Term
|
Definition
Third-generation wireless data technologies for cell phones and other mobile devices. 3G matured over time until Evolved High-Speed Packet Access (HSPA+) became the final wireless 3G data standard. It transferred at theoretical maximum speeds up to 168 megabits per second (Mbps), although real-world implementations rarely passed 10 Mbps. |
|
|
Term
|
Definition
Fourth-generation wireless data technologies for cell phones and other mobile devices. Most popularly implemented as Long Term Evolution (LTE), a wireless data standard with theoretical download speeds of 300 Mbps and upload speeds of 75 Mbps. |
|
|
Term
|
Definition
Internet connectivity technology that encapsulates IPv4 traffic into an IPv6 tunnel to get to an IPv6-capable router. |
|
|
Term
|
Definition
Fifth-generation wireless data technologies for cell phones and other mobile devices. Cellular carriers started rolling out 5G in 2019. Depending on the frequency bands used and the 5G modems in the devices, the speed ranges from 30 Mbps to well over 1 Gbps. |
|
|
Term
|
Definition
An IPv6 tunneling standard that can go through IPv4 network address translation (NAT). |
|
|
Term
|
Definition
An IPv6 tunneling protocol that doesn’t require a tunnel broker. It is generally used to directly connect two routers because it normally requires a public IPv4 address. |
|
|
Term
8 position 8 contact (8P8C) |
|
Definition
Four-pair connector used on the end of network cable. Often erroneously referred to as an RJ-45 connector. |
|
|
Term
10 Gigabit Ethernet (10 GbE) |
|
Definition
A very fast Ethernet designation that runs at 10 Gbps, with a number of fiber-optic and copper standards. |
|
|
Term
|
Definition
Fiber-optic implementation of Ethernet that runs at 10 Mbps using baseband signaling. Maximum segment length is 2 km. |
|
|
Term
|
Definition
An Ethernet LAN designed to run on UTP cabling. Runs at 10 Mbps and uses baseband signaling. Maximum length for the cabling between the NIC and the hub (or the switch, the repeater, and so forth) is 100 m. |
|
|
Term
|
Definition
A 10 GbE standard using 1550-nm single-mode fiber. Maximum cable length up to 40 km. |
|
|
Term
|
Definition
A 10 GbE standard using 1310-nm single-mode fiber. Maximum cable length up to 10 km. |
|
|
Term
|
Definition
A 10 GbE standard using 850-nm multimode fiber. Maximum cable length up to 300 m. |
|
|
Term
|
Definition
A 10 GbE standard designed to run on Cat 6a UTP cabling. Maximum cable length of 100 m. |
|
|
Term
|
Definition
A 40 GbE standard designed to run on Cat 8 UTP cabling. Maximum cable length of 30 m. |
|
|
Term
40 Gigabit Ethernet (40 GbE) |
|
Definition
Ethernet designation that runs at 40 Gbps, primarily used in switch-to-switch trunks and data center servers. 40 GbE can use either single-mode fiber or OM3 (or greater) multimode fiber. Transceivers use the quad small form-factor pluggable plus (QSFP+) port. |
|
|
Term
|
Definition
Patch panel used in telephone networks; displaced by 110 blocks in networking. |
|
|
Term
|
Definition
An Ethernet LAN designed to run on fiber-optic cabling. Runs at 100 Mbps and uses baseband signaling. Maximum cable length is 400 m for half-duplex and 2 km for full-duplex. |
|
|
Term
|
Definition
An Ethernet LAN designed to run on UTP cabling. Runs at 100 Mbps, uses baseband signaling, and uses two pairs of wires on Cat 5 or better cabling. |
|
|
Term
|
Definition
The technically accurate but little-used name for 100BASE-T. |
|
|
Term
100 Gigabit Ethernet (100 GbE) |
|
Definition
Ethernet designation that runs at 100 Gbps, primarily implemented in backbones and machine-to-machine connections. Employs both MMF and SMF with various connectors. A typical connector, the QSFP28, has four 25 Gb channels. |
|
|
Term
|
Definition
A connection gridwork used to link UTP and STP cables behind an RJ-45 jack or patch panel. Also known as a 110-punchdown block. |
|
|
Term
|
Definition
A connection gridwork used to link UTP and STP cables behind an RJ-45 jack or patch panel. Also known as a 110-punchdown block. |
|
|
Term
|
Definition
A specialized tool for connecting UTP wires to a 110-block. Also called a 110-punchdown tool. |
|
|
Term
|
Definition
The IEEE committee responsible for all Ethernet standards. |
|
|
Term
|
Definition
IEEE trunk standard that enables switches from different manufacturers to transfer VLAN traffic to each other. |
|
|
Term
|
Definition
A port-authentication network access control mechanism for networks. |
|
|
Term
|
Definition
Open and vendor-neutral Layer 2 network protocol standardized under the IEEE 802.3 umbrella, enabling any company to make interoperable Ethernet equipment. Originally created in the 1970s by Xerox and transferred to the IEEE. |
|
|
Term
|
Definition
The IEEE standard for 1000BASE-T. |
|
|
Term
|
Definition
The umbrella IEEE standard for all versions of Gigabit Ethernet other than 1000BASE-T. |
|
|
Term
|
Definition
A family of standards for wireless local area networks marketed as Wi-Fi. |
|
|
Term
|
Definition
A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 54 Mbps. |
|
|
Term
|
Definition
A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 1 Gbps. 802.11ac is marketed as Wi-Fi 5. |
|
|
Term
|
Definition
Along with the corresponding 802.11g-ht standard, technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported. |
|
|
Term
|
Definition
Wireless standard that brings improvements in high-density areas such as stadiums and conferences in comparison to previous standards. Marketed as both Wi-Fi 6 and Wi-Fi 6E. Wi-Fi 6 operates at the 2.4-GHz and 5-GHz bands, while Wi-Fi 6E operates at the 6-GHz band. 802.11ax offers a maximum throughput of up to 10 Gbps. |
|
|
Term
|
Definition
The first popular wireless standard, operates in the frequency range of 2.4 GHz and offers throughput of up to 11 Mbps. |
|
|
Term
|
Definition
Older wireless standard that operates on the 2.4-GHz band with a maximum throughput of 54 Mbps. Superseded by 802.11n. |
|
|
Term
|
Definition
Along with the corresponding 802.11a-ht standard, technical terms for mixed mode 802.11a/802.11g operation. In mixed mode, both technologies are simultaneously supported. |
|
|
Term
|
Definition
A wireless security standard branded as WPA2. See Wi-Fi Protected Access 2 (WPA2). |
|
|
Term
|
Definition
An 802.11 standard (marketed as Wi-Fi 4) that increases transfer speeds and adds support for multiple input/multiple output (MIMO) by using multiple antennas. 802.11n can operate on either the 2.4- or 5-GHz frequency band and has a maximum throughput of 400 Mbps. Superseded by 802.11ac, but used with many IoT devices. |
|
|
Term
|
Definition
A Gigabit Ethernet standard using single-mode fiber cabling, with a 5-km maximum cable distance. |
|
|
Term
|
Definition
A Gigabit Ethernet standard using multimode fiber cabling, with a 220- to 500-m maximum cable distance. |
|
|
Term
|
Definition
A Gigabit Ethernet standard using Cat 5e/6 UTP cabling, with a 100-m maximum cable distance. |
|
|
Term
|
Definition
An umbrella Gigabit Ethernet standard. Also known as 802.3z. Comprises all Gigabit standards with the exception of 1000BASE-T, which is under the 802.3ab standard. |
|
|
Term
|
Definition
DNS record that maps hostnames to their IPv4 addresses. |
|
|
Term
AAA (Authentication, Authorization, and Accounting) |
|
Definition
A security philosophy wherein a user trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network. The authenticating server should also record session information about the client. |
|
|
Term
|
Definition
DNS record that maps hostnames to their IPv6 addresses. |
|
|
Term
|
Definition
Quality of some building materials (such as brick, sheetrock, and wood) to reduce or eliminate a Wi-Fi signal. |
|
|
Term
|
Definition
To remove an aspect of a device or process to treat it as a separate unit. Also, the removed aspect of a device or process. |
|
|
Term
acceptable use policy (AUP) |
|
Definition
A document that defines what a person may and may not do on an organization’s computers and networks. |
|
|
Term
|
Definition
All-encompassing term that defines the degree of permission granted to use a particular resource. That resource may be anything from a switch port to a particular file to a physical door within a building. |
|
|
Term
access control list (ACL) |
|
Definition
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource. |
|
|
Term
Access Control Server (ACS) |
|
Definition
Cisco program/process/server that makes the decision to admit or deny a node based on posture assessment. From there, the ACS directs the edge access device to allow a connection or to implement a denial or redirect. |
|
|
Term
|
Definition
An entryway with two successive locked doors and a small space between them providing one-way entry or exit. This is a security measure taken to prevent unauthorized entry. Traditionally called a mantrap. |
|
|
Term
|
Definition
One tier of a three-tiered architecture commonly used in data centers. The access layer acts as the primary connection between the data center’s connectivity and the servers. |
|
|
Term
|
Definition
Regular port in a switch that has been configured as part of a VLAN. Access ports are ports that hosts connect to. They are the opposite of a trunk port, which is only connected to a trunk port on another switch. |
|
|
Term
|
Definition
A form of directory service used in networks with Windows servers. Creates an organization of related computers that share one or more Windows domains. |
|
|
Term
|
Definition
An LED on a NIC, hub, or switch that blinks rapidly to show data transfers over the network. |
|
|
Term
|
Definition
A wireless networking mode where each node is in direct contact with every other node in a decentralized free-for-all. Ad hoc mode is similar to the mesh topology. |
|
|
Term
Address Resolution Protocol (ARP) |
|
Definition
A protocol in the TCP/IP suite used with the command-line utility of the same name to determine the MAC address that corresponds to a particular IP address. |
|
|
Term
|
Definition
Specialized user account that has been granted sufficient access rights and authority to manage specified administrative tasks. Some administrative accounts exist as a default of the system and have all authority throughout the system. Others must be explicitly assigned the necessary powers to administer given resources. |
|
|
Term
|
Definition
Feature of multi-protocol routers that enables the router to determine the most reliable route—among its protocols—to the same destination. |
|
|
Term
ADSL (asymmetric digital subscriber line) |
|
Definition
A fully digital, dedicated connection to the telephone system that provides download speeds of up to 9 Mbps and upload speeds of up to 1 Mbps. |
|
|
Term
Advanced Encryption Standard (AES) |
|
Definition
A block cipher created in the late 1990s that uses a 128-bit block size and a 128-, 192-, or 256-bit key size. AES has never been cracked. |
|
|
Term
|
Definition
A program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows. |
|
|
Term
|
Definition
In terms of posture assessment, refers to software that runs within a client and reports the client’s security characteristics to an access control server to be approved or denied entry to a system. |
|
|
Term
|
Definition
In terms of posture assessment, refers to a client that has its posture checked and presented by non-permanent software, such as a Web app program, that executes as part of the connection process. Agentless software does not run directly within the client but is run on behalf of the client. |
|
|
Term
|
Definition
A technique used in IPv4 and IPv6 address space planning to combine subnets, thus reducing the number of entries in routing tables and using IP address space more efficiently. |
|
|
Term
|
Definition
The act of physically separating a network from every other network. |
|
|
Term
|
Definition
An open source tool for penetration testing many aspects of wireless networks. |
|
|
Term
|
Definition
Proactive message sent from an SNMP manager as a result of a trap issued by an agent. Alerts may be sent as e-mail, SMS message, voicemail, or via other avenues. |
|
|
Term
|
Definition
A set of rules for solving a problem in a given number of steps. |
|
|
Term
|
Definition
Permission for data or communication to pass through or to access a resource. Specific allowances through a firewall are called exceptions. |
|
|
Term
American Registry for Internet Numbers (ARIN) |
|
Definition
A Regional Internet Registry (RIR) that parcels out IP addresses to large ISPs and major corporations in North America. |
|
|
Term
|
Definition
The type of DoS attack that sends a small amount of traffic to a server, which produces a much larger response from the server that is sent to a spoofed IP address, overwhelming a victim machine. |
|
|
Term
|
Definition
The type of DoS attack that sends a small amount of traffic to a server, which produces a much larger response from the server that is sent to a spoofed IP address, overwhelming a victim machine. |
|
|
Term
angled physical contact (APC) |
|
Definition
Fiber-optic connector that makes physical contact between two fiber-optic cables. It specifies an 8-degree angle to the curved end, lowering signal loss. APC connectors have less connection degradation from multiple insertions compared to other connectors. |
|
|
Term
|
Definition
Open-source cross-platform GUI port scanner. Can be used as an alternative to Nmap for less demanding scanning tasks. |
|
|
Term
|
Definition
Technical standards published by the Telecommunications Industry Association (TIA) and accredited by the American National Standards Institute (ANSI) for cabling in commercial buildings. Replaced the TIA/EIA-568 standards. Part of the standards include pin and pair assignments in twisted pair networking cable, such as that used in Ethernet networks. See also T568A and T568B. |
|
|
Term
|
Definition
Labeling standard/guidelines published by the Telecommunications Industry Association (TIA) and accredited by the American National Standards Institute (ANSI) for cabling in commercial buildings. Replaced the TIA/EIA-606 standard/guidelines. |
|
|
Term
|
Definition
Software that attempts to block several types of threats to a client, including viruses, Trojan horses, worms, and other unapproved software installation and execution. |
|
|
Term
|
Definition
Software that attempts to prevent viruses from installing or executing on a client. Some antivirus software may also attempt to remove the virus or eradicate the effects of a virus after an infection. |
|
|
Term
|
Definition
A method of addressing groups of computers as though they were a single computer. Anycasting starts by giving a number of computers (or clusters of computers) the same IP address. Advanced routers then send incoming packets to the closest of the computers. |
|
|
Term
|
Definition
Provides tools for programs to use to access the network (and the lower layers). HTTP, SSL/TLS, FTP, SMTP, DNS, DHCP, and IMAP are all examples of protocols that operate at the Application layer. |
|
|
Term
|
Definition
Tracks application events, such as when an application opens or closes. Different types of application logs record different events. |
|
|
Term
Application Programming Interface (API) |
|
Definition
Shared functions, subroutines, and libraries that allow programs on a machine to communicate with the OS and other programs. |
|
|
Term
application/context aware |
|
Definition
Advanced feature of some stateful firewalls where the content of the data is inspected to ensure it comes from, or is destined for, an appropriate application. Context-aware firewalls look both deeply and more broadly to ensure that the data content and other aspects of the packet are appropriate to the data transfer being conducted. Packets that fall outside these awareness criteria are denied by the firewall. |
|
|
Term
|
Definition
One or more decision makers consider a proposed change and the impact of the change, including funding. If the change, the impact, and the funding are acceptable, the change is permitted. |
|
|
Term
|
Definition
The creation and storage of retrievable copies of electronic data for legal and functional purposes. |
|
|
Term
|
Definition
An attribute of a file that shows whether the file has been backed up since the last change. Each time a file is opened, changed, or saved, the archive bit is turned on. Some types of backups turn off the archive bit to indicate that a good backup of the file exists on tape. |
|
|
Term
|
Definition
32-bit numeric identifier assigned to OSPF areas. Can manifest as an integer between 0 and 4,294,967,295, or in a form similar to an IPv4 address (for example, “0.0.0.0”). The Area ID will be 0 in networks with a single area. See also areas (OSPF) and Open Shortest Path First (OSPF). |
|
|
Term
|
Definition
Within the OSPF routing protocol, areas are administrative groupings of interconnected routers used to control how routers reroute traffic if a link drops. See also Area ID (OSPF) and Open Shortest Path First (OSPF). |
|
|
Term
|
Definition
A protocol in the TCP/IP suite used with the command-line utility of the same name to determine the MAC address that corresponds to a particular IP address. |
|
|
Term
|
Definition
A man-in-the-middle attack (on-path attack) where the attacker associates his MAC address with someone else’s IP address (almost always the router), so all traffic will be sent to him first. The attacker sends out unsolicited ARPs, which can be either requests or replies. |
|
|
Term
|
Definition
A command used to discover hosts on a network, similar to ping, but that relies on ARP rather than ICMP. The arping command won’t cross any routers, so it only works within a broadcast domain. See also Address Resolution Protocol (ARP) and ping. |
|
|
Term
|
Definition
After a data center audit, the auditing company produces this report to detail all findings, upgrade recommendations, and compliance fixes. |
|
|
Term
|
Definition
Reusing, repurposing, or recycling computing devices that follows system life cycle policies in many organizations. |
|
|
Term
|
Definition
Managing each aspect of a network, from documentation to performance to hardware. |
|
|
Term
asymmetric digital subscriber line (ADSL) |
|
Definition
A fully digital, dedicated connection to the telephone system that provides download speeds of up to 9 Mbps and upload speeds of up to 1 Mbps. |
|
|
Term
|
Definition
An encryption method in which the key used to encrypt a message and the key used to decrypt it are different, or asymmetrical. |
|
|
Term
|
Definition
The degradation of signal over distance for a networking cable. |
|
|
Term
|
Definition
An assessment of a data center’s compliance with laws, regulations, and standards for information security, such as HIPAA or PCI DSS. An audit should be made by an outside organization that specializes in auditing to avoid any potential conflict of interest or bias. |
|
|
Term
|
Definition
The process of verifying the credentials of a user attempting to access a system. The most common set of credentials is a username and password. |
|
|
Term
Authentication, Authorization, and Accounting (AAA) |
|
Definition
A security philosophy wherein a user trying to connect to a network must first present some form of credential in order to be authenticated and then must have limitable permissions within the network. The authenticating server should also record session information about the client. |
|
|
Term
|
Definition
In Kerberos, the system that authenticates (but does not authorize) the client. After verifying the submitted credentials, the server gives the client a Ticket-Granting Ticket. See also Ticket-Granting Ticket (TGT). |
|
|
Term
|
Definition
DNS server that holds the primary zone file for a particular domain or domains. |
|
|
Term
authoritative name servers |
|
Definition
Another name for authoritative DNS servers. See authoritative DNS server. |
|
|
Term
|
Definition
A step in the AAA philosophy during which a client’s permissions are decided upon. |
|
|
Term
Automatic Private IP Addressing (APIPA) |
|
Definition
A networking feature in operating systems that enables clients to self-configure an IP address and subnet mask automatically when a DHCP server isn’t available. |
|
|
Term
|
Definition
An organizational concept within the Border Gateway protocol (BGP) that defines one or more networks that share a unified “policy” regarding how they exchange traffic with other Autonomous Systems. |
|
|
Term
|
Definition
To save important data in a secondary location as a safety precaution against the loss of the primary data. |
|
|
Term
|
Definition
Archive of important data that the disaster recovery team can retrieve in case of some disaster. |
|
|
Term
backup designated router (BDR) |
|
Definition
In OSPF networks, a second router set to take over if the designated router fails. |
|
|
Term
|
Definition
An onsite generator that provides electricity if the power utility fails. |
|
|
Term
|
Definition
A card-shaped device used for authentication; something you have, a possession factor. |
|
|
Term
|
Definition
The amount of digital data that can be transferred over a medium in a fixed amount of time. For networks, most often expressed in bits per second. |
|
|
Term
|
Definition
When the frequency of a band is filled to capacity due to a large number of devices using the same bandwidth. |
|
|
Term
|
Definition
Web site for measuring an Internet connection throughput, both download and upload speeds. |
|
|
Term
|
Definition
When a malicious user gains access to an open port and uses it to probe a host to gain information and access, as well as learn details about running services. |
|
|
Term
|
Definition
Digital signaling that has only one signal (a single signal) on the cable at a time. The signal must be in one of three states: one, zero, or idle. |
|
|
Term
|
Definition
Static image of a system’s (or network’s) performance when all elements are known to be working properly. |
|
|
Term
|
Definition
Reference record of all the hardware (including portable computers, servers, switches, routers, etc.) and software currently in use in a data center. The baseline configuration also includes network topology and placement of devices in the organization. |
|
|
Term
|
Definition
A simple form of NAT that translates a computer’s private or internal IP address to a global IP address on a one-to-one basis. |
|
|
Term
|
Definition
In wireless networking, a single access point servicing a given area. |
|
|
Term
Basic Service Set Identifier (BSSID) |
|
Definition
The MAC address of a wireless access point (WAP). |
|
|
Term
|
Definition
One analog cycle on a telephone line. |
|
|
Term
|
Definition
The number of bauds per second. In the early days of telephone data transmission, the baud rate was often analogous to bits per second. Due to advanced modulation of baud cycles as well as data compression, this is no longer true. |
|
|
Term
bidirectional (BiDi) transceiver |
|
Definition
Full-duplex fiber-optic connector that relies on wave division multiplexing (WDM) to differentiate wave signals on a single fiber, creating single strand fiber transmission. |
|
|
Term
bidirectional wavelength division multiplexing (BWDM) |
|
Definition
An older, less popular version of WDM, mostly replaced by dense wavelength division multiplexing (DWDM). |
|
|
Term
|
Definition
Human physical characteristic that can be measured and saved to be compared as authentication in granting the user access to a network or resource. Common biometrics include fingerprints, facial scans, retinal scans, voice pattern recognition, and others. |
|
|
Term
|
Definition
Device that scans fingerprints, retinas, or even the sound of the user’s voice to provide a foolproof replacement for both passwords and smart devices. |
|
|
Term
|
Definition
Access that is denied to or from a resource. A block may be implemented in a firewall, access control server, or other secure gateway. |
|
|
Term
|
Definition
An encryption algorithm that encrypts data in “chunks” of a certain length at a time. |
|
|
Term
|
Definition
Contiguous ranges of IP addresses that are assigned to organizations and end users by IANA. Also called network blocks. |
|
|
Term
|
Definition
A connector used for 10BASE-2 coaxial cable. All BNC connectors have to be locked into place by turning the locking ring 90 degrees. |
|
|
Term
|
Definition
Passive connector used to join two segments of coaxial cables that are terminated with BNC connectors. |
|
|
Term
|
Definition
Two or more NICs in a system working together to act as a single NIC to increase performance. |
|
|
Term
Bootstrap Protocol (BOOTP) |
|
Definition
Early protocol that provided dynamic IP addressing (this job has generally been replaced by DHCP) and diskless booting. |
|
|
Term
Border Gateway Protocol (BGP) |
|
Definition
An exterior gateway routing protocol that enables groups of routers to share routing information so that efficient, loop-free routes can be established. BGP connects Autonomous Systems on the Internet. The current version is BGP-4. |
|
|
Term
|
Definition
A group of computers under the control of one operator, used for malicious purposes. |
|
|
Term
|
Definition
A spot on a network where traffic slows precipitously. |
|
|
Term
|
Definition
A signal sent by one device taking many different paths to get to the receiving systems. |
|
|
Term
|
Definition
A measurement of how fast data is moved across a transmission medium. A Gigabit Ethernet connection moves 1,000,000,000 bps. |
|
|
Term
branch office (data center) |
|
Definition
A multilocation organization’s remote office served by centralized data centers. Branch offices themselves store very little data onsite. |
|
|
Term
|
Definition
A device that connects two networks and passes traffic between them based only on the node address, so that traffic between nodes on one network does not appear on the other network. For example, an Ethernet bridge only looks at the MAC address. Bridges filter and forward frames based on MAC addresses and operate at Layer 2 (Data Link layer) of the OSI seven-layer model. While wired bridges were made obsolete by switches, wireless bridges are still in use today. See also wireless bridge. |
|
|
Term
|
Definition
A circular path caused by connecting multiple switches together in a circuit. Switches use Spanning Tree Protocol (STP) to detect loops and disable the associated port. |
|
|
Term
|
Definition
An early type of DSL connection that made the DSL line function the same as if you snapped an Ethernet cable into your NIC. |
|
|
Term
bring your own device (BYOD) |
|
Definition
Mobile deployment model wherein users bring their own network-enabled devices to the work environment. These cell phones, tablets, notebooks, and other mobile devices must be easily and securely integrated and released from corporate network environments using onboarding and offboarding technologies. |
|
|
Term
|
Definition
Analog signaling that sends multiple signals over the cable at the same time. The best example of broadband signaling is cable television. The zero, one, and idle states exist on multiple channels on the same cable. See also baseband. |
|
|
Term
|
Definition
A frame or packet addressed to all machines; always limited to a broadcast domain. |
|
|
Term
|
Definition
The address a NIC attaches to a frame when it wants every other NIC on the network to read it. In TCP/IP, the general broadcast address is 255.255.255.255. In Ethernet, the broadcast MAC address is FF-FF-FF-FF-FF-FF. |
|
|
Term
|
Definition
A network of computers that hear each other’s broadcasts. |
|
|
Term
|
Definition
The result of one or more devices sending a nonstop flurry of broadcast frames on the network. |
|
|
Term
|
Definition
A type of attack wherein every permutation of some form of data is tried in an attempt to discover protected information. Commonly used to crack short passwords. |
|
|
Term
buffer (fiber-optic cable) |
|
Definition
A component of a fiber-optic cable that adds strength to the cable. |
|
|
Term
|
Definition
A network topology that uses a single bus cable that connects all of the computers in a line. Bus topology networks must be terminated to prevent signal reflection. True bus topologies are no longer used. |
|
|
Term
business continuity planning (BCP) |
|
Definition
The process of defining the steps to be taken in the event of a physical corporate crisis to continue operations at another location. Includes the creation of documents to specify facilities, equipment, resources, personnel, and their roles. |
|
|
Term
|
Definition
Eight contiguous bits; a fundamental data unit in contemporary computing. Bytes are counted in powers of two and each byte represents a decimal value between 0 and 255. |
|
|