Comprehensive N008 Network+ Acronyms

¡Supera tus tareas y exámenes ahora con Quizwiz!

DNS

(Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses.

MT-RJ

- Mechanical Transfer Register Jack. - A fiber optic cable connector that is very popular for small form factor devices due to its small size. - Smallest connector

MIMO

- Multiple-input multiple-output - Multiple transmit and receive antennas 802.11n uses

NAT

- Network Address Translation (NAT), dynamic routing. conserves IP addresses by enabling private IP networks using unregistered IP addresses to go online.

NGFW

A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. It is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.

PDU

A protocol data unit (PDU) is an open-system interconnection (OSI) term used in telecommunications that refers to a group of information added or removed by a layer of the OSI model

AUP

Acceptable Use Policy What is acceptable use of company assets? - Detailed documentation - May be documented in the Rules of Behavior • Covers many topics - Internet use, telephones, computers, mobile devices, etc. • Used by an organization to limit legal liability - If someone is dismissed, these are the well-documented reasons why

ACL

Access Control List Allow or disallow traffic based on - Groupings of categories - Source IP, Destination IP, port number, time of day, application, etc

AP

Access Point Not a wireless router - A wireless router is a router and an access point in a single device • An access point is a bridge - Extends the wired network onto the wireless network - OSI layer 2 device

ARP

Address Resolution Protocol the protocol used to associate the IP address to a MAC address. When a host wants to send a packet to another host, say IP address 10.5. 5.1, on its local area network (LAN), it first sends out (broadcasts) an ARP packet

AES

Advanced Encryption Standard - Symmetric block cipher chosen by the U.S. government to protect classified information

OTDR

An Optical Time Domain Reflectometer (OTDR) is a device that tests the integrity of a fiber cable and is used for the building, certifying, maintaining, and troubleshooting fiber optic systems.

APC

Angled Physical Contact (Angle-Polished Connectors) Ferrule end-face radius polished at an eight degree angle - Lower return loss, generally higher insertion loss than UPC (Fiber)

AH

Authentication Header Data integrity • Origin authentication • Replay attack protection • Keyed-hash mechanism • No confidentiality/encryption

AAAA

Authentication, Authorization, Accounting and Address - is another type of DNS Record that points a domain or subdomain to an IPv6 address, so that when someone types that domain or subdomain in the address bar, the browser knows where to go.

APIPA

Automatic Private Internet Protocol Addressing • A link-local address - No forwarding by routers • IETF has reserved 169.254.0.1 - through 169.254.255.254 - First and last 256 addresses are reserved - Functional block of 169.254.1.0 through 169.254.254.255

BGP

Border Gateway Protocol Determines route based on paths, network policies, or configured rule-sets

BYOD

Bring Your Own Device • Bring Your Own Device or Bring Your Own Technology • Employee owns the device - Need to meet the company's requirements • Difficult to secure - It's both a home device and a work device - How is data protected? - What happens to the data when a device is sold or traded in?

BNC

British Naval Connector/Bayonet Neill-Concelman

CAN

Campus Area Network Corporate Area Network • Limited geographical area - A group of buildings • LAN technologies - Fiber connected, high speed Ethernet • Your fiber in the ground - No third-party provider

CNAME

Canonical Name A name is an alias of another, canonical name - One physical server, multiple services

CSMA/CA

Carrier-Sense Multiple Access with Collision Avoidance

CSMA/CD

Carrier-Sense Multiple Access with Collision Detection Listen for an opening - Don't transmit if the network is already busy • Send a frame of data - You send data whenever you can - There's no queue or prioritization • If a collision occurs - Transmit a jam signal to let everyone know a collision has occurred - Wait a random amount of time, then retry

CSU

Channel Service Unit is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa. For example, if you have a Web business from your own home and have leased a digital line (perhaps a T-1 or fractional T-1 line) to a phone company or a gateway at an Internet service provider, you have a CSU/DSU at your end and the phone company or gateway host has a CSU/DSU at its end.

CIDR

Classless Inter-Domain Routing a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.

CWDM

Coarse Wavelength Division Multiplexing 10GBASE-LX4 uses four 3.125 Gbit/sec carriers at four different wavelengths

CDMA

Code Division Multiple Access - Everyone communicates at the same time - Each call uses a different code - The codes are used to filter each call on the receiving side • Used by Verizon and Sprint - Handsets are controlled by the network provider - Not much adoption elsewhere. CDMA (Code-Division Multiple Access) refers to any of several protocols used in second-generation (2G) and third-generation (3G) wireless communications. As the term implies, CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth.

CLI

Command-Line Interface Study command line tools

CVE

Common Vulnerabilities and Exposures A community managed list of vulnerabilities - Sponsored by the U.S. Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA)

CIA

Confidentiality, Integrity, and Availability Combination of principles - The fundamentals of security • Confidentiality - Prevent disclosure of information to unauthorized individuals or systems • Integrity - Messages can't be modified without detection • Availability - Systems and networks must be up and running

CAM

Content Addressable Memory (table) a system memory construct used by Ethernet switch logic which stores information such as MAC addresses available on physical ports with their associated VLAN Parameters. Switch table

CRC

Cyclic Redundancy Check Error indicates when data is corrupted. Calculating from all data, CRC validates packets of information sent by devices and verifies it against the data extracted, ensuring its accuracy.

DLP

Data Loss Prevention • Where's your data? - Social Security numbers, credit card numbers, medical records • Detailed policies needed to define what is allowed - How is sensitive data transferred? - Is the data encrypted? How? • DLP solutions can watch and alert on policy violations - Often requires multiple solutions in different places

DSU

Data Service Unit is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.

DoS

Denial-of-Service Attack meant to shut down a machine or a network

DWDM

Dense Wavelength Division Multiplexing Multiplex multiple OC carriers into a single fiber - Add 160 signals, increase to 1.6 Tbit/s

DaaS

Desktop as a Service Basic application usage - Applications actually run on a remote server - Virtual Desktop Infrastructure (VDI), Desktop as a Service (DaaS) - Local device is a keyboard, mouse, and screen. • Minimal operating system on the client - No huge memory or CPU needs • Network connectivity - Big network requirement - Everything happens across the wire

DSL

Digital Subscriber Line ADSL (Asymmetric Digital Subscriber Line) - Uses telephone lines • Download speed is faster than the upload speed (asymmetric) - ~10,000 foot limitation from the central office (CO) - 200 Mbit/s downstream / 20 Mbit/s upstream are common - Faster speeds may be possible if closer to the CO

DDoS

Distributed Denial-of-Service Botnet attack

DHCP

Dynamic Host Configuration Protocol IPv4 address configuration used to be manual - IP address, subnet mask, gateway, DNS servers, NTP servers, etc. • Dynamic Host Configuration Protocol - Provides automatic addresses and IP configuration for almost all devices

EIRP

Effective Isotropic Radiated Power the total radiated power from a transmitter antenna times the numerical directivity of the antenna in the direction of the receiver, or the power delivered to the antenna times the antenna numerical gain.

EIA

Electronic Industries Association • ANSI/TIA/EIA 606 - Administration Standard for the Telecommunications - Infrastructure of Commercial Buildings • Presentation of information - Reports, drawings, work orders • Pathway, space, grounding - Identifiers, Labeling • Cables - Identifiers, labels, color coding, bar coding

ESP

Encapsulating Security Payload Data confidentiality (encryption) • Limited traffic flow confidentiality • Data integrity • Anti-replay protection

EIGRP

Enhanced Interior Gateway Routing Protocol is a network protocol that enables routers to exchange information more efficiently than earlier network protocols, such as Interior Gateway Routing Protocol (IGRP) or Border Gateway Protocol (BGP).

EUI

Extended Unique Identifier allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identifier (EUI-64). This feature is a key benefit over IPv4 as it eliminates the need of manual configuration or DHCP as in the world of IPv4.

FCoE

Fibre Channel over Ethernet a method of supporting converged Fibre Channel (FC) and Ethernet traffic on a data center bridging (DCB) network. FCoE encapsulates unmodified FC frames in Ethernet to transport the FC frames over a physical Ethernet network.

FTP

File Transfer Protocol tcp/20 (active mode data), tcp/21 (control) - Transfers files between systems - Authenticates with a username and password - Full-featured functionality (list, add, delete, etc.)

FHRP

First Hop Redundancy Protocol - Your computer is configured with a single default gateway - We need a way to provide availability if the default gateway fails

GRE

Generic Routing Encapsulation - The "tunnel" between two endpoints • Encapsulate traffic inside of IP - Two endpoints appear to be directly connected to each other - No built-in encryption

GBIC

Gigabit Interface Converter a transceiver that converts electric currents (digital highs and lows) to optical signals, and optical signals to digital electric currents.

GSM

Global System for Mobile Communications

HA

High Availability

ICS

Industrial Control System command and control networks and systems designed to support industrial processes. The largest subgroup of ICS is SCADA

IaaS

Infrastructure as a Service Sometimes called Hardware as a Service (HaaS) - Outsource your equipment • You're still responsible for the management - And for the security • Your data is out there, but more within your control • Web server providers

IDF

Intermediate Distribution Frame Extension of the MDF - A strategic distribution point • Connects the users to the network - Uplinks from the MDF - Workgroup switches - Other local resources • Common in medium to large organizations - Users are geographically diverse

ICMP

Internet Control Message Protocol - "Text messaging" for your network devices • Another protocol carried by IP - Not used for data transfer • Devices can request and reply to administrative requests - Hey, are you there? / Yes, I'm right here. • Devices can send messages when things don't go well - That network you're trying to reach is not reachable from here - Your time-to-live expired, just letting you know

IGMP

Internet Group Management Protocol - Hosts and routers use IGMP to direct multicast transmissions

IMAP

Internet Message Access Protocol v4 - tcp/143 - Manage email inbox from multiple clients

IPSec

Internet Protocol Security Security for OSI Layer 3 - Authentication and encryption for every packet • Confidentiality and integrity/anti-replay - Encryption and packet signing • Very standardized - Common to use multi-vendor implementations • Two core IPSec protocols - Authentication Header (AH) - Encapsulation Security Payload (ESP)

IPv4

Internet Protocol version 4

IPv6

Internet Protocol version 6

ISP

Internet Service Provider

iSCSI

Internet Small Computer Systems Interface Internet Small Computer Systems Interface - Send SCSI commands over an IP network - Created by IBM and Cisco, now an RFC standard • Makes a remote disk look and operate like a local disk - Like Fibre Channel • Can be managed quite well in software - Drivers available for many operating systems - No proprietary topologies or hardware needed

IDS

Intrusion Detection System • Intrusions - Exploits against operating systems, applications, etc. - Buffer overflows, cross-site scripting, other vulnerabilities • Detection vs. Prevention - Detection - Alarm or alert - Prevention - Stop it before it gets into the network

IPS

Intrusion Prevention System • Intrusions - Exploits against operating systems, applications, etc. - Buffer overflows, cross-site scripting, other vulnerabilities • Detection vs. Prevention - Detection - Alarm or alert - Prevention - Stop it before it gets into the network

MPLS

Learning from ATM and Frame Relay • Packets through the WAN have a label - Routing decisions are easy • Any transport medium, any protocol inside - IP packets, ATM cells, Ethernet frames - OSI layer 2.5 (!) • Increasingly common WAN technology - Ready-to-network

LED

Light-Emitting Diode

LDAP

Lightweight Directory Access Protocol Protocol for reading and writing directories over an IP network - An organized set of records, like a phone directory • X.500 specification was written by the International Telecommunications Union (ITU) - They know directories! • DAP ran on the OSI protocol stack - LDAP is lightweight, and uses TCP/IP (tcp/389 and udp/389) • LDAP is the protocol used to query and update an X.500 directory - Used in Windows Active Directory, Apple OpenDirectory, OpenLDAP, etc. • Hierarchical structure - Builds a tree • Container objects - Country, organization, organizational units • Leaf objects - Users, computers, printers, files

LDAPS

Lightweight Directory Access Protocol (over SSL) - A non-standard implementation of LDAP over SSL - Still in use today

LACP

Link Aggregation Control Protocol is a standards-based method to control the bundling of several physical network links together to form a logical channel for increased bandwidth and redundancy purposes.

LAN

Local Area Network

LC

Local Connector a small form factor (SFF) connector, which is designed to join LC fibers where a connection or disconnection is required.

LTE

Long-Term Evolution 4G

MX

Mail exchanger record (MX) • Determines the host name for the mail server - this isn't an IP address; it's a name

MDF

Main Distribution Frame Central point of the network - Usually in a data center • Termination point for WAN links - Connects the inside to the outside • Good test point - Test in both directions • This is often the data center - The central point for data

MIB

Management Information Base is a Simple Network Management Protocol (SNMP) flat-file, nonrelational database that describes devices being monitored. Network management platforms monitor nodes by reading the value of the managed resources in the MIB.

MAC

Media Access Control/Medium Access Control a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.

MDIX

Medium Dependent Interface Crossover is a type of Ethernet port connection that uses twisted-pair cabling to link two networked devices.

MOU

Memorandum of Understanding (MOU) - Both sides agree on the contents of the memorandum - Usually includes statements of confidentiality - Informal letter of intent; not a signed contract

MAN

Metropolitan Area Network

MU-MIMO

Multi-User MIMO used by 802.11ac and 802.11ax

mGRE

Multipoint Generic Routing Encapsulation Multipoint Generic Router Encapsulation - Used extensively for Dynamic Multipoint VPN (DMVPN) - Common on Cisco routers • Your VPN builds itself - Remote sites communicate to each other • Tunnels are built dynamically, on-demand - A dynamic mesh

NAC

Network Access Control (NAC) • IEEE 802.1X - Port-based Network Access Control (NAC) - You don't get access until you authenticate • We're talking about physical interfaces - Not TCP or UDP ports • Makes extensive use of EAP and RADIUS - Extensible Authentication Protocol / Remote Authentication Dial In User Service • Administrative enable/disable - Disable your unused ports • Duplicate MAC address checking - Stop the spoofers

NS

Network Simulator (NS) is simply a discrete event-driven network simulation tool for studying the dynamic nature of communication networks. Network Simulator 2 (NS2) provides substantial support for simulation of different protocols over wired and wireless networks.

NFV

Network function virtualization (NFV) • Replace physical network devices with virtual versions - Manage from the hypervisor • Same functionality as a physical device - Routing, switching, load balancing, firewalls, etc. • Quickly and easily deploy network functions - Click and deploy from the hypervisor • Many different deployment options - Virtual machine, container, fault tolerance, etc.

NDA

Non-disclosure agreement (NDA) • Confidentiality agreement between parties - Information in the agreement should not be disclosed • Protects confidential information - Trade secrets, business activities - Anything else listed in the NDA • Unilateral or bilateral (or multilateral) - One-way NDA or mutual NDA • Formal contract - Signatures are usually required

OID

OIDs stands for Object Identifiers. OIDs uniquely identify managed objects in a MIB hierarchy. This can be depicted as a tree, the levels of which are assigned by different organizations.

OSPF

Open Shortest Path First (OSPF) is a link-state routing protocol that was developed for IP networks and is based on the Shortest Path First (SPF) algorithm. OSPF is an Interior Gateway Protocol

PAN

Personal Area Network

PAT

Port Address Translation (PAT) is an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address to conserve IP addresses.

PoE

Power over Ethernet (PoE) is technology that passes electric power over twisted-pair Ethernet cable to powered devices (PD), such as wireless access points, IP cameras, and VoIP phones in addition to the data that cable usually carries.

NTD

The Network Termination Device (NTD) or NBN Connection Box has several ports on the bottom to deliver telephone (if included in your plan) and internet services.

NIC

The network interface card (NIC) or network card is the hardware device most essential to establishing communication between computers.

PaaS

is a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.

MTU

maximum transmission unit - The largest data unit a network (for example, Ethernet or token ring) will accept for transmission.

EAP

• Extensible Authentication Protocol (EAP) - An authentication framework • Many different ways to authenticate based on RFC standards - Manufacturers can build their own EAP methods • EAP integrates with 802.1X - Prevents access to the network until the authentication succeeds

MTBF

• Mean time between failures (MTBF) - Predict the time between outages

MTTR

• Mean time to repair (MTTR) - Time required to fix the issue

NAS

• Network Attached Storage (NAS) - Connect to a shared storage device across the network - File-level access


Conjuntos de estudio relacionados

Python for CP1-2 (Part 1:Beginning)

View Set

Marine Science Chapter Four: Waves and Tides

View Set

everything about world history up until the protestant reformation

View Set

Effective Supervisory Practices 5th Ed. Chapters 8-16

View Set

La 50 preguntas y contestaciones de la tabla periódica

View Set

Prep U: Chapter 38- End of Life Care

View Set