Term | Definition |
Protocols | Methods and rules for communication |
Client/server | most communication between computers use the client server model |
TCP/IP (Transmission Control Protocol/internet protocol) | a group of suite protocols |
Packet | transmitted data |
Network Adapter | makes your machine capable of getting on the internet |
MAC (Media Access Control) | a number written in hex that represents your network card |
Local Area Network (LAN) | a network bound by routers and gateways |
Router | a device that manages traffic between two or more networks |
Gateway | any device or computer that network traffic can use to leave one network and go to a different model |
IP Address | a 32 or 128 bit address that is assigned to a network connection |
Port number, Port, Port Address | each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer |
Dynamic IP Address | an IP address that is assigned to by a server each time it connects to the network |
Static IP Address | an IP address that is permanently assigned to a computer or device |
DHCP Dynamic Host Configuration Protocol | gives an IP address to a computer when it first attempts to initiate a connection to the network and request an IP address |
DHCP Client | a computer or other device such as a printer that requires a DHCP Address |
Internet Protocol Version 4 IPv4 | created about 4 billion potential IP addresses but they are all used up |
Internet Protocol Version 6 IPv6 | uses 128 bit address in Hex format |
Class A | is a single network octet |
Class B | is 2 octets used for network |
Class C | using 3 octets for network portion |
Class D | used for Multicasting |
Multicasting | in which one host sends messages to multiple hosts |
Loopback Address | 127.0.0.1 |
Subnet Mask | used with IPv4 identifies what portion is network and what portion is host |
Classful Subnet Mask | if you don't divide a network into subnets the default subnet is used |
Classless Subnet Mask | does not align with the network id with the network octets assigned by the class license |
Public IP Addresses | the IP Addresses that are open to the public |
Private IP Addresses | a group of IP addresses that are available on private company internet servers |
NAT Network Address Translation | a program that substitutes public IP addresses for Private Addresses |
Automatic Private IP Addresses APIPA | when the computer cannot lease an IP address it uses an APIPA |
Link or local link | a LAN or Wan that has a router boundry |
Interface | a nodes attachment link |
Interface ID | the last 64 bits or 4 blocks of an IP addresses |
ISATAP | Intra-Site Automatic Tunnel Addressing Protocol |
Teredo | named after the teredo worm that bores holes in wood if IPv6 addresses intended to be used by this protocol always begin with the same 32 bit prefix |
6TO4 | an older tunneling protocol |
Unicast Address | packets are delivered to a single node on the network |
Multicast Address | Packets are delivered to all nodes on a network |
Anycast Address | used by routers |
Global unicast Address or Global Address | can be routed on the internet |
Link-Local Unicast Address or Link-Local Address | can be used for communicating with nodes in the same link |
Unique Local Unicast Address or Unique Local Address | used to identify a specific site within a large organization |
Host Name or Computer Name | a name of a computer and can be used in place of its IP address |
Domain Name | identifys a network |
Fully Qualified Domain Name | identifies a computer and the network it belongs to |
DNS Domain Name Server | used by a dns server to find an IP address |
Name Resolution | associating a name with an IP address |
Host File | what is loaded at startup |
DNS Client | when windows queries the DNS Server |
TCP | the protocol that guarantees packet delivery |
Connection Oriented Protocol | checks to insure packet delivery |
UDP | does not guarantee packet delivery |
Connectionless Protocol or best effort protocol | checks to insure packet delivery |
HTTP | a protocol used for web browsers |
HTTPS | a secure version of HTTP |
SMTP | used to send emails |
SMTP AUTH | used to authenticate email servers |
POP3 or IMAP4 | used to deliver email messages |
Telnet | used by an Admin to access a computer remotely |
LDAP | is used by various client applications when the application needs to query a database |
SMB | a protocol used by windows to share files and printers on a network |
FTP | used to transfer files between two computers |
SSH | is used to pass login information to a remote computer |
SFTP | used to transfer files from client to server |
SNMP | used to monitor network traffic |
RDP | used by windows to remote onto a desktop |
Alternate IP Address | When you manually assign an IP address |
Wireless Access Point | creates wireless networks |
SSID | when the wireless device does not broadcast its name |
Wireless Wide Area Network | to connect a computer using mobile broadband to a cellular network |
SIM | small flash memory card |
Virtual Private Network | used by employees when they work away from the corporate office |
QOS | used to improve network performance |
Port Filtering | is used to open and close certain ports |
Port Forwarding | means when the firewall receives a request for communication from the internet to a specific computer and port |
Port Triggering | opens a port when a Pc on the network initiates communication through another port |
WIFI | Wireless internet connection |
802.11 a/b/g/n | Standards for wireless connectivity |
Multiple input/Multiple Output | can use 2 or more antennas to improve performance |
Radio Frequency | the frequency of waves generated by a radio signal |
Channel | a specific radio frequency within a broader frequency |
WEP | no longer considered a secure because the key used for encryption is static |
WPA | More secure than wep and designed to replace it also called TKIP |
TKIP | More secure than wep and designed to replace it also called WPA |
WPA2 | also called the 802.11i standard is the best wireless encryption standard |
AES | improved the way TKIP generated encryption keys |
WPS | makes it easier for uses to connect their computers to a wireless network |