems access. It provides connectivity to servers and other shared systems.

shell  An interface, graphical or otherwise, that enables a user to access the functionality of an operating system.

SIP (Session Initiation Protocol)   An application-layer protocol designed to establish and maintain multimedia sessions such as Internet telephony calls.

SLIP (Serial Line Internet Protocol)  A protocol that uses encapsulation to allow TCP/IP to be transmitted over asynchronous lines, such as standard telephone lines. Previously used for most Internet access, SLIP has been largely replaced by PPP because of SLIP’s lack of error-checking capabilities.

SMF (single-mode fiber)  A fiber cable that allows only a single light beam to pass. The light transmissions in single-mode fiber pass through the core in a direct line, like a flashlight beam. Compare to MMF.

SMTP (Simple Mail Transfer Protocol)  An Internet protocol used for the transfer of email messages and attachments.

SNAP (SubNetwork Access Protocol)  An Internet protocol that specifies a standard method of encapsulating IP datagrams and ARP messages on a network.

SNAT (static NAT)  A simple form of NAT. SNAT maps a private IP address directly to a static unchanging public IP address. See NAT.

SNMP 2/3 (Simple Network Management Protocol)  A protocol that provides network devices with a method to monitor and control network devices; manage configurations, statistics collection, performance, and security; and report network management information to a management console. SNMP is part of the TCP/IP protocol suite. SMTP uses port 161.

SNMP agent  A software component that allows a device to communicate with, and be contacted by, an SNMP management system.

SNMP trap  An SNMP utility that sends an alarm to notify the administrator that something within the network activity differs from the established threshold, as defined by the administrator.

SOA (start of authority)  A record of information containing data on DNS zones and other DNS records. A DNS zone is the part of a domain for which an individual DNS server is responsible. Each zone contains a single SOA record.

socket  A logical interprocess communications mechanism through which a program communicates with another program or with a network.

SONET/OC-x (Synchronous Optical Network)  A U.S. standard for data transmission that travels over optical networks referred to as OC-x, where x is the level. The international equivalent of SONET is Synchronous Digital Hierarchy (SDH).

source address  The address of the host that sent the frame. The source address is contained in the frame so that the destination node knows who sent the data.

source-route bridge  A bridge used in source-route bridging to send a packet to the destination node through the route specified by the sending node.

spanning tree  A protocol used to help prevent bridging loops.

spike  An instantaneous, dramatic increase in the voltage input to a device. Spikes are responsible for much of the damage done to network hardware components.

SPS (standby power supply)  A type of power supply whereby the SPS monitors the power line and switches to battery power as soon as it detects a problem. During the time it takes to switch to battery power, the computer is not receiving any power and may power down. This is in contrast to an online UPS, which constantly provides battery power.

SPX (Sequenced Packet Exchange)  A protocol used in conjunction with IPX when guaranteed delivery is required. SPX is used mainly in NetWare network environments. SPX operates at the transport layer of the OSI model.

SSH (Secure Shell)  An application, like Telnet, that allows a session to be opened on a remote host. SSH differs from Telnet in that it provides additional authentication methods and encryption for data as it traverses the network. SSH uses TCP/IP port 22.

SSID (Service Set Identifier)  A unique client identifier sent over the WLAN that acts as a simple password used for authentication between a wireless client and an access point. The SSID is used to differentiate between networks; therefore, the client system and the AP must use the same SSID.

SSL (Secure Sockets Layer)  A method of securely transmitting information to and receiving information from a remote website. SSL is implemented through the HTTPS. SSL operates at the presentation layer of the OSI model and uses TCP/IP port 443.

ST (straight tip)  A bayonet-style fiber-optic connector.

STA (spanning tree algorithm)  A standard defined by IEEE 802.1 as part of STP to eliminate loops in an internetwork with multiple paths.

star  A type of network topology in which all devices are connected to a central device (hub, switch). The physical appearance of the network is that of a star.

static IP address  An IP address that is assigned to a network device manually, in contrast to dynamically via DHCP.

static routing  A routing method in which all routes must be entered into a device manually and in which no route information is exchanged between routing devices on the network. Compare with dynamic routing.

static window  A mechanism used in flow control that prevents the sender of data from overwhelming the receiver. The amount of data that can be buffered in a static window is configured dynamically by the protocol.

store-and-forward  A fast-packet-switching method that produces a higher latency than other switching methods because the entire contents of the packet are copied into the onboard buffers of the switch. CRC calculations are performed before the packet can be passed on to the destination address.

STP (shielded twisted pair)  Twisted-pair network cable that has shielding to insulate the cable from EMI.

STP (spanning-tree protocol)  A protocol developed to eliminate the loops caused by the multiple paths in an internetwork. STP is defined in IEEE 802.1.

straight cable  A straight cable refers to a patch cable that has a standard wiring configuration. Compare to rollover or crossover cable.

subdomain  A privately controlled segment of the DNS namespace that exists under other segments of the namespace as a division of the main domain. Sometimes also called a child domain.

subnet  A logical division of a network, based on the address to which all the devices on the network are assigned.

subnet mask  A 32-bit address used to mask, or screen, a portion of an IP address to differentiate the part of the address that designates the network and the part that designates the host.

subnetting  The process of using parts of the node portion of an assigned IP address to create more network IDs. Although subnetting increases the number of network IDs, it decreases the number of node addresses available for each network ID.

supernetting  The process of aggregating IP network addresses and using them as a single network address range.

surge  A voltage increase that is less dramatic than that of a spike but can last a lot longer. Sometimes referred to as a swell. The opposite of brownout.

surge protector  An inexpensive and simple device that is placed between a power outlet and a network component to protect the component from spikes and surges. Also known as a surge suppressor.

SVC (switched virtual circuit)  A virtual circuit that is established dynamically on demand to form a dedicated link and is then broken when transmission is complete.

switch  A Layer 2 networking device that forwards frames based on destination addresses.

SYN  A message sent to initiate a TCP session between two devices. The proper term is synchronization packet.

synchronous transmission  A digital signal transmission method that uses a precise clocking method and a predefined number of bits sent at a constant rate.

system log  A log, accessed through Event Viewer on Windows Server platforms, that provides information and warnings on events logged by operating system components and hardware devices. These events include driver failures, device conflicts, read/write errors, timeouts, and bad block errors.

T

TACACS+ (Terminal Access Controller Access Control System+)  A security protocol designed to provide centralized validation of users who are attempting to gain access to a router or Network Access Server (NAS). TACACS+ is a set of security protocols designed to provide authentication, authorization, and accounting (AAA) of remote users. TACACS uses TCP port 49 by default.

T-line  A digital communication line used in WANs. Commonly used T designations are T1 (Trunk Level 1) and T3 (Trunk Level 3). It is also possible to use only part of a T1 line, which then becomes known as fractional T1. T1 lines support a data transmission rate of up to 1.544Mbps.

TCP (Transmission Control Protocol)  A connection-oriented, reliable data transmission communication protocol that operates at the transport layer of the OSI model. TCP is part of the TCP/IP suite.

TCP/IP (Transmission Control Protocol/Internet Protocol)  A suite of protocols that includes TCP and IP. TCP/IP was originally designed for use on large internetworks but has now become the de facto protocol for networks of all sizes.

TCP/IP socket  A socket, or connection to an endpoint, that is used in TCP/IP communication transmissions.

TCP/IP suite  Refers to all of the individual protocols found within TCP/IP.

TDM (Time-Division Multiplexing)  TDM divides a single communication channel into multiple channels, allowing data signals to be transferred simultaneously as subchannels in one communication channel. Despite being only a single channel, data signals take turns to send data.

TDR (time-domain reflectometer)  A device used to test copper cables to determine whether and where a break is on the cable. For optical cables, an optical OTDR is used.

Telnet  A standard terminal emulation protocol in the TCP/IP protocol stack. Telnet is used to perform terminal emulation over TCP/IP via remote terminal connections, enabling users to log in to remote systems and use resources as if they were connected to a local system.

Terminal Services  A service on Windows server platforms that allows clients to connect to the server as if it were a multiuser operating system. All the processing for the client session is performed on the server, with only screen updates and user input being transmitted across the network connection.

TFTP (Trivial File Transfer Protocol)  A simplified version of FTP that allows file transfers but does not offer any security or file management capabilities. TFTP uses TCP/IP port 69.

thick coaxial  The thick cable most commonly used as the backbone of a coaxial network. It is approximately .375 inches in diameter.

Thick Ethernet  The IEEE 802.3 standard 10Base5, which describes ethernet networking using thick coaxial cabling. Also called ThickNet.

thin client  An application run from a back-end server system such as Microsoft Terminal Services. The processing tasks are all performed at the terminal server rather than on the client. In basic usage, only screen updates are sent from the terminal server, and only keyboard and mouse data is sent to the terminal server.

thin coaxial  Cable that is thinner than thick coaxial cable but still about .25 inches in diameter. It is commonly used in older bus topologies.

Thin Ethernet  The 802.3a standard 10Base2, which describes ethernet networking using thin coaxial cabling. Also referred to as ThinNet.

TIA (Telecommunications Industry Association)  An organization that, along with EIA, develops standards for telecommunications technologies.

TKIP (Temporal Key Integrity Protocol)  The temporal key integrity protocol (TKIP) was designed to address the shortcomings of the WEP security protocol. TKIP is an encryption protocol defined in IEEE 802.11i.

TLS (transport layer security)  A security protocol designed to ensure privacy between communicating client/server applications.

token  A frame that provides controlling information. In a token ring network, the node that possesses the token is the one that is allowed to transmit next.

Token Ring  An IBM-proprietary token-passing LAN topology defined by IEEE standard 802.5. It operates at either 4Mbps or 16Mbps, in a star topology.

tone generator  A device used with a tone locator to locate and diagnose problems with twisted-pair cabling. Commonly referred to as a fox and hound.

topology  The shape or layout of a physical network and the flow of data through the network. See also logical topology, physical topology.

trace route  A function of the TCP/IP protocol suite, implemented in utilities such as traceroute and tracert, that allows the entire path of a packet to be tracked between source and destination hosts. It is used as a troubleshooting tool.

traffic shaping  A QoS strategy that is designed to enforce prioritization policies on the transmission throughout the network.

transmit  To send data using light, electronic, or electrical signals. In networking, this is usually done in the form of digital signals composed of bits.

transparent bridging  A situation in which the bridges on a network tell each other which ports on the bridge should be opened and closed, which ports should be forwarding packets, and which ports should be blocking packets—all without the assistance of any other device.

transport layer  Layer 4 of the OSI model. Protocols at this layer perform functions such as segmenting data, so that it can be sent over the network, and then reassembling the segmented data on the receiving end. The transport layer also deals with some of the errors that can occur in a stream of data, such as dropped and duplicated packets.

trunking  Trunking refers to the use of multiple network cables or ports in parallel to increase the link speed beyond the limits of any one single cable or port.

TTL (time to live)  A value assigned to a packet of data to prevent it from moving around the network indefinitely. The TTL value is decremented each time the packet crosses a router, until it reaches 0, at which point it is removed from the network.

twisted-pair  A type of cable that uses multiple twisted pairs of copper wire.

U

UART (Universal Asynchronous Receiver/Transmitter)  A chip that is responsible for communications carried over a serial port; it converts between data bits and serial bits.

UDP (User Datagram Protocol)  A communications protocol that provides connectionless, unreliable communications services and operates at the transport layer of the OSI model. It requires a network-layer protocol such as IP to guide it to the destination host.

unbound media (or boundless media)  A term used to describe any media without physical constraints. Examples of unbound media include infrared, wireless, and microwave. Compare with bound media.

UNC (Universal Naming Convention)  A naming standard for computers and resources that provides a common syntax to locate systems on the network. An example of a UNC name is \servernamesharename.

unicast  Communication that takes place over a network between a single sender and a single receiver.

UPS (uninterruptible power supply)  A system that provides protection against power surges and power outages. During blackouts, a UPS gives you time to shut down systems or devices on the network before the temporary power interruption becomes permanent. Also referred to as battery backup.

uptime  The amount of time that a device has been on and operating.

URL (uniform resource locator)  A name used to identify a site and subsequently a page on the Internet. An example of a URL is www.quepublishing.com/products.

USB (universal serial bus)  A type of interface between a computer system and peripheral devices. The USB interface allows you to add or remove devices without shutting down the computer. USB supports up to 127 devices. USB supports auto detection and plug and play.

UTP (unshielded twisted pair)  A type of cable that uses multiple twisted pairs of copper wire in a casing that does not provide much protection from EMI. The most common network cable in ethernet networks, UTP is rated in categories including Category 1 through Category 5, as well as Category 5e and Category 6.

V

Vertical cross connect  The main or vertical cross connect is the location where outside cables enter the building for distribution. This may include Internet and phone cabling. Compare with horizontal cross connect.

virtual memory  A process for paging or swapping data from memory to disk to increase the amount of RAM available to a system.

virus  A software program designed specifically to affect a system or network adversely. A virus is usually designed to be passed on to other systems with which it comes in contact.

VLAN (virtual LAN)  A group of devices located on one or more different LAN segments, whose configuration is based on logical and physical connections. This allows the devices to operate as if they were connected to the same physical switch, regardless of whether they are connected to the same switch.

VNC (virtual network computing)  VNC allows remote log-in where clients can access their own desktop while being physically away from their computer. VNC uses a protocol known as the remote framebuffer (RFB) protocol. RFB is the backbone allowing remote access to another systems graphical interface.

VoIP (voice over IP)  VoIP refers to the transfer of voice communication over IP networks.

volume set  Multiple disks or partitions of disks that have been configured to read as one drive.

VPN (virtual private network)  A network that uses a public network such as the Internet, or private network, as a backbone to connect two or more private networks. A VPN provides users with the equivalent of a private network in terms of security. VPNs can also be used as a means of establishing secure remote connectivity between a remote system and another network.

VTP (VLAN Trunking Protocol)  VTP is a Cisco proprietary protocol that manages the addition, deletion, and renaming of VLANs for the entire network. Information of changes to a VLAN or an addition of a new VLAN to a network are distributed to all switches on the network simultaneously and do not need to be done one at a time.

W

WAN (wide area network)  A data communications network that serves users across a broad geographical area. WANs often use transmission devices such as modems or CSUs/DSUs to carry signals over leased lines or over common carrier lines.

web server  A server that runs an application and makes the contents of certain directories on that server, or other servers, available to clients for download, via a protocol such as HTTP.

WEP (Wired Equivalent Privacy)  Data encryption method used to protect the transmission between 802.11 wireless clients and access points. WEP security has come under scrutiny because it uses an insufficient key length and provides no automated method for distributing the keys.

Wi-Fi  A voluntary standard that manufacturers can adhere to, which aims to create compatibility among wireless devices. Wi-Fi is an abbreviation of the phrase Wireless Fidelity.

window flow control  A flow control method in which the receiving host buffers the data it receives and holds it in the buffer until it can be processed. After the data is processed, an acknowledgment is sent to the sender. See also dynamic window, static window.

WINS (Windows Internet Name Service)  A NetBIOS name-to-IP address resolution service that runs on Windows server platforms.

WINS database  A dynamically built database of NetBIOS names and IP addresses used by WINS.

wire crimper  A tool used to create networking cables. The type of wire crimping tool used depends on the cable being made.

wireless channel  Term used to refer to the band of frequency used for wireless communications. Each IEEE wireless standard specifies the channels that can be used.

wireless networking  Networking that uses any unbound media, such as infrared, microwave, or radio waves.

WISP (Wireless Internet Service Provider)  A service provider that specializes in offering users wireless access to the Internet, often including hotspot access.

WLAN (Wireless LAN)  A local area network created using wireless transmission methods such as radio or infrared rather than traditional wired solutions.

workstation  A client computer on a network that does not offer any services of its own but uses the services of the servers on the network.

WPA (Wi-Fi Protected Access)  Data encryption method used on 802.11 wireless LANs. WPA is an industry-supported standard designed to address security shortcomings of WEP.

WWAN (wireless wide area network)  A wide area network that is created using wireless links.

X

X.25  X.25 was one of the original packet-switching technologies, but today it has been replaced in many applications by Frame Relay.

Z

Zeroconf (zero configuration)  Self-configuration network device that has an auto configured IP address and DNS information—everything needed to connect to a network without configuration.

zone transfer  The passing of DNS information from one name server to a secondary name server.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.26.158