• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/181

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

181 Cards in this Set

  • Front
  • Back
"Rivest, Shamir, Adelman" (RSA)
an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be sufficiently secure given sufficiently long keys and the use of up-to-date implementations.
Access Control List (ACL)
applied to port numbers or network daemon names that are available on a host or other layer 3, each with a list of hosts and/or networks permitted to use the service
Address Resolution Protocol (ARP)
a computer networking protocol for determining a network host's Link Layer or hardware address when only its Internet Layer (IP) or Network Layer address is known.
Advanced Encryption Standard (AES)
a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael.
Alternate Mark Inversion (AMI)
a type of line code used on a T-carrier, known as Alternate Mark Inversion because, in this context, a binary '1' is referred to as a "mark", while a binary '0' is called a "space".
American Registry for Internet Numbers (ARIN)
the Regional Internet Registry (RIR) for Canada, many Caribbean and North Atlantic islands, and the United States.
Amplitude Modulation (AM)
a technique used in electronic communication, most commonly for transmitting information via a radio carrier wave.
AppleTalk Filing Protocol (AFP)
a network protocol that offers file services for Mac OS X and original Mac OS. In Mac OS X, AFP is one of several file services supported including Server Message Block (SMB), Network File System (NFS), File Transfer Protocol (FTP), and WebDAV.
Asymmetric Digital Subscriber Line (ADSL)
the bandwidth is greater in the direction to the customer premises than the reverse
Asynchronous Transfer Mode (ATM)
a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells.
Authentication Header (AH)
a member of the IPsec protocol suite. AH guarantees connectionless integrity and data origin authentication of IP packets.
Automatic Document Feeder (ADF)
feature which takes several pages and feeds the paper one page at a time into a scanner or copier
Automatic Private Internet Protocol Addressing (APIPA)
an address autoconfiguration method by Microsoft used to assign a link-local address when a globally routable or private address is not available.
Basic Rate Interface (BRI)
an Integrated Services Digital Network (ISDN) configuration intended primarily for use in subscriber lines similar to those that have long been used for plain old telephone service.
Bit-Error Rate Test (BERT)
a testing method for digital communication circuits that uses predetermined stress patterns consisting of a sequence of logical ones and zeros generated by a pseudorandom binary sequencer.
Boot Protocol /Bootstrap Protocol (BootP)
a network protocol used by a network client to obtain an IP address from a configuration server.
Border Gateway Protocol (BGP)
the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reachability among autonomous systems (AS).
Bridge Protocol Data Unit (BPDU)
use special data frames to exchange information about bridge IDs and root path costs in Spanning Tree Protocol.
British Naval Connector / Bayonet Niell-Concelman (BNC)
is a common type of RF connector used for the coaxial cable which connects much radio, television, and other radio-frequency electronic equipment.
Building Distribution Frame (BDF)
a distribution frame is a passive device which terminates cables, allowing arbitrary interconnections to be made.
Canonical Name (CNAME)
a type of resource record in the Domain Name System (DNS) that specifies that the domain name is an alias of another, canonical domain name.
Carrier Sense Multiple Access / Collision Avoidance (CSMA / CA)
a wireless network multiple access method in which a carrier sensing scheme is used and a node wishing to transmit data has to first listen to the channel for a predetermined amount of time to determine whether or not another node is transmitting on the channel within the wireless range.
Carrier Sense Multiple Access / Collision Detection (CSMA / CD)
a computer networking access method in which a carrier sensing scheme is used and a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to send that frame again.
CCITT Packet Switching Protocol (X.25)
an ITU-T standard protocol suite for packet switched wide area network (WAN) communication. An X.25 WAN consists of packet-switching exchange (PSE) nodes as the networking hardware, and leased lines, Plain old telephone service connections or ISDN connections as physical links. X.25 is a family of protocols that was popular during the 1980s with telecommunications companies and in financial transaction systems such as automated teller machines. X.25 was originally defined by the International Telegraph and Telephone Consultative Committee (CCITT, now ITU-T) in a series of drafts and finalized in a publication known as The Orange Book in 1976.
Challenge Handshake Authentication Protocol (CHAP)
authenticates a user or network host to an authenticating entity.
Challenge-Response Authentication Mechanism - Message Digest 5 (CRAM-MD5)
a challenge-response authentication mechanism based on the HMAC-MD5 MAC algorithm. It is employed by some SASL implementations, and it is quite often supported by SMTP-AUTH Mail submission agents.
Channel Service Unit (CSU)
is a line bridging device for use with T-carrier that is used to perform loopback testing, bit stuffing, provide a framing and formatting pattern compatible with the network, a barrier for electrical interference from either side of the unit, and is the last signal regeneration point, on the loop side, coming from the central office, before the regenerated signal reaches a multiplexer or data terminal equipment (DTE).
Classless inter domain routing (CIDR)
a method for allocating IP addresses and routing Internet Protocol packets. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous addressing architecture of classful network design in the Internet.
Data Link Control (DLC)
the service provided by the data link layer. Network interface cards have a DLC address that identifies each card; for instance, Ethernet and other types of cards have a 48-bit MAC address built into the cards' firmware when they are manufactured.
Data Service Unit (DSU)
a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment. The device converts bipolar digital signals coming ultimately from a digital circuit and directly from a Channel Service Unit (CSU), into a format (e.g. RS/EIA/TIA-530) compatible with the piece of data terminal equipment (DTE) (e.g. a router) to which the data is sent.
Data-Over-Cable Service Interface Specification (DOCSIS)
an international telecommunications standard that permits the addition of high-speed data transfer to an existing cable TV (CATV) system. It is employed by many cable television operators to provide Internet access (see cable Internet) over their existing hybrid fiber-coaxial (HFC) infrastructure.
Demilitarized Zone (DMZ)
a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet.
Dense Wavelength Division Multiplexing (DWDM)
refers originally to optical signals multiplexed within the 1550 nm band so as to leverage the capabilities (and cost) of erbium doped fiber amplifiers (EDFAs), which are effective for wavelengths between approximately 1525-1565 nm (C band), or 1570-1610 nm (L band). EDFAs were originally developed to replace SONET/SDH optical-electrical-optical (OEO) regenerators, which they have made practically obsolete.
Digital Subscriber Line (DSL)
a family of technologies that provides digital data transmission over the wires of a local telephone network.
Domain Name Service / Domain Name Server / Domain Name System (DNS)
a hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network.
Dynamic Host Configuration Protocol (DHCP)
an automatic configuration protocol used on IP networks. Computers that are connected to IP networks must be configured before they can communicate with other computers on the network.
E-Carrier Level 1 (E1)
common in most telephone exchanges and are used to connect to medium and large companies, to remote exchanges and in many cases between exchanges.
Electromagnetic Interference (EMI)
a disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source.
Electrostatic Discharge (ESD)
the sudden and momentary electric current that flows between two objects at different electrical potentials.
Encapsulated security packets (ESP)
a member of the IPsec protocol suite. In IPsec it provides origin authenticity, integrity, and confidentiality protection of packets. ESP also supports encryption-only and authentication-only configurations, but using encryption without authentication is strongly discouraged because it is unsecure. Unlike Authentication Header (AH), ESP in transport mode does not provide integrity and authentication for the entire IP packet.
Enhanced Interior Gateway Routing Protocol (EIGRP)
a Cisco proprietary routing protocol loosely based on their original IGRP. EIGRP is an advanced distance-vector routing protocol, with optimizations to minimize both the routing instability incurred after topology changes, as well as the use of bandwidth and processing power in the router.
Extended Service Set Identifier (ESSID)
a set of one or more interconnected BSSs and integrated local area networks that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.
Extensible Authentication Protocol (EAP)
an authentication framework frequently used in wireless networks and Point-to-Point connections. For IEEE 802.11 the WPA and WPA2 standards have adopted five EAP types as its official authentication mechanisms, and many other standards allow its use.
eXtensible Markup Language (XML)
a set of rules for encoding documents in machine-readable form. It is defined in the XML 1.0 Specification.
Exterior Gateway Protocol (EGP)
a now obsolete routing protocol for the Internet not to be confused with EGPs in general (of which EGP and Border Gateway Protocol (BGP) are examples).
Fiber Distributed Data Interface (FDDI)
a 100 Mbit/s optical standard for data transmission in a local area network that can extend in range up to 200 kilometers (124 miles). Although FDDI logical topology is a ring-based token network, it does not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol is derived from the IEEE 802.4 token bus timed token protocol.
File Transfer Protocol (FTP)
a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the Internet.
Frequency Division Multiplexing (FDM)
a form of signal multiplexing which involves assigning non-overlapping frequency ranges to different signals or to each "user" of a medium.
Frequency Hopping Spread Spectrum (FHSS)
a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is utilized as a multiple access method in the frequency-hopping code division multiple access (FH-CDMA) scheme.
Frequency Modulation (FM)
conveys information over a carrier wave by varying its instantaneous frequency. This is in contrast with amplitude modulation, in which the amplitude of the carrier is varied while its frequency remains constant.
Fully Qualified Domain Name / Fully Qualified Distinguished Name (FQDN)
a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root domain. A fully qualified domain name is distinguished by its unambiguity; it can only be interpreted one way.
Gigabit Interface Converter (GBIC)
a standard for transceivers, commonly used with Gigabit Ethernet and fibre channel. By offering a standard, hot swappable electrical interface, one gigabit Ethernet port can support a wide range of physical media, from copper to long-wave single-mode optical fiber, at lengths of hundreds of kilometers.
Hertz (Hz)
the SI unit of frequency defined as the number of cycles per second of a periodic phenomenon.
High-Level Data Link Control (HDLC)
a bit-oriented synchronous data link layer protocol developed by the International Organization for Standardization (ISO).
Hot Standby Router Protocol (HSRP)
a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway.
Hypertext Transfer Protocol (HTTP)
a networking protocol for distributed, collaborative, hypermedia information systems.
Hypertext Transfer Protocol Secure (HTTPS)
a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encrypted communication and secure identification of a network web server.
Independent Computer Architecture (ICA)
a proprietary protocol for an application server system, designed by Citrix Systems. The protocol lays down a specification for passing data between server and clients, but is not bound to any one platform.
Institute of Electrical and Electronics Engineers (IEEE)
a non-profit professional association dedicated to advancing technological innovation related to electricity.
Integrated Services Digital Network (ISDN)
a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1989 in the CCITT red book.Prior to ISDN, the phone system was viewed as a way to transport voice, with some special services available for data. The key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the classic telephone system. There are several kinds of access interfaces to ISDN defined as Basic Rate Interface (BRI), Primary Rate Interface (PRI) and Broadband ISDN (B-ISDN).
Interior Gateway Protocol (IGP)
a routing protocol that is used to exchange routing information within an autonomous system (AS).
Intermediate Distribution Frame (IDF)
a central office or customer premises, a frame that (a) cross-connects the user cable media to individual user line circuits and (b) may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames.
Intermediate System - Intermediate system (IS-IS)
a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for datagrams through a packet-switched network. The protocol was defined in ISO/IEC 10589:2002 as an international standard within the Open Systems Interconnection (OSI) reference design. Though originally an ISO standard, the IETF republished the protocol as an Internet Standard in RFC 1142. IS-IS has been called "the de facto standard for large service provider network backbones."[
Internet Assigned Numbers Authority (IANA)
the entity that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Internet Protocol-related symbols and numbers. IANA is operated by the Internet Corporation for Assigned Names and Numbers, also known as ICANN.
Internet Connection Sharing (ICS)
the use of a device with Internet access such as 3G cellular service, broadband via Ethernet, or other Internet gateway as an access point for other devices. It was implemented by Microsoft as a feature of its Windows operating system (as of Windows 98 Second Edition and later) for sharing a single Internet connection on one computer between other computers on the same local area network. It makes use of DHCP and network address translation (NAT).
Internet Control Message Protocol (ICMP)
one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. ICMP can also be used to relay query messages.
Internet Corporation for Assigned Names and Numbers (ICANN)
a non-profit corporation that was created to oversee a number of Internet-related tasks previously performed directly on behalf of the U.S. government by other organizations, notably the Internet Assigned Numbers Authority (IANA).
Internet Group Multicast Protocol (IGMP)
a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral part of the IP multicast specification. It is analogous to ICMP for unicast connections. IGMP can be used for online streaming video and gaming, and allows more efficient use of resources when supporting these types of applications.
Internet Information Services (IIS)
a web server application and set of feature extension modules created by Microsoft for use with Microsoft Windows.
Internet Key Exchange (IKE)
the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication which are either pre-shared or distributed using DNS (preferably with DNSSEC), and a Diffie-Hellman key exchange to set up a shared session secret from which cryptographic keys are derived.
Internet Message Access Protocol version 4 (IMAP4)
one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol (POP).
Internet Network Information Center (InterNIC)
was the Internet governing body primarily responsible for domain name and IP address allocations from 1972 until September 18, 1998 when this role was assumed by the Internet Corporation for Assigned Names and Numbers (ICANN).
Internet Protocol (IP)
the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.
Internet Protocol Security (IPSec)
a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
Internet Protocol version 4 (IPv4)
the fourth revision in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed.
Internet Protocol version 6 (IPv6)
a version of the Internet Protocol (IP) that is designed to succeed Internet Protocol version 4 (IPv4). The Internet operates by transferring data in small packets that are independently routed across networks as specified by an international communications protocol known as the Internet Protocol. Each data packet contains two numeric addresses that are the packet's origin and destination devices.
Internet Service Provider (ISP)
a company that provides access to the Internet. Access ISPs connect customers to the Internet using copper, wireless or fiber connections.
Internetwork Packet Exchange (IPX)
is the OSI-model Network layer protocol in the IPX/SPX protocol stack. The IPX/SPX protocol stack is supported by Novell's NetWare network operating system. Because of Netware's popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking protocol. Novell derived IPX from Xerox Network Systems' IDP protocol.
Intrusion Detection System (IDS)
a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.
Intrusion Prevention System (IPS)
are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about said activity, attempt to block/stop activity, and report activity.
Layer 2 Forwarding (L2F)
a tunneling protocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet. L2F does not provide encryption or confidentiality by itself; It relies on the protocol being tunneled to provide privacy. L2F was specifically designed to tunnel Point-to-Point Protocol (PPP) traffic.
Layer 2 Tunneling Protocol (L2TP)
a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. Although L2TP acts like a Data Link Layer protocol in the OSI model, L2TP is in fact a Session Layer protocol, and uses the registered UDP port 1701.
Light Emitting Diode (LED)
a semiconductor light source. LEDs are used as indicator lamps in many devices and are increasingly used for other lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness.
Lightweight Directory Access Protocol (LDAP)
an application protocol for reading and editing directories over an IP network. A directory in this sense is an organized set of records: for example, a telephone directory is an alphabetical list of persons and organizations with an address and phone number in each "record".
Line Printer Request (LPR)
a network protocol for submitting print jobs to a remote printer.
Link aggregation control protocol (LACP)
provides a method to control the bundling of several physical ports together to form a single logical channel. LACP allows a network device to negotiate an automatic bundling of links by sending LACP packets to the peer (directly connected device that also implements LACP).
Local Area Network (LAN)
a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
Local Connector (LC)
terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so that light can pass. High-density connections, SFP transceivers, XFP transceivers
Local Exchange Carrier (LEC)
a regulatory term in telecommunications for the local telephone company.
Logical Link Control (LLC)
the upper sub-layer of the Data Link Layer (which is itself layer 2, just above the Physical Layer) in the seven-layer OSI reference model. It provides multiplexing mechanisms that make it possible for several network protocols (IP, IPX, Decnet and Appletalk) to coexist within a multipoint network and to be transported over the same network media, and can also provide flow control and automatic repeat request (ARQ) error management mechanisms. The LLC sub-layer acts as an interface between the Media Access Control (MAC) sublayer and the network layer.
Mail Exchanger (MX)
a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol.
Main Distribution Frame (MDF)
a signal distribution frame for connecting equipment (inside plant) to cables and subscriber carrier equipment (outside plant). The MDF is a termination point within the local telephone exchange where exchange equipment and terminations of local loops are connected by jumper wires at the MDF.
Management Information Base (MIB)
a virtual database used for managing the entities in a communications network. Most often associated with the Simple Network Management Protocol (SNMP), the term is also used more generically in contexts such as in OSI/ISO Network management model. While intended to refer to the complete collection of management information available on an entity, it is often used to refer to a particular subset, more correctly referred to as MIB-module.
Mechanical Transfer-Registered Jack (MT-RJ)
terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so that light can pass. Duplex multimode connections.
Media Access Control / Medium Access Control (MAC)
a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.
Media Dependent Interface (MDI)
an uplink port is an Ethernet port connection typically used on the Network Interface Card (NIC) or Integrated NIC port on a PC. Since inputs on a NIC must go to outputs on the switch or hub these latter devices have their inputs and outputs (transmit and receive signals) reversed in a configuration known as MDIX or MDI-X. Some network hubs or switches have an MDI port (often switchable) in order to connect to other hubs or switches without an Ethernet crossover cable, but with a straight-through cable.
Media Dependent Interface Crossover (MDIX)
a female 8P8C port connection on a computer, router, hub, or switch. Straight through cables connect pins 1 & 2 (transmit) on an MDI device to pins 1 & 2 (receive) on an MDIX device. Similarly pins 3 & 6 are receive on an MDI device and transmit on an MDIX device. The X refers to the fact that transmit wires on an MDI device must be connected to receive wires on an MDIX device. As a rule, end stations (i.e., PCs or workstations) and routers use an MDI interface, hubs and switches use MDIX interfaces.
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
the Microsoft version of the Challenge-handshake authentication protocol, CHAP. The protocol exists in two versions, MS-CHAPv1 and MS-CHAPv2. MS-CHAPv2 was introduced with Windows NT 4.0 SP4 and was added to Windows 98 and Windows 95 in the upgrade. Windows Vista dropped support for MS-CHAPv1.
Microsoft IPX/SPX Protocol (NWLINK)
Microsoft's implementation of Novell's IPX/SPX protocols. NWLink includes an implementation of NetBIOS atop IPX/SPX.
Multimode Fiber (MMF)
a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Typical multimode links have data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters—more than sufficient for the majority of premises applications.
Multi-Protocol Label Switching (MPLS)
a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next with the help of labels. MPLS makes it easy to create "virtual links" between distant nodes. It can encapsulate packets of various network protocols.
Network Access Control (NAC)
an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
Network Address Translation (NAT)
the process of modifying IP address information in IP packet headers while in transit across a traffic routing device. The simplest type of NAT provides a one to one translation of IP addresses. RFC 2663 refers to this type of NAT as basic NAT. It is often also referred to as one-to-one NAT. In this type of NAT only the IP addresses,
Network Basic Input / Output Extended User Interface (NetBEUI)
In 1985, IBM went forward with the token ring network scheme and a NetBIOS emulator was produced to allow NetBIOS-aware applications from the PC-Network era to work over this new design. This emulator, named NetBIOS Extended User Interface (NetBEUI), expanded the base NetBIOS API with, among other things, the ability to deal with the greater node capacity of token ring. A new networking protocol, NBF, was simultaneously produced to allow NetBEUI (NetBIOS) to provide its services over token ring — specifically, at the IEEE 802.2 Logical Link Control layer.
Network Basic Input / Output System (NetBIOS)
provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol. Older operating systems ran NetBIOS over IEEE 802.2 and IPX/SPX using the NetBIOS Frames (NBF) and NetBIOS over IPX/SPX (NBX) protocols, respectively. In modern networks, NetBIOS normally runs over TCP/IP via the NetBIOS over TCP/IP (NBT) protocol. This results in each computer in the network having both an IP address and a NetBIOS name corresponding to a (possibly different) host name.
Network Control Protocol (NCP)
the middle layers of the protocol stack running on host computers of the ARPANET, the predecessor to the modern Internet. Although sometimes the abbreviation NCP is mistakenly expanded to Network Control Protocol, this term is not found in the contemporaneous documentation.
Network File Service (NFS)
a network file system protocol originally developed by Sun Microsystems in 1984,[1] allowing a user on a client computer to access files over a network in a manner similar to how local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File System is an open standard defined in RFCs, allowing anyone to implement the protocol.
Network Interface Card (NIC)
a computer hardware component that connects a computer to a computer network. Whereas network interface controllers were commonly implemented on expansion cards that plug into a computer bus, the low cost and ubiquity of the Ethernet standard means that most newer computers have a network interface built into the motherboard.
Network News Transport Protocol (NNTP)
an Internet application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.
Network Time Protocol (NTP)
a protocol for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. It is designed particularly to resist the effects of variable latency by using a jitter buffer.
Open Shortest Path First (OSPF)
an adaptive routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328 (1998) for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 (2008). Research into the convergence time of OSPF can be found in Stability Issues in OSPF Routing (2001).
Open Systems Interconnect (OSI)
an effort to standardize networking that was started in 1977 by the International Organization for Standardization (ISO), along with the ITU-T.
Optical Carrier (OCx)
a standardized set of specifications of transmission bandwidth for digital signals that can be carried on Synchronous Optical Networking (SONET) fiber optic networks.
Optical Time Domain Reflectometer (OTDR)
an optoelectronic instrument used to characterize an optical fiber. An OTDR injects a series of optical pulses into the fiber under test. It also extracts, from the same end of the fiber, light that is scattered (Rayleigh backscatter) or reflected back from points along the fiber. (This is equivalent to the way that an electronic time-domain reflectometer measures reflections caused by changes in the impedance of the cable under test.) The strength of the return pulses is measured and integrated as a function of time, and is plotted as a function of fiber length.
Password Authentication Protocol (PAP)
is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP.
Permanent Virtual Circuit (PVC)
can be established as an option to provide a dedicated circuit link between two facilities. PVC configuration is usually preconfigured by the service provider. Unlike SVCs, PVC are usually very seldom broken/disconnected.
Plain Old Telephone System (POTS)
the voice-grade telephone service that remains the basic form of residential and small business service connection to the telephone network in many parts of the world. The name is a retronym, and is a reflection of the telephone service still available after the advent of more advanced forms of telephony such as ISDN, mobile phones and VoIP. POTS has been available almost since the introduction of the public telephone system in the late 19th century, in a form mostly unchanged to the normal user despite the introduction of Touch-Tone dialing, electronic telephone exchanges and fiber-optic communication into the public switched telephone network (PSTN).
Point-to-Point Protocol (PPP)
a data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption privacy, and compression. PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET. Most Internet service providers (ISPs) use PPP for customer dial-up access to the Internet.
Point-to-Point Protocol over Ethernet (PPPoE)
a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with DSL services where individual users connect to the DSL modem over Ethernet and in plain Metro Ethernet networks.
Point-to-Point Tunneling Protocol (PPTP)
a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
Port Address Translation (PAT)
many to one NAT technique in which internal addresses are translated to an external address plus a port number.
Post Office Protocol version 3 (POP3)
an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
Power over Ethernet (PoE)
a system to pass electrical power safely, along with data, on Ethernet cabling. The IEEE standard for PoE requires category 5 cable or higher for high power levels, but can operate with category 3 cable for low power levels.
Primary Rate Interface (PRI)
a standardized telecommunications service level within the Integrated Services Digital Network (ISDN) specification for carrying multiple DS0 voice and data transmissions between a network and a user. PRI is the standard for providing telecommunication services to offices. It is based on the T-carrier (T1) line in the US, and the E-carrier (E1) line in Europe. The T1 line consists of 24 channels, while an E1 has 32.
Public Key Infrastructure (PKI)
a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA).
Public Switched Telephone Network (PSTN)
the network of the world's public circuit-switched telephone networks. It consists of telephone lines, fiberoptic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables all inter-connected by switching centers which allows any telephone in the world to communicate with any other. Originally a network of fixed-line analog telephone systems, the PSTN is now almost entirely digital in its core and includes mobile as well as fixed telephones.
Quality of Service (QoS)
refers to resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.
Real-time Transport Protocol (RTP)
a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications and web-based push-to-talk features.
Registered Jack (RJ)
a standardized physical network interface — both jack construction and wiring pattern — for connecting telecommunications or data equipment to a service provided by a local exchange carrier or long distance carrier. The standard designs for these connectors and their wiring are named RJ11, RJ14, RJ21, RJ48, etc.
Remote Access Service (RAS)
any combination of hardware and software to enable the remote access tools or information that typically reside on a network of IT devices. A RAS server is a specialized computer which aggregates multiple communication channels together.
Remote Authentication Dial-In User Service (RADIUS)
a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service.
Remote Desktop Protocol (RDP)
a proprietary protocol developed by Microsoft, which concerns providing a user with a graphical interface to another computer.
Remote Shell (RSH)
a command line computer program that can execute shell commands as another user, and on another computer across a computer network. The remote system to which rsh connects runs the rshd daemon. The rshd daemon typically uses the well-known Transmission Control Protocol (TCP) port number 514.
Reverse Address Resolution Protocol (RARP)
an obsolete computer networking protocol used by a host computer to request its Internet Protocol (IPv4) address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address.
Routing Internet Protocol (RIP)
a distance-vector routing protocol, which employs the hop count as a routing metric. The hold down time is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination.
Secure Copy Protocol (SCP)
a means of securely transferring computer files between a local and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.
Secure File Transfer Protocol (SFTP)
a network protocol that provides file access, file transfer, and file management functionality over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capability, but is also intended to be usable with other protocols.
Secure Shell (SSH)
a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Secure Sockets Layer (SSL)
cryptographic protocol that provides communication security over the Internet. TLS and SSL encrypt the segments of network connections above the Transport Layer, using symmetric cryptography for privacy and a keyed message authentication code for message reliability.
Sequenced Packet Exchange (SPX)
are networking protocols used primarily on networks using the Novell NetWare operating systems.
Serial Line Internet Protocol (SLIP)
an encapsulation of the Internet Protocol designed to work over serial ports and modem connections. It is documented in RFC 1055. On personal computers, SLIP has been largely replaced by the Point-to-Point Protocol (PPP), which is better engineered, has more features and does not require its IP address configuration to be set before it is established. On microcontrollers, however, SLIP is still the preferred way of encapsulating IP packets due to its very small overhead.
Service Set Identifier (SSID)
a name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long.
Session Initiation Protocol (SIP)
an IETF-defined signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP). The protocol can be used for creating, modifying and terminating two-party (unicast) or multiparty (multicast) sessions consisting of one or several media streams.
Shielded Twisted Pair (STP)
a type of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. It was invented by Alexander Graham Bell.
Simple Mail Transfer Protocol (SMTP)
an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks.
Simple Network Management Protocol (SNMP)
an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects.
Single Mode Fiber (SMF)
an optical fiber designed to carry only a single ray of light (mode).
Standard Connector / Subscriber Connector (SC)
terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so that light can pass. Datacom and telcom; extremely common.
Start of Authority (SOA)
DNS record type that specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone
Static Network Address Translation (SNAT)
The meaning of the term SNAT varies by vendor. Many vendors have proprietary definitions for SNAT. A common expansion is source NAT, the counterpart of destination NAT (DNAT). Microsoft uses the acronym for Secure NAT, in regard to the ISA Server. For Cisco Systems, SNAT means stateful NAT. In computer networking, the process of network address translation done in a secure way involves rewriting the source and/or destination addresses of IP packets as they pass through a router or firewall. Could also be one to one NAT.
Straight Tip (ST)
terminates the end of an optical fiber, and enables quicker connection and disconnection than splicing. The connectors mechanically couple and align the cores of fibers so that light can pass. Multimode, rarely single-mode; APC not possible.
Symmetrical Digital Subscriber Line (SDSL)
a collection of Internet access technologies based on DSL that offer symmetric bandwidth upstream and downstream. It is considered the opposite of Asymmetric Digital Subscriber Line (ADSL) technologies where the upstream bandwidth is lower than the downstream bandwidth.
Synchronous Optical Network (SONET)
standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber using lasers or light-emitting diodes (LEDs).
T-Carrier Level 1 (T1)
any data circuit that runs at the original 1.544 Mbit/s line rate.
Temporal Key Integrity Protocol (TKIP)
a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as a solution to replace WEP without requiring the replacement of legacy hardware.
Terminal Access Control Access Control System+ (TACACS+)
a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network.
Terminal Adaptor (TA)
a device that connects a terminal (computer) to the ISDN network.
Time Division Multiplexing (TDM)
a type of digital (or rarely analog) multiplexing in which two or more bit streams or signals are transferred apparently simultaneously as sub-channels in one communication channel, but are physically taking turns on the channel.
Time Domain Reflectometer (TDR)
an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).
Time to Live (TTL)
mechanism that limits the lifespan of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded. In computer networking, TTL prevents a data packet from circulating indefinitely.
Transmission Control Protocol (TCP)
one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
Transmission Control Protocol / Internet Protocol (TCP / IP)
the set of communications protocols used for the Internet and other similar networks.
Transport Layer Security (TLS)
is a cryptographic protocol that provides communication security over the Internet.
Trivial File Transfer Protocol (TFTP)
a file transfer protocol known for its simplicity. It is generally used for automated transfer of configuration or boot files between machines in a local environment. Compared to FTP, TFTP is extremely limited, providing no authentication, and is rarely used interactively by a user.
Turbo C shell (tcsh)
a Unix shell based on and compatible with the C shell (csh). It is essentially the C shell with programmable command line completion, command-line editing, and a few other features.
Uniform Resource Locator (URL)
a Uniform Resource Identifier (URI) that specifies where a known resource is available and the mechanism for retrieving it. In popular usage and in many technical documents and verbal discussions it is often incorrectly used as a synonym for URI.
Universal Naming Convention (UNC)
specifies a common syntax to describe the location of a network resource, such as a shared file, directory, or printer.
Unshielded Twisted Pair (UTP)
the most common cable used in computer networking. Modern Ethernet, the most common data networking standard, utilizes UTP cables. Twisted pair cabling is often used in data networks for short and medium length connections because of its relatively lower costs compared to optical fiber and coaxial cable.
User Datagram Protocol (UDP)
one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths.
Virtual Local Area Network (VLAN)
a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical local area network (LAN), but it allows for end stations to be grouped together even if they are not located on the same network switch.
Virtual Network Connection (VNC)
a graphical desktop sharing system that uses the RFB protocol to remotely control another computer. It transmits the keyboard and mouse events from one computer to another, relaying the graphical screen updates back in the other direction, over a network.
Virtual Private Network (VPN)
a secure way of connecting to a private Local Area Network at a remote location, using the Internet or any unsecure public network to transport the network data packets privately, using encryption. The VPN uses authentication to deny access to unauthorized users, and encryption to prevent unauthorized users from reading the private network packets. The VPN can be used to send any kind of network traffic securely, including voice, video or data.
Virtual Trunk Protocol (VTP)
a Cisco proprietary Layer 2 messaging protocol that manages the addition, deletion, and renaming of Virtual Local Area Networks (VLAN) on a network-wide basis. Cisco's VLAN Trunk Protocol reduces administration in a switched network. When a new VLAN is configured on one VTP server, the VLAN is distributed through all switches in the domain. This reduces the need to configure the same VLAN everywhere. To do this, VTP carries VLAN information to all the switches in a VTP domain.
Voice over IP (VoIP)
one of a family of internet technologies, communication protocols, and transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms frequently encountered and often used synonymously with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.
Wide Area Network (WAN)
a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). This is in contrast with personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively.
Wi-Fi Protected Access (WPA)
security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).
Window Internet Name Service (WINS)
Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively WINS is to NetBIOS names what DNS is to domain names — a central mapping of host names to network addresses.
Wired Equivalent Privacy (WEP)
a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention is to provide data confidentiality comparable to that of a traditional wired network.
Wireless Application Protocol / Wireless Access Point (WAP)
a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
World Wide Web (www)
a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them via hyperlinks. Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners-Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web.
Zero Configuration (Zeroconf)
a set of techniques that automatically creates a usable Internet Protocol (IP) network without manual operator intervention or special configuration servers.