Networking
star topology
A physical topology in which every node on the network is connected through a central device, such as a switch. Any single physical wire on a star network connects only two devices, so a cabling problem will affect only two nodes. Nodes transmit data to the hub, which then retransmits the data to the rest of the network segment where the destination node can pick it up.
IP
A protocol that routes a packet to its correct destination address on the Internet.
system
A set of connected things or parts forming a complex whole
backdoor
An account that is secretly set up without the administrator's knowledge or permission, that cannot be detected, and that allows for remote access to the device.
phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Network interface card
An interface fitted inside a personal computer or network terminal which allows it to communicate with other machines over a network.
IPv6
IPv6 An extended scheme of IP addresses, using 128-bit IP addresses, that allows for more IP addresses than current system, IPv4, which uses 32-bit IP addresses. IPv6 is expressed as eight groups of four hexadecimal characters (numbers and letters),
IPv4
Internet Protocol version 4. Identifies hosts using a 32-bit IP address. IPv4 is expressed in dotted decimal format with decimal numbers separated by dots or periods like this: 192.168.1.1. IPv6 - Internet Protocol version 6. Identifies hosts using a 128-bit address. IPv6 is expressed as eight groups of four hexadecimal characters (numbers and letters), such as this: FE80: 0000: 0000: 0000: 20D4: 3FF7: 003F:DE62.
IP
Internet Protocol, protocol that provides the Internet's addressing scheme and is responsible for the actual delivery of data packets
LAN
Local Area Network, Computer network covering a small area. Connects computers in small groups as well as peripherals such as printers to those computers.
PAN
Personal Area Network, just your own little network, it will have multiple devices, but generally for a single user.
POP
Post Office Protocol - Email protocol.
802.11
Set of protocols that specify how wireless networks works. Most common are currently B and G. N is an emerging standard.
1-1
Simplest network, only connecting 2 computers via ethernet cables.
System Admin
The administrator of a (usually) business network and related servers.
Bandwidth
The amount of data that can be transmitted over a network in a given amount of time.
client-server
The model assigns one of two roles to the computers in a network: Client or server. A server is a computer system that selectively shares its resources; a client is a computer or computer program that initiates contact with a server in order to make use of a resource.
TCP
Transmission Control Protocol, a protocol developed for the internet to get data from one network device to another
TCP
Transmission Control Protocol. Provides guaranteed delivery of IP traffic over a network
TCP/IP
Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet.
WPA
Wi-Fi Protected Access
WAN
Wide Area Network, Covers a broad area and allows for data transfers over long distances.
WEP
Wired Equivalent Privacy, an encryption algorithm used to protect data on Wi-Fi Networks
backup
a copy of a file or directory on a separate storage device
decimal
a familiar numeral system that uses ten digits
packet
a fragment of a message sent via a network
WLAN
a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
CSMA/CD
a method of data collision detection in which a node connected to the network listens (that is, has carrier sense) to determine that no other nodes are currently transmitting data signals; short for Carrier Sense Multiple Access with Collision Detection.
binary
a numeral system that only uses two digits
trojan
a program that appears desirable but actually contains something harmful
Help Desk
a service that provides information and assistance to the users of a computer network
switch
a smart hub, it joins multiple computers together, but will direct traffic only to the port that needs it
virus
a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
0
absence of a voltage, "Off", "No", "False"
networking
communicating with and within a group
node
connection along a route, any computer/device that is hooked up to a computer network
hub
contains multiple ports to connect nodes to network. DO NOT USE IF A SWITCH IS AVAILABLE
router
enable computers to communicate and they can pass information between two networks
network topology
how different nodes in a network are connected together and how they communicate
cat5
is a type of UTP Cabling that is rated up to 100 Mbps.
Cat6
is a type of UTP Cabling that is rated up to 1000 Mbps and uses RJ-45 connectors.
1
presence of a voltage, "On", "Yes", "True"
protocol
rules determining the format and transmission of data
bits
single digit pieces of information, placeholder for a binary digit
Network Admin
someone who has training in computer and peripheral maintenance and repair, network design, and installation of network software, installs new equipment, configured computers for users, repairs equipment, and assigns network access to users.
Default Gateway
the IP address of a computer that's able to access the next level of a network.
wireless
transmission of data and information through airwaves using radio frequency, specified by the 802.11 standard ( eg a,b,g,n)
UTP
unshielded twisted pair
FTP
use the File Transfer Protocol to transfer data from one computer to another
Ethernet
A network communications protocol that specifies how machines will exchange data. It uses a broadcast system in which one machine transmits its message on the communication medium. The other machines listen for messages directed to them.
ring topology
A network configuration in which the computers and peripherals are laid out in a configuration resembling a circle. Data flows around the circle from device to device in one direction only.
computer network
A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, and allow electronic communications.
Port
(1) As applied to services running on a computer, a number assigned to a process on a computer so that the process can be found by TCP/IP. Also called a port address or port number. EG Web Servers are port 80.
MAC Address
(Media Access Control) A unique identifier similar to a serial number assigned to networking equipment at time of manufacture.
byte
8 bits
Fibre Optic
Cabling used for networking that uses fine strands of glass. The medium can carry a great deal of data and it gives a fast transfer rate.
bridge
Connectors commonly used for connection between 2 LANs, like switches, but with fewer ports.
router
Connects all points together within network or between networks
resource
Data, CPUs, printers, and data storage devices are some examples of resources.
DNS
Domain Name System, hierarchical distributed naming system for computers, services, or any resource connected to the Internet
DHCP
Dynamic Host Configuration Protocol, gives out IP addresses to computers on a network
192.168.0.1
Free IP Address (IPv4) designated for private use to establish default gateway