Term
|
Definition
| A very powerful cable testing device used by professional installers to test the electrical characteristics of a cable and then generate a certification report, proving that cable runs pass ANSI/TIA standards. |
|
|
Term
|
Definition
| Location where the cable comes out of the wall at the workstation location. |
|
|
Term
|
Definition
| A bridge device that interconnects a cable company’s DOCSIS service to a user’s Ethernet network. In most locations, the cable modem is the demarc. |
|
|
Term
|
Definition
| Device that enables the creation of UTP cables. |
|
|
Term
|
Definition
| A generic name for a device that tests the functionality of cables. Some common tests are for continuity, electrical shorts, crossed wires, or other electrical characteristics. |
|
|
Term
|
Definition
| A device for organizing cable runs in a drop ceiling. |
|
|
Term
|
Definition
| A DNS response served from a cache of previous responses. |
|
|
Term
| cache-only DNS server (caching-only DNS server) |
|
Definition
| DNS server that does not have any forward lookup zones. Resolves names of systems on the Internet for the network, but is not responsible for telling other DNS servers the names of any clients. |
|
|
Term
|
Definition
| A server dedicated to storing cache information on a network. These servers can reduce overall network traffic dramatically. |
|
|
Term
|
Definition
| Network graphing program. |
|
|
Term
| campus area network (CAN) |
|
Definition
| A network installed in a medium-sized space spanning multiple buildings. |
|
|
Term
| canonical name (CNAME) record |
|
Definition
| A DNS record that stores a fully qualified domain name. A common use is to provide an alias for another hostname. |
|
|
Term
|
Definition
| A Wi-Fi network implementation used in some public facilities that directs attempts to connect to the network to an internal Web page for that facility; generally used to force terms of service on users. |
|
|
Term
|
Definition
| A file in which the collected packets from a packet sniffer program are stored. |
|
|
Term
|
Definition
| Generic term for devices designed to snap into an expansion slot. |
|
|
Term
| carrier-sense multiple access with collision avoidance (CSMA/CA) |
|
Definition
| Access method used only on wireless networks. Before hosts transmit, they first listen for traffic. If the transmitting host does not hear any traffic, it will transmit its frame. It will then listen for an acknowledgment frame from the receiving host. If the transmitting host does not hear the acknowledgment, it will wait for a randomly determined period of time and try again. |
|
|
Term
| carrier-sense multiple access with collision detection (CSMA/CD) |
|
Definition
| Obsolete access method that Ethernet systems used in wired LAN technologies, enabling frames of data to flow through the network and ultimately reach address locations. Hosts on CSMA/CD networks first listened to hear if there was any data on the wire. If there was none, the hosts sent out data. If a collision occurred, then both hosts waited for a randomly determined time period before retransmitting the data. Full-duplex Ethernet made CSMA/CD obsolete. |
|
|
Term
|
Definition
| Category 3 wire, a standard for UTP wiring that can operate at up to 16 Mbps. |
|
|
Term
|
Definition
| Category 5 wire, a standard for UTP wiring that can operate at up to 100 Mbps. |
|
|
Term
|
Definition
| Category 5e wire, a standard for UTP wiring with improved support for 100 Mbps using two pairs and support for 1000 Mbps using four pairs. |
|
|
Term
|
Definition
| Category 6 wire, a standard for UTP wiring with improved support for 1000 Mbps; supports 10 Gbps up to 55 meters. |
|
|
Term
|
Definition
| Category 6a wire, a standard for UTP wiring with support for 10 Gbps up to 100 meters. |
|
|
Term
|
Definition
| Category 7 wire, a standard (unrecognized by ANSI/TIA) for UTP wiring with support for 10+ Gbps at 600 MHz maximum frequency. |
|
|
Term
|
Definition
| A grade assigned to twisted pair cable to help network installers get the right cable for the right network technology. Cat ratings are officially rated in megahertz (MHz), indicating the highest-frequency bandwidth the cable can handle. |
|
|
Term
|
Definition
| A 128-bit block cipher used in the IEEE 802.11i (WPA2) standard. See Advanced Encryption Standard (AES). |
|
|
Term
|
Definition
| Building that houses local exchanges and a location where individual voice circuits come together. |
|
|
Term
|
Definition
| A digitally signed electronic document issued by a trusted third party—a certificate authority (CA)—attesting to the identity of the holder of a specific cryptographic public key. |
|
|
Term
|
Definition
| A device that tests a cable to ensure that it can handle its rated amount of capacity. |
|
|
Term
|
Definition
| A document used to track the collection, handling, and transfer of evidence. |
|
|
Term
| Challenge Handshake Authentication Protocol (CHAP) |
|
Definition
| A remote access authentication protocol. It has the serving system challenge the remote client, which must provide an encrypted password. |
|
|
Term
|
Definition
| The process of initiating, approving, funding, implementing, and documenting significant changes to the network. |
|
|
Term
| change management documentation |
|
Definition
| A set of documents that defines procedures for changes to the network. |
|
|
Term
|
Definition
| Personnel who collect change requests, evaluate the change, work with decision makers for approval, plan and implement approved changes, and document the changes. |
|
|
Term
|
Definition
| A formal or informal document suggesting a modification to some aspect of the network or computing environment. |
|
|
Term
|
Definition
| A portion of the wireless spectrum on which a particular wireless network operates. Setting wireless networks to different channels enables separation of the networks. |
|
|
Term
|
Definition
| Wireless technology that enables wireless access points (WAPs) to use two channels for transmission. |
|
|
Term
|
Definition
| Drawback of 2.4-GHz wireless networks where channels shared some bandwidth with other channels. This is why only three 2.4-GHz channels can be used in the United States (1, 6, and 11). |
|
|
Term
| Channel Service Unit/Data Service Unit (CSU/DSU) |
|
Definition
| A piece of equipment that connects a T-carrier leased line from the telephone company to a customer’s equipment (such as a router). It performs line encoding and conditioning functions, and it often has a loopback function for testing. |
|
|
Term
|
Definition
| A simple error-detection method that adds a numerical value to the end of each packet, enabling the receiver to detect corruption that can occur as a packet moves through the network. |
|
|
Term
| choose your own device (CYOD) |
|
Definition
| Mobile deployment model where corporate employees select among a catalog of approved mobile devices. The organization retains complete control and ownership over the mobile devices, although employees can install their own apps. |
|
|
Term
|
Definition
| Widely considered to be the foundation of IT security; stands for confidentiality, integrity, and availability. It is put into practice through various security methods and controls. Every security technique, practice, and mechanism put into place to protect systems and data relates in some fashion to ensuring confidentiality, integrity, and availability |
|
|
Term
|
Definition
| A series of complex and hard-to-reverse mathematics run on a string of ones and zeroes to make a new set of seemingly meaningless ones and zeroes. |
|
|
Term
|
Definition
| A door unlocking system that uses a door handle, a latch, and a sequence of mechanical push buttons. |
|
|
Term
|
Definition
| The output when plaintext is run through a cipher algorithm using a key. |
|
|
Term
|
Definition
| The process for connecting two phones together on one circuit. |
|
|
Term
|
Definition
| Cisco’s proprietary operating system for routers and switches. Originally stood for Internetworking Operating System. |
|
|
Term
|
Definition
| The part of a fiber-optic cable that makes the light reflect down the fiber. |
|
|
Term
|
Definition
| A prioritization value used to apply to services, ports, or whatever a quality of service (QoS) device might use. |
|
|
Term
|
Definition
| Contiguous chunk of IP addresses passed out by the Internet Assigned Numbers Authority (IANA). Classful addressing was phased out after the introduction of Classless Inter-Domain Routing and is no longer used. |
|
|
Term
|
Definition
| Obsolete IPv4 addressing scheme that relied on the original class blocks, such as Class A, Class B, and Class C. |
|
|
Term
|
Definition
| IPv4 addressing scheme that does not rely on the original class blocks, such as Class A, Class B, and Class C. |
|
|
Term
| Classless Inter-Domain Routing (CIDR) |
|
Definition
| The basis of allocating and routing classless addresses, not restricting subnet masks to /8, /16, or /24, which classful addressing did. Based on variable-length subnet masking (VLSM), where subnets can be allocated according to the needs of an organization, such as /26 for a network with 254 or fewer node, or /30 for a network with only two nodes. See also subnetting. |
|
|
Term
|
Definition
| A subnet that does not fall into the common categories such as Class A, Class B, and Class C. |
|
|
Term
|
Definition
| Readable data transmitted or stored in unencrypted form. |
|
|
Term
|
Definition
| Any login process conducted over a network where account names, passwords, or other authentication elements are sent from the client or server in an unencrypted fashion. |
|
|
Term
|
Definition
| A computer program that uses the services of another computer program; software that extracts information from a server. A Netflix or Hulu application running on a Smart TV is a client for the provider’s streaming services. Also, a machine that accesses shared resources on a server. |
|
|
Term
|
Definition
| A relationship in which a client obtains services from a server on behalf of a user. In classic terms, a network architecture (topology) where one computer shares resources (the server) and other computers on the network access those resources (clients). |
|
|
Term
| client/server application |
|
Definition
| An application located on a client that makes use of services provided by a server. This server can be external or located on the client system. |
|
|
Term
|
Definition
| A network that has dedicated server machines and client machines. |
|
|
Term
|
Definition
| A type of VPN connection where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network. |
|
|
Term
|
Definition
| Tiers of NTP time sources layered according to relative accuracy. A number indicates the accuracy of each tier (called a stratum), counting up from the most-accurate Stratum 0. |
|
|
Term
| closed-circuit television (CCTV) |
|
Definition
| self-contained, closed system in which video cameras feed their signal to specific, dedicated monitors and storage devices. |
|
|
Term
|
Definition
| The cloud is like a cafeteria of computing and networking resources that are managed by someone else and enhanced by layers of powerful services and software. Cloud computing is the act of using these resources and services. |
|
|
Term
| cloud/server-based anti-malware |
|
Definition
| Anti-malware software that offloads a significant amount of processing from individual hosts to local or cloud-based servers. |
|
|
Term
|
Definition
| Multiple pieces of interconnected equipment, such as servers, that appear to the network as a single (logical) device. Clustering provides redundancy and fault tolerance. |
|
|
Term
| coarse wavelength division multiplexing (CWDM) |
|
Definition
| An optical multiplexing technology in which a few signals of different optical wavelength could be combined to travel a fairly short distance. |
|
|
Term
|
Definition
| A type of cable that contains a central conductor wire surrounded by an insulating material, which in turn is surrounded by a braided metal shield. It is called coaxial because the center wire and the braided metal shield share a common axis or centerline. |
|
|
Term
| code-division multiple access (CDMA) |
|
Definition
| Early cellular telephone technology that used spread-spectrum transmission. Obsolete. |
|
|
Term
|
Definition
| A location that consists of a building, facilities, desks, and everything that a business needs except computers. |
|
|
Term
|
Definition
| The result of two nodes transmitting at the same time on a multiple access network such as a wireless network. Both frames may be lost or partial frames may result. |
|
|
Term
|
Definition
| A set of connected hosts that all share one medium to transmit and receive. The shared medium can result in a collision if two hosts transmit at the same time. Characteristic of early, half-duplex, non-switched Ethernet. |
|
|
Term
|
Definition
| A process in which an organization places its own server hardware in a public, third-party data center. Also written without the hyphen as colocation. |
|
|
Term
|
Definition
| A request, typed from a terminal or embedded in a file, to perform an operation or to execute a particular program. |
|
|
Term
|
Definition
| A private cloud paid for and used by more than one organization with similar goals or needs (such as medical providers who all need to comply with the same patient privacy laws). |
|
|
Term
|
Definition
| When different pieces of hardware or software don’t work together correctly. |
|
|
Term
| compatibility requirements |
|
Definition
| With respect to network installations and upgrades, requirements that deal with how well the new technology integrates with older or existing technologies. |
|
|
Term
|
Definition
| The science of gathering, preserving, examining, and presenting evidence stored on a computer or any form of digital media that is presentable in a court of law. |
|
|
Term
|
Definition
| A device that brings together at a common center connections to a particular kind of network (such as Ethernet) and implements that network internally. |
|
|
Term
|
Definition
| A set of documents, policies, and procedures designed to help an organization maintain and update its network in a logical, orderly fashion. |
|
|
Term
| configuration management documentation |
|
Definition
| Documents that define the configuration of a network. These would include wiring diagrams, network diagrams, baselines, and policy/procedure/configuration documentation. |
|
|
Term
|
Definition
| The settings stored in devices that define how they are to operate. |
|
|
Term
|
Definition
| Generically, a link that enables two computers to communicate. |
|
|
Term
|
Definition
| A type of communication characterized by sending packets that are not acknowledged by the destination host. Connectionless protocols are generally faster than connection-oriented protocols. UDP is the quintessential connectionless protocol in the TCP/IP suite. |
|
|
Term
|
Definition
| Network communication between two hosts that includes negotiation between the hosts to establish a communication session. Data segments are then transferred between hosts, with each segment being acknowledged before a subsequent segment can be sent. Orderly closure of the communication is conducted at the end of the data transfer or in the event of a communication failure. TCP is the only connection-oriented protocol in the TCP/IP suite. |
|
|
Term
|
Definition
| Connection jack in a switch or router used exclusively to connect a computer that will manage the device. |
|
|
Term
|
Definition
| An advanced networking device that implements content filtering, enabling administrators to filter traffic based on specific signatures or keywords (such as profane language). |
|
|
Term
|
Definition
| Advanced networking device that works at least at Layer 7 (Application layer) and hides servers behind a single IP address. |
|
|
Term
|
Definition
| The process of creating documents—a contingency plan—that set out how to limit damage and recover quickly from an incident. |
|
|
Term
|
Definition
| The physical connection of wires in a network. |
|
|
Term
|
Definition
| Inexpensive network tester that can only test for continuity on a line. |
|
|
Term
|
Definition
| Point at which the routing tables for all routers in a network are updated. |
|
|
Term
|
Definition
| The central glass of the fiber-optic cable that carries the light signal. |
|
|
Term
|
Definition
| One tier of a three-tiered architecture commonly used in data centers. The core layer ties together all the switches at the distribution layer and interconnects with external networks such as the Internet. |
|
|
Term
| corporate-owned business only (COBO) |
|
Definition
| Deployment model where the corporation owns all the mobile devices issued to employees. Employees have a whitelist of preapproved applications they can install. |
|
|
Term
| corporate-owned personally enabled (COPE) |
|
Definition
| Deployment model that is very similar to COBO, in that the organization issues mobile devices. With COPE, however, employees are presented with a whitelist of preapproved applications that they may install. |
|
|
Term
|
Definition
| A metric for the desirability of a particular route. Can incorporate factors that affect performance such as bandwidth. |
|
|
Term
|
Definition
| A predefined event that is monitored and recorded to a log file. Logs store information about the performance of some particular aspect of a system. Different programs refer to the monitored aspect with different terms. Performance Monitor calls them counters; syslog calls them facilities. |
|
|
Term
| CRC (cyclic redundancy check) |
|
Definition
| A mathematical method used to check for errors in long streams of transmitted data with high accuracy. The CRC is found in the Frame Check Sequence (FCS). |
|
|
Term
|
Definition
| Also called a crimping tool, the tool used to secure a crimp (or an RJ-45 connector) onto the end of a cable. |
|
|
Term
|
Definition
| specially terminated UTP cable used to interconnect routers or switches, or to connect network cards without a switch. Crossover cables reverse the sending and receiving wire pairs from one end to the other. |
|
|
Term
|
Definition
| Electrical signal interference between two cables that are in close proximity to each other. |
|
|
Term
|
Definition
| Malicious software that uses some form of encryption to lock a user out of a system. |
|
|
Term
| CSMA/CA (carrier-sense multiple access with collision avoidance) |
|
Definition
| Access method used only on wireless networks. Before hosts transmit, they first listen for traffic. If the transmitting host does not hear any traffic, it will transmit its frame. It will then listen for an acknowledgment frame from the receiving host. If the transmitting host does not hear the acknowledgment, it will wait for a randomly determined period of time and try again. |
|
|
Term
| CSMA/CD (carrier-sense multiple access with collision detection) |
|
Definition
| Obsolete access method that Ethernet systems used in wired LAN technologies, enabling frames of data to flow through the network and ultimately reach address locations. Hosts on CSMA/CD networks first listened to hear if there was any data on the wire. If there was none, the hosts sent out data. If a collision occurred, then both hosts waited for a randomly determined time period before retransmitting the data. Full-duplex Ethernet made CSMA/CD obsolete. |
|
|
Term
| CSU/DSU (Channel Service Unit/Data Service Unit) |
|
Definition
| A piece of equipment that connects a T-carrier leased line from the telephone company to a customer’s equipment (such as a router). It performs line encoding and conditioning functions, and it often has a loopback function for testing. |
|
|
Term
| customer-premises equipment (CPE) |
|
Definition
| The primary distribution box and customer-owned/managed equipment that exists on the customer side of the demarc. |
|
|
Term
| cyclic redundancy check (CRC) |
|
Definition
| A mathematical method used to check for errors in long streams of transmitted data with high accuracy. The CRC is found in the Frame Check Sequence (FCS). |
|
|
Term
|
Definition
| The process of creating extra copies of data to be used in case the primary data source fails. |
|
|
Term
|
Definition
| A dedicated space—a building or part of a building—housing a networked group of servers that provides data storage, Web hosting, application hosting, cloud services, and more. |
|
|
Term
|
Definition
| identifies devices on the Physical layer. MAC addresses are part of the Data Link layer. Switches operate at the Data Link layer. |
|
|
Term
| Data Over Cable Service Interface Specification (DOCSIS) |
|
Definition
| The standard protocol used by cable modem networks to facilitate data transfer. |
|
|
Term
|
Definition
| A connectionless transfer unit created with User Datagram Protocol designed for quick transfers over a packet-switched network. |
|
|
Term
|
Definition
| A virtual private network solution that optimizes connections for delay-sensitive applications, such as voice and video. A DTLS VPN uses TLS to provide encryption for enhanced security. |
|
|
Term
|
Definition
| A place that should be covered by the network signal but where devices get no signal. |
|
|
Term
| deauthentication (deauth) attack |
|
Definition
| A form of DoS attack that targets 802.11 Wi-Fi networks specifically by sending out a frame that kicks a wireless client off its current WAP connection. A rogue WAP nearby presents a stronger signal, which the client will prefer. The rogue WAP connects the client to the Internet and then proceeds to intercept communications to and from that client. |
|
|
Term
|
Definition
| The process of stripping all the extra header information from a packet as the data moves up a protocol stack. |
|
|
Term
|
Definition
| A measurement of the quality of a signal. |
|
|
Term
|
Definition
| A circuit that runs from a breaker box to specific outlets. |
|
|
Term
|
Definition
| A telephone line that is an always open, or connected, circuit. Dedicated telephone lines usually do not have telephone numbers. |
|
|
Term
|
Definition
| A machine that does not use any client functions, only server functions. |
|
|
Term
|
Definition
| A software function or operation that occurs automatically unless the user specifies something else. |
|
|
Term
|
Definition
| In a TCP/IP network, a router that accepts traffic for all routes unknown to a client or another router. In SOHO networks, this is usually the only router in the network and provides the interface to the ISP’s network. |
|
|
Term
|
Definition
| Using multiple layers of security to protect against threats to the network. |
|
|
Term
|
Definition
| A device that marks the dividing line of responsibility for the functioning of a network between internal users and upstream service providers. Also, demarcation point. |
|
|
Term
|
Definition
| Any cabling that runs from the network interface to whatever box is used by the customer as a demarc. |
|
|
Term
|
Definition
| A lightly protected or unprotected subnet positioned between an outer firewall and an organization’s highly protected internal network. Screened subnets are used mainly to host public servers (such as Web servers). |
|
|
Term
|
Definition
| Device that can extract and distribute individual streams of data that have been combined to travel along a single shared network cable. |
|
|
Term
|
Definition
| An attack that floods a networked resource with so many requests that it becomes overwhelmed and ceases functioning. DoS prevents users from gaining normal use of a resource. |
|
|
Term
| dense wavelength division multiplexing (DWDM) |
|
Definition
| An optical multiplexing technology in which a large number of optical signals of different optical wavelength could be combined to travel over relatively long fiber cables. |
|
|
Term
|
Definition
| The main router in an OSPF network that relays information to all other routers in the area. |
|
|
Term
| desktop as a service (DaaS) |
|
Definition
| A cloud computing service that enables a user or organization to virtualize user workstations and manage them as flexibly as other cloud resources. |
|
|
Term
| destination (header field) |
|
Definition
| A field common to many packet-switched network protocols. Contains the address of the intended recipient (in the address format—such as a MAC or IP address—appropriate for the protocol). |
|
|
Term
|
Definition
| A fixed, predetermined number that identifies which process the data in a TCP segment or UDP datagram is intended for. The destination port number is contained in the destination field of segments and datagrams. |
|
|
Term
|
Definition
| A subprogram to control communications between the computer and some peripheral hardware. |
|
|
Term
|
Definition
| The last six digits of a MAC address, identifying the manufacturer’s unique serial number for that NIC. |
|
|
Term
| DHCP four-way handshake (DORA) |
|
Definition
| DHCP process in which a client gets a lease for an IPv4 address—Discover, Offer, Request, and Acknowledgment. |
|
|
Term
|
Definition
| Created by the DHCP server to allow a system requesting DHCP IP information to use that information for a certain amount of time. |
|
|
Term
|
Definition
| A router feature that, when enabled, accepts DHCP broadcasts from clients and then sends them via unicast addresses directly to the DHCP server. In common terms, DHCP communications can cross from one network to another through a router that has DHCP relay configured. Also known as a DHCP relay agent. |
|
|
Term
|
Definition
| The pool of IP addresses that a DHCP server may allocate to clients requesting IP addresses or other IP information like DNS server addresses. |
|
|
Term
|
Definition
| Switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources. Typically used to block attacks that use a rogue DHCP server. |
|
|
Term
|
Definition
| IPv6 version of DHCP. A stateful DHCPv6 server works similarly to an IPv4 DHCP server, while a stateless DHCPv6 server provides configuration information and lets the host pick its own address via stateless address autoconfiguration (SLAAC). |
|
|
Term
|
Definition
| Similar to an incremental backup in that it backs up the files that have been changed since the last backup. This type of backup does not change the state of the archive bit. |
|
|
Term
| differentiated services (DiffServ) |
|
Definition
| The underlying architecture that makes quality of service (QoS) work. |
|
|
Term
| dig (domain information groper) |
|
Definition
| Command-line tool in non-Windows systems used to diagnose DNS problems. |
|
|
Term
|
Definition
| A hash of a message which has been encrypted and attached to the message. The hash is encrypted with the signer’s private key. The recipient can decrypt the hash with the signer’s public key and use the hash to confirm the message was not altered. This both verifies a sender’s identity and the integrity of the message. |
|
|
Term
| digital subscriber line (DSL) |
|
Definition
| A high-speed Internet connection technology that uses a regular telephone line for connectivity. DSL comes in several varieties, including asymmetric (ADSL) and symmetric (SDSL), and many speeds. Typical home-user DSL connections are ADSL with a download speed of up to 9 Mbps and an upload speed of up to 1 Kbps. |
|
|
Term
|
Definition
| The standard straight-wire antenna that provides most omnidirectional function. |
|
|
Term
|
Definition
| A type of electric circuit where the flow of electrons is in a complete circle. |
|
|
Term
|
Definition
| An antenna that focuses its signal more toward a specific direction; as compared to an omnidirectional antenna that radiates its signal in all directions equally. |
|
|
Term
| direct-sequence spread-spectrum (DSSS) |
|
Definition
| A spread-spectrum broadcasting method defined in the 802.11 standard that sends data out on different frequencies at the same time. |
|
|
Term
|
Definition
| The means and methods to recover primary infrastructure from a disaster. Disaster recovery starts with a plan and includes data backups. |
|
|
Term
| discretionary access control (DAC) |
|
Definition
| Authorization method based on the idea that there is an owner of a resource who may at his or her discretion assign access to that resource. DAC is considered much more flexible than mandatory access control (MAC). |
|
|
Term
|
Definition
| Process by which data is written simultaneously to two or more disk drives. Read and write speed is decreased but redundancy, in case of catastrophe, is increased. Also known as RAID level 1. |
|
|
Term
|
Definition
| Process by which data is spread among multiple (at least two) drives. It increases speed for both reads and writes of data, but provides no fault tolerance. Also known as RAID level 0. |
|
|
Term
| disk striping with parity |
|
Definition
| Process by which data is spread among multiple (at least three) drives, with parity information as well to provide fault tolerance. The most commonly implemented type is RAID 5, where the data and parity information is spread across three or more drives. |
|
|
Term
|
Definition
| Diffusion over distance of light propagating down fiber cable. |
|
|
Term
|
Definition
| Set of routing protocols that calculates the total cost to get to a particular network ID and compares that cost to the total cost of all the other routes to get to that same network ID. |
|
|
Term
| distributed control system (DCS) |
|
Definition
| A small controller added directly to a machine used to distribute the computing load. |
|
|
Term
| Distributed Coordination Function (DCF) |
|
Definition
| One of two methods of collision avoidance defined by the 802.11 standard and the only one currently implemented. DCF specifies strict rules for sending data onto the network media. See also Point Coordination Function (PCF). |
|
|
Term
| distributed denial of service (DDoS) |
|
Definition
| Multicomputer assault on a network resource that attempts, with sheer overwhelming quantity of requests, to prevent regular users from receiving services from the resource. Can also be used to crash systems. DDoS attacks are usually executed using botnets consisting of compromised systems referred to as zombies. |
|
|
Term
|
Definition
| The centralized installation, configuration, and handling of every switch in a virtualized network. |
|
|
Term
|
Definition
| One tier of a three-tiered architecture commonly used in data centers. The distribution layer interconnects racks of servers and other rack-mounted gear through top-of-rack switching. Modern data center design leverages advances in virtualization and software-defined networking (SDN) to replace the distribution layer common in the three-tiered network design with a virtualized mesh network. |
|
|
Term
| DNS cache poisoning (DNS poisoning) |
|
Definition
| an attack that adds or changes information in a DNS server’s cache to point hostnames to incorrect IP addresses, under the attacker’s control. When a client requests an IP address from this DNS server for a Web site, the poisoned server hands out an IP address of an attacker machine, not the legitimate site. When the client subsequently visits the attacker site, they become vulnerable to a number of threats including malware. |
|
|
Term
|
Definition
| A feature of DNS servers that temporarily stores information about previous DNS lookups to speed up future requests. |
|
|
Term
|
Definition
| A specific branch of the DNS name space. Top-level DNS domains include .com, .gov, and .edu. |
|
|
Term
|
Definition
| DNS server configuration that sends (forwards) DNS requests to another DNS server. |
|
|
Term
|
Definition
| A piece of data, such as an IP address, attached to a name in the DNS tree. Each record type helps different aspects of DNS do their job. For example: A records store the IP address of a domain, NS records store the name server for a given DNS entry, and MX records direct e-mail to specific e-mail servers. |
|
|
Term
|
Definition
| A cache used by Windows DNS clients to keep track of DNS information. |
|
|
Term
|
Definition
| Servers at the top of the hierarchy of DNS servers running the Internet. There are only 13 root servers. |
|
|
Term
|
Definition
| Software that responds to DNS queries, often running on a system dedicated to this purpose. |
|
|
Term
|
Definition
| A hierarchy of DNS domains and individual computer names organized into a tree-like structure, the top of which is the root. |
|
|
Term
|
Definition
| A medium and the data recorded on it for human use; for example, a report sheet or book. By extension, any record that has permanence and that can be read by a human or a machine. |
|
|
Term
|
Definition
| A collection of organized documents or the information recorded in documents. Also, instructional material specifying the inputs, operations, and outputs of a computer program or system. |
|
|
Term
|
Definition
| A term used to describe a grouping of users, computers, and/or networks. In Microsoft networking, a domain is a group of computers and users that shares a common account database and a common security policy. For the Internet, a domain is a group of computers that shares a common element in their DNS hierarchical name. |
|
|
Term
|
Definition
| A Microsoft Windows Server system specifically configured to store user and server account information for its domain. Often abbreviated as “DC.” Windows domain controllers store all account and security information in the Active Directory domain service. |
|
|
Term
| domain information groper (dig) |
|
Definition
| Command-line tool in non-Windows systems used to diagnose DNS problems. |
|
|
Term
|
Definition
| A TCP/IP name resolution system that resolves hostnames to IP addresses, IP addresses to hostnames, and other bindings, like DNS servers and mail servers for a domain. |
|
|
Term
|
Definition
| Users and groups that are defined across an entire network domain. |
|
|
Term
|
Definition
| Methodology to grant permission or to deny passage through a doorway, whether computer-controlled, human-controlled, token-oriented, or by other means. |
|
|
Term
|
Definition
| Shorthand method for discussing and configuring binary IP addresses using a base 10 numbering system. |
|
|
Term
|
Definition
| The process of writing identical data to two hard drives on the same controller at the same time to provide data redundancy. |
|
|
Term
| DSL Access Multiplexer (DSLAM) |
|
Definition
| A device located in a telephone company’s central office that connects multiple customers to the Internet. |
|
|
Term
|
Definition
| A device that enables customers to connect to the Internet using a DSL connection. A DSL modem isn’t really a modem—it’s more like an ISDN terminal adapter—but the term stuck, and even the manufacturers of the devices now call them DSL modems. |
|
|
Term
|
Definition
| Networking device, such as a router or PC, that runs both IPv4 and IPv6. |
|
|
Term
|
Definition
| A way for a computer to receive IP information automatically from a server program. See also Dynamic Host Configuration Protocol (DHCP). |
|
|
Term
| Dynamic ARP Inspection (DAI) |
|
Definition
| Uses information collected by DHCP snooping to spot and ignore suspicious ARPs to prevent ARP cache poisoning and other malevolent efforts. |
|
|
Term
|
Definition
| A protocol that enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server. |
|
|
Term
| Dynamic Host Configuration Protocol (DHCP) |
|
Definition
| A protocol that enables a DHCP server to set TCP/IP settings automatically for a DHCP client. |
|
|
Term
| dynamic multipoint VPN (DMVPN) |
|
Definition
| A virtual private network solution optimized for connections between multiple locations directly. |
|
|
Term
|
Definition
| Type of network address translation (NAT) in which many computers can share a pool of routable IP addresses that number fewer than the computers. |
|
|
Term
|
Definition
| Port numbers 49152–65535, recommended by IANA to be used as ephemeral port numbers. |
|
|
Term
|
Definition
| Process by which routers in an internetwork automatically exchange information with other routers. Requires a dynamic routing protocol, such as OSPF or EIGRP. |
|
|