Term
MAC (media access control) address |
|
Definition
Unique 48-bit address assigned to each network card. IEEE assigns blocks of possible addresses to various NIC manufacturers to help ensure that each address is unique. The Data Link layer of the OSI seven-layer model uses MAC addresses to locate machines. |
|
|
Term
|
Definition
A method of limiting access to a wireless network based on the physical addresses of wireless NICs. |
|
|
Term
|
Definition
A method of limiting access to a wireless network based on the physical addresses of wireless NICs. |
|
|
Term
|
Definition
IP address assigned to a specific MAC address in a DHCP server. |
|
|
Term
|
Definition
he unique 48-bit address assigned to a network interface card. This is also known as the MAC address or the EUI-48 |
|
|
Term
|
Definition
Programming within an application that enables users to control aspects of it (generally to handle repetitive tasks). Also, any type of malware that exploits application macros to replicate and activate. |
|
|
Term
|
Definition
Special holding area on an e-mail server that separates out e-mail for each user. |
|
|
Term
main distribution frame (MDF) |
|
Definition
The room in a building that stores the demarc, telephone cross-connects, and LAN cross-connects. |
|
|
Term
|
Definition
The time it takes to implement and thoroughly test a network change. |
|
|
Term
|
Definition
A user who consciously attempts to access, steal, or damage resources. |
|
|
Term
|
Definition
Any program or code (macro, script, and so on) that’s designed to do something on a system or network that you don’t want to have happen. Some examples of malware include spyware, rootkits, worms, and ransomware. |
|
|
Term
|
Definition
An attacker taps into communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or in some cases even changing the data and then sending the data on. |
|
|
Term
|
Definition
Networking devices, such as routers and advanced switches, that are extensively configurable. |
|
|
Term
|
Definition
Network that is monitored by the SNMP protocol consisting of SNMP managed devices, management information base (MIB) items, and SNMP manager(s). |
|
|
Term
|
Definition
Networking devices, such as routers and advanced switches, that are extensively configurable. |
|
|
Term
management information base (MIB) |
|
Definition
SNMP’s management database. |
|
|
Term
mandatory access control (MAC) |
|
Definition
A security model in which every resource is assigned a label that defines its security level. If the user lacks that security level, they do not get access. |
|
|
Term
|
Definition
An entryway with two successive locked doors and a small space between them providing one-way entry or exit. This is a security measure taken to prevent unauthorized entry. |
|
|
Term
|
Definition
A simple point-to-point connection between two IPv6 networks. |
|
|
Term
maximum transmission unit (MTU) |
|
Definition
Specifies the largest size of a data unit in a communications protocol, such as Ethernet. |
|
|
Term
|
Definition
|
|
Term
MD5 (Message-Digest Algorithm Version 5) |
|
Definition
An older hashing function that has been cracked and should have been replaced by now—especially in any security context. |
|
|
Term
mean time between failures (MTBF) |
|
Definition
A factor typically applied to a hardware component that represents the manufacturer’s best guess (based on historical data) regarding how much time will pass between major failures of that component. |
|
|
Term
mean time to failure (MTTF) |
|
Definition
Indicates the length of time a device is expected to last in operation. In MTTF, only a single, definitive failure will occur and will require that the device be replaced rather than repaired. |
|
|
Term
mean time to repair (MTTR) |
|
Definition
The estimated amount of time it takes to replace or fix a failed system. |
|
|
Term
Mechanical Transfer Registered Jack (MT-RJ) |
|
Definition
A type of small form factor (SFF) fiber connector. |
|
|
Term
Media Access Control (MAC) |
|
Definition
The part of a NIC that prepares outgoing frames, processes incoming frames, and controls the physical layer interface. The MAC is responsible for tasks such as addressing outgoing frames and validating the length and FCS of incoming frames. |
|
|
Term
Media Access Control (MAC) address table |
|
Definition
A database every switch maintains, listing the MAC address and port of each connected device. |
|
|
Term
|
Definition
A device that lets you interconnect different types of Ethernet cable. |
|
|
Term
Media Gateway Control Protocol (MGCP) |
|
Definition
A protocol that is designed to be a complete VoIP or video presentation connection and session controller. MGCP uses TCP ports 2427 and 2727. |
|
|
Term
|
Definition
A network of far-flung routers and servers that provides sufficient bandwidth for video teleconferencing (VTC) via quality of service (QoS) and other tools. |
|
|
Term
|
Definition
A prefix that usually stands for the binary quantity 1,048,576. One megabyte is 1,048,576 bytes. One megahertz, however, is 1,000,000 hertz. |
|
|
Term
memorandum of understanding (MOU) |
|
Definition
A document that defines an agreement between two parties in situations where a legal contract is not appropriate. |
|
|
Term
|
Definition
Topology in which each computer has a direct or indirect connection to every other computer in a network. Any node on the network can forward traffic to other nodes. Popular in cellular and many wireless networks. |
|
|
Term
|
Definition
A tool that enables a penetration tester to use a massive library of exploits and payloads as well as tweak them for specific penetrations. |
|
|
Term
|
Definition
Iteration of the Internet that relies on virtual reality (VR) environments to create a 3-D experience for user interaction. Early attempts at creating this space include Second Life (video game) and many science fiction stories, such as Neuromancer, The Matrix, and Snow Crash. Facebook uses the term Metaverse. NVIDIA refers to the space as the Omniverse. |
|
|
Term
|
Definition
Relative value that defines the “cost” of using a particular route (to determine the best one). |
|
|
Term
|
Definition
A metropolitan area network (MAN) based on the Ethernet standard. |
|
|
Term
metropolitan area network (MAN) |
|
Definition
Multiple computers connected via cabling, radio, leased phone lines, or infrared that are within the same city. A perfect example of a MAN is the Tennessee city Chattanooga’s gigabit network available to all citizens, the Chattanooga Gig. |
|
|
Term
|
Definition
A unit of measure that equals a frequency of 1 million cycles per second. |
|
|
Term
|
Definition
Also called drive mirroring, reading and writing data at the same time to two drives for fault-tolerance purposes. Considered RAID level 1. |
|
|
Term
|
Definition
Also called high-throughput, or 802.11a-ht/802.11g-ht, one of three modes used with 802.11n wireless networks wherein the wireless access point (WAP) sends special packets that support older standards yet can also improve the speed of those standards via 802. |
|
|
Term
|
Definition
A light distortion problem unique to multimode fiber-optic cable. |
|
|
Term
|
Definition
A simplified representation of a real object or process. In the case of networking, models represent logical tasks and subtasks that are required to perform network communication. |
|
|
Term
modem (modulator-demodulator) |
|
Definition
A device that converts both digital bit streams into analog signals (modulation) and incoming analog signals back into digital signals (demodulation). Most commonly used to interconnect telephone lines and computers. |
|
|
Term
|
Definition
The various multiplexing and demultiplexing technologies and protocols, both analog and digital. |
|
|
Term
modulator-demodulator (modem) |
|
Definition
A device that converts both digital bit streams into analog signals (modulation) and incoming analog signals back into digital signals (demodulation). Most commonly used to interconnect telephone lines and computers. |
|
|
Term
|
Definition
A group of computers connected to the same access switch. |
|
|
Term
|
Definition
A query that asks an NTP server about the traffic between itself and peers. |
|
|
Term
|
Definition
A feature of some video surveillance systems that starts and stops recordings based on actions caught by the camera(s). |
|
|
Term
|
Definition
Bracket that acts as a holder for a faceplate in cable installations. |
|
|
Term
|
Definition
Microsoft’s dominant variation of the CHAP protocol, uses a slightly more advanced encryption protocol. |
|
|
Term
MTU (maximum transmission unit) |
|
Definition
Specifies the largest size of a data unit in a communications protocol, such as Ethernet. |
|
|
Term
|
Definition
Method of sending a packet in which the sending computer sends it to a group of interested computers. |
|
|
Term
|
Definition
A set of IP addresses reserved for one-to-many communication, such as in streaming video conferencing. |
|
|
Term
multifactor authentication (MFA) |
|
Definition
A form of authentication where a user must use two or more factors to prove his or her identity. Methods of multifactor authentication involve knowledge factors (like passwords or pin numbers), possession factors (like a badge or smart card), and inherence factors (like fingerprints or voice). |
|
|
Term
|
Definition
A switch that has functions that operate at multiple layers of the OSI seven-layer model. |
|
|
Term
|
Definition
A tool for testing voltage (AC and DC), resistance, and continuity. |
|
|
Term
|
Definition
Type of fiber-optic cable with a large-diameter core that supports multiple modes of propagation. The large diameter simplifies connections, but has drawbacks related to distance. |
|
|
Term
|
Definition
Type of fiber-optic cable that uses LEDs. |
|
|
Term
|
Definition
An availability solution in which more than one connection or path between a server and SAN is maintained in order to ensure continued availability in the event that one connection goes down. |
|
|
Term
multiple input/multiple output (MIMO) |
|
Definition
eature in 802.11n and later WAPs that enables them to make multiple simultaneous connections. See also multiuser MIMO (MU-MIMO). |
|
|
Term
|
Definition
Device that merges information from multiple input channels to a single output channel. |
|
|
Term
Multiprotocol Label Switching (MPLS) |
|
Definition
Router feature that labels certain data to use a desired connection. It works with any type of packet switching (even Ethernet) to force certain types of data to use a certain path. |
|
|
Term
multisource agreement (MSA) |
|
Definition
A document that details the interoperability of network hardware from a variety of manufacturers. |
|
|
Term
|
Definition
The ability to support multiple customers on the same infrastructure at the same time. Multitenancy enables customers with small computing needs to only pay for what they actually need in exchange for sharing the same infrastructure with other customers. Comes with the risk those customers will hog shared resources or compromise the infrastructure (by accident or on purpose). |
|
|
Term
|
Definition
Feature of 802.11ac and later networking that enables a WAP to broadcast to multiple users simultaneously. See also multiple input/multiple output (MIMO). |
|
|
Term
|
Definition
DNS record that SMTP servers use to determine where to send mail for a given domain. |
|
|
Term
|
Definition
Terminal command in Linux that dynamically displays the route a packet is taking. Similar to traceroute. |
|
|
Term
|
Definition
A method that enables one computer on the network to locate another to establish a session. All network protocols perform name resolution by providing some form of name server. |
|
|
Term
|
Definition
DNS servers that hold the actual name and IP DNS records in a kind of database called a zone. |
|
|
Term
NAT (network address translation) |
|
Definition
A means of translating a system’s IP address into another IP address before sending it out to a larger network. NAT manifests itself by a NAT program that runs on a system or a router. A network using NAT provides the systems on the network with private IP addresses. The system running the NAT software has two interfaces: one connected to the network and the other connected to the larger network.
The NAT program takes packets from the client systems bound for the larger network and translates their internal private IP addresses to its own public IP address, enabling many systems to share a single IP address. |
|
|
Term
|
Definition
Special database in a NAT router that stores destination IP addresses and ephemeral source ports from outgoing packets and compares them against returning packets. A NAT translation table also maps internal sockets to their external counterparts. |
|
|
Term
|
Definition
A transition mechanism that attaches the bytes of an IPv4 address onto the end of an IPv6 address for network traversal. |
|
|
Term
|
Definition
The VLAN designation assigned to all frames without 802.1Q tags entering a trunk port on a switch. In addition, any frames that are part of the native VLAN will not receive an 802.1Q tag when they leave the trunk port. |
|
|
Term
near-end crosstalk (NEXT) |
|
Definition
Crosstalk at the same end of a cable from which the signal is being generated. |
|
|
Term
|
Definition
IPv6 packet sent in response to a multicast neighbor solicitation packet, telling the requesting system the MAC address of the system it solicited. |
|
|
Term
|
Definition
IPv6 protocol that performs the same functions as ARP in IPv4 and plays a role in features such as SLAAC. It consists of five ICMP control message types: neighbor solicitation, neighbor advertisement, router solicitation, router advertisement, and redirect. |
|
|
Term
Neighbor Discovery Protocol (NDP) |
|
Definition
IPv6 protocol that performs the same functions as ARP in IPv4 and plays a role in features such as SLAAC. It consists of five ICMP control message types: neighbor solicitation, neighbor advertisement, router solicitation, router advertisement, and redirect. |
|
|
Term
|
Definition
IPv6 process of finding a MAC address of a local host, given its IPv6 address. |
|
|
Term
|
Definition
Popular and extremely comprehensive vulnerability testing tool. |
|
|
Term
NetBEUI (NetBIOS Extended User Interface) |
|
Definition
Microsoft’s first networking protocol, designed to work with NetBIOS. NetBEUI is long obsolesced by TCP/IP. NetBEUI did not support routing. |
|
|
Term
NetBIOS (Network Basic Input/Output System) |
|
Definition
A protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved. |
|
|
Term
NetBIOS over TCP/IP (NetBT) |
|
Definition
A Microsoft-created protocol that enables NetBIOS naming information to be transported over TCP/IP networks. The result is that Microsoft naming services can operate on a TCP/IP network without the need for DNS services. |
|
|
Term
|
Definition
Microsoft’s first networking protocol, designed to work with NetBIOS. NetBEUI is long obsolesced by TCP/IP. NetBEUI did not support routing.
A protocol that operates at the Session layer of the OSI seven-layer model. This protocol creates and manages connections based on the names of the computers involved. |
|
|
Term
|
Definition
The primary tool used to monitor packet flow on a network. |
|
|
Term
|
Definition
Component process of NetFlow that captures and saves data from a NetFlow-enabled device’s cache for future NetFlow analysis. |
|
|
Term
|
Definition
A command-line utility used to examine the TCP/IP connections open on a given host. Once universal, though it is being replaced by ss in Linux. |
|
|
Term
|
Definition
A collection of two or more devices interconnected by telephone lines, coaxial cables, satellite links, radio, and/or some other communication technique. A computer network is a group of computers that are connected together and communicate with one another for a common purpose. Computer networks support “people and organization” networks, users who also share a common purpose for communicating. |
|
|
Term
network access control (NAC) |
|
Definition
Control over information, people, access, machines, and everything in between. |
|
|
Term
|
Definition
Rules that define who can access the network, how it can be accessed, and what resources of the network can be used. |
|
|
Term
network access server (NAS) |
|
Definition
System that controls the modems in a RADIUS network. |
|
|
Term
network address translation (NAT) |
|
Definition
A means of translating a system’s IP address into another IP address before sending it out to a larger network. NAT manifests itself by a NAT program that runs on a system or a router. A network using NAT provides the systems on the network with private IP addresses. The system running the NAT software has two interfaces: one connected to the network and the other connected to the larger network.
The NAT program takes packets from the client systems bound for the larger network and translates their internal private IP addresses to its own public IP address, enabling many systems to share a single IP address. |
|
|
Term
|
Definition
Feature-packed network box that incorporates numerous processes such as routing, network address translation (NAT), switching, intrusion detection and prevention systems, firewall, and more. |
|
|
Term
network attached storage (NAS) |
|
Definition
A dedicated file server that has its own file system and typically uses hardware and software designed for serving and storing files. |
|
|
Term
|
Definition
Also called blocks, contiguous ranges of IP addresses that are assigned to organizations and end users by IANA. |
|
|
Term
|
Definition
An equipment room that holds servers, switches, routers, and other network gear. |
|
|
Term
|
Definition
The process of gathering together and planning the layout for the equipment needed to create a network. |
|
|
Term
network function virtualization (NFV) |
|
Definition
A network architecture that applies infrastructure-as-code (IaC)-style automation and orchestration to network management. |
|
|
Term
network function virtualization infrastructure (NFVI) |
|
Definition
The foundation of hardware (such as generic servers and switches) and software (like hypervisors and controllers) that power network function virtualization (NFV). |
|
|
Term
|
Definition
A number used in IP networks to identify the network on which a device or machine exists. |
|
|
Term
|
Definition
A device by which a system accesses a network. In most cases, this is a NIC or a modem. |
|
|
Term
network interface card (NIC) |
|
Definition
Traditionally, an expansion card that enables a PC to link physically to a network. Modern computers now use built-in NICs, no longer requiring physical cards, but the term “NIC” is still very common. |
|
|
Term
network interface unit (NIU) |
|
Definition
Another name for a demarc. |
|
|
Term
|
Definition
Layer 3 of the OSI seven-layer model. |
|
|
Term
Network Management Software (NMS) |
|
Definition
Tools that enable you to describe, visualize, and configure an entire network. |
|
|
Term
network management system (NMS) |
|
Definition
A set of standards for communication with network devices (switches, routers, WAPs) connected to a TCP/IP network. Used for network management. |
|
|
Term
|
Definition
A highly detailed illustration of a network, down to the individual computers. A network map shows IP addresses, ports, protocols, and more. |
|
|
Term
|
Definition
Another name for the Service Set Identifier (SSID). |
|
|
Term
network operations center (NOC) |
|
Definition
A centralized location for techs and administrators to manage all aspects of a network. |
|
|
Term
network performance baseline |
|
Definition
Network performance and access patterns under normal conditions. A network performance baseline can be acquired through continuous performance monitoring or periodic benchmarks and is used to aid in network troubleshooting. |
|
|
Term
|
Definition
The first 64 bits of an IPv6 address that identifies the network. |
|
|
Term
|
Definition
Special software that exists in every network-capable operating system that acts to create unique identifiers for each system. It also creates a set of communication rules for issues like how to handle data chopped up into multiple packets and how to deal with routers. TCP/IP is the dominant network protocol suite today. |
|
|
Term
|
Definition
Separating network assets through various means, such as with VLANs or with a DMZ, to protect against access by malicious actors. |
|
|
Term
|
Definition
A shared resource on a network. |
|
|
Term
|
Definition
The techniques, components, and practices involved in creating and operating computer-to-computer links. |
|
|
Term
|
Definition
Any number of things that share one essential feature: the potential to damage network data, machines, or users. |
|
|
Term
Network Time Protocol (NTP) |
|
Definition
Protocol that gives the current time. |
|
|
Term
|
Definition
Refers to the way that cables and other pieces of hardware connect to one another. |
|
|
Term
network-based anti-malware |
|
Definition
A single source server that holds current anti-malware software. Multiple systems can access and run the software from that server. The single site makes the software easier to update and administer than anti-malware installed on individual systems. |
|
|
Term
|
Definition
Firewall, perhaps implemented in a gateway router or as a proxy server, through which all network traffic must pass inspection to be allowed or blocked. |
|
|
Term
|
Definition
The next router a packet should go to at any given point. |
|
|
Term
next-generation firewall (NGFW) |
|
Definition
Network protection device that functions at multiple layers of the OSI model to tackle traffic no traditional firewall can filter alone. |
|
|
Term
|
Definition
Connecting multiple NICs in tandem to increase bandwidth in smaller increments. |
|
|
Term
|
Definition
A popular open-source network scanner designed to scan a network and create a map of hosts and services by sending out packets and examining the responses. Frequently used as a vulnerability scanner. |
|
|
Term
|
Definition
A member of a network or a point where one or more functional units interconnect transmission lines. |
|
|
Term
|
Definition
Undesirable signals bearing no desired information and frequently capable of introducing errors into the communication process. |
|
|
Term
|
Definition
Software used in posture assessment that does not stay resident in client station memory. It is executed prior to login and may stay resident during the login session but is removed from client RAM when the login or session is complete. The agent presents the security characteristics to the access control server, which then decides to allow, deny, or redirect the connection. |
|
|
Term
|
Definition
Not being able to deny having sent a message. |
|
|
Term
|
Definition
A full backup of every selected file on a system. This type of backup turns off the archive bit after the backup. |
|
|
Term
|
Definition
Data traffic entering and leaving a data center. Network devices seen in north-south traffic include edge routers, edge firewalls, and load balancers. |
|
|
Term
|
Definition
A billionth of a second. Light travels a little over 11 inches in 1 ns. |
|
|
Term
|
Definition
Records that list the authoritative DNS servers for a domain. |
|
|
Term
|
Definition
A command-line tool used to query DNS servers manually for specific records. Used when a tech needs to see if a DNS record exists and confirm its value. |
|
|
Term
|
Definition
A file system for hard drives that enables object-level security, long filename support, compression, and encryption. NTFS 4.0 debuted with Windows NT 4.0. Later Windows versions continue to update NTFS. |
|
|
Term
|
Definition
Groupings of what Microsoft calls special permissions that have names like Execute, Read, and Write, and that allow or disallow users certain access to files. |
|
|
Term
|
Definition
Command that puts the NTP server into interactive mode in order to submit queries. |
|
|