Page 46 / 53 Scroll up to view Page 41 - 45
Prestige 944S Cable Sharing Gateway with 4-port Switch
H
Glossary
Flash memory
The nonvolatile storage that can be electrically erased and reprogrammed so that data can be
stored, booted, and rewritten as necessary.
FTP
File Transfer Protocol is an Internet file transfer service that operates on the Internet and over
TCP/IP networks. FTP is basically a client/server protocol in which a system running the FTP
server accepts commands from a system running an FTP client. The service allows users to send
commands to the server for uploading and downloading files. FTP is popular on the Internet
because it allows for speedy transfer of large files between two systems.
Gateway
A gateway is a computer system or other device that acts as a translator between two systems
that do not use the same communication protocols, data formatting structures, languages, and/or
architecture.
Hacker
Generally, a hacker is anyone who enjoys experimenting with technology including computers
and networks. Not all hackers are criminals breaking into systems. Some are legitimate users and
hobbyists. Nevertheless, some are dedicated criminals or vandals.
HDLC
HDLC (High-level Data Link Control) is a bit-oriented (the data is monitored bit by bit), link
layer protocol for the transmission of data over synchronous networks.
Headend
Central distribution point for a CATV system. Video signals are received here from satellites and
maybe other sources, frequency converted to the appropriate channels combined with locally
originated signals and rebroadcast onto the HFC plant. The headend is where the CMTS is
normally located.
HFC
HFC (hybrid fiber coaxial cable) is a telecommunication technology in which fiber optic cable
and coaxial cable are used in different portions of a network to carry broadband content (such as
video, data and voice). Typically, a local cable TV company might use fiber optic cable from the
cable headend (distribution center) to serving nodes located close to business and residential
users and from these nodes use coaxial cable to individual businesses and homes. An advantage
of HFC is that some of the characteristics of fiber optic cable (high bandwidth and low noise and
interference susceptibility) can be brought close to the user without having to replace the existing
coaxial cable that is installed all the way to the home and business.
Host
Any computer on a network that is a repository for services available to other computers on the
network. It is quite common to have one host machine provide several services, such as WWW
and USENET.
HTTP
Hyper Text Transfer Protocol. The most common protocol used on the Internet. HTTP is the
primary protocol used for web sites and web browsers. It is also prone to certain kinds of attacks.
IANA
Internet Assigned Number Authority acts as the clearinghouse to assign and coordinate the use of
numerous Internet protocol parameters such as Internet addresses, domain names, protocol
numbers, and more. The IANA Web site is at http://www.isi.edu/iana.
ICMP
Internet Control Message Protocol is a message control and error-reporting protocol between a
host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the
messages are processed by the TCP/IP software and are not directly apparent to the application
user.
Integrity
Proof that the data is the same as originally intended. Unauthorized software or people have not
altered the original information.
internet
(Lower case i) Any time you connect 2 or more networks together, you have an internet.
Internet
(Upper case I) The vast collection of inter-connected networks that all use the TCP/IP protocols
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 53
Prestige 964 Cable Router
Glossary
I
and that evolved from the ARPANET of the late 60’s and early 70’s. The Internet now (July
1995) connects roughly 60,000 independent networks into a vast global internet
Internet Worm
See Worm.
Intranet
A private network inside a company or organization that uses the same kinds of software that you
would find on the public Internet, but that is only for internal use.
Intruder
Person or software interested in breaking computer security to access, modify, or damage data.
Also see Cracker.
IP
Internet Protocol
he IP (currently IP version 4, or IPv4), is the underlying protocol for routing
packets on the Internet and other TCP/IP-based networks.
IPCP (PPP)
IP Control Protocol allows changes to IP parameters such as the IP address.
IPX
Internetwork Packet eXchange The native NetWare internetworking protocol is IPX
(Internetwork Packet Exchange). Like IP (Internet Protocol), IPX is an internetworking protocol
that provides datagram services.
IRC
Internet Relay Chat. IRC was developed in the late 1980s as a way for multiple users on a system
to “chat” over the network. Today IRC is a very popular way to “talk” in real time with other
people on the Internet. However, IRC is also one avenue hackers use to get information from you
about your system and your company. Moreover, IRC sessions are prone to numerous attacks
that while not dangerous can cause your system to crash.
ISP
Internet Service Providers provide connections into the Internet for home users and businesses.
There are local, regional, national, and global ISPs. You can think of local ISPs as the
gatekeepers into the Internet.
LAN
Local Area Network is a shared communication system to which many computers are attached.
A LAN, as its name implies, is limited to a local area. This has to do more with the electrical
characteristics of the medium than the fact that many early LANs were designed for departments,
although the latter accurately describes a LAN as well. LANs have different topologies, the most
common being the linear bus and the star configuration.
Linux
A version of the UNIX operating system designed to run on IBM Compatible computers.
Logic Bomb
A virus that only activates itself when certain conditions are met. Logic bombs usually damage
files or cause other serious problems when they are activated.
MAC
On a local area network (LAN) or other network, the MAC (Media Access Control) address is
your computer's unique hardware number. (On an Ethernet LAN, it's the same as your Ethernet
address.) The MAC layer frames data for transmission over the network, then passes the frame to
the physical layer interface where it is transmitted as a stream of bits.
MCNS
Multimedia Cable Network System is the consortium behind the DOCSIS standard for cable
modems.
MSO
Multiple Service Operators. A cable TV service provider that also provides other services such as
data and/or voice telephony.
Name Resolution
The allocation of an IP address to a host name. See DNS
NAT
Network Address Translation is the translation of an Internet Protocol address used within one
network to a different IP address known within another network - see also SUA.
NDIS
Network Driver Interface Specification is a Windows specification for how communication
protocol programs (such as TCP/IP) and network device drivers should communicate with each
other.
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 53
Prestige 944S Cable Sharing Gateway with 4-port Switch
J
Glossary
NetBIOS
Network Basic Input / Output System. NetBIOS is an extension of the DOS BIOS that enables a
PC to connect to and communicate with a LAN.
Network
Any time you connect 2 or more computers together so that they can share resources, you have a
computer network. Connect 2 or more networks together and you have an internet.
NIC
Network Interface Card. A board that provides network communication capabilities to and from
a computer system. Also called an adapter.
Node
Any single computer connected to a network
One-way Cable
Modem
A one-way Cable Modem uses the TV cable for the downstream (receive) and a telephone
modem for upstream (transmit).
PAC
The box that calls/answers the phone call and relays the PPP frames to the PNS. A PAC must
have IP and dial-up capability.
Packet Filter
A filter that scans packets and decides whether to let them through.
PAP
Password Authentication Protocol PAP is a security protocol that requires users to enter a
password before accessing a secure system. The user’s name and password are sent over the wire
to a server, where they are compared with a database of user account names and passwords. This
technique is vulnerable to wiretapping (eavesdropping) because the password can be captured
and used by someone to log onto the system.
Password Cracker
A program that uses a dictionary of words, phrases, names, etc. to guess a password.
Password encryption
A system of encrypting electronic files using a single key or password. Anyone who knows the
password can decrypt the file.
Password
Shadowing
The encrypted password is no visible in the passwd file but stored in a shadow file that is only
readable by root. This prevents brute force attacks on the encrypted field to guess the password.
see e.g.:
http://whatis.com/shadowpa.htm
Penetration
Gaining access to computers or networks by bypassing security programs and passwords.
Phreaking
Breaking into phone or other communication systems. Phreaking sites on the Internet are popular
among crackers and other criminals
Ping Attack
An attack that slows down the network until it is unusable. The attacker sends a "ping" command
to the network repeatedly to slow it down. See also Denial of Service.
Pirate
Someone who steals or distributes software without paying the legitimate owner for it. This
category of computer criminal includes several different types of illegal activities Making copies
of software for others to use. Distributing pirated software over the Internet or a Bulletin Board
System. Receiving or downloading illegal copies of software in any form.
Pirated Software
Software that has been illegally copied, or that is being used in violation of the software's
licensing agreement. Pirated software is often distributed through pirate bulletin boards or on the
Internet. In the internet underground it is known as Warez.
Plain Text
The opposite of Cipher Text, Plain Text is readable by anyone.
PNS
PPTP Network Server.
A PNS must have IP connectivity.
POP
Post Office Protocol. This is a common protocol used for sending, receiving, and delivering mail
messages.
Port
An Internet port refers to a number that is part of a URL, appearing after a colon (:) right after
the domain name. Every service on an Internet server listens on a particular port number on that
server. Most services have standard port numbers, e.g. Web servers normally listen on port 80.
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 53
Prestige 964 Cable Router
Glossary
K
Port (H/W)
An interface on a computer for connecting peripherals or devices to the computer. A printer port,
for example, is an interface that is designed to have a printer connected to it. Ports can be defined
by specific hardware (such as a keyboard port) or through software.
POTS
Plain Old Telephone Service is the analog telephone service that runs over copper twisted-pair
wires and is based on the original Bell telephone system. Twisted-pair wires connect homes and
businesses to a neighborhood central office. This is called the local loop. The central office is
connected to other central offices and long-distance facilities.
PPP
Point to Point Protocol.
PPP encapsulates and transmits IP (Internet Protocol) datagrams over
serial point-to-point links. PPP works with other protocols such as IPX (Internetwork Packet
Exchange). The protocol is defined in IETF (Internet Engineering Task Force) RFC 1661 through
1663. PPP provides router-to-router, host-to-router, and host-to-host connections.
PPTP
Point-to-Point Tunneling Protocol.
Promiscuous Packet
Capture
Actively capturing packet information from a network. Most computers only collect packets
specifically addressed to them. Promiscuous packet capture acquires all network traffic it can
regardless of where the packets are addressed.
Protocol
A “language” for communicating on a network. Protocols are sets of standards or rules used to
define, format, and transmit data across a network. There are many different protocols used on
networks. For example, most web pages are transmitted using the HTTP protocol.
Proxy Server
A server that performs network operations in lieu of other systems on the network. Proxy Servers
are most often used as part of a firewall to mask the identity of users inside a corporate network
yet still provide access to the Internet. When a user connects to a proxy server, via a web browser
or other networked application, he submits commands to the proxy server. The server then
submits those same commands to the Internet, yet without revealing any information about the
system that originally requested the information. Proxy servers are an ideal way to also have all
users on a corporate network channel through one point for all external communications. Proxy
servers can be configured to block certain kinds of connections and stop some hacks.
PSTN
Public Switched Telephone Network was put into place many years ago as a voice telephone
call-switching system. The system transmits voice calls as analog signals across copper twisted
cables from homes and businesses to neighborhood COs (central offices); this is often called the
local loop. The PSTN is a circuit-switched system, meaning that an end-to-end private circuit is
established between caller and callee.
Public Key
Encryption
System of encrypting electronic files using a key pair. The key pair contains a public key used
during encryption, and a corresponding private key used during decryption.
PVC
Permanent Virtual Circuit.
A PVC is a logical point-to-point circuit between customer sites.
PVCs are low-delay circuits because routing decisions do not need to be made along the way.
Permanent means that the circuit is preprogrammed by the carrier as a path through the network.
It does not need to be set up or torn down for each session.
Ranging
The process of automatically adjusting transmission levels and time offsets of individual modems
in order to make sure the bursts coming from different modems line up in the right timeslots and
are received at the same power level at the CMTS.
Reconnaissance
The finding and observation of potential targets for a cracker to attack.
RFC
An RFC (Request for Comments) is an Internet formal document or standard that is the result of
committee drafting and subsequent review by interested parties. Some RFCs are informational in
nature. Of those that are intended to become Internet standards, the final version of the RFC
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 53
Prestige 944S Cable Sharing Gateway with 4-port Switch
L
Glossary
becomes the standard and no further comments or changes are permitted. Change can occur,
however, through subsequent RFCs.
RIP
Routing Information Protocol is an interior or intra-domain routing protocol that uses the
distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare
environment as a method for exchanging routing information between routers.
Router
A device that connects two networks together. Routers monitor, direct, and filter information that
passes between these networks. Because of their location, routers are a good place to install
traffic or mail filters. Routers are also prone to attacks because they contain a great deal of
information about a network.
SAP
In NetWare, the SAP (Service Advertising Protocol) broadcasts information about available
services on the network that other network devices can listen to. A server sends out SAP
messages every 60 seconds. A server also sends out SAP messages to inform other devices that it
is closing down. Workstations use SAP to find services they need on the network.
SATAN
A UNIX program that gathers information on networks and stores it in databases. It is helpful in
finding security flaws such as incorrect settings, software bugs and poor policy decisions. It
shows network services that are running, the different types of hardware and software on the
network, and other information. It was written to help users find security flaws in their network
systems.
Server
A computer, or a software package, that provides a specific kind of service to client software
running on other computers.
Set-Top Box
A set-top box is a device that enables a television set to become a user interface to the Internet
and also enables a television set to receive and decode digital television (DTV) broadcasts.
Shoulder Surfing
Looking over someone's shoulder to see the numbers they dial on a phone, or the information
they enter into a computer.
SID (Service ID)
Used in the DOCSIS standard to define a particular mapping between a cable modem (CM) and
the CMTS. The SID is used for the purpose of upstream bandwidth allocation and
class-of-service management.
SNMP
System Network Management Protocol is a popular management protocol defined by the Internet
community for TCP/IP networks. It is a communication protocol for collecting information from
devices on the network.
Snooping
Passively watching a network for information that could be used to a hacker's advantage, such as
passwords. Usually done while Camping Out.
SOCKS
A protocol that handles TCP traffic through proxy servers.
SPAM
Unwanted e-mail, usually in the form of advertisements.
Splitter
Passive devices that divide the traffic on trunk cables and send it down feeder cables.
Spoofing
To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide
their location and identity
SSL (Secured Socket
Layer)
Technology that allows you to send information that only the server can read. SSL allows servers
and browsers to encrypt data as they communicate with each other. This makes it very difficult
for third parties to understand the communications.
STP
Twisted-pair cable consists of copper-core wires surrounded by an insulator. Two wires are
twisted together to form a pair, and the pair form a balanced circuit. The twisting prevents
interference problems. STP (shielded twisted-pair) provides protection against external crosstalk.
Straight through
A cable that wires a pin to its equivalent pin. This cable connects two dissimilar devices, for
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top