Glossary

10Base2 Ethernet

An implementation of Ethernet that specifies a 10Mbps signaling rate, baseband signaling, and coaxial cable with a maximum segment length of 185 meters.

10BaseFL

An implementation of Ethernet that specifies a 10Mbps signaling rate, baseband signaling, and fiber-optic cabling.

10BaseT

An implementation of Ethernet that specifies a 10Mbps signaling rate, baseband signaling, and twisted-pair cabling.

100BaseVG

Star topology using round-robin for allowing systems to transmit data on the network.

100VG (Voice Grade)

IEEE 802.12 standard for 100BaseVG networks.

100VGAnyLAN

A networking technology that runs 100-Megabit Ethernet over regular (Cat 3) phone lines. It hasn’t gained the industry acceptance that 100BaseT has. See also AnyLAN.

access control list (ACL)

List of rights that an object has to resources in the network. Also a type of firewall. In this case, the lists reside on a router and determine which machines can use the router and in what direction.

ACK

See acknowledgment.

acknowledgment (ACK)

A message confirming that the data packet was received. This occurs at the Transport layer of the OSI model.

ACL

See access control list.

Active Directory

The replacement for NT Directory Service (NTDS) that is included with Windows 2000. It acts similarly to NDS (Novell Directory Services) because it is a true X.500-based directory service.

active hub

A hub that is powered and actively regenerates any signal that is received. See also hub.

active monitor

Used in Token Ring networks, a process that prevents data frames from roaming the ring unchecked. If the frame passes the active monitor too many times, it is removed from the ring. Also ensures that a token is always circulating the ring.

adapter

Technically, the peripheral hardware that installs into your computer or the software that defines how the computer talks to that hardware.

address

Designation to allow PCs to be known by a name or number to other PCs. Addressing allows a PC to transmit data directly to another PC by using its address (IP or MAC).

address record

Part of a DNS table that maps an IP address to a domain name. Also known as an A (or host) record.

ad hoc RF network

A network created when two RF-capable devices are brought within transmission range of each other. A common example is handheld PDAs beaming data to each other.

ADSL

See asymmetrical digital subscriber line.

alias record

See CNAME record.

antivirus

A category of software that uses various methods to eliminate viruses in a computer. It typically also protects against future infection. See also virus.

AnyLAN

Another name for 100VGAnyLAN created in 802.12. See also 100VGAnyLAN.

Application layer

The seventh layer of the OSI model, it deals with how applications access the network and describes application functionality, such as file transfer, messaging, and so on.

ARCnet

The Attached Resource Computer Network, which was developed by Datapoint Corporation in the late 1970s as one of the first baseband networks. It can use either a physical star or bus topology.

ARP table

A table used by the ARP protocol. Contains a list of known TCP/IP addresses and their associated MAC addresses. The table is cached in memory so that ARP lookups do not have to be performed for frequently accessed TCP/IP and MAC addresses. See also media access control, Transmission Control Protocol/Internet Protocol.

asymmetrical digital subscriber line (ADSL)

An implementation of DSL where the upload and download speeds are different. See also digital subscriber line.

Asynchronous Transfer Mode (ATM)

A connection-oriented network architecture based on broadband ISDN technology that uses constant size 53-byte cells instead of packets. Because cells don’t change size, they are switched much faster and more efficiently than packets across a network.

ATM

See Asynchronous Transfer Mode.

Attachment Unit Interface (AUI) port

Port on some NICs that allows connecting the NIC to different media types by using an external transceiver.

backbone

The part of most networks that connects multiple segments together to form a LAN. The backbone usually has higher speed than the segments. See also segment, local area network.

Backup Domain Controller (BDC)

Computer on a Windows NT network that has a copy of the SAM database for fault tolerance and performance enhancement purposes. See also Security Accounts Manager.

backup plan

Term used to describe a company’s strategy to make copies of and restore its data in case of an emergency.

backup window

The amount of time that an administrator has available to perform a complete, successful backup.

bandwidth

In network communications, the amount of data that can be sent across a wire in a given time. Each communication that passes along the wire decreases the amount of available bandwidth.

baseband

A transmission technique in which the signal uses the entire bandwidth of a transmission medium.

baseline

A category of network documentation that indicates how the network normally runs. It includes such information as network statistics, server utilization trends, and processor performance statistics.

bearer channel (B channel)

The channels in an ISDN line that carry data. Each bearer channel typically has a bandwidth of 64Kbps.

blackout

See power blackout.

blank

These are often referred to as slot covers. If a PC card is removed, there will be an opening in the computer case. This will allow dirt and dust to enter the computer and prevent it from being cooled properly. Some computer cases have the blanks as part of the case and they must be broken off from the case before a bus slot may be used to insert a PC card into it.

BNC connector

Tubular connectors most commonly used with coaxial cable.

bonding

A procedure where two ISDN B channels are joined together to provide greater bandwidth.

bounded media

A network medium that is used at the Physical layer where the signal travels over a cable of some kind.

bridge

A network device, operating at the Data Link layer, that logically separates a single network into segments, but lets the two segments appear to be one network to higher layer protocols.

broadband

A network transmission method in which a single transmission medium is divided so that multiple signals can travel across the same medium simultaneously.

broadcast address

A special network address that refers to all users on the network. For example, the TCP/IP address 255.255.255.255 is the broadcast address. Any packets sent to that address will be sent to everyone on that LAN.

brouter

A device that combines the functionality of a bridge and a router, but can’t be distinctly classified as either.

brownout

See power brownout.

bus

Pathways in a PC that allow data and signals to be transmitted between the PC components. Types of buses include ISA and PCI.

bus topology

A topology where the cable and signals run in a straight line from one end of the network to the other.

cable

A physical transmission medium that has a central conductor of wire or fiber surrounded by a plastic jacket.

cable map

General network documentation indicating each cable’s source and destination as well as where each network cable runs.

cable tester

A special instrument that is used to test the integrity of LAN cables. See also time-domain reflectometer.

carrier

Signal at a frequency that is chosen to carry data. Addition of data to the frequency is modulation and the removal of data from the frequency is demodulation. This is used on analog devices like modems.

Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)

A media access method that sends a request to send (RTS) packet and waits to receive a clear to send (CTS) packet before sending. Once the CTS is received, the sender sends the packet of information.

Carrier Sense Multiple Access/Collision Detection (CSMA/CD)

A media access method that first senses whether there is a signal on the wire, indicating that someone is transmitting currently. If no one else is transmitting, it attempts a transmission and listens for someone else trying to transmit at the same time. If this happens, both senders back off and don’t transmit again until some specified period of time has passed. See also collision.

categories

Different grades of cables that determine how much protection is offered against interference from outside the cable. Category 1 allows voice data only. Category 2 allows data transmissions up to 4Mbps. Category 3 allows data transmissions up to 10Mbps. Category 4 allows data transmissions up to 16Mbps. Category 5 allows data transmissions up to 100Mbps.

cell

Similar to a packet or frame, except that the ATM cell does not always contain the destination or source addressing information. It also does not contain higher-level addressing or packet control information.

central office

The office in any metropolitan or rural area that contains the telephone switching equipment for that area. The central office connects all users in that area to each other as well as to the rest of the PSTN. See also Public Switched Telephone Network.

Channel Service Unit (CSU)

Generally used with a T1 Internet line, it is used to terminate the connection from the T1 provider. The CSU is usually part of a CSU/DSU unit. It also provides diagnostics and testing if necessary.

checkpoints

A certain part or time to allow for a restart at the last point that the data was saved.

checksum

A hexadecimal value computed from transmitted data that is used in error-checking routines.

circuit switching

A switching method where a dedicated connection between the sender and receiver is maintained throughout the conversation.

Classless Internetwork Domain Routing (CIDR)

The new routing method used by InterNIC to assign IP addresses. CIDR can be described as a “slash x” network. The x represents the number of bits in the network that InterNIC controls.

client

A client is a part of a client/server network. It is the part where the computing is usually done. In a typical setting, a client will use the server for remote storage, backups, or security such as a firewall.

client/server network

A server-centric network in which all resources are stored on a file server and processing power is distributed among workstations and the file server.

clipper chip

A hardware implementation of the skipjack encryption algorithm.

clustering

A computing technology where many servers work together so that they appear to be one high-powered server. If one server fails, the others in the cluster take over the services provided by the failed server.

CNAME record

A DNS record type that specifies other names for existing hosts. This allows a DNS administrator to assign multiple DNS host names to a single DNS host. Also known as an alias record.

coaxial cable

Often referred to as coax. A type of cable used in network wiring. Typical coaxial cable types include RG-58 and RG-62. 10Base2 Ethernet networks use coaxial cable. Coaxial cable is usually shielded.

collision

The error condition that occurs when two stations on a CSMA/ CD network transmit data (at the Data Link layer) at the same time. See also Carrier Sense Multiple Access/Collision Detection.

collision light

A light on a NIC or hub that indicates when a collision has occurred.

concentrator

See hub.

connectionless

Communications between two hosts that have no previous session established for synchronizing sent data. The data is not acknowledged at the receiving end. This can allow for data loss.

connectionless services

See connectionless, connectionless transport protocol.

connectionless transport protocol

A transport protocol, such as UDP, that does not create a virtual connection between sending and receiving stations. See also User Datagram Protocol.

connection-oriented

Communications between two hosts that have a previous session established for synchronizing sent data. The data is acknowledged by the receiving PC. This allows for guaranteed delivery of data between PCs.

connection-oriented transport protocol

A transport protocol that uses acknowledgments and responses to establish a virtual connection between sending and receiving stations. TCP is a connection-oriented protocol. See also Transmission Control Protocol.

controller

Part of a PC that allows connectivity to peripheral devices. A disk controller allows the PC to be connected to a hard disk. A network controller allows a PC to be connected to a network. A keyboard controller is used to connect a keyboard to the PC.

Control Panel

A special window inside Microsoft Windows operating systems (Windows 95 and above) that has icons for all of the configurable options for the system.

core OS

The core component, or kernel, of NetWare.

cost

A value given to a route between PCs or subnets to determine which route may be best. The word hop is sometimes used to refer to the number of routers between two PCs or subnets. See also hop.

country codes

The two-letter abbreviations for countries, used in the DNS hierarchy. See also Domain Name Service.

CRC

See cyclical redundancy check.

crossover cable

The troubleshooting tool used in Ethernet UTP installations to test communications between two stations, bypassing the hub. See also unshielded twisted-pair cable.

crosstalk

A type of interference that occurs when two LAN cables run close to each other. If one cable is carrying a signal and the other isn’t, the one carrying a signal will induce a “ghost” signal (crosstalk) in the other cable.

CSMA/CA

See Carrier Sense Multiple Access/Collision Avoidance.

CSMA/CD

See Carrier Sense Multiple Access/Collision Detection.

cyclical redundancy check (CRC)

An error-checking method in data communications that runs a formula against data before transmissions. The sending station then appends the resultant value (called a checksum) to the data and sends it. The receiving station uses the same formula on the data. If the receiving station doesn’t get the same checksum result for the calculation, it considers the transmission invalid, rejects the frame, and asks for a retransmission.

datagram

A unit of data smaller than a packet.

Data Link layer

The second layer of the OSI model. It describes the logical topology of a network, which is the way that packets move throughout a network. It also describes the method of media access. See also Open Systems Interconnect.

data packet

A unit of data sent over a network. A packet includes a header, addressing information, and the data itself. A packet is treated as a single unit as it is sent from device to device. Also known as a datagram.

Data Service Unit (DSU)

It transmits data through a Channel Service Unit (CSU) and is almost always a part of a single device referred to as a
CSU/DSU.

D channel

See delta channel.

default gateway

The router that all packets are sent to when the workstation doesn’t know where the destination station is or when it can’t find the destination station on the local segment.

delta channel (D channel)

A channel on an ISDN line used for link management. See also Integrated Services Digital Network.

demarcation point (demarc)

The point on any telephone installation where the telephone lines from the central office enter the customer’s premises.

denial of service (DoS) attack

Type of hack that prevents any users— even legitimate ones—from using the system.

destination port number

The address of the PC to which data is being sent from a sending PC. The port portion allows for the demultiplexing of data to be sent to a specific application.

DHCP

See Dynamic Host Configuration Protocol.

dialogs

Communications between two PCs.

digital subscriber line (DSL)

A digital WAN technology that brings high- speed digital networking to homes and businesses over POTS. There are many types, including HDSL (high-speed DSL) and VDSL (very high bit-rate DSL). See also plain old telephone service, asymmetrical digital subscriber line.

directory

A network database that contains a listing of all network resources, such as users, printers, groups, and so on.

directory service

A network service that provides access to a central database of information, which contains detailed information about the resources available on a network.

disaster recovery

The procedure by which data is recovered after a disaster.

disk striping

Technology that enables writing data to multiple disks simultaneously in small portions called stripes. These stripes maximize use by having all of the read/write heads working constantly. Different data is stored on each disk and is not automatically duplicated (this means that disk striping in and of itself does not provide fault tolerance).

distance vector routing protocol

A route discovery method in which each router, using broadcasts, tells every other router what networks and routes it knows about and the distance to them.

DIX

Another name for a 15-pin AUI connector or a DB-15 connector.

DNS

See Domain Name Service.

DNS server

Any server that performs DNS host name–to–IP address resolution. See also Domain Name Service, Internet Protocol.

DNS zone

An area in the DNS hierarchy that is managed as a single unit. See also Domain Name Service.

DoD Networking Model

A four-layer conceptual model describing how communications should take place between computer systems. The four layers are Process/Application, Host-to-Host, Internet, and Network Access.

domain

A group of networked Windows computers that share a single SAM database. See also Security Accounts Manager.

Domain Name Service (DNS)

The network service used in TCP/IP networks that translates host names to IP addresses. See also Transmission Control Protocol/Internet Protocol.

dotted decimal

Notation used by TCP/IP to designate an IP address. The notation is made up of 32 bits (4 bytes), each byte separated by a decimal. The range of numbers for each octet is 0–255. The leftmost octet contains the high-order bits and the rightmost octet contains the low-order bits.

DSL

See digital subscriber line.

D-type connector

The first type of networking connector, the D-type connector, is used to connect many peripherals to a PC. A D-type connector is characterized by its shape. Turned on its side, it looks like the letter D and contains rows of pins (male) or sockets (female). AUI connectors are examples.

dual-attached stations (DAS)

Stations on an FDDI network that are attached to both cables for connection redundancy and fault tolerance.

dumb terminal

A keyboard and monitor that send keystrokes to a central processing computer (typically a mainframe or minicomputer) that returns screen displays to the monitor. The unit has no processing power of its own, hence the moniker “dumb.”

duplexed hard drives

Two hard drives to which identical information is written simultaneously. A dedicated controller card controls each drive. Used for fault tolerance.

duplicate server

Two servers that are identical for use in clustering.

dynamic ARP table entries

See dynamic entry.

dynamic entry

An entry made in the ARP table whenever an ARP request is made by the Windows TCP/IP stack and the MAC address is not found in the ARP table. The ARP request is broadcast on the local segment. When the MAC address of the requested IP address is found, that information is added to the ARP table. See also Internet Protocol, media access control, Transmission Control Protocol/Internet Protocol.

Dynamic Host Configuration Protocol (DHCP)

A protocol used on a TCP/IP network to send client configuration data, including TCP/IP address, default gateway, subnet mask, and DNS configuration, to clients. See also default gateway, Domain Name Service, subnet mask, Transmission Control Protocol/Internet Protocol.

dynamic packet filtering

A type of firewall used to accept or reject packets based on the contents of the packets.

dynamic routing

The use of route discovery protocols to talk to other routers and find out what networks they are attached to. Routers that use dynamic routing send out special packets to request updates of the other routers on the network as well as to send their own updates.

dynamic state list

See dynamic routing.

dynamically allocated port

TCP/IP port used by an application when needed. The port is not constantly used.

EEPROM

See electrically erasable programmable read-only memory.

electrically erasable programmable read-only memory (EEPROM)

A special integrated circuit on expansion cards that allows data to be stored on the chip. If necessary, the data can be erased by a special configuration program. Typically used to store hardware configuration data for expansion cards.

electromagnetic interference (EMI)

The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable. The result is degradation of the signal.

electronic mail (e-mail)

An application that allows people to send messages via their computers on the same network or over the Internet.

electrostatic discharge (ESD)

A problem that exists when two items with dissimilar static electrical charges are brought together. The static electrical charges jump to the item with fewer electrical charges, causing ESD, which can damage computer components.

e-mail

See electronic mail.

EMI

See electromagnetic interference.

encoding

The process of translating data into signals that can be transmitted on a transmission medium.

encryption key

The string of alphanumeric characters used to decrypt encrypted data.

endpoint

The two ends of a connection for transmitting data. One end is the receiver, and the other is the sender.

ESD

See electrostatic discharge.

Ethernet

A shared-media network architecture. It operates at the Physical and Data Link layers of the OSI model. As the media access method, it uses baseband signaling over either a bus or a star topology with CSMA/CD. The cabling used in Ethernet networks can be coax, twisted-pair, or fiber-optic. See also Carrier Sense Multiple Access/Collision Detection, Open Systems Interconnect.

Ethernet address

See MAC address.

expansion slot

A slot on the computer’s bus into which expansion cards are plugged to expand the functionality of the computer (for example, using a NIC to add the computer to a network). See also network interface card.

extended AppleTalk network

An AppleTalk network segment that is assigned a 16-bit range of numbers rather than a single 16-bit number.

failover device

A device that comes online when another fails.

failover server

A hot site backup system in which the failover server is connected to the primary server. A heartbeat is sent from the primary server to the backup server. If the heartbeat stops, the failover system starts and takes over. Thus, the system doesn’t go down even if the primary server is not running.

Fast Ethernet

The general category name given to 100Mbps Ethernet technologies.

fault-resistant network

A network that will be up and running at least 99 percent of the time or that is down less than 8 hours a year.

fault-tolerant network

A network that can recover from minor errors.

FDDI

See Fiber Distributed Data Interface.

Fiber Channel

A type of server-to-storage system connection that uses fiber-optic connectors.

Fiber Distributed Data Interface (FDDI)

A network topology that uses fiber-optic cable as a transmission medium and dual, counterrotating rings to provide data delivery and fault tolerance.

fiber-optic

A type of network cable that uses a central glass or plastic core surrounded by a plastic coating.

file server

A server specialized in holding and distributing files.

File Transfer Protocol (FTP)

A TCP/IP protocol and software that permit the transferring of files between computer systems. Because FTP has been implemented on numerous types of computer systems, files can be transferred between disparate computer systems (for example, a personal computer and a minicomputer). See also Transmission Control Protocol/Internet Protocol.

firewall

A combination of hardware and software that protects a network from attack by hackers that could gain access through public networks, including the Internet.

FQDN

See Fully Qualified Domain Name.

frame relay

A WAN technology that transmits packets over a WAN using packet switching. See also packet switching.

frequency division multiplexing (FDM)

A multiplexing technique whereby the different signals are sent across multiple frequencies.

FTP

See File Transfer Protocol.

FTP proxy

A server that uploads and downloads files from a server on behalf of a workstation.

full backup

A backup that copies all data to the archive medium.

Fully Qualified Domain Name (FQDN)

An address that uses both the host name (workstation name) and the domain name.

gateway

The hardware and software needed to connect two disparate network environments so that communications can occur.

global group

A type of group in Windows NT that is used network-wide. Members can be from anywhere in the network, and rights can be assigned to any resource in the network.

ground loop

A condition that occurs when a signal cycles through a common ground connection between two devices, causing EMI interference. See also electromagnetic interference.

hardware address

A Data Link layer address assigned to every NIC at the MAC sublayer. The address is in the format xx:xx:xx:xx:xx:xx; each xx is a two-digit hexadecimal number. See also media access control, network interface card.

hardware loopback

Connects the transmission pins directly to the receiving pins, allowing diagnostic software to test if a NIC can successfully transmit and receive. See also network interface card.

heartbeat

The data transmissions between two servers in a cluster to detect when one fails. When the standby server detects no heartbeats from the main server, it comes online and takes control of the responsibilities of the main server. This allows for all services to remain online and accessible.

hop

One pass through a router. See also cost, router.

hop count

As a packet travels over a network through multiple routers, each router will increment this field in the packet by one as it crosses the router. It is used to limit the number of routers a packet can cross on the way to its destination.

host

Any network device with a TCP/IP network address. See also Transmission Control Protocol/Internet Protocol.

Host-to-Host layer

A layer in the DoD model that corresponds to the Transport layer of the OSI model. See also DoD Networking Model, Open Systems Interconnect.

HTML

See Hypertext Markup Language.

HTTP

See Hypertext Transfer Protocol.

hub

A Physical layer device that serves as a central connection point for several network devices. A hub repeats the signals it receives on one port to all other ports. See also active hub.

Hypertext Markup Language (HTML)

A set of codes used to format text and graphics that will be displayed in a browser. The codes define how data will be displayed.

Hypertext Transfer Protocol (HTTP)

The protocol used for communication between a web server and a web browser.

IBM data connector

A proprietary data connector created by IBM. This connector is unique because there isn’t a male version and female version; any IBM connector can connect with another IBM connector and lock together.

ICMP

See Internet Control Message Protocol.

IEEE

See Institute of Electrical and Electronics Engineers, Inc.

IEEE 802.x standards

The IEEE standards for LAN and MAN networking.

IEEE 802.1 LAN/MAN Management

Standard that specifies LAN/MAN network management and internetworking.

IEEE 802.2 Logical Link Control

Standard that specifies the operation of the logical link control (LLC) sublayer of the Data Link layer of the OSI model. The LLC sublayer provides an interface between the MAC sublayer and the Network layer. See also media access control, Open Systems Interconnect.

IEEE 802.3 CSMA/CD Networking

Standard that specifies a network that uses Ethernet technology and a CSMA/CD network access method. See also Carrier Sense Multiple Access/Collision Detection.

IEEE 802.4 Token Bus

Standard that specifies a physical and logical bus topology that uses coaxial or fiber-optic cable and the token-passing media access method.

IEEE 802.5 Token Ring

Specifies a logical ring, physical star, and token- passing media access method based on IBM’s Token Ring.

IEEE 802.6 Distributed Queue Dual Bus (DQDB) Metropolitan Area Network

Provides a definition and criteria for a DQDB metropolitan area network (MAN).

IEEE 802.7 Broadband Local Area Networks

Standard for broadband cabling technology.

IEEE 802.8 Fiber-Optic LANs and MANs

A standard containing guidelines for the use of fiber optics on networks, which includes FDDI and Ethernet over fiber-optic cable. See also Ethernet, Fiber Distributed Data Interface.

IEEE 802.9 Integrated Services (IS) LAN Interface

A standard containing guidelines for the integration of voice and data over the same cable.

IEEE 802.10 LAN/MAN Security

A series of guidelines dealing with various aspects of network security.

IEEE 802.11 Wireless LAN

Defines standards for implementing wireless technologies such as infrared and spread-spectrum radio.

IEEE 802.12 Demand Priority Access Method

Defines a standard that combines the concepts of Ethernet and ATM. See also Asynchronous Transfer Mode, Ethernet.

IETF

See Internet Engineering Task Force.

Institute of Electrical and Electronics Engineers, Inc. (IEEE)

An international organization that sets standards for various electrical and electronics issues.

Integrated Services Digital Network (ISDN)

A telecommunications standard that is used to digitally send voice, data, and video signals over the same lines. See also delta channel.

intelligent hub

An intelligent hub is a hub that can make some intelligent decisions about network traffic flow and can provide network traffic statistics to network administrators.

internal bridge

A bridge created by placing two NICs in a computer.

internal modem

A modem that is a regular PC card that is inserted into the bus slot. These modems are inside the PC.

International Organization for Standardization (ISO)

The standards organization that developed the OSI model. This model provides a guideline for how communications occur between computers.

Internet

A global network made up of a large number of individual networks interconnected through the use of public telephone lines and TCP/IP protocols. See also Transmission Control Protocol/Internet Protocol.

Internet Architecture Board (IAB)

The committee that oversees management of the Internet. It is made up of two subcommittees: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF). See also Internet Engineering Task Force, Internet Research Task Force.

Internet Control Message Protocol (ICMP)

A message and management protocol for TCP/IP. The Ping utility uses ICMP. See also Ping, Transmission Control Protocol/Internet Protocol.

Internet Engineering Task Force (IETF)

An international organization that works under the Internet Architecture Board to establish standards and protocols relating to the Internet. See also Internet Architecture Board.

Internet Protocol (IP)

The protocol in the TCP/IP protocol suite responsible for network addressing and routing. See also Transmission Control Protocol/Internet Protocol.

Internet Research Task Force (IRTF)

An international organization that works under the Internet Architecture Board to research new Internet technologies. See also Internet Architecture Board.

Internet service provider (ISP)

A company that provides direct access to the Internet for home and business computer users.

internetwork

A network that is internal to a company and is private.

Internetwork Packet eXchange (IPX)

A connectionless, routable network protocol based on the Xerox XNS architecture. It is the default protocol for versions of NetWare before NetWare 5. It operates at the Network layer of the OSI model and is responsible for addressing and routing packets to workstations or servers on other networks. See also Open Systems Interconnect.

inverse multiplexing

The network technology that allows one signal to be split across multiple transmission lines at the transmission source and combined at the receiving end.

IP

See Internet Protocol.

IP address

An address used by the Internet Protocol that identifies the device’s location on the network.

ipconfig

A Windows NT utility used to display that machine’s current configuration.

IP proxy

All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden. Also known as Network Address Translation (NAT).

IP spoofing

A hacker trying to gain access to a network by pretending his or her machine has the same network address as the internal network.

IPX

See Internetwork Packet eXchange.

IPX network address

A number that represents an entire network. All servers on the network must use the same external network number.

ISDN

See Integrated Services Digital Network.

ISDN terminal adapter

The device used on ISDN networks to connect a local network (or single machine) to an ISDN network. It provides power to the line as well as translates data from the LAN or individual computer for transmission on the ISDN line. See also Integrated Services Digital Network.

ISP

See Internet service provider.

Java

A programming language, developed by Sun Microsystems, that is used to write programs that will run on any platform that has a Java Virtual Machine installed.

Java Virtual Machine (JVM)

Software, developed by Sun Microsystems, that creates a virtual Java computer on which Java programs can run. A programmer writes a program once without having to recompile or rewrite the program for all platforms.

jumper

A small connector (cap or plug) that connects pins. This creates a circuit that indicates a setting to a device.

JVM

See Java Virtual Machine.

kernel

The core component of any operating system that handles the functions of memory management, hardware interaction, and program execution.

key

A folder in Windows Registry that contains subkeys and values, or a value with an algorithm to encrypt and decrypt data.

LAN

See local area network.

LAN driver

The interface between the NetWare kernel and the NIC installed in the server. Also a general category of drivers used to enable communications between an operating system and a NIC. See also network interface card.

Large Internet Packet (LIP)

A technology used by the IPX protocol so that IPX can use the largest possible packet size during a transmission. See also Internetwork Packet eXchange.

laser printer

A printer that uses a laser to form an image on a photo- sensitive drum. The image is then developed with toner and transferred to paper. Finally, a heated drum fuses toner particles onto the paper.

Layer 2 Switch

A switching hub that operates at the Data Link layer and builds a table of the MAC addresses of all the connected stations. See also media access control.

Layer 3 Switch

Functioning at the Network layer, a switch that performs the multiport, virtual LAN, data pipelining functions of a standard Layer 2 Switch, but it can perform basic routing functions between virtual LANs.

LCP

See Link Control Protocol.

line conditioner

A device used to protect against power surges and spikes. Line conditioners use several electronic methods to clean all power coming into the line conditioner.

line noise

Any extraneous signal on a power line that is not part of the power feed.

line voltage

The voltage, supplied from the power company, that comes out at the outlets.

Link Control Protocol (LCP)

The protocol used to establish, configure, and test the link between a client and PPP host. See also Point-to-Point Protocol.

link light

A small light-emitting diode (LED) that is found on both the NIC and the hub. It is usually green and labeled “Link” or something similar. A link light indicates that the NIC and the hub are making a Data Link layer connection. See also hub, network interface card.

link state route discovery

A route discovery method that transmits special packets (Link State Packets, or LSPs) that contain information about the networks to which the router is connected.

link state routing

A type of routing that broadcasts its entire routing tables only at startup and possibly at infrequently scheduled intervals. Aside from that, the router only sends messages to other routers when changes are made to the router’s routing table.

link state routing protocol

A routing table protocol where the router sends out limited information, such as updates to its routing tables, to its neighbors only.

Link Support Layer (LSL)

Part of the Novell client software that acts as sort of a switchboard between the Open Datalink Interface (ODI) LAN drivers and the various transport protocols.

Linux

A version of Unix, developed by Linus Torvalds. Runs on Intel- based PCs and is generally free. See also Unix.

LIP

See Large Internet Packet.

local area network (LAN)

A network that is restricted to a single building, group of buildings, or even a single room. A LAN can have one or more servers.

local groups

Groups created on individual servers. Rights can be assigned only to local resources.

local loop

The part of the PSTN that goes from the central office to the demarcation point at the customer’s premises. See also central office, demarcation point, Public Switched Telephone Network.

log file

A file that keeps a running list of all errors and notices, the time and date they occurred, and any other pertinent information.

logical bus topology

Type of topology in which the signal travels the distance of the cable and is received by all stations on the backbone. See also backbone.

logical link control (LLC)

A sublayer of the Data Link layer. Provides an interface between the MAC sublayer and the Network layer. See also media access control, topology.

logical network addressing

The addressing scheme used by protocols at the Network layer.

logical parallel port

Port used by the CAPTURE command to redirect a workstation printer port to a network print queue. The logical port has no relation to the port to which the printer is actually attached or to the physical port. See also physical parallel port.

logical port address

A value that is used at the Transport layer to differentiate between the upper-layer services.

logical ring topology

A network topology in which all network signals travel from one station to another, being read and forwarded by each station.

logical topology

Describes the way the information flows. The types of logical topologies are the same as the physical topologies, except that the flow of information, rather than the physical arrangement, specifies the type of topology.

LSL

See Link Support Layer.

MAC

See media access control.

MAC address

The address that is either assigned to a network card or burned into the NIC. This is how PCs keep track of one another and keep each other separate.

mail exchange (MX) record

A DNS record type that specifies the DNS host name of the mail server for a particular domain name.

MAU

See Multistation Access Unit.

media access

The process of vying for transmission time on the network media.

media access control (MAC)

A sublayer of the Data Link layer that controls the way multiple devices use the same media channel. It controls which devices can transmit and when they can transmit.

media converter

A networking device that converts from one network media type to another. For example, converting from an AUI port to an RJ-45 connector for 10BaseT.

member server

A computer that has Windows NT server installed but doesn’t have a copy of the SAM database. See also Security Accounts Manager.

mesh topology

A network topology where there is a connection from each station to every other station in the network.

modem

A communication device that converts digital computer signals into analog tones for transmission over the PSTN and converts them back to digital upon reception. The word “modem” is an acronym for “modulator/ demodulator.”

multiple-server clustering

A system in which multiple servers run continuously, each providing backup and production services at the same time. (Expensive servers, therefore, are not sitting around as designated “backup” servers, used only when an emergency arises.) If a server fails, another just takes over, without any interruption of service.

multiplexing

A technology that combines multiple signals into one signal for transmission over a slow medium. See also frequency division multiplexing, inverse multiplexing.

multipoint RF network

An RF network consisting of multiple stations, each with transmitters and receivers. This type of network also requires an RF bridge as a central sending and receiving point.

Multistation Access Unit (MAU)

The central device in Token Ring networks that acts as the connection point for all stations and facilitates the formation of the ring.

name resolution

The process of translating (resolving) logical host names to network addresses.

NAT

Acronym that means Network Address Translation. See IP proxy.

National Computing Security Center (NCSC)

The agency that developed the Trusted Computer System Evaluation Criteria (TCSEC) and the Trusted Network Interpretation Environmental Guideline (TNIEG).

National Security Agency (NSA)

The U.S. government agency responsible for protecting U.S. communications and producing foreign intelligence information. It was established by presidential directive in 1952 as a separately organized agency within the Department of Defense (DoD).

nbtstat (NetBIOS over TCP/IP statistics)

The Windows TCP/IP utility that is used to display NetBIOS over TCP/IP statistics. See also network basic input/output system, Transmission Control Protocol/Internet Protocol.

NCP

See NetWare Core Protocol.

NCSC

See National Computing Security Center.

NDPS

See Novell Distributed Print Services.

NDS

See Novell Directory Services.

NDS tree

A logical representation of a network’s resources. Resources are represented by objects in the tree. The tree is often designed after a company’s functional structure. Objects can represent organizations, departments, users, servers, printers, and other resources. See also Novell Directory Services.

nearline site

When two buildings can almost be seen from one another. Obstructions in between are few.

NetBEUI

See NetBIOS Extended User Interface.

NetBIOS

See network basic input/output system.

NetBIOS Extended User Interface (NetBEUI)

Transport protocol based on the NetBIOS protocol that has datagram support and support for connectionless transmission. NetBEUI is a protocol that is native to Microsoft networks and is mainly for use by small businesses. It is a non-routable protocol that cannot pass over a router, but does pass over a bridge since it operates at the Data Link layer. See also network basic input/output system.

NetBIOS name

The unique name used to identify and address a computer using NetBEUI.

netstat

A utility used to determine which TCP/IP connections—inbound or outbound—the computer has. It also allows the user to view packet statistics, such as how many packets have been sent and received. See also Transmission Control Protocol/Internet Protocol.

NetWare

The network operating system made by Novell.

NetWare 3.x

The version series of NetWare that supported multiple, cross-platform clients with fairly minimal hardware requirements. It used a database called the bindery to keep track of users and groups and was administered with several DOS, menu-based utilities (such as SYSCON, PCONSOLE, and FILER).

NetWare 4.x

The version series of NetWare that includes NDS. See also Novell Directory Services.

NetWare 5.x

The version series of NetWare that includes a multiprocessing kernel. It also includes a five-user version of Oracle 8, a relational database, and the ability to use TCP/IP in its pure form.

NetWare Administrator

The utility used to administer NetWare versions 4.x and later by making changes to the NDS Directory. It is the only administrative utility needed to modify NDS objects and their properties. See alsoNovell Directory Services.

NetWare Core Protocol (NCP)

The upper-layer NetWare protocol that functions on top of IPX and provides NetWare resource access to workstations. See also Internet Packet eXchange.

NetWare Link State Protocol (NLSP)

Protocol that gathers routing information based on the link state routing method. Its precursor is the Routing Information Protocol (RIP). NLSP is a more efficient routing protocol than RIP. See also link state routing.

NetWare Loadable Module (NLM)

A component used to provide a NetWare server with additional services and functionality. Unneeded services can be unloaded, thus conserving memory.

network

A group of devices connected by some means for the purpose of sharing information or resources.

Network Address Translation (NAT)

See IP proxy.

network attached storage

Storage, such as hard drives, attached to a network for the purpose of storing data for clients on the network. Network attached storage is commonly used for backing up data.

network basic input/output system (NetBIOS)

A Session layer protocol that opens communication sessions for applications that want to communicate on a network.

network-centric

Refers to network operating systems that use directory services to maintain information about the entire network.

Network File System (NFS)

A protocol that enables users to access files on remote computers as if the files were local.

network interface card (NIC)

Physical device that connects computers and other network equipment to the transmission medium.

Network layer

This third layer of the OSI model is responsible for logical addressing and translating logical names into physical addresses. This layer also controls the routing of data from source to destination as well as the building and dismantling of packets. See also Open Systems Interconnect.

network media

The physical cables that link computers in a network; also known as physical media.

network operating system (NOS)

The software that runs on a network server and offers file, print, application, and other services to clients.

network software diagnostics

Software tools, either Protocol Analyzers or Performance Monitoring Tools, used to troubleshoot network problems.

Network Support Encyclopedia (NSEPro)

See Novell Support Connection.

NFS

See Network File System.

NIC

See network interface card.

NIC diagnostics

Software utilities that verify that the NIC is functioning correctly and test every aspect of NIC operation. See also network interface card.

NIC driver

See LAN driver.

NLM

See NetWare Loadable Module.

NLSP

See NetWare Link State Protocol.

non-unicast packet

A packet that is not sent directly from one workstation to another.

NOS

See network operating system.

Novell Directory Services (NDS)

A NetWare service that provides access to a global, hierarchical directory database of network entities that can be centrally managed.

Novell Distributed Print Services (NDPS)

A printing system designed by Novell that uses NDS to install and manage printers. NDPS supports automatic network printer installation, automatic distribution of client printer drivers, and centralized printer management without the use of print queues.

Novell Support Connection

Novell’s database of technical information documents, files, patches, fixes, NetWare Application Notes, Novell lab bulletins, Novell professional developer bulletins, answers to frequently asked questions, and more. The database is available from Novell and is updated quarterly.

NSA

See National Security Agency.

N-series connector

Used with Thinnet and Thicknet cabling that is a male/female screw and barrel connector.

nslookup

Allows you to query a name server to see which IP address a name resolves to.

NT Directory Services (NTDS)

System of domains and trusts for a Windows NT Server network.

NTDS

See NT Directory Services.

object

The item that represents some network entity in NDS. See also Novell Directory Services.

octet

Refers to eight bits; one-fourth of an IP address.

ODI

See Open Datalink Interface.

OE (operator error)

When the error is not software or hardware related, it may be a problem with the user not knowing how to operate the software or hardware. OE can be a serious problem.

offline

The general name for the condition when some piece of electronic or computer equipment is unavailable or inoperable.

Open Datalink Interface (ODI)

A driver specification, developed by Novell, that enables a single workstation to communicate transparently with several different protocol stacks, using a single NIC and a single NIC driver.

OpenLinux

A version of the Linux network operating system developed by Caldera.

Open Systems Interconnect (OSI)

A model defined by the ISO to categorize the process of communication between computers in terms of seven layers. The seven layers are Application, Presentation, Session, Transport, Network, Data Link, and Physical. See also International Organization for Standardization.

OSI

See Open Systems Interconnect.

oversampling

Method of synchronous bit synchronization in which the receiver samples the signal at a much faster rate than the data rate. This permits the use of an encoding method that does not add clocking transitions.

overvoltage threshold

The level of overvoltage that will trip the circuit breaker in a surge protector.

packet

The basic division of data sent over a network.

packet filtering

A firewall technology that accepts or rejects packets based on their content.

packet switching

The process of breaking messages into packets at the sending router for easier transmission over a WAN. See also frame relay.

passive detection

A type of intruder detection that logs all network events to a file for an administrator to view later.

passive hub

A hub that simply makes physical and electrical connections between all connected stations. Generally speaking, these hubs are not powered.

password history

List of passwords that have already been used.

patch

Software that fixes a problem with an existing program or operating system.

patch cable

A central wiring point for multiple devices on a UTP network. See also unshielded twisted-pair cable.

patch panel

A patch panel is a central wiring point for multiple devices on a UTP network and itself contains no electronic circuits. Generally, patch panels are in server rooms or located near switches or hubs to provide an easy means of patching over wall jacks or hardware.

PDC

See Primary Domain Controller.

peer-to-peer network

Computers hooked together that have no centralized authority. Each computer is equal and can act as both a server and a workstation.

peripheral

Any device that can be attached to the computer to expand its capabilities.

permanent virtual circuit (PVC)

A technology used by frame relay that allows virtual data communications (circuits) to be set up between sender and receiver over a packet-switched network.

PGP

See Pretty Good Privacy.

physical address

See MAC Address.

physical bus topology

A network that uses one network cable that runs from one end of the network to the other. Workstations connect at various points along this cable.

Physical layer

The first layer of the OSI model that controls the functional interface. See also Open Systems Interconnect.

physical media

See network media.

physical mesh topology

A network configuration in which each device has multiple connections. These multiple connections provide redundant connections.

physical parallel port

A port on the back of a computer that allows a printer to be connected with a parallel cable.

physical port

An opening on a network device that allows a cable of some kind to be connected. Ports allow devices to be connected to each other with cables.

physical ring topology

A network topology that is set up in a circular fashion. Data travels around the ring in one direction, and each device on the ring acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.

physical star topology

Describes a network in which a cable runs from each network entity to a central device called a hub. The hub allows all devices to communicate as if they were directly connected. See also hub.

physical topology

The physical layout of a network, such as bus, star, ring, or mesh.

Ping

A TCP/IP utility used to test whether another host is reachable. An ICMP request is sent to the host, who responds with a reply if it is reachable. The request times out if the host is not reachable.

Ping of Death

A large ICMP packet sent to overflow the remote host’s buffer. This usually causes the remote host to reboot or hang.

plain old telephone service (POTS)

Another name for the Public Switched Telephone Network (PSTN). See asymmetrical digital subscriber line, digital subscriber line, Public Switched Telephone Network.

plenum-rated coating

Coaxial cable coating that does not produce toxic gas when burned.

point-to-point

Network communication in which two devices have exclusive access to a network medium. For example, a printer connected to only one workstation would be using a point-to-point connection.

Point-to Point Protocol (PPP)

The protocol used with dial-up connections to the Internet. Its functions include error control, security, dynamic IP addressing, and support for multiple protocols.

Point-to-Point Tunneling Protocol (PPTP)

A protocol that allows the creation of virtual private networks (VPNs), which allow users to access a server on a corporate network over a secure, direct connection via the Internet. See also virtual private network.

polling

A media access control method that uses a central device called a controller that polls each device in turn and asks if it has data to transmit.

POP3

See Post Office Protocol version 3.

port

Some kind of opening that allows network data to pass through. See alsophysical port.

Post Office Protocol version 3 (POP3)

The protocol used to download
e-mail from an SMTP e-mail server to a network client. See also Simple Mail Transfer Protocol.

POTS

See plain old telephone service.

power blackout

A total loss of power that may last for only a few seconds or as long as several hours.

power brownout

Power drops below normal levels for several seconds or longer.

power overage

Too much power is coming into the computer. See also power spike, power surge.

power sag

A lower power condition where the power drops below normal levels for a few seconds, then returns to normal levels.

power spike

The power level rises above normal for less than a second and drops back to normal.

power surge

The power level rises above normal and stays there for longer than a second or two.

power underage

The power level drops below the standard level. See also power sag.

PPP

See Point-to-Point Protocol.

PPTP

See Point-to-Point Tunneling Protocol.

Presentation layer

The sixth layer of the OSI model; responsible for formatting data exchange such as graphic commands and conversion of character sets. Also responsible for data compression, data encryption, and data stream redirection. See also Open Systems Interconnect.

Pretty Good Privacy (PGP)

A shareware implementation of RSA encryption. See also RSA Data Security, Inc.

Primary Domain Controller (PDC)

An NT server that contains a master copy of the SAM database. This database contains all usernames, passwords, and access control lists for a Windows NT domain. See also Security Accounts Manager.

print server

A centralized device that controls and manages all network printers. The print server can be hardware, software, or a combination of both. Some print servers are actually built into the network printer NICs. See also network interface card.

print services

The network services that manage and control printing on a network, allowing multiple and simultaneous access to printers.

private key

A technology in which both the sender and the receiver have the same key. A single key is used to encrypt and decrypt all messages. See also public key.

private network

The part of a network that lies behind a firewall and is not “seen” on the Internet. See also firewall.

protocol

A predefined set of rules that dictates how computers or devices communicate and exchange data on the network.

protocol analyzer

A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines.

protocol suite

The set of rules a computer uses to communicate with other computers.

proxy

A type of firewall that prevents direct communication between a client and a host by acting as an intermediary. See also firewall.

proxy cache server

An implementation of a web proxy. The server receives an HTTP request from a web browser and makes the request on behalf of the sending workstation. When the response comes, the proxy cache server caches a copy of the response locally. The next time someone makes a request for the same web page or Internet information, the proxy cache server can fulfill the request out of the cache instead of having to retrieve the resource from the Web.

proxy server

A type of server that makes a single Internet connection and services requests on behalf of many users.

PSTN

See Public Switched Telephone Network.

public

For use by everyone.

public key

A technology that uses two keys to facilitate communication, a public key and a private key. The public key is used to encrypt a message to a receiver. See also private key.

public network

The part of a network on the outside of a firewall that is exposed to the public. See also firewall.

Public Switched Telephone Network (PSTN)

This is the U.S. public telephone network. It is also called the plain old telephone service (POTS). See also central office.

punchdown tool

A hand tool used to terminate twisted-pair wires on a wall jack or patch panel.

PVC

See permanent virtual circuit.

QoS

See Quality of Service.

quad decimal

Four sets of octets separated by a decimal point; an IP address.

Quality of Service (QoS)

Data prioritization at the Network layer of the OSI model. Results in guaranteed throughput rates. See also Open Systems Interconnect.

radio frequency interference (RFI)

Interference on copper cabling systems caused by radio frequencies.

RAID

See Redundant Array of Independent (or Inexpensive) Disks.

RAID levels

The different types of RAID, such as RAID 0, RAID 1, etc.

README file

A file that the manufacturer includes with software to give the installer information that came too late to make it into the software manuals. It’s usually a last-minute addition that includes tips on installing the software, possible incompatibilities, and any known installation problems that might have been found right before the product was shipped.

reduced instruction set computing (RISC)

Computer architecture in which the computer executes small, general-purpose instructions very rapidly.

Redundant Array of Independent (or Inexpensive) Disks (RAID)

A configuration of multiple hard disks used to provide fault tolerance should a disk fail. Different levels of RAID exist, depending on the amount and type of fault tolerance provided.

regeneration process

Process in which signals are read, amplified, and repeated on the network to reduce signal degradation, which results in longer overall possible length of the network.

remote access protocol

Any networking protocol that is used to gain access to a network over public communication links.

remote access server

A computer that has one or more modems installed to enable remote connections to the network.

repeater

A Physical layer device that amplifies the signals it receives on one port and resends or repeats them on another. A repeater is used to extend the maximum length of a network segment.

replication

The process of copying directory information to other servers to keep them all synchronized.

RFI

See radio frequency interference.

RG-58

The type designation for the coaxial cable used in thin Ethernet (10Base2). It has a 50ohm impedance rating and uses BNC connectors.

RG-62

The type designation for the coaxial cable used in ARCnet networks. It has a 93ohm impedance and uses BNC connectors.

ring topology

A network topology where each computer in the network is connected to exactly two other computers. With ring topology, a single break in the ring brings the entire network down.

RIP

See Router Information Protocol.

RISC

See reduced instruction set computing.

RJ (Registered Jack) connector

A modular connection mechanism that allows for as many as eight copper wires (four pairs). RJ connectors are most commonly used for telephone (such as the RJ-11) and network adaptors (such as RJ-45).

roaming profiles

Profiles downloaded from a server at each login. When a user logs out at the end of the session, changes are made and remembered for the next time the user logs in.

route

The path to get to the destination from a source.

route cost

How many router hops there are between source and destination in an internetwork. See also hop, router.

router

A device that connects two networks and allows packets to be transmitted and received between them. A router determines the best path for data packets from source to destination. See also hop.

Router Information Protocol (RIP)

A distance-vector route discovery protocol used by IPX. It uses hops and ticks to determine the cost for a particular route. See also Internet Packet eXchange.

routing

A function of the Network layer that involves moving data throughout a network. Data passes through several network segments using routers that can select the path the data takes. See also router.

routing table

A table that contains information about the locations of other routers on the network and their distance from the current router.

RSA Data Security, Inc.

A commercial company that produces encryption software. RSA stands for Rivest, Shamir, and Adleman, the founders of the company.

sag

See power sag.

SAM

See Security Accounts Manager.

Secure Hypertext Transfer Protocol (S-HTTP)

A protocol used for secure communications between a web server and a web browser.

Security Accounts Manager (SAM)

A database within Windows NT that contains information about all users and groups and their associated rights and settings within a Windows NT domain. See also Backup Domain Controller.

security log

Log file used in Windows NT to keep track of security events specified by the domain’s Audit policy.

security policy

Rules set in place by a company to ensure the security of a network. This may include how often a password must be changed or how many characters a password should be.

segment

A unit of data smaller than a packet. Also refers to a portion of a larger network (a network can consist of multiple network segments). See also backbone.

self-powered

A device that has its own power.

sequence number

A number used to determine the order in which parts of a packet are to be reassembled after the packet has been split into sections.

Sequenced Packet eXchange (SPX)

A connection-oriented protocol that is part of the IPX protocol suite. It operates at the Transport layer of the OSI model. It initiates the connection between the sender and receiver, transmits the data, and then terminates the connection. See also Internet Packet eXchange, Open Systems Interconnect.

Serial Line Internet Protocol (SLIP)

A protocol that permits the sending of IP packets over a serial connection.

server

A computer that provides resources to the clients on the network.

server and client configuration

A network in which the resources are located on a server for use by the clients.

server-centric

A network design model that uses a central server to contain all data as well as control security.

service

Services add functionality to the network by providing resources or doing tasks for other computers. In Windows 9x, services include file and printer sharing for Microsoft or Novell networks.

service accounts

Accounts created on a server for users to perform special services, such as backup operators, account operators, and server operators.

Session layer

The fifth layer of the OSI model, it determines how two computers establish, use, and end a session. Security authentication and network naming functions required for applications occur here. The Session layer establishes, maintains, and breaks dialogs between two stations. See also Open Systems Interconnect.

share-level security

In a network that uses share-level security, instead of assigning rights to network resources to users, passwords are assigned to individual files or other network resources (such as printers). These passwords are then given to all users that need access to these resources. All resources are visible from anywhere in the network, and any user who knows the password for a particular network resource can make changes to it.

shell

Unix interfaces that are based solely upon command prompts. There is no graphical interface.

shielded

When cabling has extra wrapping to protect it from stray electrical or radio signals. Shielded cabling is more expensive than unshielded.

shielded twisted-pair cable (STP)

A type of cabling that includes pairs of copper conductors, twisted around each other, inside a metal or foil shield. This type of medium can support faster speeds than unshielded wiring.

S-HTTP

See Secure Hypertext Transfer Protocol.

signal

Transmission from one PC to another. This could be a notification to start a session or end a session.

signal encoding

The process whereby a protocol at the Physical layer receives information from the upper layers and translates all the data into signals that can be transmitted on a transmission medium.

signaling method

The process of transmitting data across the medium. Two types of signaling are digital and analog.

Simple Mail Transfer Protocol (SMTP)

A program that looks for mail on SMTP servers and sends it along the network to its destination at another SMTP server.

Simple Network Management Protocol (SNMP)

The management protocol created for sending information about the health of the network to network management consoles.

single-attached stations (SAS)

Stations on an FDDI network that are attached to only one of the cables. They are less fault tolerant than
dual-attached stations.

skipjack

An encryption algorithm developed as a possible replacement for Data Encryption Standard (DES) that is classified by the National Security Agency (NSA). Not much is known about this encryption algorithm except that it uses an 80-bit key.

SLIP

See Serial Line Internet Protocol.

SMTP

See Simple Mail Transfer Protocol.

SNMP

See Simple Network Management Protocol.

socket

A combination of a port address and an IP address.

SONET (Synchronous Optical Network)

A standard in the U.S. that defines a base data rate of 51.84Mbps; multiples of this rate are known as optical carrier (OC) levels, such as OC-3, OC-12, etc.

source address

The address of the station that sent a packet, usually found in the source area of a packet header.

source port number

The address of the PC that is sending data to a receiving PC. The port portion allows for multiplexing of data to be sent from a specific application.

splitter

Any device that electrically duplicates one signal into two.

SPS

See Standby Power Supply.

SPX

See Sequenced Packet eXchange.

Standby Power Supply (SPS)

A power backup device that has power going directly to the protected equipment. A sensor monitors the power. When a loss is detected, the computer is switched over to the battery. Thus, a loss of power might occur (typically for less than a second).

star topology

A network topology where all devices on the network have a direct connection to every other device on the network. These networks are rare except in very small settings due to the huge amount of cabling required to add a new device.

state table

A firewall security method that monitors the states of all connections through the firewall.

static ARP table entries

Entry in the ARP table that is manually added by a user when a PC will be accessed often. This will speed up the process of communicating with the PC since the IP-to-MAC address will not have to be resolved.

static routing

A method of routing packets where the router’s routing is updated manually by the network administrator instead of automatically by a route discovery protocol.

straight tip (ST)

A type of fiber-optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet. This is the most popular fiber-optic connector currently in use.

subnet mask

A group of selected bits that identify a subnetwork within a TCP/IP network. See also Transmission Control Protocol/Internet Protocol.

subnetting

The process of dividing a single IP address range into multiple address ranges.

subnetwork

A network that is part of another network. The connection is made through a gateway, bridge, or router.

subnetwork address

A part of the 32-bit IPv4 address that designates the address of the subnetwork.

subscriber connector (SC)

A type of fiber-optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged.

supernetting

The process of combining multiple IP address ranges into a single IP network.

surge protector

A device that contains a special electronic circuit that monitors the incoming voltage level and then trips a circuit breaker when an overvoltage reaches a certain level called the overvoltage threshold.

surge suppressors

See surge protector.

switched

A network that has multiple routes to get from a source to a destination. This allows for higher speeds.

symmetrical keys

When the same key is used to encrypt and decrypt data.

SYN flood

A Denial of Service attack in which the hacker sends a barrage of SYN packets. The receiving station tries to respond to each SYN request for a connection, thereby tying up all the resources. All incoming connections are rejected until all current connections can be established.

TCP

See Transmission Control Protocol.

TCP/IP

See Transmission Control Protocol/Internet Protocol.

TDMA

See Time Division Multiple Access.

TDR

See time-domain reflectometer.

telephony server

A computer that functions as a smart answering machine for the network. It can also perform call center and call routing functions.

Telnet

A protocol that functions at the Application layer of the OSI model, providing terminal emulation capabilities. See also Open Systems Interconnect.

template

A set of guidelines that you can apply to every new user account created.

terminal emulator

A program that enables a PC to act as a terminal for a mainframe or a Unix system.

terminator

A device that prevents a signal from bouncing off the end of the network cable, which would cause interference with other signals.

test accounts

An account set up by an administrator to confirm the basic functionality of a newly installed application, for example. The test account has equal rights to accounts that will use the new functionality. It is important to use test accounts instead of administrator accounts to test new functionality. If an administrator account is used, problems related to user rights may not manifest themselves because administrator accounts typically have full rights to all network resources.

TFTP

See Trivial File Transfer Protocol.

Thick Ethernet (Thicknet)

A type of Ethernet that uses thick coaxial cable and supports a maximum transmissions distance of 500 meters. Also called 10Base5.

Thin Ethernet (Thinnet)

A type of Ethernet that uses RG-58 cable and 10Base2.

Time Division Multiple Access (TDMA)

A method to divide individual channels in broadband communications into separate time slots, allowing more data to be carried at the same time. It is also possible to use TDMA in baseband communications.

time-domain reflectometer (TDR)

A tool that sends out a signal and measures how much time it takes to return. It is used to find short or open circuits. Also called a cable tester.

Time to Live (TTL)

A field in IP packets that indicates how many routers the packet can still cross (hops it can still make) before it is discarded. TTL is also used in ARP tables to indicate how long an entry should remain in the table.

token

The special packet of data that is passed around the network in a Token Ring network. See Token Ring network.

token passing

A media access method in which a token (data packet) is passed around the ring in an orderly fashion from one device to the next. A station can transmit only when it has the token. If it doesn’t have the token, it can’t transmit. The token continues around the network until the original sender receives the token again. If the token has more data to send, the process repeats. If not, the original sender modifies the token to indicate that the token is free for anyone else to use.

Token Ring network

A network based on a physical star, logical ring topology, in which data is passed along the ring until it finds its intended receiver. Only one data packet can be passed along the ring at a time. If the data packet goes around the ring without being claimed, it is returned to the sender.

tone generator

A small electronic device used to test network cables for breaks and other problems that sends an electronic signal down one set of UTP wires. Used with a tone locator. See also tone locator, unshielded twisted-pair cable.

tone locator

A device used to test network cables for breaks and other problems; designed to sense the signal sent by the tone generator and emit a tone when the signal is detected in a particular set of wires.

topology

The physical and/or logical layout of the transmission media specified in the physical and logical layers of the OSI model. See also Open Systems Interconnect.

Trace Route

See tracert.

tracert

The TCP/IP Trace Route command-line utility that shows the user every router interface a TCP/IP packet passes through on its way to a destination. See also Transmission Control Protocol/Internet Protocol.

trailer

A section of a data packet that contains error-checking information.

transceiver

The part of any network interface that transmits and receives network signals.

transient

A high-voltage burst of current.

transmission

Sending of packets from the PC to the network cable.

Transmission Control Protocol (TCP)

The protocol found at the Host- to-Host layer of the DoD model. This protocol breaks data packets into segments, numbers them, and sends them in random order. The receiving computer reassembles the data so that the information is readable for the user. In the process, the sender and the receiver confirm that all data has been received; if not, it is resent. This is a connection-oriented protocol. See also connection-oriented transport protocol.

Transmission Control Protocol/Internet Protocol (TCP/IP)

The protocol suite developed by the DoD in conjunction with the Internet. It was designed as an internetworking protocol suite that could route information around network failures. Today it is the de facto standard for communications on the Internet.

transmission media

Physical cables and/or wireless technology across which computers are able to communicate.

Transport layer

The fourth layer of the OSI model, it is responsible for checking that the data packet created in the Session layer was received error free. If necessary, it also changes the length of messages for transport up or down the remaining layers. See also Open Systems Interconnect.

Trivial File Transfer Protocol (TFTP)

A protocol similar to FTP that does not provide the security or error-checking features of FTP. See also File Transfer Protocol.

trunk lines

The telephone lines that form the backbone of a telephone network for a company. These lines connect the telephone(s) to the telephone company and to the PSTN. See also Public Switched Telephone Network.

T-series connections

A series of digital connections leased from the telephone company. Each T-series connection is rated with a number based on speed. T1 and T3 are the most popular.

TTL

See Time to Live.

twisted-pair cable

A type of network transmission medium that contains pairs of color-coded, insulated copper wires that are twisted around each other. A twisted-pair cable consists of one or more twisted pairs in a common jacket.

type

A DOS command that displays the contents of a file. Also, short for data type.

UDP

See User Datagram Protocol.

Uniform Resource Locator (URL)

A URL is one way of identifying a document on the Internet. It consists of the protocol that is used to access the document and the domain name or IP address of the host that holds the document, for example, http://www.sybek.com.

uninterruptible power supply (UPS)

A natural line conditioner that uses a battery and power inverter to run the computer equipment that plugs into it. The battery charger continuously charges the battery. The battery charger is the only thing that runs off line voltage. During a power problem, the battery charger stops operating, and the equipment continues to run off the battery.

Unix

A 32-bit, multitasking operating system developed in the 1960s for use on mainframes and minicomputers.

unshielded

When cabling has little protection of wrapping to protect it from stray electrical or radio signals. Unshielded cabling is less expensive than shielded.

unshielded twisted-pair cable (UTP)

Twisted-pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because no shielding is used in this cable, it is very susceptible to EMI, RFI, and other types of interference. See also crossover cable, electromagnetic interference, radio frequency interference.

upgrade

To increase an aspect of a PC, for example, by upgrading the RAM (increasing the RAM), upgrading the CPU (changing the current CPU for a faster CPU), etc.

UPS

See uninterruptible power supply.

uptime

The amount of time a particular computer or network component has been functional.

URL

See Uniform Resource Locator.

user

The person who is using a computer or network.

User Datagram Protocol (UDP)

Protocol at the Host-to-Host layer of the DoD model, which corresponds to the Transport layer of the OSI model. Packets are divided into segments, given numbers, sent randomly, and put back together at the receiving end. This is a connectionless protocol. See also connectionless transport protocol, Open Systems Interconnect.

user-level security

A type of network in which user accounts can read, write, change, and take ownership of files. Rights are assigned to user accounts, and each user knows only his or her own username and password, which makes this the preferred method for securing files.

vampire tap

A connection used with Thicknet to attach a station to the main cable. It is called a vampire tap because it has a tooth that “bites” through the insulation to make the physical connection.

virtual COM

Serial port that is used as if it were a serial port, but the actual serial port interface does not exist.

Virtual LAN (VLAN)

Allows users on different switch ports to participate in their own network separate from, but still connected to, the other stations on the same or connected switch.

virtual private network (VPN)

Using the public Internet as a backbone for a private interconnection (network) between locations.

virus

A program intended to damage a computer system. Sophisticated viruses encrypt and hide in a computer and may not appear until the user performs a certain action or until a certain date. See also antivirus.

virus engine

The core program that runs the virus-scanning process.

volume

Loudness of a sound, or the portion of a hard disk that functions as if it were a separate hard disk.

VPN

See virtual private network.

WAN

See wide area network.

web proxy

A type of proxy that is used to act on behalf of a web client or web server.

web server

A server that holds and delivers web pages and other web content using the HTTP protocol. See also Hypertext Transfer Protocol.

wide area network (WAN)

A network that crosses local, regional, and international boundaries.

Windows Internet Name Service (WINS)

A Windows NT service that dynamically associates the NetBIOS name of a host with a domain name. See also network basic input/output system.

Windows NT

A network operating system developed by Microsoft that uses that same graphical interface as the Desktop environment, Windows 95/98.

Windows NT 3.51

The version of Windows NT based on the “look and feel” of Windows 3.x. See also Windows NT.

Windows NT 4

The version of Windows NT based on the “look and feel” of Windows 95/98. See also Windows NT.

Windows NT Service

A type of Windows program (a file with either an .EXE or a .DLL extension) that is loaded automatically by the server or manually by the administrator.

winipcfg

The IP configuration utility for Windows 95/98 that allows you to view the current TCP/IP configuration of a workstation.

WinNuke

A Windows-based attack that affects only computers running Windows NT 3.51 or 4. It is caused by the way that the Windows NT TCP/ IP stack handles bad data in the TCP header. Instead of returning an error code or rejecting the bad data, it sends NT to the Blue Screen of Death (BSOD). Figuratively speaking, the attack nukes the computer.

WINS

See Windows Internet Name Service.

wire crimper

Used for attaching ends onto different types of network cables by a process known as crimping. Crimping involves using pressure to press some kind of metal teeth into the inner conductors of a cable.

wireless access point (WAP)

A wireless bridge used in a multipoint RF network.

wireless bridge

It performs all the functions of a regular bridge, but it uses RF instead of cables to transmit signals.

workgroup

A specific group of users or network devices, organized by job function or proximity to shared resources.

workstation

A computer that is not a server but is on a network. Generally a workstation is used to do work, while a server is used to store data or perform a network function. In the most simple terms, a workstation is a computer that is not a server.

World Wide Web (WWW)

A collection of HTTP servers running on the Internet. They support the use of documents formatted with HTML. See also Hypertext Markup Language, Hypertext Transfer Protocol.

worms

Similar to a virus. Worms, however, propagate themselves over a network. See also virus.

WWW

See World Wide Web.

X Window

A graphical user interface (GUI) developed for use with the various flavors of Unix.




Network+ Study Guide
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net