Term
|
Definition
A tunnelling protocol in which IPv6 packets travel over an IPv4 network |
|
|
Term
|
Definition
IEEE specifications for wireless communication and data synchronization. Also known as Wi-Fi. IEEE b/g/n standards are current, and IEEE 802.11a is outdated. Apple Computer’s versions of 802.11 standards are called AirPort and AirPort Extreme. |
|
|
Term
|
Definition
A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called MAC address, physical address, or hardware address. |
|
|
Term
AES (Advanced Encryption Standard) |
|
Definition
An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi. |
|
|
Term
|
Definition
When configuring TCP/IP in Windows, the static IP address that Windows uses if it cannot lease an IP address from a DHCP server. |
|
|
Term
|
Definition
Used by routers. The address identifies multiple destinations, and packets are delivered to the closest destination. |
|
|
Term
Automatic Private IP Address (APIPA) |
|
Definition
An IP address in the address range 169.254.x.y, used by a computer when it cannot successfully lease an IP address from a DHCP server. |
|
|
Term
|
Definition
See connectionless protocol. |
|
|
Term
|
Definition
A specific radio frequency within a broader frequency. |
|
|
Term
|
Definition
A license leased for a range of IP addresses that defines a single octet, which is the network portion of the IP addresses in that license. The last three octets can be used for the host address or for subnetting the network. |
|
|
Term
|
Definition
A license that leases the first two octets of a range of IP addresses, and these first two octets are used for the network portion of the IP ddress. The last two octets can be used for the host address or for subnetting the network. |
|
|
Term
|
Definition
A license for IP addresses that leases the first three octets as the network portion of the range of IP addresses. |
|
|
Term
|
Definition
A subnet mask that contain all ones or all zeroes in an octet, and the octets that contain all ones are the octets leased by the class license. For example, 11111111.11111111.11111111.00000000 or 255.255.255.0 is the subnet mask for a Class C license. |
|
|
Term
|
Definition
A subnet mask that can have a mix of zeroes and ones in one octet or can contain all ones in an octet that was not leased by the class license. For example, 11111111.11111111.11110000.00000000 or 255.255.240.0. |
|
|
Term
|
Definition
A computer concept whereby one computer (the client) requests information from another computer (the server). |
|
|
Term
|
Definition
|
|
Term
connection-oriented protocol |
|
Definition
In networking, a protocol that confirms that a good connection has been made before transmitting data to the other end. An example of a connection-oriented protocol is TCP. |
|
|
Term
|
Definition
A protocol such as UDP that does not require a connection before sending a packet and does not guarantee delivery. An example of a UDP transmission is streaming video over the web. Also called a best-effort protocol. |
|
|
Term
|
Definition
The gateway a computer on a network will use to access another network unless it knows to specifically use another gateway for quicker access to that network. |
|
|
Term
DHCP (dynamic host configuration protocol) |
|
Definition
A protocol used by a server to assign dynamic IP addresses to computers on a network when they first access the network. |
|
|
Term
|
Definition
A computer or other device that requests addresses from a DHCP server |
|
|
Term
|
Definition
Stands for “demilitarized zone” and refers to removing firewall protection from a computer or network within an organization of protected computers and networks. |
|
|
Term
DNS (Domain Name System or Domain Name Service) |
|
Definition
A distributed pool of information (called the name space) that keeps track of assigned host names and domain names and their corresponding IP addresses, and the system that allows a host to locate information in the pool. |
|
|
Term
|
Definition
When Windows queries the DNS server for a name resolution. |
|
|
Term
|
Definition
A computer that can find an IP address for another computer when only the fully qualified domain name is known. |
|
|
Term
|
Definition
A unique, text-based name that identifies a network. A fully qualified domain name is sometimes loosely called a domain name. Also see fully qualified domain name. |
|
|
Term
|
Definition
An assigned IP address that is used for the current session only. When the session is terminated, the IP address is returned to the list of available addresses. |
|
|
Term
FTP (File Transfer Protocol) |
|
Definition
The protocol used to transfer files over a TCP/IP network. |
|
|
Term
fully qualified domain name (FQDN |
|
Definition
A host name and a domain name such as jsmith.amazon.com. Sometimes loosely referred to as a domain name. |
|
|
Term
|
Definition
A router, computer, or other device that connects networks. |
|
|
Term
|
Definition
See global unicast address |
|
|
Term
|
Definition
A TCP/IP version 6 IP address that can be routed on the Internet. Also called a global address. |
|
|
Term
|
Definition
A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called MAC address, physical address, or adapter address |
|
|
Term
|
Definition
A name that identifies a computer, printer, or other device on a network, which can be used instead of the computer’s IP address to address the computer on the network. The host name together with the domain name is called the fully qualified domain name. Also called computer name |
|
|
Term
|
Definition
HTTP (Hypertext Transfer Protocol) |
|
|
Term
|
Definition
A version of the HTTP protocol that includes data encryption for security using the SSL or TLS security protocols. |
|
|
Term
IMAP4 (Internet Message Access Protocol, version 4) |
|
Definition
A protocol used by an email server and client that allows the client to manage email stored on the server without downloading the email. Compare to POP3. |
|
|
Term
|
Definition
In TCP/IP version 6, a node’s attachment to a link. The attachment can be a physical attachment (for example, when using a network adapter) or a logical attachment (for example, when using a tunnelling protocol). Each interface is assigned an IP address. |
|
|
Term
|
Definition
In TCP/IP version 6, the last 64 bits or 4 blocks of an IP address that identifies that interface. |
|
|
Term
Internet Protocol version 4 (IPv4) |
|
Definition
In TCP/IP version 6, the last 64 bits or 4 blocks of an IP address that identifies that interface. |
|
|
Term
Internet Protocol version 6 (IPv6) |
|
Definition
A TCP/IP standard that allows for an IP address with 128 bits. |
|
|
Term
|
Definition
A TCP/IP standard that allows for an IP address with 128 bits. |
|
|
Term
|
Definition
A 32-bit or 128-bit address used to uniquely identify a device on a network that uses TCP/IP protocols. The first numbers identify the network; the last numbers identify a host. An example of a 32-bit IP address is 206.96.103.114. An example of a 128-bit IP address is 2001:0000:B80::D3:9C5A:CC |
|
|
Term
|
Definition
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) in which IPv6 packets travel over an IPv4 network. |
|
|
Term
Lightweight Directory Access Protocol (LDAP) |
|
Definition
A protocol used by various client applications when the application needs to query a database. |
|
|
Term
|
Definition
In TCP/IP version 6, a local area network or wide area network bounded by routers. Also called local link. |
|
|
Term
|
Definition
A type of TCP/IP version 6 IP address that can be used for communication among nodes on the same link and is allowed on the Internet. Also called link-local unicast address or local address. |
|
|
Term
link-local unicast address |
|
Definition
|
|
Term
|
Definition
A network bound by routers or other gateway devices. |
|
|
Term
|
Definition
|
|
Term
|
Definition
An IP address that indicates your own computer and is used to test TCP/IP configuration on the computer. |
|
|
Term
MAC (Media Access Control) address |
|
Definition
A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed on the adapter as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called a physical address, an adapter address, or a hardware address. |
|
|
Term
|
Definition
In TCP/IP version 6, an IP address used when packets are delivered to all nodes on a network. |
|
|
Term
|
Definition
A process in which a message is sent by one host to multiple hosts, such as when a video conference is broadcast to several hosts on the Internet. |
|
|
Term
multiple input/multiple output (MIMO) |
|
Definition
A feature of the IEEE 802.11n standard for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance. |
|
|
Term
|
Definition
The process of associating a character-based computer name to an IP address. |
|
|
Term
NAT (Network Address Translation) |
|
Definition
A protocol used to convert private IP addresses on a LAN to a public IP address before a data packet is sent over the Internet. |
|
|
Term
|
Definition
In TCP/IP version 6, two or more nodes on the same link. |
|
|
Term
|
Definition
In TCP/IP version 4, each of the four numbers that are separated by periods and make up a 32-bit IP address. One octet is 8 bits. |
|
|
Term
|
Definition
Segment of network data that also includes header, destination address, and type of data that is sent as a unit. Also called data packet or datagram. |
|
|
Term
|
Definition
A 48-bit hardware address unique to each NIC card or onboard network controller and assigned by the manufacturer at the factory. The address is often printed as hexadecimal numbers. An example is 00 00 0C 08 2F 35. Also called MAC address, adapter address, or hardware address |
|
|
Term
POP3 (Post Office Protocol, version 3) |
|
Definition
The protocol that an email server and client use when the client requests the downloading of email messages. The most recent version is POP version 3. Compare to IMAP3. |
|
|
Term
|
Definition
(1) As applied to services running on a computer, a number that a service or process on a computer uses to listen for activity. Also called a port address or port number. (2) A physical connector, usually at the back of a computer, that allows a cable from a peripheral device, such as a printer, mouse, or modem, to be attached. |
|
|
Term
|
Definition
As applied to services running on a computer, a number that a service or process on a computer uses to listen for activity. |
|
|
Term
|
Definition
To open or close certain ports so they can or cannot be used. A firewall uses port filtering to protect a network from unwanted communication |
|
|
Term
|
Definition
A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when the private network is protected by a firewall device using NAT. Also called tunnelling. |
|
|
Term
|
Definition
As applied to services running on a computer, a number that a service or process on a computer uses to listen for activity. |
|
|
Term
|
Definition
When a firewall opens a port because a computer behind the firewall initiates communication on another port. |
|
|
Term
|
Definition
In TCP/IP version 4, an IP address that is used on a private network that is isolated from the Internet. |
|
|
Term
|
Definition
The rules for communication. For example, TCP/IP is a suite or group of protocols that define many types of communication on a TCP/IP network. |
|
|
Term
|
Definition
In TCP/IP version 4, an IP address available to the Internet. |
|
|
Term
|
Definition
A measure of the success of communication over the Internet. Communication is degraded on the Internet when packets are dropped, delayed, delivered out of order, or corrupted. VoIP requires a high QoS. |
|
|
Term
|
Definition
The frequency of waves generated by a radio signal, which are electromagnetic frequencies above audio and below light. For example, Wi-fi 802.11n transmits using a radio frequency of 5 GHz and 2.4 GHz. |
|
|
Term
Remote Desktop Protocol (RDP |
|
Definition
The protocol used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer. |
|
|
Term
|
Definition
A device that connects networks and makes decisions as to the best routes to use when forwarding packets. |
|
|
Term
|
Definition
A protocol used to transfer files from an FTP server to an FTP client using encryption. |
|
|
Term
|
Definition
A protocol that is used to pass login information to a remote computer and control that computer over a network using encryption |
|
|
Term
Server Message Block (SMB) |
|
Definition
A protocol used by Windows to share files and printers on a network. |
|
|
Term
Service Set Identifier (SSID) |
|
Definition
The name of the access point for a wireless network. |
|
|
Term
SIM (Subscriber Identification Module) card |
|
Definition
A small flash memory card that contains all the information you need to connect to a cellular network, including a password and other authentication information needed to access the network, encryption standards used, and the services that your subscription includes. |
|
|
Term
Simple Network Management Protocol (SNMP) |
|
Definition
A TCP/IP protocol used to monitor network traffic |
|
|
Term
SMTP (Simple Mail Transfer Protocol) |
|
Definition
The protocol used by email clients and servers to send email messages over the Internet. Also see POP and IMAP. |
|
|
Term
SMTP AUTH (SMTP Authenication) |
|
Definition
A protocol that is used to authenticate or prove that a client who attempts to use an email server to send email is authorized to use the server. The protocol is based on the Simple Authentication and Security Layer (SASL) protocol. |
|
|
Term
|
Definition
A permanent IP address that is manually assigned to a computer. |
|
|
Term
|
Definition
When several local networks are tied together in a subsystem of the larger intranet. |
|
|
Term
|
Definition
Using TCP/IP version 6, the last block in the 64-bit prefix of an IP address. |
|
|
Term
|
Definition
Using TCP/IP version 4, a group of four numbers (dotted decimal numbers) that tell TCP/IP if a remote computer is on the same or different network. |
|
|
Term
TCP (Transmission Control Protocol/Internet Protocol) |
|
Definition
A protocol in the TCP/IP protocol suite. TCP guarantees delivery of data for application protocols and establishes a session before it begins transmitting data. |
|
|
Term
|
Definition
A TCP/IP command-line client/server application that allows an administrator or other user to control a computer remotely. |
|
|
Term
|
Definition
A tunneling protocol in which IPv6 packets travel over an IPv4 network. Named after the Teredo worm that bores holes in wood. |
|
|
Term
TKIP (Temporal Key Integrity Protocol) |
|
Definition
A type of encryption used by WPA to secure a wireless Wi-fi network. |
|
|
Term
UDP (User Datagram Protocol) |
|
Definition
A connectionless TCP/IP protocol that does not require a connection to send a packet and does not guarantee that the packet arrives at its destination. UDP is faster than TCP because TCP takes the time to make a connection and guarantee delivery. |
|
|
Term
|
Definition
Using TCP/IP version 6, an IP address assigned to a single node on a network. |
|
|
Term
unique local address (ULA) |
|
Definition
Using TCP/IP version 6, an IP address used to identify a specific site within a larger intranet. Also called a unique local unicast address. |
|
|
Term
unique local unicast address |
|
Definition
See unique local address (ULA). |
|
|
Term
virtual private network (VPN) |
|
Definition
A security technique that uses encrypted data packets between a private network and a computer somewhere on the Internet. |
|
|
Term
WEP (Wired Equivalent Privacy) |
|
Definition
A data encryption method used on Wi-fi wireless networks that uses either 64-bit or 128-bit encryption keys that are static keys, meaning the key does not change while the wireless network is in use. |
|
|
Term
Wi-fi (Wireless Fidelity) |
|
Definition
A data encryption method used on Wi-fi wireless networks that uses either 64-bit or 128-bit encryption keys that are static keys, meaning the key does not change while the wireless network is in use. |
|
|
Term
Wi-fi Protected Setup (WPS) |
|
Definition
Designed to make it easier for users to connect their computers to a wireless network when a hard-to-remember SSID and security key are used. |
|
|
Term
|
Definition
A wireless device that creates a wireless network. |
|
|
Term
wireless wide area network (WWAN |
|
Definition
A cellular network for mobile broadband devices |
|
|
Term
WPA (Wi-fi Protected Access) |
|
Definition
A data encryption method for wireless networks that use the TKIP (Temporal Key Integrity Protocol) encryption method and the encryption keys are changed at set intervals while the wireless LAN is in use. |
|
|
Term
WPA2 (Wi-fi Protected Access2) |
|
Definition
A data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. WPA2 is currently the strongest wireless encryption standard. |
|
|
Term
HTTP (Hypertext Transfer Protocol) |
|
Definition
The communications protocol used by the World Wide Web. |
|
|