• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/98

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

98 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
ACL
Access Control List
A list of users, or groups of users, who are permitted to access a resource, as well as the degree of access each user or group is permitted

Access Control List

AD

Active Directory

a technology created by Microsoft that provides a variety of network services, including: LDAP-like directory services, Kerberos based authentication and DNS based naming

Active Directory

ADSL

Asymmetric Digital Subscriber Line

A point–to–point,digital WAN technology that uses standard telephone lines to provide consumers withhigh–speed Internet access, remote LAN access, another services. The term“asymmetric” refers to the fact that the service provides a higher transmissionrate for downstream than for upstream traffic. Downstream transmission ratescan be up to 8.448 Mbps, whereas upstream rates range up to 640 Kbps.

Asymmetric Digital Subscriber Line

AH

Authentication Header


Oneof the protocols used by IPsec to protect data as it is transmitted over thenetwork. AH provides authentication, anti–replay, and data integrity services,but it does not encrypt the data

Authentication Header

ARP

Address Resolution Protocol


Adata–link layer protocol that resolves IP addresses into hardware addresses.

Address Resolution Protocol

ATM

Asynchronous Transfer Mode

A network communications technology based on53–byte cells, designed to carry voice, data, and video traffic over LANs andWANs at speeds ranging from 25.6 Mbps to2.46 Gbps

Asynchronous Transfer Mode

BERT

Bit-Error Rate Test

testing method for digital communication circuits that uses predetermined stress patterns comprising of a sequence of logical ones and zeros generated by a pseudorandom binary sequence.

Bit-Error Rate Test

BootP

Boot Protocol /Bootstrap Protocol

A UDP network protocol used by a network client to obtain its IP address automatically (similar to DHCP but less complex). This is usually done during the bootstrap process when a computer is starting up.

Boot Protocol /Bootstrap Protocol

BRI

Basic Rate Interface

An Integrated Services Digital Network (ISDN) service thatconsists of two64-Kbps B channels plus one 16-KbpsD channel, enablingusers to combine the B channelsfor a single128-Kbps data pipe or use them separately.Also called 2B+D,BRI is the primary consumer ISDNservice used forInternet access and remote networking.

Basic Rate Interface

CHAP

Challenge Handshake Authentication Protocol

An authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. It periodically verifies the identity of the client by using a three-way handshake.

Challenge Handshake Authentication Protocol

CIFS

Common Internet File System

similar to SMB, it operates as an application-level network protocol mainly used to provide shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network.

Common Internet File System

CNAME

Canonical Name

Alias of one name to another: the DNS lookup will continue by retrying the lookup with the new name. This helps when running multiple services (like an FTP and a webserver; each running on different ports) from a single IP address

Canonical Name

CSMA / CD

Carrier Sense Multiple Access / Collision Detection

Using this protocol, a node that wants to transfer data over the network first listens to the LAN to determine whether it is in use. If the LAN is not in use, the node begins transmitting its data. If the network is busy, the node waits for the LAN to clear for a predetermined time, and then it takes control of the LAN. If two nodes are waiting to use the LAN, they will periodically attempt to access the LAN at the same time. When this happens, a data collision occurs, rendering the data from both nodes useless.

Carrier Sense Multiple Access / Collision Detection

CSU

Channel Service Unit

A line bridging device for use with T-carrier that is used to perform loopback testing

Channel Service Unit

DC

Domain Controller

server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain.

Domain Controller

DLC

Data Link Control

the service provided by the data link layer.

Data Link Control

DSU

Data Service Unit

a piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment.

Data Service Unit

EAP

Extensible Authentication Protocol

universal authentication framework frequently used in wireless networks and Point-to-Point connections.

Extensible Authentication Protocol

EFS

Encrypting File System

a file system driver that provides filesystem-level encryption in Microsoft Windows (2000 and later) operating systems, except Windows XP Home Edition, Windows Vista Basic, and Windows Vista Home Premium.

Encrypting File System

FDDI (fiddy)

Fiber Distributed Data Interface

provides a high-speed backbone for data transmission in a local area network that can extend in range up to 200 kilometers (124 miles). its protocol is derived from the IEEE 802.4 token bus timed token protocol. Uses single and mulitmode fiber, dual-ring architecture, 100mbps

Fiber Distributed Data Interface

FDM

Frequency Division Multiplexing

used by broadband, a form of signal multiplexing which involves assigning non-overlapping frequency ranges to different signals or to each "user" of a medium.

Frequency Division Multiplexing

FHSS

Frequency Hopping Spread Spectrum

In spread spectrum transmissions, the frequency of the radio signal hops in a random, defined sequence that is known to the receiving device. This method spreads the signal across the time spectrum using time division multiplexing (TDM) techniques.

Frequency Hopping Spread Spectrum

GBIC

Gigabit Interface Converter

a standard for transceivers, commonly used with Gigabit Ethernet and fibre channel. By offering a standard, hot swappable electrical interface, one gigabit ethernet port can support a wide range of physical media, from copper to long-wave single-mode optical fiber, at lengths of hundreds of kilometers.

Gigabit Interface Converter

GPO

Group Policy Object

what a set of Group Policy settings are stored in. It reduces the administrative burden and costs associated with managing these resources

Group Policy Object

GSNW

Gateway Services for NetWare

allows Microsoft networking clients to access files that reside on NetWare servers w/o having to load NetWare client software

Gateway Services for NetWare

HDLC

High-Level Data Link Control

a bit-oriented synchronous data link layer protocol used almost exclusively to connect one device to another, developed by the International Organization for Standardization (ISO).

High-Level Data Link Control

IANA

Internet Assigned Numbers Authority

the entity that oversees global IP address allocation, root zone management for the Domain Name System (DNS) , media types, and other Internet protocol assignments.

Internet Assigned Numbers Authority

ICA

Independent Computer Architecture

designed by Citrix, the protocol lays down a specification for passing data between server and clients, but is not bound to any one platform.

Independent Computer Architecture

ICMP

Internet Control Message Protocol

one of the core protocols of the Internet Protocol Suite. It is chiefly used by networked computers' operating systems to send error messages—indicating, for instance, that a requested service is not available or that a host or router could not be reached

Internet Control Message Protocol

ICS

Internet Connection Sharing

It makes use of DHCP and Network address translation (NAT). It routes TCP/IP packets from a small LAN to the Internet.

Internet Connection Sharing

IEEE

Institute of Electrical and Electronics Engineers an international non-profit, professional organization for the advancement of technology related to electricity.

Institute of Electrical and Electronics Engineers

IGMP

Internet Group Multicast Protocol

a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships.

Internet Group Multicast Protocol

IIS

Internet Information Services

a set of Internet-based services for servers created by Microsoft for use with Microsoft Windows. It is the world's second most popular web server in terms of overall websites behind the industry leader Apache HTTP Server. The servers currently include FTP, SMTP, NNTP, and HTTP/HTTPS.

Internet Information Services

IKE

Internet Key Exchange

is the protocol used to set up a security association (SA) in the IPsec protocol suite.

Internet Key Exchange

IMAP

Internet Message Access Protocol

advantages over POP3: When using it, clients often stay connected as long as the user interface is active and download message content on demand. Plus access to MIME message parts and partial fetch

Internet Message Access Protocol

IP

Internet Protocol

is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams (packets) from the source host to the destination host solely based on their addresses.

Internet Protocol

IPSec

Internet Protocol Security

a suite of protocols for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. Operates at the Network Layer

Internet Protocol Security

IPv4

Internet Protocol version 4

these addresses exist in the numeric format of XXX.YYY.ZZZ.AAA. Each address consists of four 8-bit (32-bits total) fields separated by dots (.). This format of specifying addresses is called dotted decimal notation.

Internet Protocol version 4

IPv6

Internet Protocol version 6

supports 2x128 (about 3.4×10x38) addresses

Internet Protocol version 6

IPX

Inter network Packet Exchange

is the OSI-model Network layer protocol in the IPX/SPX protocol stack.

Inter network Packet Exchange

IRC

Internet Relay Chat

a form of real-time Internet chat or synchronous conferencing.

Internet Relay Chat

ISDN

Integrated Services Digital Network

The key feature of this is that it integrates speech and data on the same lines, adding features that were not available in the classic telephone system. There are several kinds of access interfaces to it defined: Basic Rate Interface (BRI), Primary Rate Interface (PRI) and Broadband-ISDN (B-ISDN).

Integrated Services Digital Network

ISM

Industrial, Scientific, and Medical

radio bands originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications. In general, communications equipment must accept any interference generated by this equipment.

Industrial, Scientific, and Medical

L2F

Layer 2 Forwarding

a tunneling protocol developed by Cisco Systems, Inc. to establish Virtual Private Network connections over the Internet.

Layer 2 Forwarding

L2TP

Layer 2 Tunneling Protocol

a tunneling protocol used to support virtual private networks (VPNs). IPsec is often used to secure these packets by providing confidentiality, authentication and integrity.

Layer 2 Tunneling Protocol

LC

Local Connector

is a small form-factor (half size) SC connector developed by Lucent Technologies for use in telephone environments. provide higher connection densities than the SC connectors and are as easy to connect and disconnect as RJ-11

Local Connector

LDAP

Lightweight Directory Access Protocol

an application protocol for querying and modifying directory services running over TCP/IP. Its deployments today tend to use Domain name system (DNS) names for structuring the topmost levels of the hierarchy. Deeper inside the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else that represents a given tree entry (or multiple entries).

Lightweight Directory Access Protocol

LLC

Logical Link Control

provides multiplexing and flow control mechanisms that make it possible for several network protocols (IP, IPX) to coexist within a multipoint network and to be transported over the same network media.

Logical Link Control

LPD

Line Printer Daemon

a set of programs that provide printer spooling and network print server functionality for Unix-like systems. The most common implementation of it is the official BSD UNIX operating system

Line Printer Daemon

MAU

Multistation Access Unit

a device to attach multiple network stations in a star topology in a Token ring network, internally wired to connect the stations into a logical ring.

Multistation Access Unit

MDI

Media Dependent Interface

This connection requires an external crossover (either the cable or the other hub must perform the crossover function)

Media Dependent Interface

MDIX

Media Dependent Interface Crossover

This type of connection performs the crossover function. This allows a straight-through cable to be used to make the connection when engaged.

Media Dependent Interface Crossover

MIB

Management Information Base

a database of objects that can be monitored by a network mgmt system. SNMP devices stores data about themselves in these

Management Information Base

MMF

MultiMode Fiber

a network cable that has higher "light-gathering" capacity. In practical terms, the larger core size simplifies connections and also allows the use of lower-cost electronics such as light-emitting diodes (LEDs) and vertical-cavity surface-emitting lasers (VCSELs) which operate at the 850 nm wavelength (single-mode fibers used in telecommunications operate at 1310 or 1550 nm and require more expensive laser sources. these cables typically have orange jackets, while SM cable jackets are usually yellow.

MultiMode Fiber

MT-RJ

Mechanical Transfer-Registered Jack

small form-factor fiber-optic connector that resembles an RJ-45 connector. It was designed by AMP to provide an inexpensive, easy-to-implement fiber connection method. These smaller fiber connectors provide higher connection densities than the ST connectors and are as easy to connect and disconnect as RJ-45 connectors. In addition, they fit in conventional RJ-45 faceplates and patch panel openings

Mechanical Transfer-Registered Jack

MX

Mail Exchanger

in the context of the Domain Name System formally refers to an IP address assigned to a device hosting a mail server, and by extension also indicates the server itself.

Mail Exchanger

NAT

Network Address Translation

the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another

Network Address Translation

NCP

NetWare Core Protocol

a NetWare network protocol used to access file, print, directory, clock synchronization, messaging, remote command execution and other network service functions.

NetWare Core Protocol

NDS

NetWare Directory Services

a NetWare directory service software product for centrally managing access to resources on multiple servers and computers within a given network.

NetWare Directory Services

NFS

Network File System

any computer file system that supports sharing of files, printers and other resources as persistent storage over a computer network.

Network File System

NIS

Network Information Service

developed by Sun Microsystems, it consists of a client-server directory service protocol for distributing system configuration data such as user and host names between computers on a computer network.

Network Information Service

NLM

NetWare Loadable Module

used to implement extensions to the core NetWare operating system. These extensions can be hardware drivers, server functions (for example, clustering), applications (for example, GroupWise), OS libraries (for example, CLIB.NLM) or utilities (for example, MONITOR.NLM).

NetWare Loadable Module

NNTP

Network News Transport Protocol

an Internet application protocol used primarily for reading and posting Usenet articles
NTP

Network Time Protocol

a protocol for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Uses UDP port 123 as its transport layer.
OSPF

Open Shortest Path First

a dynamic routing protocol for use in Internet Protocol (IP) networks that detects changes in the topology, such as link failures, very quickly and converges on a new loop-free routing structure within seconds. uses link state routing (sends out their routing tables via multicast or unicast, not broadcast, and only when neccessary).
OTDR

Optical Time Domain Reflectometer

an optoelectronic instrument used for estimating the fiber's length and overall attenuation, including splice and mated-connector losses. It may also be used to locate faults, such as breaks, and to measure optical return loss.
OU

Organizational Unit

provides a way of classifying objects located in directories, or names in a digital certificate hierarchy, typically used either to differentiate between objects with the same name (John Doe in OU "marketing" versus John Doe in OU "customer service"), or to parcel out authority to create and manage objects (for example: to give rights for user-creation to local technicians instead of having to manage all accounts from a single central group).
PAP

Password Authentication Protocol

a simple authentication protocol used to authenticate a user to a network access server
PDC

Primary Domain Controller

a server computer in a pre-Windows 2000 NT server Domain. It has the master copy of the user accounts database which it can access and modify.
POP3

Post Office Protocol version 3

an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
PPP

Point-to-Point Protocol

remote access protocol used to establish an internet connection between serial point-to-point links, replaced SLIP, more feature rich
PPPoE

Point-to-Point Protocol over Ethernet

remote access protocol that connects LAN to the internet using ADSL or cable modem
PPTP

Point-to-Point Tunneling Protocol

a method for implementing virtual private networks. It does not provide confidentiality or encryption. Made obsolete by L2TP.
PRI

Primary Rate Interface

avail in North America and Japan. getting 23 B (carries data) channels (64k each) and 1 D (control info) channel (64k) = 1.544 mbps = T1
PVC

Permanent Virtual Circuit

based on packet switching used in WANs that require a constant flow of data. PVCs decrease the bandwidth use that's associated with a permanent connection
QoS

Quality of Service

refers to resource reservation control mechanisms rather than the achieved service quality. It is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow.
RADIUS

Remote Authentication Dial-In User Service

a service that provides centralized network authentication and accounting for multiple users. It's frequently used w/dial-up networking connections.
RAS

Remote Access Service

a Windows NT 4.0 service for remote networking. Predominately a Microsoft technology
RDP

Remote Desktop Protocol

allows you access to a GUI to the desktop on a server or workstation and run it locally on your machine as if it were actually your machine, runs on TCP port 3389, it's an open standard
RSA

Rivest, Shamir, Adelman

a popular public key algorithm. the key is created by choosing two large primary numbers and multiplying them together.
S / MIME

Secure Multipurpose Internet Mail Extensions

a standard for public key encryption and signing of e-mail encapsulated in MIME.
SCP

Secure Copy Protocol

an extension to OpenSSH (open source secure shell), it allows you to copy files from one host to another securely. It effectively replaces FTP
SFTP

Secure File Transfer Protocol

slightly different from SCP, used in conjunction with the proprietary SSH. It allows you to securely copy files
SLIP

Serial Line Internet Protocol

access remote networks using serial ports and modems, slower and less reliable, quickly replaced by PPP
SMF

Single Mode Fiber

fiber cable that does not exhibit modal dispersion resulting from multiple spatial modes. They are therefore better at retaining the fidelity of each light pulse over long distances. For these reasons, they can have a higher bandwidth.
SNMP

Simple Network Management Protocol

consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects.
SONET

Synchronous Optical Network

a high-bandwidth WAN technique, it can work w/different standards, uses a double-ring topology over fiber-optic cable, has OC throughput levels (OC1 - OC768)
SSH

Secure Shell

a network protocol that allows data to be exchanged using a secure channel between two networked devices. It was designed as a replacement for Telnet and other insecure remote shells.
SSID

Service Set Identifier

is a friendly name used to identify the particular 802.11 wireless LAN(s).
T1

T-Carrier Level 1

transmission rate of 1.544mbps = PRI. T3 = 45mbps
UDP

User Datagram Protocol

a connection-less transport protocol that is designed for speed but has no sequence checking, usually used for streaming video
VPN

Virtual Private Network

a logically constructed WAN that uses existing public transmission systems. They are created through the use of software and/or hardware. two popular VPN tunneling protocols are PPTP and L2TP
Zeroconf

Zero Configuration

a set of techniques that automatically creates a usable IP network without configuration or special servers.
Zero Configuration

AAA

Authentication, Authorization, Accounting

AS

Autonomous System

The largest and highest-leveladministrative uniton the Internet.

Autonomous System

BSSID

Basic service setIdentifier


In wireless networking,the 6-byte MACaddress of the basic serviceset. In an ad hocnetwork, the BSSID is a randomlygenerated number.u&

Basic service set Identifier

BNC Connector

British Naval Connectoror Bayonet Neill-Concelman
British Naval Connectoror Bayonet Neill-Concelman

APIPA

AutomaticPrivate Internet Protocol Addressing

Automatic Private Internet Protocol Addressing