|
|
An implementation of Ethernet that specifies a 10Mbps signaling rate, baseband signaling, and coaxial cable with a maximum segment length of 185 meters.
An implementation of Ethernet that specifies a 10Mbps signaling rate, baseband signaling, and fiber-optic cabling.
An implementation of Ethernet that specifies a 10Mbps signaling rate, baseband signaling, and twisted-pair cabling.
Star topology using round-robin for allowing systems to transmit data on the network.
IEEE 802.12 standard for 100BaseVG networks.
A networking technology that runs 100-Megabit Ethernet over regular (Cat 3) phone lines. It hasn’t gained the industry acceptance that 100BaseT has. See also AnyLAN.
List of rights that an object has to resources in the network. Also a type of firewall. In this case, the lists reside on a router and determine which machines can use the router and in what direction.
See acknowledgment.
A message confirming that the data packet was received. This occurs at the Transport layer of the OSI model.
See access control list.
The replacement for NT Directory Service (NTDS) that is included with Windows 2000. It acts similarly to NDS (Novell Directory Services) because it is a true X.500-based directory service.
A hub that is powered and actively regenerates any signal that is received. See also hub.
Used in Token Ring networks, a process that prevents data frames from roaming the ring unchecked. If the frame passes the active monitor too many times, it is removed from the ring. Also ensures that a token is always circulating the ring.
Technically, the peripheral hardware that installs into your computer or the software that defines how the computer talks to that hardware.
Designation to allow PCs to be known by a name or number to other PCs. Addressing allows a PC to transmit data directly to another PC by using its address (IP or MAC).
Part of a DNS table that maps an IP address to a domain name. Also known as an A (or host) record.
A network created when two RF-capable devices are brought within transmission range of each other. A common example is handheld PDAs beaming data to each other.
See asymmetrical digital subscriber line.
See CNAME record.
A category of software that uses various methods to eliminate viruses in a computer. It typically also protects against future infection. See also virus.
Another name for 100VGAnyLAN created in 802.12. See also 100VGAnyLAN.
The seventh layer of the OSI model, it deals with how applications access the network and describes application functionality, such as file transfer, messaging, and so on.
The Attached Resource Computer Network, which was developed by Datapoint Corporation in the late 1970s as one of the first baseband networks. It can use either a physical star or bus topology.
A table used by the ARP protocol. Contains a list of known TCP/IP addresses and their associated MAC addresses. The table is cached in memory so that ARP lookups do not have to be performed for frequently accessed TCP/IP and MAC addresses. See also media access control, Transmission Control Protocol/Internet Protocol.
An implementation of DSL where the upload and download speeds are different. See also digital subscriber line.
A connection-oriented network architecture based on broadband ISDN technology that uses constant size 53-byte cells instead of packets. Because cells don’t change size, they are switched much faster and more efficiently than packets across a network.
See Asynchronous Transfer Mode.
Port on some NICs that allows connecting the NIC to different media types by using an external transceiver.
The part of most networks that connects multiple segments together to form a LAN. The backbone usually has higher speed than the segments. See also segment, local area network.
Computer on a Windows NT network that has a copy of the SAM database for fault tolerance and performance enhancement purposes. See also Security Accounts Manager.
Term used to describe a company’s strategy to make copies of and restore its data in case of an emergency.
The amount of time that an administrator has available to perform a complete, successful backup.
In network communications, the amount of data that can be sent across a wire in a given time. Each communication that passes along the wire decreases the amount of available bandwidth.
A transmission technique in which the signal uses the entire bandwidth of a transmission medium.
A category of network documentation that indicates how the network normally runs. It includes such information as network statistics, server utilization trends, and processor performance statistics.
The channels in an ISDN line that carry data. Each bearer channel typically has a bandwidth of 64Kbps.
See power blackout.
These are often referred to as slot covers. If a PC card is removed, there will be an opening in the computer case. This will allow dirt and dust to enter the computer and prevent it from being cooled properly. Some computer cases have the blanks as part of the case and they must be broken off from the case before a bus slot may be used to insert a PC card into it.
Tubular connectors most commonly used with coaxial cable.
A procedure where two ISDN B channels are joined together to provide greater bandwidth.
A network medium that is used at the Physical layer where the signal travels over a cable of some kind.
A network device, operating at the Data Link layer, that logically separates a single network into segments, but lets the two segments appear to be one network to higher layer protocols.
A network transmission method in which a single transmission medium is divided so that multiple signals can travel across the same medium simultaneously.
A special network address that refers to all users on the network. For example, the TCP/IP address 255.255.255.255 is the broadcast address. Any packets sent to that address will be sent to everyone on that LAN.
A device that combines the functionality of a bridge and a router, but can’t be distinctly classified as either.
See power brownout.
Pathways in a PC that allow data and signals to be transmitted between the PC components. Types of buses include ISA and PCI.
A topology where the cable and signals run in a straight line from one end of the network to the other.
A physical transmission medium that has a central conductor of wire or fiber surrounded by a plastic jacket.
General network documentation indicating each cable’s source and destination as well as where each network cable runs.
A special instrument that is used to test the integrity of LAN cables. See also time-domain reflectometer.
Signal at a frequency that is chosen to carry data. Addition of data to the frequency is modulation and the removal of data from the frequency is demodulation. This is used on analog devices like modems.
A media access method that sends a request to send (RTS) packet and waits to receive a clear to send (CTS) packet before sending. Once the CTS is received, the sender sends the packet of information.
A media access method that first senses whether there is a signal on the wire, indicating that someone is transmitting currently. If no one else is transmitting, it attempts a transmission and listens for someone else trying to transmit at the same time. If this happens, both senders back off and don’t transmit again until some specified period of time has passed. See also collision.
Different grades of cables that determine how much protection is offered against interference from outside the cable. Category 1 allows voice data only. Category 2 allows data transmissions up to 4Mbps. Category 3 allows data transmissions up to 10Mbps. Category 4 allows data transmissions up to 16Mbps. Category 5 allows data transmissions up to 100Mbps.
Similar to a packet or frame, except that the ATM cell does not always contain the destination or source addressing information. It also does not contain higher-level addressing or packet control information.
The office in any metropolitan or rural area that contains the telephone switching equipment for that area. The central office connects all users in that area to each other as well as to the rest of the PSTN. See also Public Switched Telephone Network.
Generally used with a T1 Internet line, it is used to terminate the connection from the T1 provider. The CSU is usually part of a CSU/DSU unit. It also provides diagnostics and testing if necessary.
A certain part or time to allow for a restart at the last point that the data was saved.
A hexadecimal value computed from transmitted data that is used in error-checking routines.
A switching method where a dedicated connection between the sender and receiver is maintained throughout the conversation.
The new routing method used by InterNIC to assign IP addresses. CIDR can be described as a “slash x” network. The x represents the number of bits in the network that InterNIC controls.
A client is a part of a client/server network. It is the part where the computing is usually done. In a typical setting, a client will use the server for remote storage, backups, or security such as a firewall.
A server-centric network in which all resources are stored on a file server and processing power is distributed among workstations and the file server.
A hardware implementation of the skipjack encryption algorithm.
A computing technology where many servers work together so that they appear to be one high-powered server. If one server fails, the others in the cluster take over the services provided by the failed server.
A DNS record type that specifies other names for existing hosts. This allows a DNS administrator to assign multiple DNS host names to a single DNS host. Also known as an alias record.
Often referred to as coax. A type of cable used in network wiring. Typical coaxial cable types include RG-58 and RG-62. 10Base2 Ethernet networks use coaxial cable. Coaxial cable is usually shielded.
The error condition that occurs when two stations on a CSMA/ CD network transmit data (at the Data Link layer) at the same time. See also Carrier Sense Multiple Access/Collision Detection.
A light on a NIC or hub that indicates when a collision has occurred.
See hub.
Communications between two hosts that have no previous session established for synchronizing sent data. The data is not acknowledged at the receiving end. This can allow for data loss.
See connectionless, connectionless transport protocol.
A transport protocol, such as UDP, that does not create a virtual connection between sending and receiving stations. See also User Datagram Protocol.
Communications between two hosts that have a previous session established for synchronizing sent data. The data is acknowledged by the receiving PC. This allows for guaranteed delivery of data between PCs.
A transport protocol that uses acknowledgments and responses to establish a virtual connection between sending and receiving stations. TCP is a connection-oriented protocol. See also Transmission Control Protocol.
Part of a PC that allows connectivity to peripheral devices. A disk controller allows the PC to be connected to a hard disk. A network controller allows a PC to be connected to a network. A keyboard controller is used to connect a keyboard to the PC.
A special window inside Microsoft Windows operating systems (Windows 95 and above) that has icons for all of the configurable options for the system.
The core component, or kernel, of NetWare.
A value given to a route between PCs or subnets to determine which route may be best. The word hop is sometimes used to refer to the number of routers between two PCs or subnets. See also hop.
The two-letter abbreviations for countries, used in the DNS hierarchy. See also Domain Name Service.
See cyclical redundancy check.
The troubleshooting tool used in Ethernet UTP installations to test communications between two stations, bypassing the hub. See also unshielded twisted-pair cable.
A type of interference that occurs when two LAN cables run close to each other. If one cable is carrying a signal and the other isn’t, the one carrying a signal will induce a “ghost” signal (crosstalk) in the other cable.
See Carrier Sense Multiple Access/Collision Avoidance.
See Carrier Sense Multiple Access/Collision Detection.
An error-checking method in data communications that runs a formula against data before transmissions. The sending station then appends the resultant value (called a checksum) to the data and sends it. The receiving station uses the same formula on the data. If the receiving station doesn’t get the same checksum result for the calculation, it considers the transmission invalid, rejects the frame, and asks for a retransmission.
A unit of data smaller than a packet.
The second layer of the OSI model. It describes the logical topology of a network, which is the way that packets move throughout a network. It also describes the method of media access. See also Open Systems Interconnect.
A unit of data sent over a network. A packet includes a header, addressing information, and the data itself. A packet is treated as a single unit as it is sent from device to device. Also known as a datagram.
It transmits data through a Channel Service Unit (CSU) and is almost always a part of a single device referred to as a
CSU/DSU.
See delta channel.
The router that all packets are sent to when the workstation doesn’t know where the destination station is or when it can’t find the destination station on the local segment.
A channel on an ISDN line used for link management. See also Integrated Services Digital Network.
The point on any telephone installation where the telephone lines from the central office enter the customer’s premises.
Type of hack that prevents any users— even legitimate ones—from using the system.
The address of the PC to which data is being sent from a sending PC. The port portion allows for the demultiplexing of data to be sent to a specific application.
See Dynamic Host Configuration Protocol.
Communications between two PCs.
A digital WAN technology that brings high- speed digital networking to homes and businesses over POTS. There are many types, including HDSL (high-speed DSL) and VDSL (very high bit-rate DSL). See also plain old telephone service, asymmetrical digital subscriber line.
A network database that contains a listing of all network resources, such as users, printers, groups, and so on.
A network service that provides access to a central database of information, which contains detailed information about the resources available on a network.
The procedure by which data is recovered after a disaster.
Technology that enables writing data to multiple disks simultaneously in small portions called stripes. These stripes maximize use by having all of the read/write heads working constantly. Different data is stored on each disk and is not automatically duplicated (this means that disk striping in and of itself does not provide fault tolerance).
A route discovery method in which each router, using broadcasts, tells every other router what networks and routes it knows about and the distance to them.
Another name for a 15-pin AUI connector or a DB-15 connector.
See Domain Name Service.
Any server that performs DNS host name–to–IP address resolution. See also Domain Name Service, Internet Protocol.
An area in the DNS hierarchy that is managed as a single unit. See also Domain Name Service.
A four-layer conceptual model describing how communications should take place between computer systems. The four layers are Process/Application, Host-to-Host, Internet, and Network Access.
A group of networked Windows computers that share a single SAM database. See also Security Accounts Manager.
The network service used in TCP/IP networks that translates host names to IP addresses. See also Transmission Control Protocol/Internet Protocol.
Notation used by TCP/IP to designate an IP address. The notation is made up of 32 bits (4 bytes), each byte separated by a decimal. The range of numbers for each octet is 0–255. The leftmost octet contains the high-order bits and the rightmost octet contains the low-order bits.
See digital subscriber line.
The first type of networking connector, the D-type connector, is used to connect many peripherals to a PC. A D-type connector is characterized by its shape. Turned on its side, it looks like the letter D and contains rows of pins (male) or sockets (female). AUI connectors are examples.
Stations on an FDDI network that are attached to both cables for connection redundancy and fault tolerance.
A keyboard and monitor that send keystrokes to a central processing computer (typically a mainframe or minicomputer) that returns screen displays to the monitor. The unit has no processing power of its own, hence the moniker “dumb.”
Two hard drives to which identical information is written simultaneously. A dedicated controller card controls each drive. Used for fault tolerance.
Two servers that are identical for use in clustering.
See dynamic entry.
An entry made in the ARP table whenever an ARP request is made by the Windows TCP/IP stack and the MAC address is not found in the ARP table. The ARP request is broadcast on the local segment. When the MAC address of the requested IP address is found, that information is added to the ARP table. See also Internet Protocol, media access control, Transmission Control Protocol/Internet Protocol.
A protocol used on a TCP/IP network to send client configuration data, including TCP/IP address, default gateway, subnet mask, and DNS configuration, to clients. See also default gateway, Domain Name Service, subnet mask, Transmission Control Protocol/Internet Protocol.
A type of firewall used to accept or reject packets based on the contents of the packets.
The use of route discovery protocols to talk to other routers and find out what networks they are attached to. Routers that use dynamic routing send out special packets to request updates of the other routers on the network as well as to send their own updates.
See dynamic routing.
TCP/IP port used by an application when needed. The port is not constantly used.
See electrically erasable programmable read-only memory.
A special integrated circuit on expansion cards that allows data to be stored on the chip. If necessary, the data can be erased by a special configuration program. Typically used to store hardware configuration data for expansion cards.
The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable. The result is degradation of the signal.
An application that allows people to send messages via their computers on the same network or over the Internet.
A problem that exists when two items with dissimilar static electrical charges are brought together. The static electrical charges jump to the item with fewer electrical charges, causing ESD, which can damage computer components.
See electronic mail.
See electromagnetic interference.
The process of translating data into signals that can be transmitted on a transmission medium.
The string of alphanumeric characters used to decrypt encrypted data.
The two ends of a connection for transmitting data. One end is the receiver, and the other is the sender.
See electrostatic discharge.
A shared-media network architecture. It operates at the Physical and Data Link layers of the OSI model. As the media access method, it uses baseband signaling over either a bus or a star topology with CSMA/CD. The cabling used in Ethernet networks can be coax, twisted-pair, or fiber-optic. See also Carrier Sense Multiple Access/Collision Detection, Open Systems Interconnect.
See MAC address.
A slot on the computer’s bus into which expansion cards are plugged to expand the functionality of the computer (for example, using a NIC to add the computer to a network). See also network interface card.
An AppleTalk network segment that is assigned a 16-bit range of numbers rather than a single 16-bit number.
A device that comes online when another fails.
A hot site backup system in which the failover server is connected to the primary server. A heartbeat is sent from the primary server to the backup server. If the heartbeat stops, the failover system starts and takes over. Thus, the system doesn’t go down even if the primary server is not running.
The general category name given to 100Mbps Ethernet technologies.
A network that will be up and running at least 99 percent of the time or that is down less than 8 hours a year.
A network that can recover from minor errors.
See Fiber Distributed Data Interface.
A type of server-to-storage system connection that uses fiber-optic connectors.
A network topology that uses fiber-optic cable as a transmission medium and dual, counterrotating rings to provide data delivery and fault tolerance.
A type of network cable that uses a central glass or plastic core surrounded by a plastic coating.
A server specialized in holding and distributing files.
A TCP/IP protocol and software that permit the transferring of files between computer systems. Because FTP has been implemented on numerous types of computer systems, files can be transferred between disparate computer systems (for example, a personal computer and a minicomputer). See also Transmission Control Protocol/Internet Protocol.
A combination of hardware and software that protects a network from attack by hackers that could gain access through public networks, including the Internet.
See Fully Qualified Domain Name.
A WAN technology that transmits packets over a WAN using packet switching. See also packet switching.
A multiplexing technique whereby the different signals are sent across multiple frequencies.
See File Transfer Protocol.
A server that uploads and downloads files from a server on behalf of a workstation.
A backup that copies all data to the archive medium.
An address that uses both the host name (workstation name) and the domain name.
The hardware and software needed to connect two disparate network environments so that communications can occur.
A type of group in Windows NT that is used network-wide. Members can be from anywhere in the network, and rights can be assigned to any resource in the network.
A condition that occurs when a signal cycles through a common ground connection between two devices, causing EMI interference. See also electromagnetic interference.
A Data Link layer address assigned to every NIC at the MAC sublayer. The address is in the format xx:xx:xx:xx:xx:xx; each xx is a two-digit hexadecimal number. See also media access control, network interface card.
Connects the transmission pins directly to the receiving pins, allowing diagnostic software to test if a NIC can successfully transmit and receive. See also network interface card.
The data transmissions between two servers in a cluster to detect when one fails. When the standby server detects no heartbeats from the main server, it comes online and takes control of the responsibilities of the main server. This allows for all services to remain online and accessible.
One pass through a router. See also cost, router.
As a packet travels over a network through multiple routers, each router will increment this field in the packet by one as it crosses the router. It is used to limit the number of routers a packet can cross on the way to its destination.
Any network device with a TCP/IP network address. See also Transmission Control Protocol/Internet Protocol.
A layer in the DoD model that corresponds to the Transport layer of the OSI model. See also DoD Networking Model, Open Systems Interconnect.
See Hypertext Markup Language.
See Hypertext Transfer Protocol.
A Physical layer device that serves as a central connection point for several network devices. A hub repeats the signals it receives on one port to all other ports. See also active hub.
A set of codes used to format text and graphics that will be displayed in a browser. The codes define how data will be displayed.
The protocol used for communication between a web server and a web browser.
A proprietary data connector created by IBM. This connector is unique because there isn’t a male version and female version; any IBM connector can connect with another IBM connector and lock together.
See Internet Control Message Protocol.
See Institute of Electrical and Electronics Engineers, Inc.
The IEEE standards for LAN and MAN networking.
Standard that specifies LAN/MAN network management and internetworking.
Standard that specifies the operation of the logical link control (LLC) sublayer of the Data Link layer of the OSI model. The LLC sublayer provides an interface between the MAC sublayer and the Network layer. See also media access control, Open Systems Interconnect.
Standard that specifies a network that uses Ethernet technology and a CSMA/CD network access method. See also Carrier Sense Multiple Access/Collision Detection.
Standard that specifies a physical and logical bus topology that uses coaxial or fiber-optic cable and the token-passing media access method.
Specifies a logical ring, physical star, and token- passing media access method based on IBM’s Token Ring.
Provides a definition and criteria for a DQDB metropolitan area network (MAN).
Standard for broadband cabling technology.
A standard containing guidelines for the use of fiber optics on networks, which includes FDDI and Ethernet over fiber-optic cable. See also Ethernet, Fiber Distributed Data Interface.
A standard containing guidelines for the integration of voice and data over the same cable.
A series of guidelines dealing with various aspects of network security.
Defines standards for implementing wireless technologies such as infrared and spread-spectrum radio.
Defines a standard that combines the concepts of Ethernet and ATM. See also Asynchronous Transfer Mode, Ethernet.
See Internet Engineering Task Force.
An international organization that sets standards for various electrical and electronics issues.
A telecommunications standard that is used to digitally send voice, data, and video signals over the same lines. See also delta channel.
An intelligent hub is a hub that can make some intelligent decisions about network traffic flow and can provide network traffic statistics to network administrators.
A bridge created by placing two NICs in a computer.
A modem that is a regular PC card that is inserted into the bus slot. These modems are inside the PC.
The standards organization that developed the OSI model. This model provides a guideline for how communications occur between computers.
A global network made up of a large number of individual networks interconnected through the use of public telephone lines and TCP/IP protocols. See also Transmission Control Protocol/Internet Protocol.
The committee that oversees management of the Internet. It is made up of two subcommittees: the Internet Engineering Task Force (IETF) and the Internet Research Task Force (IRTF). See also Internet Engineering Task Force, Internet Research Task Force.
A message and management protocol for TCP/IP. The Ping utility uses ICMP. See also Ping, Transmission Control Protocol/Internet Protocol.
An international organization that works under the Internet Architecture Board to establish standards and protocols relating to the Internet. See also Internet Architecture Board.
The protocol in the TCP/IP protocol suite responsible for network addressing and routing. See also Transmission Control Protocol/Internet Protocol.
An international organization that works under the Internet Architecture Board to research new Internet technologies. See also Internet Architecture Board.
A company that provides direct access to the Internet for home and business computer users.
A network that is internal to a company and is private.
A connectionless, routable network protocol based on the Xerox XNS architecture. It is the default protocol for versions of NetWare before NetWare 5. It operates at the Network layer of the OSI model and is responsible for addressing and routing packets to workstations or servers on other networks. See also Open Systems Interconnect.
The network technology that allows one signal to be split across multiple transmission lines at the transmission source and combined at the receiving end.
See Internet Protocol.
An address used by the Internet Protocol that identifies the device’s location on the network.
A Windows NT utility used to display that machine’s current configuration.
All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden. Also known as Network Address Translation (NAT).
A hacker trying to gain access to a network by pretending his or her machine has the same network address as the internal network.
See Internetwork Packet eXchange.
A number that represents an entire network. All servers on the network must use the same external network number.
See Integrated Services Digital Network.
The device used on ISDN networks to connect a local network (or single machine) to an ISDN network. It provides power to the line as well as translates data from the LAN or individual computer for transmission on the ISDN line. See also Integrated Services Digital Network.
See Internet service provider.
A programming language, developed by Sun Microsystems, that is used to write programs that will run on any platform that has a Java Virtual Machine installed.
Software, developed by Sun Microsystems, that creates a virtual Java computer on which Java programs can run. A programmer writes a program once without having to recompile or rewrite the program for all platforms.
A small connector (cap or plug) that connects pins. This creates a circuit that indicates a setting to a device.
See Java Virtual Machine.
The core component of any operating system that handles the functions of memory management, hardware interaction, and program execution.
A folder in Windows Registry that contains subkeys and values, or a value with an algorithm to encrypt and decrypt data.
See local area network.
The interface between the NetWare kernel and the NIC installed in the server. Also a general category of drivers used to enable communications between an operating system and a NIC. See also network interface card.
A technology used by the IPX protocol so that IPX can use the largest possible packet size during a transmission. See also Internetwork Packet eXchange.
A printer that uses a laser to form an image on a photo- sensitive drum. The image is then developed with toner and transferred to paper. Finally, a heated drum fuses toner particles onto the paper.
A switching hub that operates at the Data Link layer and builds a table of the MAC addresses of all the connected stations. See also media access control.
Functioning at the Network layer, a switch that performs the multiport, virtual LAN, data pipelining functions of a standard Layer 2 Switch, but it can perform basic routing functions between virtual LANs.
See Link Control Protocol.
A device used to protect against power surges and spikes. Line conditioners use several electronic methods to clean all power coming into the line conditioner.
Any extraneous signal on a power line that is not part of the power feed.
The voltage, supplied from the power company, that comes out at the outlets.
The protocol used to establish, configure, and test the link between a client and PPP host. See also Point-to-Point Protocol.
A small light-emitting diode (LED) that is found on both the NIC and the hub. It is usually green and labeled “Link” or something similar. A link light indicates that the NIC and the hub are making a Data Link layer connection. See also hub, network interface card.
A route discovery method that transmits special packets (Link State Packets, or LSPs) that contain information about the networks to which the router is connected.
A type of routing that broadcasts its entire routing tables only at startup and possibly at infrequently scheduled intervals. Aside from that, the router only sends messages to other routers when changes are made to the router’s routing table.
A routing table protocol where the router sends out limited information, such as updates to its routing tables, to its neighbors only.
Part of the Novell client software that acts as sort of a switchboard between the Open Datalink Interface (ODI) LAN drivers and the various transport protocols.
A version of Unix, developed by Linus Torvalds. Runs on Intel- based PCs and is generally free. See also Unix.
See Large Internet Packet.
A network that is restricted to a single building, group of buildings, or even a single room. A LAN can have one or more servers.
Groups created on individual servers. Rights can be assigned only to local resources.
The part of the PSTN that goes from the central office to the demarcation point at the customer’s premises. See also central office, demarcation point, Public Switched Telephone Network.
A file that keeps a running list of all errors and notices, the time and date they occurred, and any other pertinent information.
Type of topology in which the signal travels the distance of the cable and is received by all stations on the backbone. See also backbone.
A sublayer of the Data Link layer. Provides an interface between the MAC sublayer and the Network layer. See also media access control, topology.
The addressing scheme used by protocols at the Network layer.
Port used by the CAPTURE command to redirect a workstation printer port to a network print queue. The logical port has no relation to the port to which the printer is actually attached or to the physical port. See also physical parallel port.
A value that is used at the Transport layer to differentiate between the upper-layer services.
A network topology in which all network signals travel from one station to another, being read and forwarded by each station.
Describes the way the information flows. The types of logical topologies are the same as the physical topologies, except that the flow of information, rather than the physical arrangement, specifies the type of topology.
See Link Support Layer.
See media access control.
The address that is either assigned to a network card or burned into the NIC. This is how PCs keep track of one another and keep each other separate.
A DNS record type that specifies the DNS host name of the mail server for a particular domain name.
See Multistation Access Unit.
The process of vying for transmission time on the network media.
A sublayer of the Data Link layer that controls the way multiple devices use the same media channel. It controls which devices can transmit and when they can transmit.
A networking device that converts from one network media type to another. For example, converting from an AUI port to an RJ-45 connector for 10BaseT.
A computer that has Windows NT server installed but doesn’t have a copy of the SAM database. See also Security Accounts Manager.
A network topology where there is a connection from each station to every other station in the network.
A communication device that converts digital computer signals into analog tones for transmission over the PSTN and converts them back to digital upon reception. The word “modem” is an acronym for “modulator/ demodulator.”
A system in which multiple servers run continuously, each providing backup and production services at the same time. (Expensive servers, therefore, are not sitting around as designated “backup” servers, used only when an emergency arises.) If a server fails, another just takes over, without any interruption of service.
A technology that combines multiple signals into one signal for transmission over a slow medium. See also frequency division multiplexing, inverse multiplexing.
An RF network consisting of multiple stations, each with transmitters and receivers. This type of network also requires an RF bridge as a central sending and receiving point.
The central device in Token Ring networks that acts as the connection point for all stations and facilitates the formation of the ring.
The process of translating (resolving) logical host names to network addresses.
Acronym that means Network Address Translation. See IP proxy.
The agency that developed the Trusted Computer System Evaluation Criteria (TCSEC) and the Trusted Network Interpretation Environmental Guideline (TNIEG).
The U.S. government agency responsible for protecting U.S. communications and producing foreign intelligence information. It was established by presidential directive in 1952 as a separately organized agency within the Department of Defense (DoD).
The Windows TCP/IP utility that is used to display NetBIOS over TCP/IP statistics. See also network basic input/output system, Transmission Control Protocol/Internet Protocol.
See NetWare Core Protocol.
See National Computing Security Center.
See Novell Distributed Print Services.
See Novell Directory Services.
A logical representation of a network’s resources. Resources are represented by objects in the tree. The tree is often designed after a company’s functional structure. Objects can represent organizations, departments, users, servers, printers, and other resources. See also Novell Directory Services.
When two buildings can almost be seen from one another. Obstructions in between are few.
See NetBIOS Extended User Interface.
See network basic input/output system.
Transport protocol based on the NetBIOS protocol that has datagram support and support for connectionless transmission. NetBEUI is a protocol that is native to Microsoft networks and is mainly for use by small businesses. It is a non-routable protocol that cannot pass over a router, but does pass over a bridge since it operates at the Data Link layer. See also network basic input/output system.
The unique name used to identify and address a computer using NetBEUI.
A utility used to determine which TCP/IP connections—inbound or outbound—the computer has. It also allows the user to view packet statistics, such as how many packets have been sent and received. See also Transmission Control Protocol/Internet Protocol.
The network operating system made by Novell.
The version series of NetWare that supported multiple, cross-platform clients with fairly minimal hardware requirements. It used a database called the bindery to keep track of users and groups and was administered with several DOS, menu-based utilities (such as SYSCON, PCONSOLE, and FILER).
The version series of NetWare that includes NDS. See also Novell Directory Services.
The version series of NetWare that includes a multiprocessing kernel. It also includes a five-user version of Oracle 8, a relational database, and the ability to use TCP/IP in its pure form.
The utility used to administer NetWare versions 4.x and later by making changes to the NDS Directory. It is the only administrative utility needed to modify NDS objects and their properties. See alsoNovell Directory Services.
The upper-layer NetWare protocol that functions on top of IPX and provides NetWare resource access to workstations. See also Internet Packet eXchange.
Protocol that gathers routing information based on the link state routing method. Its precursor is the Routing Information Protocol (RIP). NLSP is a more efficient routing protocol than RIP. See also link state routing.
A component used to provide a NetWare server with additional services and functionality. Unneeded services can be unloaded, thus conserving memory.
A group of devices connected by some means for the purpose of sharing information or resources.
See IP proxy.
Storage, such as hard drives, attached to a network for the purpose of storing data for clients on the network. Network attached storage is commonly used for backing up data.
A Session layer protocol that opens communication sessions for applications that want to communicate on a network.
Refers to network operating systems that use directory services to maintain information about the entire network.
A protocol that enables users to access files on remote computers as if the files were local.
Physical device that connects computers and other network equipment to the transmission medium.
This third layer of the OSI model is responsible for logical addressing and translating logical names into physical addresses. This layer also controls the routing of data from source to destination as well as the building and dismantling of packets. See also Open Systems Interconnect.
The physical cables that link computers in a network; also known as physical media.
The software that runs on a network server and offers file, print, application, and other services to clients.
Software tools, either Protocol Analyzers or Performance Monitoring Tools, used to troubleshoot network problems.
See Novell Support Connection.
See Network File System.
See network interface card.
Software utilities that verify that the NIC is functioning correctly and test every aspect of NIC operation. See also network interface card.
See LAN driver.
See NetWare Loadable Module.
See NetWare Link State Protocol.
A packet that is not sent directly from one workstation to another.
See network operating system.
A NetWare service that provides access to a global, hierarchical directory database of network entities that can be centrally managed.
A printing system designed by Novell that uses NDS to install and manage printers. NDPS supports automatic network printer installation, automatic distribution of client printer drivers, and centralized printer management without the use of print queues.
Novell’s database of technical information documents, files, patches, fixes, NetWare Application Notes, Novell lab bulletins, Novell professional developer bulletins, answers to frequently asked questions, and more. The database is available from Novell and is updated quarterly.
See National Security Agency.
Used with Thinnet and Thicknet cabling that is a male/female screw and barrel connector.
Allows you to query a name server to see which IP address a name resolves to.
System of domains and trusts for a Windows NT Server network.
See NT Directory Services.
The item that represents some network entity in NDS. See also Novell Directory Services.
Refers to eight bits; one-fourth of an IP address.
See Open Datalink Interface.
When the error is not software or hardware related, it may be a problem with the user not knowing how to operate the software or hardware. OE can be a serious problem.
The general name for the condition when some piece of electronic or computer equipment is unavailable or inoperable.
A driver specification, developed by Novell, that enables a single workstation to communicate transparently with several different protocol stacks, using a single NIC and a single NIC driver.
A version of the Linux network operating system developed by Caldera.
A model defined by the ISO to categorize the process of communication between computers in terms of seven layers. The seven layers are Application, Presentation, Session, Transport, Network, Data Link, and Physical. See also International Organization for Standardization.
See Open Systems Interconnect.
Method of synchronous bit synchronization in which the receiver samples the signal at a much faster rate than the data rate. This permits the use of an encoding method that does not add clocking transitions.
The level of overvoltage that will trip the circuit breaker in a surge protector.
The basic division of data sent over a network.
A firewall technology that accepts or rejects packets based on their content.
The process of breaking messages into packets at the sending router for easier transmission over a WAN. See also frame relay.
A type of intruder detection that logs all network events to a file for an administrator to view later.
A hub that simply makes physical and electrical connections between all connected stations. Generally speaking, these hubs are not powered.
List of passwords that have already been used.
Software that fixes a problem with an existing program or operating system.
A central wiring point for multiple devices on a UTP network. See also unshielded twisted-pair cable.
A patch panel is a central wiring point for multiple devices on a UTP network and itself contains no electronic circuits. Generally, patch panels are in server rooms or located near switches or hubs to provide an easy means of patching over wall jacks or hardware.
See Primary Domain Controller.
Computers hooked together that have no centralized authority. Each computer is equal and can act as both a server and a workstation.
Any device that can be attached to the computer to expand its capabilities.
A technology used by frame relay that allows virtual data communications (circuits) to be set up between sender and receiver over a packet-switched network.
See Pretty Good Privacy.
See MAC Address.
A network that uses one network cable that runs from one end of the network to the other. Workstations connect at various points along this cable.
The first layer of the OSI model that controls the functional interface. See also Open Systems Interconnect.
See network media.
A network configuration in which each device has multiple connections. These multiple connections provide redundant connections.
A port on the back of a computer that allows a printer to be connected with a parallel cable.
An opening on a network device that allows a cable of some kind to be connected. Ports allow devices to be connected to each other with cables.
A network topology that is set up in a circular fashion. Data travels around the ring in one direction, and each device on the ring acts as a repeater to keep the signal strong as it travels. Each device incorporates a receiver for the incoming signal and a transmitter to send the data on to the next device in the ring. The network is dependent on the ability of the signal to travel around the ring.
Describes a network in which a cable runs from each network entity to a central device called a hub. The hub allows all devices to communicate as if they were directly connected. See also hub.
The physical layout of a network, such as bus, star, ring, or mesh.
A TCP/IP utility used to test whether another host is reachable. An ICMP request is sent to the host, who responds with a reply if it is reachable. The request times out if the host is not reachable.
A large ICMP packet sent to overflow the remote host’s buffer. This usually causes the remote host to reboot or hang.
Another name for the Public Switched Telephone Network (PSTN). See asymmetrical digital subscriber line, digital subscriber line, Public Switched Telephone Network.
Coaxial cable coating that does not produce toxic gas when burned.
Network communication in which two devices have exclusive access to a network medium. For example, a printer connected to only one workstation would be using a point-to-point connection.
The protocol used with dial-up connections to the Internet. Its functions include error control, security, dynamic IP addressing, and support for multiple protocols.
A protocol that allows the creation of virtual private networks (VPNs), which allow users to access a server on a corporate network over a secure, direct connection via the Internet. See also virtual private network.
A media access control method that uses a central device called a controller that polls each device in turn and asks if it has data to transmit.
See Post Office Protocol version 3.
Some kind of opening that allows network data to pass through. See alsophysical port.
The protocol used to download
e-mail from an SMTP e-mail server to a network client. See also Simple Mail Transfer Protocol.
See plain old telephone service.
A total loss of power that may last for only a few seconds or as long as several hours.
Power drops below normal levels for several seconds or longer.
Too much power is coming into the computer. See also power spike, power surge.
A lower power condition where the power drops below normal levels for a few seconds, then returns to normal levels.
The power level rises above normal for less than a second and drops back to normal.
The power level rises above normal and stays there for longer than a second or two.
The power level drops below the standard level. See also power sag.
See Point-to-Point Protocol.
See Point-to-Point Tunneling Protocol.
The sixth layer of the OSI model; responsible for formatting data exchange such as graphic commands and conversion of character sets. Also responsible for data compression, data encryption, and data stream redirection. See also Open Systems Interconnect.
A shareware implementation of RSA encryption. See also RSA Data Security, Inc.
An NT server that contains a master copy of the SAM database. This database contains all usernames, passwords, and access control lists for a Windows NT domain. See also Security Accounts Manager.
A centralized device that controls and manages all network printers. The print server can be hardware, software, or a combination of both. Some print servers are actually built into the network printer NICs. See also network interface card.
The network services that manage and control printing on a network, allowing multiple and simultaneous access to printers.
A technology in which both the sender and the receiver have the same key. A single key is used to encrypt and decrypt all messages. See also public key.
The part of a network that lies behind a firewall and is not “seen” on the Internet. See also firewall.
A predefined set of rules that dictates how computers or devices communicate and exchange data on the network.
A software and hardware troubleshooting tool that is used to decode protocol information to try to determine the source of a network problem and to establish baselines.
The set of rules a computer uses to communicate with other computers.
A type of firewall that prevents direct communication between a client and a host by acting as an intermediary. See also firewall.
An implementation of a web proxy. The server receives an HTTP request from a web browser and makes the request on behalf of the sending workstation. When the response comes, the proxy cache server caches a copy of the response locally. The next time someone makes a request for the same web page or Internet information, the proxy cache server can fulfill the request out of the cache instead of having to retrieve the resource from the Web.
A type of server that makes a single Internet connection and services requests on behalf of many users.
See Public Switched Telephone Network.
For use by everyone.
A technology that uses two keys to facilitate communication, a public key and a private key. The public key is used to encrypt a message to a receiver. See also private key.
The part of a network on the outside of a firewall that is exposed to the public. See also firewall.
This is the U.S. public telephone network. It is also called the plain old telephone service (POTS). See also central office.
A hand tool used to terminate twisted-pair wires on a wall jack or patch panel.
See permanent virtual circuit.
See Quality of Service.
Four sets of octets separated by a decimal point; an IP address.
Data prioritization at the Network layer of the OSI model. Results in guaranteed throughput rates. See also Open Systems Interconnect.
Interference on copper cabling systems caused by radio frequencies.
See Redundant Array of Independent (or Inexpensive) Disks.
The different types of RAID, such as RAID 0, RAID 1, etc.
A file that the manufacturer includes with software to give the installer information that came too late to make it into the software manuals. It’s usually a last-minute addition that includes tips on installing the software, possible incompatibilities, and any known installation problems that might have been found right before the product was shipped.
Computer architecture in which the computer executes small, general-purpose instructions very rapidly.
A configuration of multiple hard disks used to provide fault tolerance should a disk fail. Different levels of RAID exist, depending on the amount and type of fault tolerance provided.
Process in which signals are read, amplified, and repeated on the network to reduce signal degradation, which results in longer overall possible length of the network.
Any networking protocol that is used to gain access to a network over public communication links.
A computer that has one or more modems installed to enable remote connections to the network.
A Physical layer device that amplifies the signals it receives on one port and resends or repeats them on another. A repeater is used to extend the maximum length of a network segment.
The process of copying directory information to other servers to keep them all synchronized.
See radio frequency interference.
The type designation for the coaxial cable used in thin Ethernet (10Base2). It has a 50ohm impedance rating and uses BNC connectors.
The type designation for the coaxial cable used in ARCnet networks. It has a 93ohm impedance and uses BNC connectors.
A network topology where each computer in the network is connected to exactly two other computers. With ring topology, a single break in the ring brings the entire network down.
See Router Information Protocol.
See reduced instruction set computing.
A modular connection mechanism that allows for as many as eight copper wires (four pairs). RJ connectors are most commonly used for telephone (such as the RJ-11) and network adaptors (such as RJ-45).
Profiles downloaded from a server at each login. When a user logs out at the end of the session, changes are made and remembered for the next time the user logs in.
The path to get to the destination from a source.
How many router hops there are between source and destination in an internetwork. See also hop, router.
A device that connects two networks and allows packets to be transmitted and received between them. A router determines the best path for data packets from source to destination. See also hop.
A distance-vector route discovery protocol used by IPX. It uses hops and ticks to determine the cost for a particular route. See also Internet Packet eXchange.
A function of the Network layer that involves moving data throughout a network. Data passes through several network segments using routers that can select the path the data takes. See also router.
A table that contains information about the locations of other routers on the network and their distance from the current router.
A commercial company that produces encryption software. RSA stands for Rivest, Shamir, and Adleman, the founders of the company.
See power sag.
See Security Accounts Manager.
A protocol used for secure communications between a web server and a web browser.
A database within Windows NT that contains information about all users and groups and their associated rights and settings within a Windows NT domain. See also Backup Domain Controller.
Log file used in Windows NT to keep track of security events specified by the domain’s Audit policy.
Rules set in place by a company to ensure the security of a network. This may include how often a password must be changed or how many characters a password should be.
A unit of data smaller than a packet. Also refers to a portion of a larger network (a network can consist of multiple network segments). See also backbone.
A device that has its own power.
A number used to determine the order in which parts of a packet are to be reassembled after the packet has been split into sections.
A connection-oriented protocol that is part of the IPX protocol suite. It operates at the Transport layer of the OSI model. It initiates the connection between the sender and receiver, transmits the data, and then terminates the connection. See also Internet Packet eXchange, Open Systems Interconnect.
A protocol that permits the sending of IP packets over a serial connection.
A computer that provides resources to the clients on the network.
A network in which the resources are located on a server for use by the clients.
A network design model that uses a central server to contain all data as well as control security.
Services add functionality to the network by providing resources or doing tasks for other computers. In Windows 9x, services include file and printer sharing for Microsoft or Novell networks.
Accounts created on a server for users to perform special services, such as backup operators, account operators, and server operators.
The fifth layer of the OSI model, it determines how two computers establish, use, and end a session. Security authentication and network naming functions required for applications occur here. The Session layer establishes, maintains, and breaks dialogs between two stations. See also Open Systems Interconnect.
In a network that uses share-level security, instead of assigning rights to network resources to users, passwords are assigned to individual files or other network resources (such as printers). These passwords are then given to all users that need access to these resources. All resources are visible from anywhere in the network, and any user who knows the password for a particular network resource can make changes to it.
Unix interfaces that are based solely upon command prompts. There is no graphical interface.
When cabling has extra wrapping to protect it from stray electrical or radio signals. Shielded cabling is more expensive than unshielded.
A type of cabling that includes pairs of copper conductors, twisted around each other, inside a metal or foil shield. This type of medium can support faster speeds than unshielded wiring.
See Secure Hypertext Transfer Protocol.
Transmission from one PC to another. This could be a notification to start a session or end a session.
The process whereby a protocol at the Physical layer receives information from the upper layers and translates all the data into signals that can be transmitted on a transmission medium.
The process of transmitting data across the medium. Two types of signaling are digital and analog.
A program that looks for mail on SMTP servers and sends it along the network to its destination at another SMTP server.
The management protocol created for sending information about the health of the network to network management consoles.
Stations on an FDDI network that are attached to only one of the cables. They are less fault tolerant than
dual-attached stations.
An encryption algorithm developed as a possible replacement for Data Encryption Standard (DES) that is classified by the National Security Agency (NSA). Not much is known about this encryption algorithm except that it uses an 80-bit key.
See Serial Line Internet Protocol.
See Simple Mail Transfer Protocol.
See Simple Network Management Protocol.
A combination of a port address and an IP address.
A standard in the U.S. that defines a base data rate of 51.84Mbps; multiples of this rate are known as optical carrier (OC) levels, such as OC-3, OC-12, etc.
The address of the station that sent a packet, usually found in the source area of a packet header.
The address of the PC that is sending data to a receiving PC. The port portion allows for multiplexing of data to be sent from a specific application.
Any device that electrically duplicates one signal into two.
See Standby Power Supply.
See Sequenced Packet eXchange.
A power backup device that has power going directly to the protected equipment. A sensor monitors the power. When a loss is detected, the computer is switched over to the battery. Thus, a loss of power might occur (typically for less than a second).
A network topology where all devices on the network have a direct connection to every other device on the network. These networks are rare except in very small settings due to the huge amount of cabling required to add a new device.
A firewall security method that monitors the states of all connections through the firewall.
Entry in the ARP table that is manually added by a user when a PC will be accessed often. This will speed up the process of communicating with the PC since the IP-to-MAC address will not have to be resolved.
A method of routing packets where the router’s routing is updated manually by the network administrator instead of automatically by a route discovery protocol.
A type of fiber-optic cable connector that uses a mechanism similar to the BNC connectors used by Thinnet. This is the most popular fiber-optic connector currently in use.
A group of selected bits that identify a subnetwork within a TCP/IP network. See also Transmission Control Protocol/Internet Protocol.
The process of dividing a single IP address range into multiple address ranges.
A network that is part of another network. The connection is made through a gateway, bridge, or router.
A part of the 32-bit IPv4 address that designates the address of the subnetwork.
A type of fiber-optic connector. These connectors are square shaped and have release mechanisms to prevent the cable from accidentally being unplugged.
The process of combining multiple IP address ranges into a single IP network.
A device that contains a special electronic circuit that monitors the incoming voltage level and then trips a circuit breaker when an overvoltage reaches a certain level called the overvoltage threshold.
See surge protector.
A network that has multiple routes to get from a source to a destination. This allows for higher speeds.
When the same key is used to encrypt and decrypt data.
A Denial of Service attack in which the hacker sends a barrage of SYN packets. The receiving station tries to respond to each SYN request for a connection, thereby tying up all the resources. All incoming connections are rejected until all current connections can be established.
See Transmission Control Protocol.
See Transmission Control Protocol/Internet Protocol.
See Time Division Multiple Access.
See time-domain reflectometer.
A computer that functions as a smart answering machine for the network. It can also perform call center and call routing functions.
A protocol that functions at the Application layer of the OSI model, providing terminal emulation capabilities. See also Open Systems Interconnect.
A set of guidelines that you can apply to every new user account created.
A program that enables a PC to act as a terminal for a mainframe or a Unix system.
A device that prevents a signal from bouncing off the end of the network cable, which would cause interference with other signals.
An account set up by an administrator to confirm the basic functionality of a newly installed application, for example. The test account has equal rights to accounts that will use the new functionality. It is important to use test accounts instead of administrator accounts to test new functionality. If an administrator account is used, problems related to user rights may not manifest themselves because administrator accounts typically have full rights to all network resources.
See Trivial File Transfer Protocol.
A type of Ethernet that uses thick coaxial cable and supports a maximum transmissions distance of 500 meters. Also called 10Base5.
A type of Ethernet that uses RG-58 cable and 10Base2.
A method to divide individual channels in broadband communications into separate time slots, allowing more data to be carried at the same time. It is also possible to use TDMA in baseband communications.
A tool that sends out a signal and measures how much time it takes to return. It is used to find short or open circuits. Also called a cable tester.
A field in IP packets that indicates how many routers the packet can still cross (hops it can still make) before it is discarded. TTL is also used in ARP tables to indicate how long an entry should remain in the table.
The special packet of data that is passed around the network in a Token Ring network. See Token Ring network.
A media access method in which a token (data packet) is passed around the ring in an orderly fashion from one device to the next. A station can transmit only when it has the token. If it doesn’t have the token, it can’t transmit. The token continues around the network until the original sender receives the token again. If the token has more data to send, the process repeats. If not, the original sender modifies the token to indicate that the token is free for anyone else to use.
A network based on a physical star, logical ring topology, in which data is passed along the ring until it finds its intended receiver. Only one data packet can be passed along the ring at a time. If the data packet goes around the ring without being claimed, it is returned to the sender.
A small electronic device used to test network cables for breaks and other problems that sends an electronic signal down one set of UTP wires. Used with a tone locator. See also tone locator, unshielded twisted-pair cable.
A device used to test network cables for breaks and other problems; designed to sense the signal sent by the tone generator and emit a tone when the signal is detected in a particular set of wires.
The physical and/or logical layout of the transmission media specified in the physical and logical layers of the OSI model. See also Open Systems Interconnect.
See tracert.
The TCP/IP Trace Route command-line utility that shows the user every router interface a TCP/IP packet passes through on its way to a destination. See also Transmission Control Protocol/Internet Protocol.
A section of a data packet that contains error-checking information.
The part of any network interface that transmits and receives network signals.
A high-voltage burst of current.
Sending of packets from the PC to the network cable.
The protocol found at the Host- to-Host layer of the DoD model. This protocol breaks data packets into segments, numbers them, and sends them in random order. The receiving computer reassembles the data so that the information is readable for the user. In the process, the sender and the receiver confirm that all data has been received; if not, it is resent. This is a connection-oriented protocol. See also connection-oriented transport protocol.
The protocol suite developed by the DoD in conjunction with the Internet. It was designed as an internetworking protocol suite that could route information around network failures. Today it is the de facto standard for communications on the Internet.
Physical cables and/or wireless technology across which computers are able to communicate.
The fourth layer of the OSI model, it is responsible for checking that the data packet created in the Session layer was received error free. If necessary, it also changes the length of messages for transport up or down the remaining layers. See also Open Systems Interconnect.
A protocol similar to FTP that does not provide the security or error-checking features of FTP. See also File Transfer Protocol.
The telephone lines that form the backbone of a telephone network for a company. These lines connect the telephone(s) to the telephone company and to the PSTN. See also Public Switched Telephone Network.
A series of digital connections leased from the telephone company. Each T-series connection is rated with a number based on speed. T1 and T3 are the most popular.
See Time to Live.
A type of network transmission medium that contains pairs of color-coded, insulated copper wires that are twisted around each other. A twisted-pair cable consists of one or more twisted pairs in a common jacket.
A DOS command that displays the contents of a file. Also, short for data type.
See User Datagram Protocol.
A URL is one way of identifying a document on the Internet. It consists of the protocol that is used to access the document and the domain name or IP address of the host that holds the document, for example, http://www.sybek.com.
A natural line conditioner that uses a battery and power inverter to run the computer equipment that plugs into it. The battery charger continuously charges the battery. The battery charger is the only thing that runs off line voltage. During a power problem, the battery charger stops operating, and the equipment continues to run off the battery.
A 32-bit, multitasking operating system developed in the 1960s for use on mainframes and minicomputers.
When cabling has little protection of wrapping to protect it from stray electrical or radio signals. Unshielded cabling is less expensive than shielded.
Twisted-pair cable consisting of a number of twisted pairs of copper wire with a simple plastic casing. Because no shielding is used in this cable, it is very susceptible to EMI, RFI, and other types of interference. See also crossover cable, electromagnetic interference, radio frequency interference.
To increase an aspect of a PC, for example, by upgrading the RAM (increasing the RAM), upgrading the CPU (changing the current CPU for a faster CPU), etc.
See uninterruptible power supply.
The amount of time a particular computer or network component has been functional.
See Uniform Resource Locator.
The person who is using a computer or network.
Protocol at the Host-to-Host layer of the DoD model, which corresponds to the Transport layer of the OSI model. Packets are divided into segments, given numbers, sent randomly, and put back together at the receiving end. This is a connectionless protocol. See also connectionless transport protocol, Open Systems Interconnect.
A type of network in which user accounts can read, write, change, and take ownership of files. Rights are assigned to user accounts, and each user knows only his or her own username and password, which makes this the preferred method for securing files.
A connection used with Thicknet to attach a station to the main cable. It is called a vampire tap because it has a tooth that “bites” through the insulation to make the physical connection.
Serial port that is used as if it were a serial port, but the actual serial port interface does not exist.
Allows users on different switch ports to participate in their own network separate from, but still connected to, the other stations on the same or connected switch.
Using the public Internet as a backbone for a private interconnection (network) between locations.
A program intended to damage a computer system. Sophisticated viruses encrypt and hide in a computer and may not appear until the user performs a certain action or until a certain date. See also antivirus.
The core program that runs the virus-scanning process.
Loudness of a sound, or the portion of a hard disk that functions as if it were a separate hard disk.
See virtual private network.
See wide area network.
A type of proxy that is used to act on behalf of a web client or web server.
A server that holds and delivers web pages and other web content using the HTTP protocol. See also Hypertext Transfer Protocol.
A network that crosses local, regional, and international boundaries.
A Windows NT service that dynamically associates the NetBIOS name of a host with a domain name. See also network basic input/output system.
A network operating system developed by Microsoft that uses that same graphical interface as the Desktop environment, Windows 95/98.
The version of Windows NT based on the “look and feel” of Windows 3.x. See also Windows NT.
The version of Windows NT based on the “look and feel” of Windows 95/98. See also Windows NT.
A type of Windows program (a file with either an .EXE or a .DLL extension) that is loaded automatically by the server or manually by the administrator.
The IP configuration utility for Windows 95/98 that allows you to view the current TCP/IP configuration of a workstation.
A Windows-based attack that affects only computers running Windows NT 3.51 or 4. It is caused by the way that the Windows NT TCP/ IP stack handles bad data in the TCP header. Instead of returning an error code or rejecting the bad data, it sends NT to the Blue Screen of Death (BSOD). Figuratively speaking, the attack nukes the computer.
See Windows Internet Name Service.
Used for attaching ends onto different types of network cables by a process known as crimping. Crimping involves using pressure to press some kind of metal teeth into the inner conductors of a cable.
A wireless bridge used in a multipoint RF network.
It performs all the functions of a regular bridge, but it uses RF instead of cables to transmit signals.
A specific group of users or network devices, organized by job function or proximity to shared resources.
A computer that is not a server but is on a network. Generally a workstation is used to do work, while a server is used to store data or perform a network function. In the most simple terms, a workstation is a computer that is not a server.
A collection of HTTP servers running on the Internet. They support the use of documents formatted with HTML. See also Hypertext Markup Language, Hypertext Transfer Protocol.
Similar to a virus. Worms, however, propagate themselves over a network. See also virus.
See World Wide Web.
A graphical user interface (GUI) developed for use with the various flavors of Unix.
|
|