• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back

Access Control List (ACL)

Defines what types of packets should be routed and what types of packets should be discarded

address resolution

Process of translating the application layer address of the destination into a network layer address and in turn translating that into a data link layer address.

Address ResolutionProtocol (ARP)

Protocol used for resolution of network layer addresses into link layer addresses

broadcast address

A logical address at which all devices connected to a multiple access communications network are enabled to receive datagrams.

classless addressing

Allocates address space to Internet Service Providers and end users on any address bit boundary, instead of 8 bit segments.

port

An application specific or process specific software construct serving as communications endpoint in a computer's host operating system

Domain Name Service(DNS)

A hierarchical distributed naming system for computers, services, or any resources connected to the Internet.

Dynamic HostConfiguration Protocol(DHCP)

A network protocol that is used to configure devices which are connected to a network (known as hosts) so they can communicate on an IP network

Internet Corporation forAssigned Names andNumbers (ICANN)

A non profit organization responsible for coordinating the IP address spaces and assignment of address blocks to regional Internet registries.

Quality of Service (QoS)

The ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.

subnet

A logical visible subdivision of an IP network.

unicast message

A communication b/ two computers

User Datagram Protocol

A simple fast connection less transport level protocol.

attenuation

Loss of signal amplitude as a function of distance traveled.

SSID

Service Set Identifier

checksum

A fixed size datum computed from an arbitrary block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage.

cross-talk

Any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel.

frame

A data packet on an Ethernet Link

media access control

A sub layer of the ISO data link layer that provides physical addressing and channel access control mechanisms

Point-to-Point Protocol(PPP)

A data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption and compression.

sliding window


technique for controlling transmitted data packets between two network computers where reliable and sequential delivery of data packets is required, such as when using the Data Link Layer (OSI model) or Transmission Control Protocol (TCP).

synchronous transmission

Uses no start or stop bits, but instead synchronizes transmission speeds at both the receiving and sending end of the transmission using clock signals built into each component.

throughput

The total number of information bits received per second, after taking into account the overhead bits and the need to re transmit frames containing errors.

transmission efficiency

Transmission efficiency is defined as the total number of information bits (bit n the messages sent by the user) divided by the total bits in transmission. (information bits plus overhead bits)

access point (AP)

A radio transceiver that plays the same role as a hub or switch in wired Ethernet LANs.

Active Directory

A directory service created by Microsoft for Windows domain networks.

bottleneck

A phenomenon where the performance or capacity of an entire system is limited by a single or limited number of components or resources.

Border Gateway Protocol(BGP)

Dynamic distance vector exterior routing protocol used on the Internet to exchange routing information b/ autonomous systems.

Extensible AuthenticationProtocol (EAP)

An authentication framework frequently used in wireless networks and Point to Point connections.

Forwarding Table

Lists the Ethernet addresses of the computers connected to each port on a switch.

hub

Device that operates at the physical level for connecting multiple Ethernet devices together and making them act as a single networking segment.

logical topology

Bound to network protocols and describe how data is moved across the network.

MAC address filtering

Refers to a security access control method whereby the 48 bit address assigned to each network card is used to determine access to the network.

network operatingsystem (NOS)

Software that runs on a server and enables the server to manage data, users, groups, security, and applications.

network profile

Specifies what resources on each server are available for network use by other computers and which the devices of people are allowed what access to the network.

network segmentation

Act or profession of splitting a computer network into sub networks, each being a network segment or network layer.

Open Shortest Path First(OSPF)

A dynamic hybrid interior routing protocol that is commonly used on the Internet.

RAID

A storage technology that combines multiple disk drive components into a logical unit. Data is distributed across the drives in one of several ways depending on the level of redundancy and performance required.

RIP

A dynamic distance vector interior protocol that is commonly used on smaller networks, such as those operated by a single organization.

switch

A multi port network bridge that process and routes data at the data link level of the OSI model.

WPA

Enhancement to WEP. Typically uses TKIP encryption

WEP

Deprecated wireless network security standard.

WLAN

Uses radio transmission to send data b/ the NIC and the AP.

Subnet Mask

Divides the IP Address into two parts, which helps increase security and performace.