Term
|
Definition
| A tunnelling protocol in which IPv6 packets travel over an IPv4 network |
|
|
Term
|
Definition
| IEEE specifications for wireless communication and data synchronization. Also known as Wi-Fi. IEEE b/g/n standards are current, and IEEE 802.11a is outdated. Apple Computer’s versions of 802.11 standards are called AirPort and AirPort Extreme. |
|
|
Term
|
Definition
| A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called MAC address, physical address, or hardware address. |
|
|
Term
| AES (Advanced Encryption Standard) |
|
Definition
| An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi. |
|
|
Term
|
Definition
| When configuring TCP/IP in Windows, the static IP address that Windows uses if it cannot lease an IP address from a DHCP server. |
|
|
Term
|
Definition
| Used by routers. The address identifies multiple destinations, and packets are delivered to the closest destination. |
|
|
Term
| Automatic Private IP Address (APIPA) |
|
Definition
| An IP address in the address range 169.254.x.y, used by a computer when it cannot successfully lease an IP address from a DHCP server. |
|
|
Term
|
Definition
| See connectionless protocol. |
|
|
Term
|
Definition
| A specific radio frequency within a broader frequency. |
|
|
Term
|
Definition
| A license leased for a range of IP addresses that defines a single octet, which is the network portion of the IP addresses in that license. The last three octets can be used for the host address or for subnetting the network. |
|
|
Term
|
Definition
A license that leases the first two octets of a range of IP addresses, and these first two octets are used for the network portion of the IP ddress. The last two octets can be used for the host address or for subnetting the network. |
|
|
Term
|
Definition
| A license for IP addresses that leases the first three octets as the network portion of the range of IP addresses. |
|
|
Term
|
Definition
| A subnet mask that contain all ones or all zeroes in an octet, and the octets that contain all ones are the octets leased by the class license. For example, 11111111.11111111.11111111.00000000 or 255.255.255.0 is the subnet mask for a Class C license. |
|
|
Term
|
Definition
| A subnet mask that can have a mix of zeroes and ones in one octet or can contain all ones in an octet that was not leased by the class license. For example, 11111111.11111111.11110000.00000000 or 255.255.240.0. |
|
|
Term
|
Definition
| A computer concept whereby one computer (the client) requests information from another computer (the server). |
|
|
Term
|
Definition
|
|
Term
| connection-oriented protocol |
|
Definition
| In networking, a protocol that confirms that a good connection has been made before transmitting data to the other end. An example of a connection-oriented protocol is TCP. |
|
|
Term
|
Definition
| A protocol such as UDP that does not require a connection before sending a packet and does not guarantee delivery. An example of a UDP transmission is streaming video over the web. Also called a best-effort protocol. |
|
|
Term
|
Definition
| The gateway a computer on a network will use to access another network unless it knows to specifically use another gateway for quicker access to that network. |
|
|
Term
| DHCP (dynamic host configuration protocol) |
|
Definition
| A protocol used by a server to assign dynamic IP addresses to computers on a network when they first access the network. |
|
|
Term
|
Definition
| A computer or other device that requests addresses from a DHCP server |
|
|
Term
|
Definition
| Stands for “demilitarized zone” and refers to removing firewall protection from a computer or network within an organization of protected computers and networks. |
|
|
Term
| DNS (Domain Name System or Domain Name Service) |
|
Definition
| A distributed pool of information (called the name space) that keeps track of assigned host names and domain names and their corresponding IP addresses, and the system that allows a host to locate information in the pool. |
|
|
Term
|
Definition
| When Windows queries the DNS server for a name resolution. |
|
|
Term
|
Definition
| A computer that can find an IP address for another computer when only the fully qualified domain name is known. |
|
|
Term
|
Definition
| A unique, text-based name that identifies a network. A fully qualified domain name is sometimes loosely called a domain name. Also see fully qualified domain name. |
|
|
Term
|
Definition
| An assigned IP address that is used for the current session only. When the session is terminated, the IP address is returned to the list of available addresses. |
|
|
Term
| FTP (File Transfer Protocol) |
|
Definition
| The protocol used to transfer files over a TCP/IP network. |
|
|
Term
| fully qualified domain name (FQDN |
|
Definition
| A host name and a domain name such as jsmith.amazon.com. Sometimes loosely referred to as a domain name. |
|
|
Term
|
Definition
| A router, computer, or other device that connects networks. |
|
|
Term
|
Definition
| See global unicast address |
|
|
Term
|
Definition
| A TCP/IP version 6 IP address that can be routed on the Internet. Also called a global address. |
|
|
Term
|
Definition
| A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called MAC address, physical address, or adapter address |
|
|
Term
|
Definition
| A name that identifies a computer, printer, or other device on a network, which can be used instead of the computer’s IP address to address the computer on the network. The host name together with the domain name is called the fully qualified domain name. Also called computer name |
|
|
Term
|
Definition
| HTTP (Hypertext Transfer Protocol) |
|
|
Term
|
Definition
| A version of the HTTP protocol that includes data encryption for security using the SSL or TLS security protocols. |
|
|
Term
| IMAP4 (Internet Message Access Protocol, version 4) |
|
Definition
| A protocol used by an email server and client that allows the client to manage email stored on the server without downloading the email. Compare to POP3. |
|
|
Term
|
Definition
| In TCP/IP version 6, a node’s attachment to a link. The attachment can be a physical attachment (for example, when using a network adapter) or a logical attachment (for example, when using a tunnelling protocol). Each interface is assigned an IP address. |
|
|
Term
|
Definition
| In TCP/IP version 6, the last 64 bits or 4 blocks of an IP address that identifies that interface. |
|
|
Term
| Internet Protocol version 4 (IPv4) |
|
Definition
| In TCP/IP version 6, the last 64 bits or 4 blocks of an IP address that identifies that interface. |
|
|
Term
| Internet Protocol version 6 (IPv6) |
|
Definition
| A TCP/IP standard that allows for an IP address with 128 bits. |
|
|
Term
|
Definition
| A TCP/IP standard that allows for an IP address with 128 bits. |
|
|
Term
|
Definition
| A 32-bit or 128-bit address used to uniquely identify a device on a network that uses TCP/IP protocols. The first numbers identify the network; the last numbers identify a host. An example of a 32-bit IP address is 206.96.103.114. An example of a 128-bit IP address is 2001:0000:B80::D3:9C5A:CC |
|
|
Term
|
Definition
| Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) in which IPv6 packets travel over an IPv4 network. |
|
|
Term
| Lightweight Directory Access Protocol (LDAP) |
|
Definition
| A protocol used by various client applications when the application needs to query a database. |
|
|
Term
|
Definition
| In TCP/IP version 6, a local area network or wide area network bounded by routers. Also called local link. |
|
|
Term
|
Definition
| A type of TCP/IP version 6 IP address that can be used for communication among nodes on the same link and is allowed on the Internet. Also called link-local unicast address or local address. |
|
|
Term
| link-local unicast address |
|
Definition
|
|
Term
|
Definition
| A network bound by routers or other gateway devices. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| An IP address that indicates your own computer and is used to test TCP/IP configuration on the computer. |
|
|
Term
| MAC (Media Access Control) address |
|
Definition
| A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed on the adapter as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called a physical address, an adapter address, or a hardware address. |
|
|
Term
|
Definition
| In TCP/IP version 6, an IP address used when packets are delivered to all nodes on a network. |
|
|
Term
|
Definition
| A process in which a message is sent by one host to multiple hosts, such as when a video conference is broadcast to several hosts on the Internet. |
|
|
Term
| multiple input/multiple output (MIMO) |
|
Definition
| A feature of the IEEE 802.11n standard for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance. |
|
|
Term
|
Definition
| The process of associating a character-based computer name to an IP address. |
|
|
Term
| NAT (Network Address Translation) |
|
Definition
| A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet. |
|
|
Term
|
Definition
| In TCP/IP version 6, two or more nodes on the same link. |
|
|
Term
|
Definition
| In TCP/IP version 4, each of the four numbers that are separated by periods and make up a 32-bit IP address. One octet is 8 bits. |
|
|
Term
|
Definition
| Segment of network data that also includes header, destination address, and type of data that is sent as a unit. Also called data packet or datagram. |
|
|
Term
|
Definition
| A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called MAC address, adapter address, or hardware address |
|
|
Term
| POP3 (Post Office Protocol, version 3) |
|
Definition
| The protocol that an email server and client use when the client requests the downloading of email messages. The most recent version is POP version 3. Compare to IMAP3. |
|
|
Term
|
Definition
| (1) As applied to services running on a computer, a number that a service or process on a computer uses to listen for activity. Also called a port address or port number. (2) A physical connector, usually at the back of a computer, that allows a cable from a peripheral device, such as a printer, mouse, or modem, to be attached. |
|
|
Term
|
Definition
| As applied to services running on a computer, a number that a service or process on a computer uses to listen for activity. |
|
|
Term
|
Definition
| To open or close certain ports so they can or cannot be used. A firewall uses port filtering to protect a network from unwanted communication |
|
|
Term
|
Definition
| A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when the private network is protected by a firewall device using NAT. Also called tunnelling. |
|
|
Term
|
Definition
| As applied to services running on a computer, a number that a service or process on a computer uses to listen for activity. |
|
|
Term
|
Definition
| When a firewall opens a port because a computer behind the firewall initiates communication on another port. |
|
|
Term
|
Definition
| In TCP/IP version 4, an IP address that is used on a private network that is isolated from the Internet. |
|
|
Term
|
Definition
| The rules for communication. For example, TCP/IP is a suite or group of protocols that define many types of communication on a TCP/IP network. |
|
|
Term
|
Definition
| In TCP/IP version 4, an IP address available to the Internet. |
|
|
Term
|
Definition
| A measure of the success of communication over the Internet. Communication is degraded on the Internet when packets are dropped, delayed, delivered out of order, or corrupted. VoIP requires a high QoS. |
|
|
Term
|
Definition
| The frequency of waves generated by a radio signal, which are electromagnetic frequencies above audio and below light. For example, Wi-fi 802.11n transmits using a radio frequency of 5 GHz and 2.4 GHz. |
|
|
Term
| Remote Desktop Protocol (RDP |
|
Definition
| The protocol used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer. |
|
|
Term
|
Definition
| A device that connects networks and makes decisions as to the best routes to use when forwarding packets. |
|
|
Term
|
Definition
| A protocol used to transfer files from an FTP server to an FTP client using encryption. |
|
|
Term
|
Definition
| A protocol that is used to pass login information to a remote computer and control that computer over a network using encryption |
|
|
Term
| Server Message Block (SMB) |
|
Definition
| A protocol used by Windows to share files and printers on a network. |
|
|
Term
| Service Set Identifier (SSID) |
|
Definition
| The name of the access point for a wireless network. |
|
|
Term
| SIM (Subscriber Identification Module) card |
|
Definition
| A small flash memory card that contains all the information you need to connect to a cellular network, including a password and other authentication information needed to access the network, encryption standards used, and the services that your subscription includes. |
|
|
Term
| Simple Network Management Protocol (SNMP) |
|
Definition
| A TCP/IP protocol used to monitor network traffic |
|
|
Term
| SMTP (Simple Mail Transfer Protocol) |
|
Definition
| The protocol used by email clients and servers to send email messages over the Internet. Also see POP and IMAP. |
|
|
Term
| SMTP AUTH (SMTP Authenication) |
|
Definition
| A protocol that is used to authenticate or prove that a client who attempts to use an email server to send email is authorized to use the server. The protocol is based on the Simple Authentication and Security Layer (SASL) protocol. |
|
|
Term
|
Definition
| A permanent IP address that is manually assigned to a computer. |
|
|
Term
|
Definition
| When several local networks are tied together in a subsystem of the larger intranet. |
|
|
Term
|
Definition
| Using TCP/IP version 6, the last block in the 64-bit prefix of an IP address. |
|
|
Term
|
Definition
| Using TCP/IP version 4, a group of four numbers (dotted decimal numbers) that tell TCP/IP if a remote computer is on the same or different network. |
|
|
Term
| TCP (Transmission Control Protocol/Internet Protocol) |
|
Definition
| A protocol in the TCP/IP protocol suite. TCP guarantees delivery of data for application protocols and establishes a session before it begins transmitting data. |
|
|
Term
|
Definition
| A TCP/IP command-line client/server application that allows an administrator or other user to control a computer remotely. |
|
|
Term
|
Definition
| A tunneling protocol in which IPv6 packets travel over an IPv4 network. Named after the Teredo worm that bores holes in wood. |
|
|
Term
| TKIP (Temporal Key Integrity Protocol) |
|
Definition
| A type of encryption used by WPA to secure a wireless Wi-fi network. |
|
|
Term
| UDP (User Datagram Protocol) |
|
Definition
| A connectionless TCP/IP protocol that does not require a connection to send a packet and does not guarantee that the packet arrives at its destination. UDP is faster than TCP because TCP takes the time to make a connection and guarantee delivery. |
|
|
Term
|
Definition
| Using TCP/IP version 6, an IP address assigned to a single node on a network. |
|
|
Term
| unique local address (ULA) |
|
Definition
| Using TCP/IP version 6, an IP address used to identify a specific site within a larger intranet. Also called a unique local unicast address. |
|
|
Term
| unique local unicast address |
|
Definition
| See unique local address (ULA). |
|
|
Term
| virtual private network (VPN) |
|
Definition
| A security technique that uses encrypted data packets between a private network and a computer somewhere on the Internet. |
|
|
Term
| WEP (Wired Equivalent Privacy) |
|
Definition
| A data encryption method used on Wi-fi wireless networks that uses either 64-bit or 128-bit encryption keys that are static keys, meaning the key does not change while the wireless network is in use. |
|
|
Term
| Wi-fi (Wireless Fidelity) |
|
Definition
| A data encryption method used on Wi-fi wireless networks that uses either 64-bit or 128-bit encryption keys that are static keys, meaning the key does not change while the wireless network is in use. |
|
|
Term
| Wi-fi Protected Setup (WPS) |
|
Definition
| Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used. |
|
|
Term
|
Definition
| A wireless device that creates a wireless network. |
|
|
Term
| wireless wide area network (WWAN |
|
Definition
| A cellular network for mobile broadband devices |
|
|
Term
| WPA (Wi-fi Protected Access) |
|
Definition
| A data encryption method for wireless networks that use the TKIP (Temporal Key Integrity Protocol) encryption method and the encryption keys are changed at set intervals while the wireless LAN is in use. |
|
|
Term
| WPA2 (Wi-fi Protected Access2) |
|
Definition
| A data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard. |
|
|
Term
| HTTP (Hypertext Transfer Protocol) |
|
Definition
| The communications protocol used by the World Wide Web. |
|
|