Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
172 Cards in this Set
- Front
- Back
A Record |
IPv4(public) to IPv4(local) |
|
AAAA |
IPv6 to Local IPv4 |
|
DNAME |
alias for name and sub Name |
|
Cname |
alias of name |
|
ACL |
Access control list List of permissions attached to an object |
|
ADSL |
Asymmetric Digital Subscriber Line
Sevices that uses POTS to send signal over copper wire |
|
AES |
Advanced Encryption Standard
specification for the encryptionof electronic data |
|
AH |
Authentication Header (AH) is a protocol and part of the Internet Protocol Security (IPsec) protocol suite, which authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data |
|
AP |
Access Point |
|
APC |
Angle Polished Connector
Fiber optic terminator |
|
APIPA |
Automatic Private Internet Protocol Addressing DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn't available.
|
|
APT |
Advanced Persistent Protocol
|
|
ARP |
Address Resolution Protocol
IP to MAC address resolution |
|
AM |
Amplitude Modulation most commonly for transmitting information via a radio carrier wave ulation |
|
ARIN |
American Registry for internet numbers is the nonprofit corporation responsible for managing Internet number resources |
|
AS |
Autonomous System
is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the Internet. |
|
ASP |
Application service provider-business providing computer-based services to customers over a network |
|
ATM |
Asynchronous Transfer Mode- dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology
|
|
BERT |
Bit-Error Rate Test-testing method for digital communication circuits that uses predetermined stress patterns consisting of a sequence of logical ones and zeros generated by a test pattern generator.
|
|
BGP |
Border Gateway Protocol-exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet
|
|
BNC |
British Naval Connector / Bayonet Niell-Concelman-a miniature quick connect/disconnect radio frequency connector used for coaxial cable
|
|
BootP |
Boot Protocol /Bootstrap Protocol- automatically assign an IP address to network devices from a configuration server
|
|
BPDU |
Bridge Protocol Data Unit- frames that contain information about the Spanning tree protocol (STP).
|
|
BRI |
Basic Rate Interface- The BRI configuration provides 2 bearer channels (B channels) at 64 kbit/s each and 1 data channel (D channel) at 16 kbit/s.
|
|
BSSID |
Basic Service Set Identifier -set consisting of all the devices associated with a consumer or enterprise IEEE 802.11 wireless local area network (WLAN).
|
|
CAM |
Channel Access Method- allows several terminals connected to the same multi-point transmission medium to transmit over it and to share its capacity
|
|
CARP |
Common Address Redundancy Protocol- allows multiple hosts on the same local area network to share a set of IP addresses
|
|
CHAP MS-CHAP |
Challenge Handshake Authentication Protocol-authenticates a user or network host to an authenticating entity. That entity may be, for example, an Internet service provider
|
|
CIDR |
Classless inter domain routing
|
|
CSMA/CA |
Carrier Sense Multiple Access / Collision Avoidance- a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by transmitting only when the channel is sensed to be "idle". When they do transmit, nodes transmit their packet data in its entirety.802.11
|
|
CSMA/CD |
Carrier Sense Multiple Access / Collision Detection- It uses a carrier sensing scheme in which a transmitting data station detects other signals while transmitting a frame, and stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.[1]
|
|
CSU |
Channel Service Unit- is used to perform loopback testing
|
|
DHCP |
Dynamic Host Configuration Protocol- dynamically distributing network configuration parameters, such as IP addresses for interfaces and services.
|
|
DLC |
Data Link Control- is the service provided by the data link layer.
|
|
DMZ |
Demilitarized Zone-contains and exposes an organization's external-facing services to a usually larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN)
|
|
DNS |
Domain Name Service-naming system for computers, services, or any resource connected to the Internet or a private network
|
|
DOCSIS |
Data-Over-Cable Service Interface Specification-is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV (CATV) system
|
|
DOS |
Denial of Service-an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
|
|
DDOS |
Distributed Denial of Service- the attack source is more than one, often thousands of, unique IP addresses.
|
|
DSL |
Digital Subscriber Line- transmit digital data over telephone lines
|
|
DSSS |
Direct Sequence Spread Spectrum- This spreading of the transmitted signal over a large bandwidth make the resulting wideband signal appear as a noise signal which allows greater resistance to intentional and unintentional interference with the transmitted signal.
|
|
DSU |
Data Service Unit- piece of telecommunications circuit terminating equipment that transforms digital data between telephone company lines and local equipment
|
|
DWDM |
Dense Wavelength Division Multiplexing- multiplexes a number of optical carrier signals onto a single optical fiber by using different wavelengths (i.e., colors) of laser light.
|
|
E1 |
E-Carrier Level - 2.048 Mbit/s
|
|
EAP |
Extensible Authentication Protocol-is an authentication framework frequently used in wireless networks and point-to-point connections.
|
|
EDNS |
Extension Mechanisms for DNS- specification for expanding the size of several parameters of the Domain Name System protocol which had size restrictions that the Internet engineering community deemed too limited for increasing functionality of the protocol
|
|
EGP |
Exterior Gateway Protocol obsolete routing protocol protocol for exchanging routing information between two neighbor gateway host
|
|
EIGRP |
Enhanced Interior Gateway Routing Protocol- advanced distance-vector routing protocol that is used on a computer network to help automate routing decisions and configuration. The protocol was designed by Cisco Systems.
|
|
EMI |
Electromagnetic Interference- is a disturbance generated by an external source that affects an electrical circuit by electromagnetic induction, electrostatic coupling, or conduction
|
|
ESD |
Electrostatic Discharge-sudden flow of electricity between two electrically charged objects caused by contact, an electrical short, or dielectric breakdown
|
|
ESSID |
Extended Service Set Identifier- is one or more interconnected basic service sets (BSSs) and their associated LANs
|
|
ESP |
Encapsulated security packets- protocol within the IPSec for providing authentication, integrity and confidentially of network packets data/payload in IPv4 and IPv6 networks
|
|
FDDI |
Fiber Distributed Data Interface- FDDI provides a 100 Mbit/s optical standard for data transmission in local area network that can extend in range up to 200 kilometers (120 mi). Although FDDI logical topology is a ring-based token network, it did not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol was derived from the IEEE 802.4 token bus timed token protocol
|
|
FDM |
Frequency Division Multiplexing- is a technique by which the total bandwidth available in a communication medium is divided into a series of non-overlapping frequency sub-bands, each of which is used to carry a separate signal
|
|
FHSS |
Frequency Hopping Spread Spectrum-a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is used as a multiple access method in the frequency-hopping code division multiple access (FH-CDMA) scheme.
|
|
FQDN |
Fully Qualified Domain Name- domain name that specifies its exact location in the tree hierarchy of the Domain Name System
|
|
FTP |
File Transfer Protocol- protocol used to transfer computer files between a client and server on a computer network
|
|
FPTS |
File Transfer Protocol Security-
|
|
GBIC |
Gigabit Interface Converter- standard for transceivers, commonly used with Gigabit Ethernet and fibre channel in the 2000s
|
|
Gbps |
Giga bits per second
|
|
GPG |
GNU Privacy Guard- free software replacement for Symantec's PGP cryptographic software suite
|
|
HDLC |
High-Level Data Link Control-High-Level Data Link Control is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization
|
|
HIDS |
Host Intrusion Detection System- A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as (in some cases) the network packets on its network interfaces (just like a network-based intrusion detection system (NIDS) would do
|
|
HIPS |
Host Intrusion Prevention System- network security appliances that monitor network and/or system activities for malicious activity
|
|
HSPA |
High Speed Packet Access- High-Speed Downlink Packet Access is an enhanced 3G mobile-telephony communications protocol in the High-Speed Packet Access family, also dubbed 3.5G, 3G+, or Turbo 3G, which allows networks based on Universal Mobile Telecommunications System to have higher data speeds and capacity.
|
|
HSRP |
Hot Standby Router Protocol- Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway, and has been described in detail in RFC 2281
|
|
HTTP |
HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.
|
|
Hz |
Hertz
|
|
IANA |
Internet Assigned Numbers Authority
|
|
ICA |
Independent Computer Architecture- Windows presentation services protocol
|
|
ICANN |
Internet Corporation for Assigned Names and Numbers
|
|
ICMP |
Internet Control Message Protocol- used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached.
|
|
ICS |
Internet Connection Sharing- the use of a device with Internet access such as 3G cellular service, broadband via Ethernet, or other Internet gateway as an access point for other devices.
|
|
IDF |
Intermediate Distribution Frame -An Intermediate Distribution Frame (IDF) is a free-standing or wall mounted rack for wiring or cable from a Main Distribution Frame (MDF) - also called the Combined Distribution Frame (CDF) - and leading to individual cables for each piece of equipment such as workstations, personal computers and other end-user devices
|
|
IDS |
Intrusion Detection System- monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station
|
|
IEEE |
Institute of Electrical and Electronics Engineers
|
|
IGMP |
Internet Group Multicast Protocol- communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships. IGMP is an integral part of IP multicast.
|
|
IGP |
Interior Gateway Protocol- exchanging routing information between gateways (commonly routers) within an autonomous system (for example, a system of corporate local area networks).
|
|
IIS |
Internet Information Services- an extensible web server created by Microsoft for use with Windows NT family
|
|
IKE |
Internet Key Exchange- is the protocol used to set up a security association (SA) in the IPsec protocol suite
|
|
IMAP4 |
Internet Message Access Protocol- version 4- protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection
|
|
InterNIC
|
Internet Network Information Center- primarily responsible for domain name allocations and X.500 directory services
|
|
IP |
Internet Protocol-The main protocol for relaying data between networks
|
|
IPS |
Intrusion Prevention System-The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it
|
|
IPSec |
Internet Protocol Security- communications by authenticating and encrypting each IP packet of a communication session
|
|
ISAKMP |
Internet Security Association and Key Management Protocol-for establishing Security Associations (SA) and cryptographic keys in an Internet environment
|
|
ISDN |
Integrated Services Digital Network- communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network
|
|
ISP |
Internet Service Provider
|
|
IV |
Initialization Vector-is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom
|
|
Kbps |
Kilobits per second
|
|
L2F |
Layer 2 Forwarding- is a tunneling protocol developed by Cisco Systems, Inc. to establish virtual private network connections over the Internet. L2F does not provide encryption or confidentiality by itself; It relies on the protocol being tunneled to provide privacy.
|
|
L2TP |
Layer 2 Tunneling Protocol (L2TP)- is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs
|
|
LACP |
Link Aggregation Control Protocol (LACP)- is a protocol for the collective handling of multiple physical ports that can be seen as a single channel for network traffic purposes
|
|
LAN |
local area network (LAN)-is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, or office building
|
|
LC |
fiber optic connector |
|
LDAP |
Lightweight Directory Access Protocol- is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network
|
|
LEC |
Local Exchange Carrier- is a regulatory term in telecommunications for the local telephone company
|
|
LED |
A light-emitting diode (LED)- is a two-lead semiconductor light source
|
|
LLC |
logical link control (LLC)- data communication protocol layer is the upper sublayer of the data link layer (layer 2) of the seven-layer OSI model.
|
|
MAC |
media access control (MAC)- layer is the lower sublayer of the data link layer (layer 2) of the seven-layer OSI model
|
|
Mbps |
Megabits per second
|
|
MBps |
Megabits per second
|
|
MDF |
MDF is a termination point within the local telephone exchange where exchange equipment and terminations of local loops are connected by jumper wires at the MDF
|
|
MDI |
medium dependent interface (MDI)- describes the interface (both physical and electrical) in a computer network from a physical layer implementation to the physical medium used to carry the transmission
|
|
MDIX |
Ethernet over twisted pair also defines a medium dependent interface crossover (MDI-X) interface
|
|
MIB |
management information base (MIB)- is a database used for managing the entities in a communication network
|
|
MIMO |
multiple-input and multiple-output, or MIMO, is a method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation
|
|
MMF |
Multi-mode optical fiber is a type of optical fiber mostly used for communication over short distances, such as within a building or on a campus. Typical multimode links have data rates of 10 Mbit/s to 10 Gbit/s over link lengths of up to 600 meters (2000 feet) — more than sufficient for the majority of premises applications
|
|
MPLS |
Multiprotocol Label Switching (MPLS) is a type of data-carrying technique for high-performance telecommunications networks that directs data from one network node to the next based on short path labels rather than long network addresses, avoiding complex lookups in a routing table
|
|
MX |
mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available
|
|
NAC |
Network Access Control is an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement
|
|
NaaS |
Network as a service (NaaS) describes services for network transport connectivity. NaaS involves the optimization of resource allocations by considering network and computing resources as a unified whole
|
|
NAS |
Network-attached storage is a file-level computer data storage server connected to a computer network providing data access to a group of clients
|
|
SAN |
A SAN typically has its own network of storage devices that are generally not accessible through the local area network (LAN) by other devices |
|
NAT |
Network address translation (NAT) is a methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device
|
|
NCP |
Network Control Protocol NCP allowed users to access and use computers and devices at remote locations and to transmit files between computers
|
|
NetBEUI
|
also known y the name NetBIOS frame (NBF) protocol thanks to its frame format formalization. Because NetBEUI is an improved kind of NetBIOS, it is also by default strictly an API and does not serve as a networking protocol.
|
|
NetBIOS
|
NetBIOS /ˈnɛtbʌɪ.ɒs/ is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol.
|
|
NFS |
Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a computer network much like local storage is accessed
|
|
NIC |
network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network.
|
|
NNTP |
Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news
|
|
NTP |
networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks
|
|
OTDR |
injects a series of optical pulses into the fiber under test and extracts, from the same end of the fiber, light that is scattered (Rayleigh backscatter) or reflected back from points along the fiber
|
|
PAP |
password authentication protocol (PAP) is an authentication protocol that uses a password. PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP.
|
|
PDU |
protocol data unit has the following meanings: Information that is delivered as a unit among peer entities of a network and that may contain control information, such as address information, or user data. In a layered system, a unit of data which is specified in a protocol of a given layer and which consists of protocol-control information and possibly user data of that layer
|
|
PKI |
public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption
|
|
PoE |
Power over ethernet |
|
POP3 |
Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.[ |
|
POTS |
Plain old telephone service (POTS) is voice-grade telephone service employing analog signal transmission over copper loops
|
|
PPP |
Point-to-Point Protocol (PPP) is a data link protocol used to establish a direct connection between two nodes
|
|
PPPoE |
Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames
|
|
PPTP |
Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets
|
|
PRI |
Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user
|
|
PSTN |
public switched telephone network (PSTN) is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators, providing infrastructure and services for public telecommunication
|
|
QoS |
Quality of service (QoS) is the overall performance of a telephony or computer network, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as error rates, bit rate, throughput, transmission delay, availability
|
|
RADIUS |
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.
|
|
RARP |
Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link layer or hardware address, such as a MAC address.
|
|
RAS |
Remote Access Service (RAS) provides remote access capabilities to client applications on computers running Windows
|
|
RDP |
Remote Desktop Protocol is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection
|
|
RIP RIPv2 |
Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The maximum number of hops allowed for RIP is 15, which limits the size of networks that RIP can support. |
|
RSA |
RSA is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.
|
|
RTP |
Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks.
|
|
RTSP |
Real Time Streaming Protocol (RTSP) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points.
|
|
SCP |
Secure copy or SCP is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol.
|
|
SDSL |
SDSL is a rate-adaptive digital subscriber line (DSL) variant with T1/E1-like data rates (T1: 1.544 Mbit/s, E1: 2.048 Mbit/s). It runs over one pair of copper wires, with a maximum range of 10,000 feet (3,000 m). It cannot co-exist with a conventional voice service on the same pair as it takes over the entire bandwidth.[1]
|
|
SFTP |
SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities.
|
|
SIP |
Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions.
|
|
SLIP |
Serial Line Internet Protocol (also SLIP) is an encapsulation of the Internet Protocol designed to work over serial ports and modem connections
|
|
SMF |
single-mode optical fiber (SMF) is an optical fiber designed to carry light only directly down the fiber-the transverse mode
|
|
SMPT |
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission
|
|
SOA |
SOA record is a Start of Authority. Every domain must have a Start of Authority record at the cutover point where the domain is delegated from its parent domain
|
|
SOHO |
Small Office / Home Office
|
|
SONET |
Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting diodes (LEDs
|
|
SSH |
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network
|
|
SSL |
cryptographic protocols designed to provide communications security over a computer network
|
|
STP |
Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for Ethernet networks
|
|
TACACS
|
Terminal Access Controller Access-Control System (TACACS, usually pronounced like tack-axe) refers to a family of related protocols handling remote authentication and related services for networked access control through a centralized server
|
|
TCP |
TCP provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network
|
|
TDM |
Time-division multiplexing (TDM) is a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern
|
|
TFTP |
Trivial File Transfer Protocol (TFTP) is a simple, lockstep, File Transfer Protocol which allows a client to get from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network
|
|
TKIP |
Temporal Key Integrity Protocol or TKIP /tiːˈkɪp/ was a stopgap security protocol used in the IEEE 802.11 wireless networking standard
|
|
TLS |
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as 'SSL', are cryptographic protocols designed to provide communications security over a computer network.
|
|
TTL |
Time to live |
|
UDP |
UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. It has no handshaking dialogues, and thus exposes the user's program to any unreliability of the underlying network protocol
|
|
URL |
A uniform resource locator is a specific character string that constitutes a reference to a resource. Most web browsers display the URL of a web page above the page in an address bar
|
|
VLAN |
A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).
|
|
VoIP |
Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and broadband phone service.
|
|
VPN |
A virtual private network (VPN) extends a private network across a public network or internet |
|
VRRP |
Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
|
|
VTP |
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network
|
|
WINS |
Windows Internet Name Service (WINS) is Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names. Effectively, WINS is to NetBIOS names what DNS is to domain names — a central mapping of host names to network addresses.
|
|
WLAN |
Wireless Local Area Network
|