Term
|
Definition
interfaces with end devices such as pc printers to provide access to the rest of the network |
|
|
Term
|
Definition
aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination |
|
|
Term
|
Definition
is a high speed backebone of the internetwork |
|
|
Term
|
Definition
a desrable property of a network to handle growing amounts of traffic in a graceful manner |
|
|
Term
|
Definition
the duplication of devices services or connections so that in the event of a failure the redundant devices services or connections can perform the work of those that failed |
|
|
Term
|
Definition
is enhanced by avoiding the transmission of data though low performing intermediary switches |
|
|
Term
|
Definition
an ecopromising term describing the prevention and means of prevention of unauthorized access to an entity location or system |
|
|
Term
|
Definition
a measure of the lack of difficulty in managing a network devices using network menagement sofware and protocols |
|
|
Term
|
Definition
a mesaure if the lack of difficulity in keeping network devices and associated software in working order |
|
|
Term
|
Definition
the capablitiy to carry voice traffic over an ip based network with pots like functionality relaibility and voice quality |
|
|
Term
|
Definition
the speed and capability of a group of switches running STP to agree on a loop free layer2 topology for a switched lan |
|
|
Term
|
Definition
a measure of performance for a tramission system that reflects its transmission quality and service available |
|
|
Term
|
Definition
a digital or analog telephone switchboard located on the subscriber premeises and used to connect private and public telephone networks |
|
|
Term
|
Definition
the powering network devices over ethernet cable |
|
|
Term
|
Definition
a mulitilayer switch filters and forwards packets based on osi layer2 through layer7 information at wire speed by utilizing dedicated hardware that stores data structures mirroring routing table apr table and acl information |
|
|
Term
|
Definition
nonvitale memeory that can be read not written by the microproccesor |
|
|
Term
organized unique identifiyer |
|
Definition
a 3byte hexadecimal number that the ieee registration authority assigns to any company that manufactures components under the iso/iec8802 standard |
|
|
Term
|
Definition
refers to the transmission of data that in just one direction at a time |
|
|
Term
|
Definition
the capability of a port for simultaneous data tranmission and reception |
|
|
Term
|
Definition
an opotimal feature of catalist switches |
|
|
Term
|
Definition
a data trafficking tectnique used by switches in which traffic received on an interface is sent out all other the other interfaces of the switch |
|
|
Term
|
Definition
a group of host with a common set of requirements that communicate as if they were attached to the samed wire regaurdless pf their physical location |
|
|
Term
|
Definition
the time lag between the departure signal from the source and the arrival of the signal at destination |
|
|
Term
|
Definition
a technique in which frames are completly proccessed before being forwarded out to the appropriate port |
|
|
Term
|
Definition
an enthernet frame switching approach that streams data through a switch so that the leading edge of a packet exits the switch at the egress port before the packet finshes entering the ingress port |
|
|
Term
|
Definition
an enviorment that uses pictorial as well as tectual representation of the input and output applications and the data structures in which the information is stored |
|
|
Term
simple network manage protocol |
|
Definition
used to monitor and control network devices and to manage configurations statistics collections performance and security |
|
|
Term
|
Definition
ram that retains its contents when device is powered off |
|
|
Term
|
Definition
a simplified version of ftp that allows files to be transferred from one computer to another over a network in clear text without authentication |
|
|
Term
|
Definition
the application of a specific algorithym to data so as to alter the appearence of the data making it incomprehensible to those who are not authorized to see the information |
|
|
Term
|
Definition
the act of a packet or frame being represented with a false source address to mask its true source |
|
|
Term
|
Definition
a media that and protocol independent device discovery protocol that runs on all cisco manufactred equipment including rounters access servers bridges and switches |
|
|