Term
|
Definition
separates the network into various functional network modules, each targeting a specific place or purpose in the network. They separate areas that have different physical or logical connectivity. They designate where different functions occur in the network. |
|
|
Term
|
Definition
Aggregates the connectivity from the various functional areas and routes the traffic into the campus core submodule. |
|
|
Term
|
Definition
A single connection to an ISP |
|
|
Term
|
Definition
Two or more connections to a single ISP |
|
|
Term
|
Definition
consists of devices that put data on the local loop. Primarily provides an interface to connect subscribers to a communication link on the WAN cloud |
|
|
Term
|
Definition
The customer devices that pass the data from a customer network or host computer for transmission over the WAN. Connects to the local loop through the DCE. |
|
|
Term
|
Definition
This consists of the long-haul, all-digital, fiber-optic communications lines, switches, routers, and other equipment inside the WAN provider network. |
|
|
Term
|
Definition
establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate.
|
|
|
Term
|
Definition
Full addressing information must be carried in each packet. Each switch must evaluate the address to determine where to send the packet
ex. the internet |
|
|
Term
connection-oriented systems |
|
Definition
The network predetermines the route for a packet, and each packet only has to carry an identifier. The switch determines the onward route by looking up the identifier in tables held in memory. The set of entries in the tables identifies a particular route or circuit through the system. |
|
|
Term
dense wavelength division multiplexing (DWDM). |
|
Definition
multiplies the amount of bandwidth that a single strand of fiber can support |
|
|
Term
|
Definition
a circuit-switching technology that enables the local loop of a PSTN to carry digital signals, resulting in higher capacity switched connections. |
|
|
Term
multi-protocol label switching (MLPS) |
|
Definition
multiprotocol high-performance WAN technology that directs data from one router to the next, based on short path labels rather than IP network addresses. |
|
|
Term
|
Definition
built on a cell-based architecture rather than on a frame-based architecture. Cells are always a fixed length of 53 bytes |
|
|
Term
|
Definition
provides high-speed broadband service with wireless access and provides broad coverage like a cell phone network rather than through small Wi-Fi hotspots. Operates in a similar way to Wi-Fi, but at higher speeds, over greater distances, and for a greater number of users. |
|
|
Term
|
Definition
keeps track of the number and sequence of the bits from each specific transmission so that they can be quickly and efficiently reassembled into their original form upon receipt. |
|
|
Term
|
Definition
uses a variable time slot length allowing channels to compete for any free slot space. It employs a buffer memory that temporarily stores the data during periods of peak traffic |
|
|
Term
|
Definition
a communication method to directly connect two DTEs using a RS-232 serial cable. |
|
|
Term
|
Definition
The default encapsulation type on point-to-point connections, dedicated links, and circuit-switched connections when the link uses two Cisco devices. |
|
|
Term
|
Definition
An industry standard, switched, data link layer protocol that handles multiple virtual circuits. |
|
|
Term
|
Definition
a logical model, design, or blueprint that aids in communication between interconnecting layers. |
|
|
Term
|
Definition
functions within the data link layer and has a role in establishing, configuring, and testing the data-link connection. Establishes the point-to-point link. Also negotiates and sets up control options on the WAN data link, which are handled by the NCPs.
PPP also uses the it to agree automatically on encapsulation formats such as authentication, compression, and error detection. |
|
|
Term
|
Definition
a Layer 2 encapsulation that supports various Layer 3 protocols including IPv4 and IPv6. |
|
|
Term
|
Definition
conducts periodic challenges to make sure that the remote node still has a valid password value |
|
|
Term
|
Definition
sequentially send one bit at a time over a single channel |
|
|
Term
|
Definition
an optical network standard that uses STDM for efficient use of bandwidth |
|
|
Term
|
Definition
used to connect two DTE devices together without the need for a DCE device |
|
|
Term
|
Definition
provides greater bandwidth, reliability, and resiliency than private or leased lines |
|
|
Term
|
Definition
the logical path along an originating Frame Relay link, through the network, and along a terminating Frame Relay link to its ultimate destination |
|
|
Term
|
Definition
The connection through a Frame Relay network between two DTEs |
|
|
Term
switched virtual circuit (SVC) |
|
Definition
Established dynamically by sending signaling messages to the network (CALL SETUP, DATA TRANSFER, IDLE, CALL TERMINATION). |
|
|
Term
permanent virtual circuits (PVCs) |
|
Definition
preconfigured by the carrier, and after they are set up, only operate in DATA TRANSFER and IDLE modes. |
|
|
Term
local management interface (LMI) |
|
Definition
a keepalive mechanism that provides status information about Frame Relay connections between the router (DTE) and the Frame Relay switch (DCE). |
|
|
Term
committed information rate (CRI) |
|
Definition
the amount of data that the network receives from the access circuit. The service provider guarantees that the customer can send data at this rate |
|
|
Term
|
Definition
allows devices that temporarily need additional bandwidth to borrow it at no extra cost from other devices not using it |
|
|
Term
|
Definition
a negotiated rate above the CIR that the customer can use to transmit for short burst, and represents the maximum allowed traffic under normal working conditions. It allows traffic to burst to higher speeds, as available network bandwidth permits |
|
|
Term
|
Definition
describes the bandwidth available above the CIR up to the access rate of the link |
|
|
Term
Discard Eligibility bit (DE) |
|
Definition
identifies frames of less importance that can be dropped during times of congestion |
|
|
Term
|
Definition
Mapping between Layer 2 DLCI addresses and Layer 3 addresses can be achieved dynamically by |
|
|
Term
|
Definition
a protocol for messages sent between the DCE and DTE devices to maintain the status information of the Frame Relay between these devices |
|
|
Term
|
Definition
a network that has a single connection to its neighboring network, one way in and one way out of the network |
|
|
Term
|
Definition
Incoming packets from the public network are routed to their destinations on the private network by referring to a table in the NAT router. This table tracks public and private port pairs. |
|
|
Term
|
Definition
(sometimes referred to as tunneling) is the act of forwarding traffic addressed to a specific network port from one network node to another. This technique allows an external user to reach a port on a private IPv4 address (inside a LAN) from the outside, through a NAT-enabled router. |
|
|
Term
Data-over-Cable Service Interface Specification (DOCSIS) |
|
Definition
defines the communications and operation support interface requirements for a data-over-cable system, and permits the addition of high-speed data transfer to an existing CATV system
specifies the OSI Layer 1 and Layer 2 requirements |
|
|
Term
|
Definition
Connects the computer of the teleworker to the DSL. Usually a DSL modem connected to the computer using a USB or Ethernet cable. |
|
|
Term
DSL access multiplexer (DSLAM) |
|
Definition
Located at the CO of the carrier, it combines individual DSL connections from users into one high-capacity link to an ISP, and therefore, to the Internet. |
|
|
Term
Generic Routing Encapsulation (GRE) |
|
Definition
one example of a basic, non-secure, site-to-site VPN tunneling protocol. It is a tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels. Creates a virtual point-to-point link to Cisco routers at remote points, over an IP internetwork |
|
|
Term
|
Definition
a pre-set, shared secret key for use over symmetric VPN channels |
|
|
Term
|
Definition
a standard key-exchange method used for secure, authenticated VPN communication over the internet |
|
|
Term
|
Definition
HMAC algorithm which uses a 160-bit secret key for authentication of transmitted data |
|
|
Term
|
Definition
a digital certificate exchange process used to authenticate users with each other using VPNs |
|
|
Term
|
Definition
HMAC algorithm which uses 128-bit shared secret key for authentication of transmitted data |
|
|
Term
|
Definition
a technology that provides remote access by using a web browser and the web browser’s native SSL encryption. Alternatively, it can provide remote access using the Cisco AnyConnect Secure Mobility Client software. |
|
|
Term
|
Definition
a secure tunnel operating at Layer 3 of the OSI model that can protect and authenticate IP packets between IPsec peers |
|
|
Term
|
Definition
defines how management information is exchanged between network management applications and management agents |
|
|
Term
|
Definition
unsolicited messages alerting the SNMP manager to a condition or event on the network. |
|
|
Term
|
Definition
a Cisco IOS technology that provides statistics on packets flowing through a Cisco router or multilayer switch. It is the standard for collecting IP operational data from IP networks |
|
|
Term
|
Definition
facilitates the creation of more complex configurations for traffic analysis and data export through the use of reusable configuration components. |
|
|
Term
|
Definition
a unidirectional stream of packets between a specific source system and a specific destination |
|
|
Term
|
Definition
a “push” technology, where the client device initiates the sending of data to a configured server. |
|
|
Term
|
Definition
provide a graphical representation of traffic from local and remote switches and routers. It is an embedded browser-based interface that generates reports on the traffic that consumes critical network resources. It can capture and decode packets and track response times to pinpoint an application problem to the network or the server. |
|
|
Term
|
Definition
can be used to detect broken wires, crossed-over wiring, shorted connections, and improperly paired connections |
|
|
Term
time-domain reflectometers (TDR) |
|
Definition
used to pinpoint the distance to a break in a cable. These devices send signals along the cable and wait for them to be reflected. The time between sending the signal and receiving it back is converted into a distance measurement |
|
|
Term
portable network analyzer |
|
Definition
By plugging this in anywhere on the network, a network engineer can see the switch port to which the device is connected, and the average and peak utilization. It can also be used to discover VLAN configuration, identify top network talkers, analyze network traffic, and view interface details |
|
|
Term
|
Definition
defined as the condition in which a network device continually transmits random, meaningless data onto the network |
|
|