SG Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IEEE 802 suite of protocols

A collection of protocols that define various types of local area networks, metropolitan area networks, and wireless networks. For example, the IEEE 802.3 protocol defines the protocol for CSMA/CD local area networks.

network attached storage

A computer system attached to a network that provides both network storage and the file system that controls the storage. Not the same as a storage area network.

Server

A computer that stores the network software and shared or private user files.

Striping

A concept used in RAID in which data is broken into pieces and each piece is stored on a different disk drive.

carrier sense multiple access with collision avoidance (CSMA/CA)

A contention-based medium access control protocol for wireless networks in which wireless workstations can only transmit at designated times, in an attempt to avoid collisions.

Bindery

A database that contains information on every resource connected to this one server, including users, groups of users, printers, and data sets.

network operating system (NOS)

A large, complex program that can manage all the resources that are commonly found on most local area networks, in addition to performing the standard functions of an operating system. Linux, Unix, Netware derivatives, windows server

licensing agreement

A legal contract that describes a number of conditions that must be upheld for proper use of the software package.

wireless LAN

A network configuration that uses radio waves for intercommunication.

server blade

A network server that is contained on a printed circuit board that can be plugged into a rack with other server blades.

Wi-Fi Protected Access II(WPA2)

A new security standard to replace WPA; supports the IEEE 802.11i standard and uses AES.

uninstall software

A program that works with the user to locate and remove applications that are no longer desired.

Temporal Key Integrity Program (TKIP)

A security protocol that was designed for use with the wireless IEEE 802.11i standard and replaced WEP.

Wi-Fi Protected Access(WPA)

A set of security standards used to protect wireless LAN transmissions that is an improvement over Wired Equivalency Protocol in that it provides dynamic key encryption (although it, too, uses a 40-bit key) and mutual authentication for wireless clients.

wireless Ethernet

A shorthand term often used to denote the transmission of signals without the use of wires.

hidden workstation

A situation when two wireless devices can communicate to an access point but cannot "see" each other (two devices cannot intercommunicate by themselves).

General Public License (GPL)

A software license that allows the creator to distribute the software for free; recipients may alter the software as they wish, but must still give the altered software away for free.

application programming interface (API)

A software module that acts as an interface between application programs and technical entities, such as telephone switching systems.

server appliance

A specialized network server, such as a server that is specifically designed for database systems or for Web serving.

IEEE 802.11n

A standard created by IEEE to support wireless local area networks with transmission speeds as high, theoretically, as 600 Mbps. Uses MIMO Technology.

storage area network

A storage system that allows users to store files on a network. The file system is not controlled by a SAN but is left to the client. Not the same as network attached storage.

disk mirroring

A technique used in RAID systems in which data is duplicated onto two drives simultaneously in order to provide a backup for the data.

multiple input multiple output (MIMO)

A technology used in wireless LANs in which sending and receiving devices have multiple antennas and transmit data over multiple streams in an effort to send data faster with fewer errors.

Utilities

A type of network software that often operates in the background and supports one or more functions to keep the network or computer running at optimal performance.

IEEE 802.11g

A wireless local area network protocol that is capable of supporting a theoretical transmission speed of 54 Mbps in the 2.4-GHz frequency range.

IEEE 802.11a

A wireless local area network protocol that is capable of supporting a theoretical transmission speed of 54 Mbps in the 5-GHz frequency range.

thin client

A workstation computer that is connected to a network and has no CD/DVD drive drive or hard disk storage.

remote access software

Allows a person to access all of the possible functions of a personal computer workstation from a mobile or remote location.

interactive user license

An agreement in which the number of concurrent active users of a particular software package is strictly controlled.

site license

An agreement that allows a company to install copies of a software program on all the machines at a single site.

single-user-multiple-station license

An agreement that allows a person to install a copy of a software program on multiple computers—for example, on his or her home computer as well as his or her work computer.

single-user-single-station license

An agreement that allows a person to install a single copy of a software program on only one computer.

corporate license

An agreement that allows a software package to be installed anywhere within a corporation, even if the installation involves multiple sites.

leaf objects

An object in a hierarchical directory structure that is composed of no further objects and includes entities such as users, peripherals, servers, printers, queues, and other network resources.

organizational unit (OU)

An object in a hierarchical tree structure for a local area network operating system that is composed of further objects.

IEEE 802.11b

An older wireless local area network protocol that is capable of supporting a theoretical transmission speed of 11 Mbps in the 2.4-GHz frequency range.

multitasking operating system

An operating system that schedules each task and allocates a small amount of time to the execution of each task.

Redundant Array of Independent Disks (RAID)

Describes how the data is stored on multiple disk drives.

uninterruptible powersupply (UPS)

Devices that can maintain power to a computer or device during a power failure for a period long enough to allow a safe shutdown to be performed.

media converters

Devices that convert cables and/or signals from one form to another.

Extended Service Set (ESS)

In a wireless LAN topology, the collection of all the Basic Service Sets attached to the local area network through its access points.

peer-to-peer network

Local area networks that may not have a server; most communications are from workstation to workstation.

Spyware

Malicious software that has been installed (often unknowingly) on a user's computer to monitor the user's actions.

Active Directory

Network directory structure for Windows Server operating system; a hierarchical structure that stores information about all the objects and resources in a network and makes this information available to users, network administrators, and application programs.

NetWare Directory Services (NDS)

Now called eDirectory, a database that maintains information on, and access to, every resource on the network, including users, groups of users, printers, data sets, and servers.

Sniffers

Software and hardware devices that can monitor a network to determine if there are invalid messages being transmitted, report network problems such as malfunctioning NICs, and detect traffic congestion problems; similar to network monitoring software.

security assessment software

Software designed to assess the security weaknesses (and strengths) of a network.

anti-spam software

Software designed to detect and block spam that has been sent to a computer.

anti-spyware software

Software designed to detect and remove malicious programs known as spyware (see spyware).

antivirus software

Software designed to detect and remove viruses that have infected a computer's memory, disks, or operating system.

network-monitoring software

Software designed to monitor a network and report usage statistics, outages, virus problems, and intrusions.

Web server software

Software designed to store, maintain, and retrieve Web pages.

backup software

Software that allows network administrators to back up the data files currently stored on the network server's hard disk drive.

crash protection software

Software whose primary goal is to perform crash stalling (to try to keep the operating system running long enough to perform a graceful exit) on a workstation or network of workstations.

Wired Equivalent Privacy(WEP)

The first security protocol used to encrypt wireless LAN transmissions; it uses 40-bit-long encryption keys that are static (as opposed to dynamic). Due to the existence of a number of weaknesses, It is being replaced.

access point

The interconnecting bridge between a wireless local area network workstation and the wired local area network.

Domain

The primary unit of administration in all of the Windows network operating systems.

server virtualization

The process of making one computer (or server) act as if it were multiple computers (or servers) in order to isolate the operations of a server.

operating system

The program that is initially loaded into computer memory when the computer is turned on; it manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer.

Redirection

The technique of moving a data signal to an alternate path.

interframe space (IFS)

The time in which a workstation waits before transmitting on a wireless local area network. There are typically three different _______ ______, depending upon the function to be performed.

Internet software

The tool set of network software to support Internet-related services that include Web browsers, server software, and Web page publishing software, among other applications.

Basic Service Set (BSS)

The transmission area surrounding a single access point in a wireless local area network; it resembles a cell in a cellular telephone network.

Spam

Unsolicited bulk e-mail (typically commercial in nature) that is becoming a major nuisance to corporate users as well as individuals.


Ensembles d'études connexes

Private Pilot Study Unit 2: Airplane Instruments, Engines, and Systems

View Set

AP US GOV & POLITICS Exam Questions

View Set

The Vocabulary Builder Workbook, lesson 26-30

View Set

Community, Exam #1 Level of prevention practice questions

View Set