Page 61 / 74 Scroll up to view Page 56 - 60
Appendix
61
D-Link Systems, Inc.
Half-duplex –
Data cannot be transmitted and received at the same time
Hashing –
Transforming a string of characters into a shorter string with a predefined length
Hexadecimal –
Characters 0-9 and A-F
HomePNA –
Networking over telephone lines
HomeRF –
Networking standard that combines 802.11b and DECT (Digital Enhanced Cordless
Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a Frequency Hopping
transmission method
Hop –
The action of data packets being transmitted from one router to another
Host –
Computer on a network
HTTP –
Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients
(web browsers)
HTTPS –
HTTP over SSL is used to encrypt and decrypt HTTP transmissions
Hub –
A networking device that connects multiple devices together
I
ICMP –
Internet Control Message Protocol
IEEE –
Institute of Electrical and Electronics Engineers
IETF –
Internet Engineering Task Force
IGMP –
Internet Group Management Protocol is used to make sure that computers can report their multicast
group membership to adjacent routers
IIS –
Internet Information Server is a WEB server and FTP server provided by Microsoft
IKE –
Internet Key Exchange is used to ensure security for VPN connections
Infrastructure –
In terms of a wireless network, this is when wireless clients use an Access Point to gain
access to the network
Internet –
A system of worldwide networks which use TCP/IP to allow for resources to be accessed from
computers around the world
Internet Explorer –
A World Wide Web browser created and provided by Microsoft
Internet Protocol –
The method of transferring data from one computer to another on the Internet
Internet Protocol Security –
IPsec provides security at the packet processing layer of network
communication
Internet Service Provider –
An ISP provides access to the Internet to individuals or companies
Interoperability –
The ability for products to interact with other products without much customer interaction
Intranet –
A private network
Page 62 / 74
Appendix
62
D-Link Systems, Inc.
Intrusion Detection –
A type of security that scans a network to detect attacks coming from inside and outside
of the network
IP –
Internet Protocol
IP address –
A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer
that transmits data on the Internet or on an Intranet
IPsec –
Internet Protocol Security
IPv6 –
Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we
face of running our of IP version 4 addresses
IPX –
Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware
clients and servers to communicate
ISP –
Internet Service Provider
J
Java –
A programming language used to create programs and applets for web pages
K
Kbps –
Kilobits per second
Kbyte -
Kilobyte
Kerberos –
A method of securing and authenticating requests for services on a network
L
LAN –
Local Area Network
Latency
– The amount of time that it takes a packet to get from the one point to another on a network.
Also
referred to as delay
LED
- Light Emitting Diode
Legacy
– Older devices or technology
Local Area Network
– A group of computers in a building that usually access files from a server
M
MAC address
– A unique hardware address for devices on a Local Area Network
MDI
– Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable
MDIX
- Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable
Megabit
- Mb
Page 63 / 74
Appendix
63
D-Link Systems, Inc.
Megabyte
- MB
Megabits per second
- Mbps
MIB
– Management Information Base is a set of objects that can be managed by using SNMP
Modem
– A device that Modulates digital signals from a computer to an analog signal in order to transmit the
signal over phone lines.
It also Demodulates the analog signals coming from the phone lines to digital signals
for your computer
MPPE
– Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections
MTU
– Maximum Transmission Unit is the largest packet that can be transmitted on a packet-based network
like the Internet
Multicast
– Sending data from one device to many devices on a network
N
NAT
– Network Address Translation allows many private IP addresses to connect to the Internet, or another
network, through one IP address
NetBEUI
– NetBIOS Extended User Interface is a Local Area Network communication protocol.
This is an
updated version of NetBIOS
NetBIOS
– Network Basic Input/Output System
Netmask
– Determines what portion of an IP address designates the Network and which part designates the
Host
NetWare
– A Server Software developed by Novell
Network Interface Card
– A card installed in a computer or built onto the motherboard that allows the computer
to connect to a network
Network later
– The third layer of the OSI model which handles the routing of traffic on a network
Network Time Protocol
– Used to synchronize the time of all the computers in a network
NIC
– Network Interface Card
NTP
– Network Time Protocol
O
OFDM
– Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and
802.11g
OSI
– Open Systems Interconnection is the reference model for how data should travel between two devices
on a network
OSPF
– Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks
because only changes to the routing table are sent to all the other routers in the network as opposed to sending
the entire routing table at a regular interval, which is how RIP functions
Page 64 / 74
Appendix
64
D-Link Systems, Inc.
P
Password
-
A sequence of characters that is used to authenticate requests to resources on a network
Personal Area Network
– The interconnection of networking devices within a range of 10 meters
Physical layer
– The first layer of the OSI model.
Provides the hardware means of transmitting electrical
signals on a data carrier
PoE
– Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5
Ethernet cable
POP 3
– Post Office Protocol 3 is used for receiving email
PPP
– Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like
a phone line
PPPoE
– Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over
Ethernet
PPTP
– Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two
networks
Preamble
– Used to synchronize communication timing between devices on a network
Q
QoS
– Quality of Service
R
RADIUS
– Remote Authentication Dial-In User Service allows for remote users to dial into a central server and
be authenticated in order to access resources on a network
Rendezvous
– Apple’s version of UPnP, which allows for devices on a network to discover each other and be
connected without the need to configure any settings
Repeater
– Retransmits the signal of an Access Point in order to extend it’s coverage
RIP
– Routing Information Protocol is used to synchronize the routing table of all the routers on a network
RJ-11
– The most commonly used connection method for telephones
RJ-45
- The most commonly used connection method for Ethernet
RS-232C
– The interface for serial communication between computers and other related devices
RSA
– Algorithm used for encryption and authentication
Page 65 / 74
Appendix
65
D-Link Systems, Inc.
S
Samba
– A freeware program that allows for resources to be shared on a network.
Mainly used in Unix based
Operating Systems
Server
– A computer on a network that provides services and resources to other computers on the network
Session key
– An encryption and decryption key that is generated for every communication session between
two computers
Session layer
– The fifth layer of the OSI model which coordinates the connection and communication between
applications on both ends
Simple Mail Transfer Protocol
– Used for sending and receiving email
Simple Network Management Protocol
– Governs the management and monitoring of network devices
SMTP
– Simple Mail Transfer Protocol
SNMP
– Simple Network Management Protocol
SOHO
– Small Office/Home Office
SPI
– Stateful Packet Inspection
SSH
– Secure Shell is a command line interface that allows for secure connections to remote computers
SSID
– Service Set Identifier is a name for a wireless network
Stateful inspection
– A feature of a firewall that monitors outgoing and incoming traffic to make sure that only
valid responses to outgoing requests for incoming packets are allowed to pass though the firewall
Subnet mask
– Determines what portion of an IP address designates the Network and which part designates
the Host
T
TCP
– Transmission Control Protocol
TCP/IP
– Transmission Control Protocol/Internet Protocol
TFTP
– Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but
with less features
Throughput
– The amount of data that can be transferred in a given time period
Traceroute
– A utility displays the routes between you computer and specific destination
U
UDP
– User Datagram Protocol
UNC
– Universal Naming Convention allows for shares on computers to be identified without having to know
what storage device it’s on

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top