| Term 
 
        | ICS (industrial control system) |  | Definition 
 
        | System that monitors and controls machines such as those in a factory or chemical plant—or even just a large HVAC system in an office building. |  | 
        |  | 
        
        | Term 
 
        | ICS (Internet Connection Sharing) |  | Definition 
 
        | Technique enabling more than one computer to access the Internet simultaneously using a single Internet connection. When you use Internet connection sharing, you connect an entire LAN to the Internet using a single public IP address. Also known simply as Internet sharing |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Unit in a distributed control system (DCS) that can be used to manage global changes to the controllers. |  | 
        |  | 
        
        | Term 
 
        | IEEE (Institute of Electrical and Electronics Engineers) |  | Definition 
 
        | A worldwide professional association for electrical and electronics engineering and related disciplines. Regularly develops networking standards such as the IEEE 802 family of LAN standards. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | IEEE working group that defines the standards for wired Ethernet networks. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A family of standards for wireless local area networks marketed as Wi-Fi. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The IEEE standard for a now-obsolete parallel communication technology. |  | 
        |  | 
        
        | Term 
 
        | IETF (Internet Engineering Task Force) |  | Definition 
 
        | A standards organization that develops Internet standards, including those for TCP/IP. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A command-line utility for Linux servers and workstations that displays the current TCP/IP configuration of the machine, similar to ipconfig for Windows systems. The newer command-line utility, ip, has replaced ifconfig on most Linux systems, but it is still the default for MacOS. |  | 
        |  | 
        
        | Term 
 
        | IMAP (Internet Message Access Protocol) |  | Definition 
 
        | rotocol for retrieving e-mail from an SMTP server. An alternative to POP3. Currently in its fourth revision, IMAP4 retrieves e-mail from an e-mail server like POP3, but has several features that make it a superior e-mail tool. IMAP4 enables users to create folders on the e-mail server and multiple clients to access a single mailbox. IMAP uses TCP port 143. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The amount of resistance to an electrical signal on a wire. It is used as a relative measure of the amount of data a cable can handle. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A rule for access control lists that blocks all access by default (implicitly), unless the access is specifically permitted based on details like IP addresses, e-mail addresses, or type of application. The list of permitted entries is often referred to as a whitelist. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Technology that enables managed devices such as a switch or router to be managed by any authorized host that is connected to that network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Describes the direction of a flow of packets relative to some point of reference. Relative to the entire network, packets coming in from outside the network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Any negative situation that takes place within an organization. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Reaction to any negative situations that take place within an organization that can be stopped, contained, and remediated without outside resources. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Backs up all files that have their archive bits turned on, meaning they have been changed since the last backup. This type of backup turns the archive bits off after the files have been backed up. |  | 
        |  | 
        
        | Term 
 
        | Independent Basic Service Set (IBSS) |  | Definition 
 
        | A basic unit of organization in wireless networks formed by two or more wireless nodes communicating in ad hoc mode. |  | 
        |  | 
        
        | Term 
 
        | Independent Computing Architecture (ICA) |  | Definition 
 
        | Remote access protocol developed by Citrix. Once formed the basis of Windows Terminal Services, though Microsoft now uses its own Remote Desktop Protocol (RDP) for the same purpose. |  | 
        |  | 
        
        | Term 
 
        | industrial control system (ICS) |  | Definition 
 
        | System that monitors and controls machines such as those in a factory or chemical plant—or even just a large HVAC system in an office building. |  | 
        |  | 
        
        | Term 
 
        | infrastructure as a service (IaaS) |  | Definition 
 
        | Cloud service model that provides on-demand access to infrastructure such as servers, switches, and routers at rates based on resource use. Large-scale, global IaaS providers use virtualization to minimize idle hardware, protect against data loss and downtime, and respond to spikes in demand. |  | 
        |  | 
        
        | Term 
 
        | infrastructure as code (IaC) |  | Definition 
 
        | An automation philosophy that defines the infrastructure (servers and network components) an application or service requires in configuration files or scripts well enough that it is easy to create identical copies of the needed infrastructure. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Mode in which wireless networks use one or more wireless access points to connect the wireless network nodes centrally. This configuration is similar to the star topology of a wired network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A method of assigning user permissions, in which folder permissions flow downward into subfolders. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Potential for attacks on a system by people who work in the organization. |  | 
        |  | 
        
        | Term 
 
        | Institute of Electrical and Electronics Engineers (IEEE) |  | Definition 
 
        | A worldwide professional association for electrical and electronics engineering and related disciplines. Regularly develops networking standards such as the IEEE 802 family of LAN standards. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The external plastic covering of a fiber-optic cable. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Protecting data from being changed or deleted without authorization. In networks, integrity is mainly verified with checks that ensure data sent to a recipient is unchanged when it is received at the destination host. |  | 
        |  | 
        
        | Term 
 
        | interface identifier (interface ID) |  | Definition 
 
        | The second half (64 bits) of an IPv6 address. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A program that tracks the bandwidth and utilization of one or more interfaces on one or more devices in order to monitor traffic on a network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A short, predefined silence originally defined for CSMA/CD; also used in CSMA/CA. |  | 
        |  | 
        
        | Term 
 
        | intermediate distribution frame (IDF) |  | Definition 
 
        | The room where all the horizontal runs from all the work areas on a given floor in a building come together. |  | 
        |  | 
        
        | Term 
 
        | Intermediate System to Intermediate System (IS-IS) |  | Definition 
 
        | A link-state dynamic routing protocol similar to, but not as popular as, OSPF. IS-IS has had support for IPv6 since its inception and is the de facto standard for Internet service providers (ISPs). |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The connections between computers in a network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The firewall that sits between the perimeter network and the trusted network that houses all the organization’s private servers and workstations. The internal firewall provides strong access control lists to protect internal servers and workstations. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A network under the control of an organization. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | All the things that a network’s own users do to create problems on the network. Examples include accidental deletion of files, accidental damage to hardware devices or cabling, malicious users, and abuse of rights and permissions. |  | 
        |  | 
        
        | Term 
 
        | Internet Assigned Numbers Authority (IANA) |  | Definition 
 
        | The organization originally responsible for assigning public IP addresses. IANA no longer directly assigns IP addresses, though it does still oversee Autonomous System Number (ASN) assignment. IANA assigns blocks of IP addresses to the five Regional Internet Registries (RIRs) and delegates the work of assigning individual addresses to the RIRs. |  | 
        |  | 
        
        | Term 
 
        | Internet Authentication Service (IAS) |  | Definition 
 
        | Popular RADIUS server for Microsoft environments. |  | 
        |  | 
        
        | Term 
 
        | Internet Connection Sharing (ICS) |  | Definition 
 
        | Technique enabling more than one computer to access the Internet simultaneously using a single Internet connection. When you use Internet connection sharing, you connect an entire LAN to the Internet using a single public IP address. Also known simply as Internet sharing. |  | 
        |  | 
        
        | Term 
 
        | Internet Control Message Protocol (ICMP) |  | Definition 
 
        | A TCP/IP protocol used to handle many low-level functions such as error or informational reporting. ICMP messages are usually request and response pairs such as echo requests and responses or router solicitations and responses. There are also unsolicited “responses” (advertisements) that consist of single packets. ICMP messages are connectionless. |  | 
        |  | 
        
        | Term 
 
        | Internet Corporation for Assigned Names and Numbers (ICANN) |  | Definition 
 
        | Standards organization that sits at the very top of the Internet hierarchy, with the authority to create new top-level domains (TLDs) for use on the Internet. |  | 
        |  | 
        
        | Term 
 
        | Internet Engineering Task Force (IETF) |  | Definition 
 
        | A standards organization that develops Internet standards, including those for TCP/IP. |  | 
        |  | 
        
        | Term 
 
        | Internet Group Management Protocol (IGMP) |  | Definition 
 
        | Protocol that routers use to communicate with hosts to determine a “group” membership in order to determine which computers want to receive a multicast. Once a multicast has started, IGMP is responsible for maintaining the multicast as well as terminating at completion. |  | 
        |  | 
        
        | Term 
 
        | Internet Information Services (IIS) |  | Definition 
 
        | A Web server developed by Microsoft. |  | 
        |  | 
        
        | Term 
 
        | Internet Message Access Protocol Version 4 (IMAP4) |  | Definition 
 
        | Protocol for retrieving e-mail from an SMTP server. An alternative to POP3. Currently in its fourth revision, IMAP4 retrieves e-mail from an e-mail server like POP3, but has several features that make it a superior e-mail tool. IMAP4 enables users to create folders on the e-mail server and multiple clients to access a single mailbox. IMAP uses TCP port 143. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The billions of everyday objects that can communicate with each other, specifically over the Internet. These include smart home appliances, automobiles, video surveillance systems, and more. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Layer 3 protocol responsible for logical addressing and routing packets across networks, including the Internet. It does not guarantee reliable delivery of packets across the network, leaving that task to higher-level protocols. IP has two versions, IPv4, and IPv6. |  | 
        |  | 
        
        | Term 
 
        | Internet Protocol Security (IPsec) |  | Definition 
 
        | It is an Internet Engineering Task Force (IETF) standard suite of protocols between 2 communication points across the IP network that provide data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and authenticated packets. 
 Network layer encryption protocol.
 |  | 
        |  | 
        
        | Term 
 
        | Internet Protocol version 4 (IPv4) |  | Definition 
 
        | First version of the Internet Protocol introduced in 1980. IPv4 consists of a protocol, header, and address specification. Its 32-bit addresses are written as four sets of numbers between 0 and 255 separated by a period (often called dotted decimal format). No IPv4 address may be all 0s or all 255s. Examples of IPv4 addresses include 192.168.0.1 and 64.176.19.164. |  | 
        |  | 
        
        | Term 
 
        | Internet Protocol version 6 (IPv6) |  | Definition 
 
        | Second version of the Internet Protocol developed as the address-space limitations of IPv4 became clear. While standardization started in the 1990s, the transition from IPv4 to IPv6 is still ongoing. Its 128-bit addresses consist of eight sets of four hexadecimal numbers, each number being a value between 0000 and ffff, using a colon to separate the numbers. No IP address may be all 0s or all ffffs. An example is: fe80:ba98:7654:3210:0800:200c:00cf:1234. |  | 
        |  | 
        
        | Term 
 
        | Internet Small Computer System Interface (iSCSI) |  | Definition 
 
        | A protocol that enables the SCSI command set to be transported over a TCP/IP network from a client to an iSCSI-based storage system. iSCSI is popular with storage area network (SAN) systems. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A feature on managed switches to provide routing between VLANs. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A private TCP/IP network inside a company or organization. |  | 
        |  | 
        
        | Term 
 
        | intrusion detection system (IDS)/intrusion prevention system (IPS) |  | Definition 
 
        | An application (often running on a dedicated IDS box) that inspects incoming packets, looking for active intrusions. The difference between an IDS and an IPS is that an IPS can react to an attack by blocking traffic, while an IDS can only notify a person or device of the attack. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Linux terminal command that displays the current TCP/IP configuration of the machine; similar to Windows’ ipconfig and macOS’s ifconfig. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Layer 3 protocol responsible for logical addressing and routing packets across networks, including the Internet. It does not guarantee reliable delivery of packets across the network, leaving that task to higher-level protocols. IP has two versions, IPv4, and IPv6. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The numeric address of a computer connected to a TCP/IP network, such as the Internet. IPv4 addresses are 32 bits long, written as four octets of 8-bit binary. IPv6 addresses are 128 bits long, written as eight sets of four hexadecimal characters. IP addresses must be matched with a valid subnet mask, which identifies the part of the IP address that is the network ID and the part that is the host ID. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The processes of assigning IP addresses to networks and hosts. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Still-frame or video camera with a network interface and TCP/IP transport protocols to send output to a network resource or destination. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Range of IP addresses deliberately excluded from the pool of addresses a DHCP server may issue to clients. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A method of blocking packets based on IP addresses. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Refers variously to an IP helper address (also known as the UDP helper address) or a command for configuring IP helper addresses. An IP helper address specifies an IP address on another subnet to which a router will forward all UDP broadcasts. Most often used to enable one DHCP server to serve many subnets, but also makes it possible to pass along broadcasts for protocols such as TFTP, Time Service, TACACS, DNS, NetBIOS, and others. See also DHCP relay. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A command-line utility for Windows that displays the current TCP/IP configuration of the machine; similar to macOS’s ifconfig and UNIX/Linux’s ip. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A virtual private networking technology that uses IPsec tunneling for security |  | 
        |  | 
        
        | Term 
 
        | ISP (Internet service provider) |  | Definition 
 
        | An organization that provides access to the Internet in some form, usually for a fee. |  | 
        |  | 
        
        | Term 
 
        | IT (information technology) |  | Definition 
 
        | The business of computers, electronic communications, and electronic commerce. IT uses computers to create, exchange, and process various types of data. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A network-oriented programming language invented by Sun Microsystems (acquired by Oracle) and commonly used for writing programs that can be downloaded to your computer through the Internet and immediately run. Using small Java programs (called applets), Web pages can include functions such as animations, calculators, and other fancy tricks. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A delay in completing a transmission of all the frames in a message; caused by excessive machines on a network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Frames (usually 9000 bytes long—though technically anything over 1500 bytes qualifies) that make large data transfer easier and more efficient than using the standard frame size. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Most commonly used as the suffix for the binary quantity 1024. For instance, 640K means 640 × 1024 or 655,360. Just to add some extra confusion to the IT industry, K is often misspoken as “kilo,” the metric value for 1000. For example, 10 KB, spoken as “10 kilobytes,” means 10,240 bytes rather than 10,000 bytes. Finally, when discussing frequencies, K means 1000. So, 1 KHz = 1000 kilohertz |  | 
        |  | 
        
        | Term 
 
        | kbps (kilobits per second) |  | Definition 
 
        | Data transfer rate. 1 kilobit per second is equal to 1000 bits or 125 bytes per second. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An open authentication standard best known for serving as the authentication protocol in Windows Domains. |  | 
        |  | 
        
        | Term 
 
        | Key Distribution Center (KDC) |  | Definition 
 
        | ystem for granting authentication in Kerberos. The KDC stores secret keys for users and services. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Small device that can be easily carried in a pocket or purse or attached to a key ring. This device is used to identify the person possessing it for the purpose of granting or denying access to resources such as electronic doors. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Name for the two keys—one public and one private—that are generated in asymmetric-key encryption systems. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The device in which an alphanumeric code or password that is assigned to a specific individual for a particular asset can be entered. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A unit of measure that equals a frequency of 1000 cycles per second. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A proprietary connector developed in the 1970s by The Krone Group (a German telecommunications company) that is an alternative to the 110 punchdown block. Krone connectors enable networking as well as audio interconnections. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Network that generally (but not always) belongs to one household or organization and covers a limited place (anything from two devices in an apartment up to thousands of devices on a multi-building school or business campus). |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The connection between a central office and individual users in a telephone system. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A measure of a signal’s delay. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A grouping of related tasks involving the transfer of information. Also, a particular level of the OSI seven-layer model, for example, Physical layer, Data Link layer, and so forth. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Any device that filters and forwards frames based on the MAC addresses of the sending and receiving machines. What is normally called a “switch” is actually a “Layer 2 switch.” |  | 
        |  | 
        
        | Term 
 
        | Layer 2 Tunneling Protocol (L2TP) |  | Definition 
 
        | A VPN protocol developed using Cisco’s L2F and Microsoft’s PPTP tunneling protocols that can be run on almost any connection imaginable. LT2P has no authentication or encryption but is often used with IPsec to provide security. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A switch that can also route packets (it filters and forwards data packets based on the IP addresses of the sending and receiving machines). |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A duplex type of small form factor (SFF) fiber connector, designed to accept two fiber cables. Also known as local connector or Lucent connector. |  | 
        |  | 
        
        | Term 
 
        | LED (light emitting diode) |  | Definition 
 
        | Solid-state device that emits photons at luminous frequencies when current is applied. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | One of three modes used with 802.11n wireless networks where the wireless access point (WAP) sends out separate packets just for legacy devices. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The process of an organization preserving and organizing data in anticipation of or in reaction to a pending legal issue. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The type of interference caused by bending a piece of fiber-optic cable past its maximum bend radius. Light bleeds through the cladding, causing signal distortion and loss. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An optical power meter used by technicians to measure the amount of light lost through light leakage in a fiber cable. |  | 
        |  | 
        
        | Term 
 
        | lights-out management (LOM) |  | Definition 
 
        | Special “computer within a computer” features built into better servers, designed to give you access to a server even when the server itself is shut off. |  | 
        |  | 
        
        | Term 
 
        | Lightweight Access Point Protocol (LWAPP) |  | Definition 
 
        | Protocol used in wireless networks that enables interoperability between thin and thick clients and WAPs. |  | 
        |  | 
        
        | Term 
 
        | Lightweight Directory Access Protocol (LDAP) |  | Definition 
 
        | A protocol used to query and change a database used by the network. LDAP uses TCP port 389 by default. |  | 
        |  | 
        
        | Term 
 
        | Lightweight Extensible Authentication Protocol (LEAP) |  | Definition 
 
        | A proprietary EAP authentication used almost exclusively by Cisco wireless products. LEAP is an interesting combination of MS-CHAP authentication between a wireless client and a RADIUS server. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Connecting multiple NICs in tandem to increase bandwidth in smaller increments. See also NIC teaming. |  | 
        |  | 
        
        | Term 
 
        | Link Aggregation Control Protocol (LACP) |  | Definition 
 
        | IEEE specification of certain features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An LED on NICs, routers, and switches that lights up to show good connection between the devices. Link lights are called light-emitting diode (LED) status indicators on the CompTIA Network+ exam. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Type of dynamic routing protocol that announces only changes to routing tables, as opposed to entire routing tables. Compare to distance vector routing protocols. Examples of link-state routing protocols include OSPF and IS-IS. See also distance vector. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A network analyzer report on how good the connection is between two systems. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The address that a computer running IPv6 gives itself after first booting. The first 64 bits of a link-local address are always fe80::/64. Link-local addresses are used for communicating on a local network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Family of open source operating systems inspired by UNIX. Very popular for cloud infrastructure, embedded systems, enterprise servers, and mobile devices. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A port that is currently accepting incoming IP packets and passing them to the application that opened the port. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The process of taking several servers and making them look like a single server, spreading processing and supporting bandwidth needs. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Refers to the computer(s), server(s), and/or LAN that a user is physically using or that is in the same room, building, or subnet which can span multiple buildings. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Network that generally (but not always) belongs to one household or organization and covers a limited place (anything from two devices in an apartment up to thousands of devices on a multi-building school or business campus). |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Authenticating a user account against a password database stored on the system itself (as opposed to on a remote authentication server). |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A duplex type of small form factor (SFF) fiber connector, designed to accept two fiber cables. Also known as local connector or Lucent connector. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The accounts unique to a single Windows system. Stored in the local system’s registry. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The hosts file alias for the loopback address of 127.0.0.1, referring to the current machine. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A physical device that prevents access to essential assets of an organization, such as servers, without a key. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Stores information about the performance of some particular aspect of a system. Different programs refer to the monitored aspect with different terms. Performance Monitor calls them counters; syslog calls them facilities. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | The process of providing proper security and maintenance for log files to ensure the files are organized and safe. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Code written with malicious intent designed to execute when certain conditions are met. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A programmable network address (an IP address, for example), unlike a physical address that is burned into ROM |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | As opposed to physical addressing, the process of assigning organized blocks of logically associated network addresses to create smaller manageable networks called subnets. IP addresses are one example of logical addressing. |  | 
        |  | 
        
        | Term 
 
        | Logical Link Control (LLC) |  | Definition 
 
        | The aspect of the NIC that talks to the operating system, places outbound data coming “down” from the upper layers of software into frames, and creates the FCS on each frame. The LLC also deals with incoming frames by processing those addressed to the NIC and erasing ones addressed to other machines on the network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A document that shows the broadcast domains and individual IP addresses for all devices on the network. Only critical switches and routers are shown. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A network topology defined by signal paths as opposed to the physical layout of the cables. See also physical topology. |  | 
        |  | 
        
        | Term 
 
        | Long Term Evolution (LTE) |  | Definition 
 
        | A wireless data standard with theoretical download speeds of 300 Mbps and upload speeds of 75 Mbps. LTE is marketed as a 4G (fourth generation) wireless technology. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A server or Web site that enables technicians outside of a network to inspect information on or run diagnostic tools within that network. A technician might use their ISP’s looking glass to troubleshoot a routing issue. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Network connector that connects back into itself for physical loopback testing. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Sometimes called the localhost, a reserved IP address used for internal testing: 127.0.0.1. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Network connector that connects back into itself for physical loopback testing. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A test that sends data out of a NIC and checks to see if it comes back. Software versions that don’t test the actual port are commonly included in the device’s own diagnostics. Hardware or physical loopback tests that include the port require a loopback plug. |  | 
        |  |