click below
click below
Normal Size Small Size show me how
Chapter 15 Terms
| Term | Definition |
|---|---|
| Protocols | Methods and rules for communication |
| Client/server | most communication between computers use the client server model |
| TCP/IP (Transmission Control Protocol/internet protocol) | a group of suite protocols |
| Packet | transmitted data |
| Network Adapter | makes your machine capable of getting on the internet |
| MAC (Media Access Control) | a number written in hex that represents your network card |
| Local Area Network (LAN) | a network bound by routers and gateways |
| Router | a device that manages traffic between two or more networks |
| Gateway | any device or computer that network traffic can use to leave one network and go to a different model |
| IP Address | a 32 or 128 bit address that is assigned to a network connection |
| Port number, Port, Port Address | each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer |
| Dynamic IP Address | an IP address that is assigned to by a server each time it connects to the network |
| Static IP Address | an IP address that is permanently assigned to a computer or device |
| DHCP Dynamic Host Configuration Protocol | gives an IP address to a computer when it first attempts to initiate a connection to the network and request an IP address |
| DHCP Client | a computer or other device such as a printer that requires a DHCP Address |
| Internet Protocol Version 4 IPv4 | created about 4 billion potential IP addresses but they are all used up |
| Internet Protocol Version 6 IPv6 | uses 128 bit address in Hex format |
| Class A | is a single network octet |
| Class B | is 2 octets used for network |
| Class C | using 3 octets for network portion |
| Class D | used for Multicasting |
| Multicasting | in which one host sends messages to multiple hosts |
| Loopback Address | 127.0.0.1 |
| Subnet Mask | used with IPv4 identifies what portion is network and what portion is host |
| Classful Subnet Mask | if you don't divide a network into subnets the default subnet is used |
| Classless Subnet Mask | does not align with the network id with the network octets assigned by the class license |
| Public IP Addresses | the IP Addresses that are open to the public |
| Private IP Addresses | a group of IP addresses that are available on private company internet servers |
| NAT Network Address Translation | a program that substitutes public IP addresses for Private Addresses |
| Automatic Private IP Addresses APIPA | when the computer cannot lease an IP address it uses an APIPA |
| Link or local link | a LAN or Wan that has a router boundry |
| Interface | a nodes attachment link |
| Interface ID | the last 64 bits or 4 blocks of an IP addresses |
| ISATAP | Intra-Site Automatic Tunnel Addressing Protocol |
| Teredo | named after the teredo worm that bores holes in wood if IPv6 addresses intended to be used by this protocol always begin with the same 32 bit prefix |
| 6TO4 | an older tunneling protocol |
| Unicast Address | packets are delivered to a single node on the network |
| Multicast Address | Packets are delivered to all nodes on a network |
| Anycast Address | used by routers |
| Global unicast Address or Global Address | can be routed on the internet |
| Link-Local Unicast Address or Link-Local Address | can be used for communicating with nodes in the same link |
| Unique Local Unicast Address or Unique Local Address | used to identify a specific site within a large organization |
| Host Name or Computer Name | a name of a computer and can be used in place of its IP address |
| Domain Name | identifys a network |
| Fully Qualified Domain Name | identifies a computer and the network it belongs to |
| DNS Domain Name Server | used by a dns server to find an IP address |
| Name Resolution | associating a name with an IP address |
| Host File | what is loaded at startup |
| DNS Client | when windows queries the DNS Server |
| TCP | the protocol that guarantees packet delivery |
| Connection Oriented Protocol | checks to insure packet delivery |
| UDP | does not guarantee packet delivery |
| Connectionless Protocol or best effort protocol | checks to insure packet delivery |
| HTTP | a protocol used for web browsers |
| HTTPS | a secure version of HTTP |
| SMTP | used to send emails |
| SMTP AUTH | used to authenticate email servers |
| POP3 or IMAP4 | used to deliver email messages |
| Telnet | used by an Admin to access a computer remotely |
| LDAP | is used by various client applications when the application needs to query a database |
| SMB | a protocol used by windows to share files and printers on a network |
| FTP | used to transfer files between two computers |
| SSH | is used to pass login information to a remote computer |
| SFTP | used to transfer files from client to server |
| SNMP | used to monitor network traffic |
| RDP | used by windows to remote onto a desktop |
| Alternate IP Address | When you manually assign an IP address |
| Wireless Access Point | creates wireless networks |
| SSID | when the wireless device does not broadcast its name |
| Wireless Wide Area Network | to connect a computer using mobile broadband to a cellular network |
| SIM | small flash memory card |
| Virtual Private Network | used by employees when they work away from the corporate office |
| QOS | used to improve network performance |
| Port Filtering | is used to open and close certain ports |
| Port Forwarding | means when the firewall receives a request for communication from the internet to a specific computer and port |
| Port Triggering | opens a port when a Pc on the network initiates communication through another port |
| WIFI | Wireless internet connection |
| 802.11 a/b/g/n | Standards for wireless connectivity |
| Multiple input/Multiple Output | can use 2 or more antennas to improve performance |
| Radio Frequency | the frequency of waves generated by a radio signal |
| Channel | a specific radio frequency within a broader frequency |
| WEP | no longer considered a secure because the key used for encryption is static |
| WPA | More secure than wep and designed to replace it also called TKIP |
| TKIP | More secure than wep and designed to replace it also called WPA |
| WPA2 | also called the 802.11i standard is the best wireless encryption standard |
| AES | improved the way TKIP generated encryption keys |
| WPS | makes it easier for uses to connect their computers to a wireless network |