Term
|
Definition
One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks |
|
|
Term
|
Definition
One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks. |
|
|
Term
|
Definition
An unauthorized person attempting to follow an authorized person into a secure area. |
|
|
Term
|
Definition
A feature of modern server chassis that will log in the motherboard’s nonvolatile RAM (NVRAM) if the chassis has been opened. The log will show chassis intrusion with a date and time. Alternatively, the special stickers or zip ties that break when a device has been opened. |
|
|
Term
|
Definition
The connection-oriented payload of an IP packet. A TCP segment works at the Transport layer. |
|
|
Term
|
Definition
A three-packet conversation between TCP hosts to establish and start a data transfer session. The conversation begins with a SYN request by the initiator. The target responds with a SYN response and an ACK to the SYN request. The initiator confirms receipt of the SYN-ACK with an ACK. Once this handshake is complete, data transfer can begin. |
|
|
Term
|
Definition
A command-line packet sniffing tool. |
|
|
Term
|
Definition
The collection of all the protocols and processes that make TCP over IP communication over a network possible. |
|
|
Term
|
Definition
A central location for computer or telephone equipment and, most importantly, centralized cabling. All cables usually run to the telecommunications room from the rest of the installation. |
|
|
Term
Telecommunications Industry Association (TIA) |
|
Definition
The standards body that defines most of the standards for computer network cabling. Many of these standards are defined under the ANSI/TIA-568 standard. Since the Electronics Industry Association (EIA) was accredited by the American National Standards Institute (ANSI) to develop the standards, the name changed from TIA/EIA to ANSI/TIA after the EIA closed up shop in 2011. |
|
|
Term
|
Definition
The science of converting sound into electrical signals, moving those signals from one location to another, and then converting those signals back into sounds. This includes modems, telephone lines, the telephone system, and any products used to create a remote access link between a remote access client and server. |
|
|
Term
|
Definition
A program that enables users on the Internet to log onto remote systems from their own host systems. Telnet is no longer used due to its lack of encryption. |
|
|
Term
|
Definition
Device for keeping a telecommunications room at an optimal temperature. |
|
|
Term
|
Definition
The NSA’s security standard that is used to combat radio frequency (RF) emanation by using enclosures, shielding, and even paint. |
|
|
Term
Temporal Key Integrity Protocol (TKIP) |
|
Definition
The extra layer of security that Wi-Fi Protected Access (WPA) adds on top of Wired Equivalent Privacy (WEP); uses RC4 for cipher initialization. TKIP-RC4 has been replaced by CCMP-AES, which is much more difficult to crack. |
|
|
Term
Terminal Access Controller Access Control System Plus (TACACS+) |
|
Definition
A proprietary protocol developed by Cisco to support Authorization, Authentication, and Accounting (AAA) in a network with many routers and switches. It is similar to RADIUS in function, but uses TCP port 49 by default and separates AAA into different parts. |
|
|
Term
|
Definition
Software that enables a PC to communicate with another computer or network as if it were a specific type of hardware terminal. |
|
|
Term
|
Definition
Endpoint in a network segment. |
|
|
Term
TFTP (Trivial File Transfer Protocol) |
|
Definition
A protocol that transfers files between servers and clients. Unlike FTP, TFTP requires no user login. Devices that need an operating system, but have no local hard disk (for example, diskless workstations and routers), often use TFTP to download their operating systems. |
|
|
Term
|
Definition
Any form of potential attack against a network. |
|
|
Term
three-tiered architecture |
|
Definition
A traditional type of data center architecture consisting of the access layer that provides connectivity between the data center and users, the distribution layer that interconnects racks of servers, and the core layer that ties together all the switches at the distribution layer and acts as the point of connection to the external connections, including the Internet. |
|
|
Term
TIA/EIA (Telecommunications Industry Association/Electronics Industry Association) |
|
Definition
The standards body that defines most of the standards for computer network cabling. Many of these standards are defined under the ANSI/TIA-568 standard. Since the Electronics Industry Association (EIA) was accredited by the American National Standards Institute (ANSI) to develop the standards, the name changed from TIA/EIA to ANSI/TIA after the EIA closed up shop in 2011. |
|
|
Term
|
Definition
One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks |
|
|
Term
|
Definition
One of two four-pair UTP crimping standards for 10/100/1000BASE-T networks. |
|
|
Term
|
Definition
Labeling standard/guidelines published by the Telecommunications Industry Association (TIA) and accredited by the American National Standards Institute (ANSI) for cabling in commercial buildings. Replaced the TIA/EIA-606 standard/guidelines. |
|
|
Term
Ticket-Granting Ticket (TGT) |
|
Definition
Sent by an Authentication Server in a Kerberos setup if the credentials sent by the client match those in its database. The client uses the TGT to request authorization for network resources from the Ticket-Granting Server. |
|
|
Term
time-domain reflectometer (TDR) |
|
Definition
Advanced cable tester that tests the length of cables and their continuity or discontinuity, and identifies the location of any discontinuity due to a bend, break, unwanted crimp, and so on. |
|
|
Term
|
Definition
A field in the IP header that indicates the number of hops a packet can make before it hits its demise and gets discarded by a router. |
|
|
Term
|
Definition
The extra layer of security that Wi-Fi Protected Access (WPA) adds on top of Wired Equivalent Privacy (WEP); uses RC4 for cipher initialization. TKIP-RC4 has been replaced by CCMP-AES, which is much more difficult to crack. |
|
|
Term
TLS (Transport Layer Security) |
|
Definition
hosts use public-key cryptography to securely negotiate a cipher and symmetric key over an unsecured network, and the symmetric key to encrypt the rest of the session. Current name for the historical SSL protocol. |
|
|
Term
|
Definition
Generic term for two devices used together—a tone generator and a tone locator (probe)—to trace cables by sending an electrical signal along a wire at a particular frequency. The tone locator then emits a sound when it distinguishes that frequency. Also referred to as Fox and Hound. |
|
|
Term
|
Definition
Generic term for two devices used together—a tone generator and a tone locator (probe)—to trace cables by sending an electrical signal along a wire at a particular frequency. The tone locator then emits a sound when it distinguishes that frequency. Also referred to as Fox and Hound. |
|
|
Term
|
Definition
Host that receives the most data on a network. |
|
|
Term
|
Definition
Host that sends the most data on a network. |
|
|
Term
top-level domain (TLD) names |
|
Definition
Peak of the hierarchy for naming on the Internet; these include the .com, .org, .net, .edu, .gov, .mil, and .int names, as well as international country codes such as .us, .eu, etc. |
|
|
Term
|
Definition
A set of DNS servers—just below the root servers—that handle the top-level domain names, such as .com, .org, .net, and so on. |
|
|
Term
|
Definition
An implementation of access switches in which every equipment rack uses one (or two for redundancy) Layer 2 switches sitting at the top of the rack, connecting to all the systems on the rack. Top-of-rack switches are co-resident in the rack with servers, as compared to switches that reside in a separate rack. |
|
|
Term
|
Definition
The pattern of interconnections in a communications system among devices, nodes, and associated input and output stations. Also describes how computers connect to each other without regard to how they actually communicate. |
|
|
Term
tracert (also traceroute) |
|
Definition
A command-line utility used to follow the path a packet takes between two hosts. |
|
|
Term
tracert –6 (also traceroute6) |
|
Definition
A command-line utility that checks a path from the station running the command to a destination host. Adding the –6 switch to the command line specifies that the target host uses an IPv6 address. traceroute6 is a Linux command that performs a traceroute to an IPv6 addressed host. |
|
|
Term
|
Definition
The process of extracting knowledge from traffic flows on a network. |
|
|
Term
|
Definition
Controlling the flow of packets into or out of the network according to the type of packet or other rules. |
|
|
Term
|
Definition
Unusual and usually dramatic increase in the amount of network traffic. Traffic spikes may be the result of normal operations within the organization or may be an indication of something more sinister. |
|
|
Term
|
Definition
The portion of an Ethernet frame that is the frame check sequence (FCS). |
|
|
Term
|
Definition
Interchangeable network modules that make it easy to change the media (and associated Ethernet standards) a network device uses. Most often used to provide fiber-optic interfaces for switches, routers, and NICs. |
|
|
Term
Transmission Control Protocol (TCP) |
|
Definition
A Layer 4 connection-oriented protocol within the TCP/IP suite. TCP provides a reliable communications channel over an unreliable network by ensuring all packets are accounted for and retransmitted if any are lost. |
|
|
Term
Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
Definition
A set of communication protocols developed by the U.S. Department of Defense that enables dissimilar computers to share information over a network. IP provides an address scheme and delivers packets between hosts, while TCP ensures the data is transferred reliably and accurately. |
|
|
Term
|
Definition
A multiple-antenna technology in 802.11n WAPs that helps get rid of dead spots. |
|
|
Term
|
Definition
he fourth layer in the open systems interconnection (OSI) network model.
The OSI model divides the tasks involved with moving information between networked computers into seven smaller, more manageable task groups. Each of the seven OSI layers is assigned a task or group of tasks.
The transport layer's tasks include error correction as well as segmenting and desegmenting data before and after it's transported across the network. This layer is also responsible for flow control and making sure that segmented data is delivered over the network in the correct sequence.
Layer 4 (the transport layer) uses the transmission control protocol (TCP) & user data protocol (UDP) to carry out its tasks. |
|
|
Term
Transport Layer Security (TLS) |
|
Definition
hosts use public-key cryptography to securely negotiate a cipher and symmetric key over an unsecured network, and the symmetric key to encrypt the rest of the session. Current name for the historical SSL protocol. |
|
|
Term
|
Definition
Out-of-tolerance condition in an SNMP managed device. |
|
|
Term
Trivial File Transfer Protocol (TFTP) |
|
Definition
A protocol that transfers files between servers and clients. Unlike FTP, TFTP requires no user login. Devices that need an operating system, but have no local hard disk (for example, diskless workstations and routers), often use TFTP to download their operating systems. |
|
|
Term
|
Definition
A virus that masquerades as a file with a legitimate purpose, so that a user will run it intentionally. A common example would be a fake antivirus program that introduces some kind of malicious program under the guise of protecting the computer. |
|
|
Term
|
Definition
A port on a switch configured to carry all data, regardless of VLAN number, between all switches in a LAN. |
|
|
Term
|
Definition
The process of transferring VLAN data between two or more switches. |
|
|
Term
|
Definition
An account that has been granted specific authority to perform certain or all administrative tasks. |
|
|
Term
|
Definition
An encrypted link between two programs on two separate computers. |
|
|
Term
|
Definition
In IPv6, a service that creates the actual tunnel and (usually) offers a custom-made endpoint client for you to use, although more advanced users can often make a manual connection. |
|
|
Term
Tunnel Information and Control (TIC) protocol |
|
Definition
One of the protocols that sets up IPv6 tunnels and handles configuration as well as login. |
|
|
Term
Tunnel Setup Protocol (TSP) |
|
Definition
One of the protocols that sets up IPv6 tunnels and handles configuration as well as login. |
|
|
Term
|
Definition
Twisted pairs of cables, the most overwhelmingly common type of cabling used in networks. The two types of twisted pair cabling are UTP (unshielded twisted pair) and STP (shielded twisted pair). The twists serve to reduce interference, called crosstalk; the more twists, the less crosstalk. |
|
|
Term
two-factor authentication |
|
Definition
A method of security authentication that requires two separate means of authentication; for example, some sort of physical token that, when inserted, prompts for a password. Also called multifactor authentication (MFA). |
|
|
Term
|
Definition
Freeform type of DNS record that holds a text value. Most commonly used for SPF, DKIM, and DMARC. |
|
|
Term
|
Definition
Part of an Ethernet frame that describes/labels the frame contents. |
|
|
Term
|
Definition
The unique height measurement used with equipment racks; 1 U equals 1.75 inches. |
|
|
Term
|
Definition
One of three components of a unified communication (UC) network, it is used to handle voice, video, and more. |
|
|
Term
|
Definition
One of three components of a unified communication (UC) network, it is an edge device used to add extra services to an edge router. |
|
|
Term
|
Definition
One of three components of a unified communication (UC) network, it is typically a dedicated box that supports any UC-provided service. |
|
|
Term
UDP (User Datagram Protocol) |
|
Definition
Connectionless protocol in the TCP/IP suite. Has less overhead and better performance than TCP, but also a higher risk of errors. Fire-and-forget UDP datagrams do a lot of important behind-the-scenes work in a TCP/IP network. |
|
|
Term
|
Definition
A connectionless networking container used in UDP communication. |
|
|
Term
ultra-physical contact (UPC) connector |
|
Definition
Fiber-optic connector that makes physical contact between two fiber-optic cables. The fibers within a UPC are polished extensively for a superior finish and better junction integrity. |
|
|
Term
|
Definition
Unsecure communication between two hosts that pass data using cleartext. A Telnet connection is a common unencrypted channel. |
|
|
Term
|
Definition
A unique IP address that identifies a specific host on a network. |
|
|
Term
|
Definition
An antenna that focuses all of its transmission energy in a single, relatively narrow direction. Similarly, its design limits its ability to receive signals that are not aligned with the focused direction. |
|
|
Term
unified communication (UC) |
|
Definition
A system that rolls many different network services into one. Instant messaging (IM), telephone service, and video conferencing are a few examples. |
|
|
Term
unified threat management (UTM) |
|
Definition
A firewall that is also packaged with a collection of other processes and utilities to detect and prevent a wide variety of threats. These protections include intrusion detection systems, intrusion prevention systems, VPN portals, load balancers, and other threat mitigation apparatus. |
|
|
Term
|
Definition
Complete self-contained Internet services that rely on nothing more than software installed on computers and the computers’ microphone/speakers to provide voice telecommunication over the Internet. All of the interconnections to the public switched telephone network (PSTN) are handled in the cloud. |
|
|
Term
uniform resource locator (URL) |
|
Definition
An address that defines the type and the location of a resource on the Internet. URLs are used in almost every TCP/IP application. An example of HTTPS URL is https://www.totalsem.com. |
|
|
Term
uninterruptible power supply (UPS) |
|
Definition
A device that supplies continuous clean power to a computer system the whole time the computer is on. Protects against power outages and sags. The term UPS is often used mistakenly when people mean standby power supply or system (SPS). |
|
|
Term
|
Definition
The unique height measurement used with equipment racks; 1 U equals 1.75 inches. |
|
|
Term
|
Definition
A family of computer software operating systems (including macOS and Linux) descended from or heavily influenced by AT&T’s UNIX |
|
|
Term
|
Definition
transfers data between hosts in an unencrypted (cleartext) format. If these packets are intercepted between the communicating hosts, their data is completely exposed and readable. |
|
|
Term
unshielded twisted pair (UTP) |
|
Definition
A popular cabling for telephone and networks composed of pairs of wires twisted around each other at specific intervals. The twists serve to reduce interference (also called crosstalk). The more twists, the less interference. The cable has no metallic shielding to protect the wires from external interference, unlike its cousin, STP. Gigabit Ethernet (1000BASE-T) uses UTP, as an example. UTP is available in a variety of grades |
|
|
Term
|
Definition
Regular analog phone lines, not used for data communications |
|
|
Term
|
Definition
Supports speeds up to 4 Mbps |
|
|
Term
|
Definition
Supports speeds up to 16 Mbps |
|
|
Term
|
Definition
Supports speeds up to 20 Mbps |
|
|
Term
|
Definition
Supports speeds up to 100 Mbps |
|
|
Term
|
Definition
Supports speeds up to 100 Mbps with two pairs and up to 1000 Mbps with four pairs |
|
|
Term
|
Definition
Improved support for speeds up to 10 Gbps |
|
|
Term
|
Definition
Extends the length of 10-Gbps communication to the full 100 meters commonly associated with UTP cabling |
|
|
Term
|
Definition
A standard (unrecognized by TIA) for UTP wiring with support for 10+ Gbps |
|
|
Term
|
Definition
An account that has been granted no administrative powers. |
|
|
Term
|
Definition
Port on a switch that enables you to connect two switches together using a straight-through cable. |
|
|
Term
|
Definition
The transfer of information from a user’s system to a remote computer system. Opposite of download. |
|
|
Term
|
Definition
A device that supplies continuous clean power to a computer system the whole time the computer is on. Protects against power outages and sags. The term UPS is often used mistakenly when people mean standby power supply or system (SPS). |
|
|
Term
|
Definition
An address that defines the type and the location of a resource on the Internet. URLs are used in almost every TCP/IP application. An example of HTTPS URL is https://www.totalsem.com. |
|
|
Term
|
Definition
Anyone who uses a computer. |
|
|
Term
|
Definition
A record on a network server used to save information that identifies a user to the application, operating system, or network, including name, password, username, groups to which the user belongs, and other information based on the user and the OS or NOS being used. Usually defines the rights and roles a user has on a system. |
|
|
Term
User Datagram Protocol (UDP) |
|
Definition
Connectionless protocol in the TCP/IP suite. Has less overhead and better performance than TCP, but also a higher risk of errors. Fire-and-forget UDP datagrams do a lot of important behind-the-scenes work in a TCP/IP network. |
|
|
Term
|
Definition
A collection of settings that corresponds to a specific user account and may follow the user, regardless of the computer at which he or she logs on. These settings enable the user to have customized environment and security settings. |
|
|
Term
|
Definition
A security system in which each user has an account, and access to resources is based on user identity |
|
|
Term
|
Definition
A simple, passive, double-ended connector with female connectors on both ends. UTP couplers are used to connect two UTP cable segments together to achieve longer length when it is deemed unnecessary or inappropriate to use a single, long cable. |
|
|